Communication with non-repudiation and blind signatures
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-009/32
H04N-021/8358
G11B-020/00
G06F-015/16
H04K-001/00
H04L-009/00
출원번호
US-0082092
(2011-04-07)
등록번호
US-8806214
(2014-08-12)
발명자
/ 주소
Sudhakar, Gosukonda Naga Venkata Satya
출원인 / 주소
Novell, Inc.
대리인 / 주소
Schwegman, Lundberg & Woessner, P.A.
인용정보
피인용 횟수 :
2인용 특허 :
23
초록▼
Apparatus, systems, and methods may operate to receive, at a trusted third party (TTP), a signed disguised message as a disguised receiver signature from a receiver that has signed a disguised message using a blind signature process to transform the disguised message into the signed disguised messag
Apparatus, systems, and methods may operate to receive, at a trusted third party (TTP), a signed disguised message as a disguised receiver signature from a receiver that has signed a disguised message using a blind signature process to transform the disguised message into the signed disguised message. Additional activities may include sending, from the TTP, an undisguised version of the disguised message to the receiver, and the receiver signature to a sender of the undisguised version, after determining that the receiver signature is valid. Additional apparatus, systems, and methods are disclosed.
대표청구항▼
1. A method comprising: receiving, at a trusted third party (TTP), a signed disguised message as a disguised receiver signature from a receiver that has signed a disguised message using a blind signature process to transform the disguised message into the signed disguised message; sending, from the
1. A method comprising: receiving, at a trusted third party (TTP), a signed disguised message as a disguised receiver signature from a receiver that has signed a disguised message using a blind signature process to transform the disguised message into the signed disguised message; sending, from the TTP, an undisguised version of the disguised message to the receiver, the undisguised version sent to the TTP by a sender of the undisguised version, and sending, from the TTP, a receiver signature associated with the disguised receiver signature to the sender of the undisguised version, after determining that the receiver signature is valid;prior to sending a decryption key associated with an encrypted message previously sent from the sender to the receiver, performing at least one of verifying by the TTP that the encrypted message has been sent from the sender to the receiver or verifying by the TTP that the receiver has sent a signed version of the encrypted message to the sender; anddiscarding, by the TTP, all data associated with the receiving and the sending, after the sending is complete. 2. The method of claim 1, further comprising: processing, by the TTP, the undisguised version received from the sender as an original message to provide the disguised message. 3. The method of claim 1, further comprising: receiving a key associated with the receiver signature at the TTP, prior to the sending. 4. The method of claim 1, further comprising: processing the signed disguised message by the TTP to extract the receiver signature. 5. The method of claim 1, wherein the determining comprises: verifying, by the TTP, validity of the receiver signature. 6. A method, comprising: receiving, by a trusted third party (TTP), a decryption key and an optional global unique identifier (GUID) from a sender, the decryption key associated with an encrypted message previously sent from the sender to the receiver;receiving, by the TTP, a signed disguised message as a disguised receiver signature from the receiver that has signed a disguised message using a blind signature process to transform the disguised message into the signed disguised message;sending, from the TTP, the key and the optional GUID to the receiver, and a receiver signature associated with the disguised receiver signature to the sender, after determining that the receiver signature is valid;prior to sending the key and the optional GUID to the receiver, performing at least one of verifying by the TTP that the encrypted message has been sent from the sender to the receiver or verifying by the TTP that the receiver has sent a signed version of the encrypted message to the sender; anddiscarding, by the TTP, all data associated with the receiving and the sending, after the sending is complete. 7. The method of claim 6, further comprising: generating the optional GUID based on data provided by the sender or data provided by the receiver, or a combination of these. 8. The method of claim 6, wherein the decryption key comprises an asymmetric key. 9. The method of claim 6, wherein sending the key and the optional GUID further comprise: sending at least one of the encrypted message, the disguised message, the key, or the optional GUID via a secure data channel. 10. The method of claim 6, wherein the encrypted message comprises an email message. 11. The method of claim 6, wherein the encrypted message comprises at least one of a funds transfer request, an indication of funds received, or an indication of funds transmitted. 12. The method of claim 6, wherein the encrypted message comprises software program instructions. 13. The method of claim 6, further comprising: sending an error message to at least one of the sender or the receiver if the receiver signature is determined to be invalid. 14. A system, comprising: one or more processors; anda memory to store a signed disguised message and instructions which, when executed by the one or more processors, results in the one or more processors operating to receive, as a trusted third party (TTP), the signed disguised message as a disguised receiver signature from a receiver that has signed a disguised message using a blind signature process to transform the disguised message into the signed disguised message, and to send, as a TTP, an undisguised version of the disguised message to the receiver, the undisguised version sent to the TTP by a sender of the undisguised version, to send as the TTP, a receiver signature associated with the disguised receiver signature to a sender of the undisguised version, after determining that the receiver signature is valid, and prior to sending a decryption key associated with an encrypted message previously sent from the sender to the receiver, perform at least one of verifying by the TTP that the encrypted message has been sent from the sender to the receiver or verifying by the TTP that the receiver has sent a signed version of the encrypted message to the sender, and discard, by the TTP, all data associated with the receiving and the sending, after the sending is complete. 15. The system of claim 14, further comprising: a server to house the sender; anda display device to display, in human-perceptible format, an original message prior to being encrypted to form the encrypted message. 16. The system of claim 14, further comprising: a server to house the receiver; anda display device to display, in human-perceptible format, a decrypted form of the encrypted message. 17. The system of claim 14, further comprising: an encryption module to transform an original message into the disguised message.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (23)
Yasutsugu Kuroda JP; Masahiro Komura JP; Satoru Torii JP; Shoko Iwase JP; Etsuo Ono JP, Apparatus and method for proving transaction between users in network environment.
Skinner, Eric R.; Simzer, Kevin; Ruckstuhl, Ivo; Thakkar, Dhanya, Method and apparatus for providing non-repudiation of transaction information that includes mark up language data.
Kanda Masayuki,JPX ; Yamanaka Kiyoshi,JPX ; Takashima Youichi,JPX, Method and system for message delivery utilizing zero knowledge interactive proof protocol.
Canard, Sébastien; Guilloteau, Stéphane; Malville, Eric; Traore, Jacques, Method and system with authentication, revocable anonymity and non-repudiation.
Zolotorev, Oleg Anatolivich; Kuznetsov, Ivan Vladimirovich; Moshokin, Andrey Gennadievich; Smirnov, Alexandr Leonidovich; Khamitov, Ildar Magafurovich, Method for carrying out transactions and device for realizing the same.
Matyas, Jr.,Stephen Michael; Peyravian,Mohammad; Roginsky,Allen Leonid; Zunic,Nevenko, Secure data storage and retrieval in a client-server environment.
Jeffrey Conklin ; David Foucher ; Daniel Foucher, System and method for representing data and providing electronic non-repudiation in a negotiations system.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Whitridge Frederick W. ; Hemingway Brendan F., Telecommunications adapter providing non-repudiable communications log and supplemental power for a portable programmable device.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.