AU6084296A - Cryptographic system and method with key escrow feature - Google Patents

Cryptographic system and method with key escrow feature

Info

Publication number
AU6084296A
AU6084296A AU60842/96A AU6084296A AU6084296A AU 6084296 A AU6084296 A AU 6084296A AU 60842/96 A AU60842/96 A AU 60842/96A AU 6084296 A AU6084296 A AU 6084296A AU 6084296 A AU6084296 A AU 6084296A
Authority
AU
Australia
Prior art keywords
cryptographic system
key escrow
escrow feature
feature
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
AU60842/96A
Other versions
AU705473B2 (en
Inventor
Frank W Sudia
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Certco Inc
Original Assignee
Bankers Trust Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU16803/95A external-priority patent/AU1680395A/en
Application filed by Bankers Trust Co filed Critical Bankers Trust Co
Publication of AU6084296A publication Critical patent/AU6084296A/en
Assigned to CERTCO LLC reassignment CERTCO LLC Alteration of Name(s) of Applicant(s) under S113 Assignors: BANKERS TRUST COMPANY
Application granted granted Critical
Publication of AU705473B2 publication Critical patent/AU705473B2/en
Priority to AU44619/99A priority Critical patent/AU4461999A/en
Assigned to CERTCO INC reassignment CERTCO INC Alteration of Name(s) in Register under S187 Assignors: CERTCO LLC
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/725Finite field arithmetic over elliptic curves

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
AU60842/96A 1994-01-13 1996-08-01 Cryptographic system and method with key escrow feature Ceased AU705473B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU44619/99A AU4461999A (en) 1994-01-13 1999-08-20 Cryptographic system and method with key escrow feature

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US18185994A 1994-01-13 1994-01-13
US181859 1994-01-13
US27220394A 1994-07-08 1994-07-08
US272203 1994-07-08
AU16803/95A AU1680395A (en) 1994-01-13 1995-01-13 Cryptographic system and method with key escrow feature

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
AU16803/95A Division AU1680395A (en) 1994-01-13 1995-01-13 Cryptographic system and method with key escrow feature

Related Child Applications (1)

Application Number Title Priority Date Filing Date
AU44619/99A Division AU4461999A (en) 1994-01-13 1999-08-20 Cryptographic system and method with key escrow feature

Publications (2)

Publication Number Publication Date
AU6084296A true AU6084296A (en) 1996-10-10
AU705473B2 AU705473B2 (en) 1999-05-20

Family

ID=27152318

Family Applications (1)

Application Number Title Priority Date Filing Date
AU60842/96A Ceased AU705473B2 (en) 1994-01-13 1996-08-01 Cryptographic system and method with key escrow feature

Country Status (1)

Country Link
AU (1) AU705473B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111726230A (en) * 2020-05-22 2020-09-29 支付宝(杭州)信息技术有限公司 Data storage method, data recovery method, device and equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4888801A (en) * 1988-05-02 1989-12-19 Motorola, Inc. Hierarchical key management system
US5136643A (en) * 1989-10-13 1992-08-04 Fischer Addison M Public/key date-time notary facility
US5276737B1 (en) * 1992-04-20 1995-09-12 Silvio Micali Fair cryptosystems and methods of use

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111726230A (en) * 2020-05-22 2020-09-29 支付宝(杭州)信息技术有限公司 Data storage method, data recovery method, device and equipment

Also Published As

Publication number Publication date
AU705473B2 (en) 1999-05-20

Similar Documents

Publication Publication Date Title
AU1680395A (en) Cryptographic system and method with key escrow feature
AU3321795A (en) System and method for key escrow and data escrow encryption
AU6248898A (en) Authentication key management system and method
AU5689398A (en) Public key cryptographic apparatus and method
AU3199399A (en) Encryption key management system and method
EP0850523B8 (en) Document authentication system and method
AU1061499A (en) Method and apparatus for asymmetric key management in a cryptographic system
AU6761996A (en) Method and apparatus for encryption key creation
AU5266596A (en) Method for signature and session key generation
AU2844497A (en) Operation management system and operation management method
EP0576224A3 (en) Cryptographic key management apparatus and method.
AU4582897A (en) Public key cryptosystem method and apparatus
AU7620394A (en) Apparatus for key distribution in an encryption system
AU1732597A (en) Communication method using common cryptographic key
GB9503738D0 (en) Cryptographic key management
AU1099795A (en) Cashless key and receptacle system
AU7040996A (en) Key identifier method and apparatus
AU1940397A (en) Forming method and forming system
AU1425197A (en) Multiple cryptographic key distribution
AU6244896A (en) Restritedly blindable certificates on secret keys
AU4039297A (en) Encryption enhancement system
AU5425898A (en) Improved tri-signature security architecture systems and methods
AU6995696A (en) Security document and method for its manufacture
AU2098897A (en) Multiple account management system and method using same
AU6084296A (en) Cryptographic system and method with key escrow feature

Legal Events

Date Code Title Description
PC Assignment registered

Owner name: CERTCO INC

Free format text: FORMER OWNER WAS: CERTCO LLC

MK14 Patent ceased section 143(a) (annual fees not paid) or expired