Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the
Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the receiver. Separately, the sender sends an encrypted version of a decryption key to the receiver. The receiver presents the encrypted version of the key to the secure device and the secure device supplies the decryption key for use by the receiver to decrypt the previously sent encrypted data.
대표청구항▼
1. A computer-readable storage medium storing instructions that, when executed by a secure device, cause the secure device to perform a method, the method comprising: managing, via the secure device, certificates with a sender via a receiver, wherein the sender and the receiver are to engage in a co
1. A computer-readable storage medium storing instructions that, when executed by a secure device, cause the secure device to perform a method, the method comprising: managing, via the secure device, certificates with a sender via a receiver, wherein the sender and the receiver are to engage in a communication with one another, the secure device being a tamper-resistant device that is located in a local processing environment of the receiver, and the secure device comprising a private key that, when provided, grants administrative access to the secure device;wherein managing the certificates comprises, before the sender and the receiver engage in the communication, performing a certificate exchange between the secure device and the sender, the certificate exchange comprising: receiving a certificate for the sender from the sender at the secure device via the receiver; andrecording a date and time that the certificate for the sender is received from the sender, the recorded date and time forming a proof that communication between the sender and the secure device via the receiver was established;sending, from the secure device, a decrypted version of an encrypted key to the receiver, once the receiver presents the encrypted key provided by the sender, and wherein the receiver uses the decrypted version to engage in the communication with the sender. 2. The computer-readable storage medium of claim 1 further comprising, granting access, by the secure device, to the sender to the secure device to perform an audit. 3. The computer-readable storage medium of claim 2 further comprising, providing verification from the secure device that the receiver acquired the decrypted version of the encrypted key from the secure device. 4. The computer-readable storage medium of claim 1 further comprising, recording when the recipient was provided the encrypted key and when the secure device supplied the decrypted version of the encrypted key for auditing. 5. The computer-readable storage medium of claim 1 further comprising, using, via the secure device, the recipient to exchange a public key of the sender with the secure device and a public key of the secure device with the sender. 6. The computer-readable storage medium of claim 1, wherein sending further includes, decrypting the encrypted key with the private key and a public key of the sender. 7. A computer-readable storage medium storing instructions that, when executed by a sender, cause the sender to perform a method, the method comprising: prior to commencing a communication between the sender and a receiver, performing a certificate exchange between a device and the receiver, the certificate exchange comprising: requesting, via the device, a device certificate of a secure device using a receiver, the secure device being a tamper-resistant device that is located in a local processing environment of the receiver, and the secure device comprising a private key that, when provided, grants administrative access to the secure device;supplying, from the device, a sender certificate of the sender to the receiver for delivery to the secure device; andstoring a date and time that the device certificate of the secure device was received from the receiver, the date and time forming a proof that communication with the secure device using the receiver was established; andcommencing, via the device, the communication with the receiver, wherein a closing interaction includes an encrypted key for communication between the sender and the receiver, which when decrypted by the secure device provides a key to the receiver for decrypting encrypted data included with the communication. 8. The computer-readable storage medium of claim 7 further comprising, directly interacting, via the device, with the secure device to confirm the secure device provided the key to the receiver. 9. The computer-readable storage medium of claim 8, wherein interacting further includes obtaining a date and time from the secure device that the key was provided to the receiver by the secure device. 10. The computer-readable storage medium of claim 7 further comprising, receiving, at the device, a repudiation message sent from the receiver indicating that the receiver is asserting the key was not supplied to the receiver by the secure device. 11. The computer-readable storage medium of claim 10 further comprising, directly contacting, via the device, the secure device to obtain confirmation that the key was not supplied to the receiver by the secure device. 12. The computer-readable storage medium of claim 11 further comprising, resending, via the device, the encrypted key to recipient for delivery to the secure to obtain the key when the secure device confirms the recipient never received the key. 13. The computer-readable storage medium of claim 7 further comprising, engaging, via the device, in other communications with the receiver while the receiver uses the key. 14. An apparatus, comprising: a storage;wherein the apparatus is tamper resistant and comprises a private key that, when provided, grants administrative access to the secure device, and wherein the apparatus resides in a local processing environment of a recipient to a communication with a sender;wherein the apparatus is configured to perform a certificate exchange between the apparatus and the sender, the certificate exchange comprising: receiving a certificate for the sender from the sender via the recipient; andrecording, in the storage, a date and time that the certificate for the sender is received from the sender, the recorded date and time forming a proof that communication between the sender and the apparatus via the receiver was established; andwherein the sender provides an encrypted key for a communication with the recipient, the recipient delivers the encrypted key to the apparatus to acquire a decrypted version of the encrypted key, which the recipient is configured to then use to engage in the communication with the sender. 15. The apparatus of claim 14, wherein the apparatus is configure to provide confirmation to the sender that the decrypted key was provided to the recipient for the communication. 16. The apparatus of claim 15, wherein the apparatus is configured to provide a date and time that the decrypted key was provided by the apparatus to the recipient. 17. The apparatus of claim 14, wherein the apparatus is configured to house a public key of the sender. 18. The apparatus of claim 14, wherein the apparatus is configured to instruct the recipient to deliver to the sender a public key of the apparatus.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (28)
Yasutsugu Kuroda JP; Masahiro Komura JP; Satoru Torii JP; Shoko Iwase JP; Etsuo Ono JP, Apparatus and method for proving transaction between users in network environment.
Krajewski ; Jr. Marjan (Acton MA) Chipchak John C. (Dracut MA) Chodorow David A. (Groton MA) Trostle Jonathan T. (Lexington MA) Baldwin Peter T. (Rowley MA), Electronic information network user authentication and authorization system.
Skinner, Eric R.; Simzer, Kevin; Ruckstuhl, Ivo; Thakkar, Dhanya, Method and apparatus for providing non-repudiation of transaction information that includes mark up language data.
Kanda Masayuki,JPX ; Yamanaka Kiyoshi,JPX ; Takashima Youichi,JPX, Method and system for message delivery utilizing zero knowledge interactive proof protocol.
Canard, Sébastien; Guilloteau, Stéphane; Malville, Eric; Traore, Jacques, Method and system with authentication, revocable anonymity and non-repudiation.
Matyas, Jr.,Stephen Michael; Peyravian,Mohammad; Roginsky,Allen Leonid; Zunic,Nevenko, Secure data storage and retrieval in a client-server environment.
Jeffrey Conklin ; David Foucher ; Daniel Foucher, System and method for representing data and providing electronic non-repudiation in a negotiations system.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Whitridge Frederick W. ; Hemingway Brendan F., Telecommunications adapter providing non-repudiable communications log and supplemental power for a portable programmable device.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.