http://rdf.ncbi.nlm.nih.gov/pubchem/patent/PL-176458-B1

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_92e6d97d7361ce224dbe85f63f29f5e7
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F7-725
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0894
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-088
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0844
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0825
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-085
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-3829
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-3821
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-02
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3263
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3247
classificationIPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F7-72
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06Q20-02
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G09C1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-08
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06Q20-38
filingDate 1995-01-13^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_906cced3f96b0e3f0816c55ed2c601f3
publicationDate 1999-05-31^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber PL-176458-B1
titleOfInvention Encryption method of the communication system
abstract The invention provides a cryptographic system and method with a key escrow feature that uses a method for verifiably splitting users' private encryption keys into components and for sending those components to trusted agents chosen by the particular users, and provides a system that uses modern public key certificate management, enforced by a chip device that also self-certifies. In a preferred embodiment of this invention, the chip encrypts or decrypts only if certain conditions are met, namely, (1) if a valid "sender certificate" and a valid "recipient certificate" are input, where "valid" means that the particular user's private decryption key is provably escrowed with a specified number of escrow agents and that the master escrow center is registered and certified by the chip manufacturer, and (2) if a valid Message Control Header is generated by the sender and validated by the recipient, thereby giving authorized investigators sufficient information with which to request and obtain the escrowed keys. A further preferred embodiment of this invention provides a method for generating verifiably trusted communications among a plurality of users, comprising the steps of escrowing at a trusted escrow center a plurality of asymmetric cryptographic keys to be used by a plurality of users; verifying each of said plurality of keys at the escrow center; certifying the authorization of each of said plurality of keys upon verification; and initiating a communication from each of said plurality of users using a respective one of said plurality of keys contingent upon said certification.
priorityDate 1994-01-13^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID1132
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419551130

Showing number of triples: 1 to 28 of 28.