Processing

Please wait...

Settings

Settings

1. WO1996002993 - METHOD FOR SECURELY USING DIGITAL SIGNATURES IN A COMMERCIAL CRYPTOGRAPHIC SYSTEM

Publication Number WO/1996/002993
Publication Date 01.02.1996
International Application No. PCT/US1995/009076
International Filing Date 19.07.1995
Chapter 2 Demand Filed 14.02.1996
IPC
G07F 7/10 2006.01
GPHYSICS
07CHECKING-DEVICES
FCOIN-FREED OR LIKE APPARATUS
7Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
08by coded identity card or credit card
10together with a coded signal
H04L 9/32 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system
CPC
G06Q 20/341
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
30characterised by the use of specific devices
34using cards, e.g. integrated circuit [IC] cards or magnetic cards
341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
G06Q 20/3821
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
382insuring higher security of transaction
3821Electronic credentials
G06Q 20/401
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
401Transaction verification
G06Q 20/40975
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
409Card specific authentication in transaction processing
4097Mutual authentication between card and transaction partners
40975Use of encryption for mutual authentication
G07F 7/1008
GPHYSICS
07CHECKING-DEVICES
FCOIN-FREED OR LIKE APPARATUS
7Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
08by coded identity card or credit card ; or other personal identification means
10together with a coded signal ; , e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
H04L 2209/56
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
56Financial cryptography, e.g. electronic payment or e-cash
Applicants
  • BANKERS TRUST COMPANY [US/US]; Four Albany Street New York, NY 10006, US (AllExceptUS)
  • SUDIA, Frank, W. [US/US]; US (UsOnly)
  • SIRITZKY, Brian [IE/US]; US (UsOnly)
Inventors
  • SUDIA, Frank, W.; US
  • SIRITZKY, Brian; US
Agents
  • LAZAR, Dale, S. ; Cushman Darby & Cushman L.L.P. 1100 New York Avenue, N.W. Washington, DC 20005, US
Priority Data
08/277,43819.07.1994US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) METHOD FOR SECURELY USING DIGITAL SIGNATURES IN A COMMERCIAL CRYPTOGRAPHIC SYSTEM
(FR) PROCEDE PERMETTANT D'UTILISER EN TOUTE SECURITE DES SIGNATURES NUMERIQUES DANS UN SYSTEME DE CHIFFRAGE COMMERCIAL
Abstract
(EN)
A system for securely using digital signatures in a commercial cryptographic system that allows industry-wide security policy and authorization information to be encoded into the signatures and certificates by employing attribute certificates to enforce policy and authorization requirements. Verification of policy and authorization requirements is enforced in the system by restricting acess to public keys to users who have digitally signed and agreed to follow rules of the system. These rules can also ensure that payment is made for public and private key usage. Additionally, users can impose their own rules and policy requirements on transactions in the system.
(FR)
L'invention concerne un procédé garantissant l'utilisation en toute sécurité de signatures numériques dans un système de chiffrage commercial tel que des informations relatives à des autorisations et à des politiques de sécurité fixées à l'échelon industriel puissent être codées en signatures et certificats, au moyen de certificats d'attributs, pour faire respecter les exigences en matière de politique et d'autorisation. La vérification des exigences en matière de politique et d'autorisation est mise en application dans le système par le fait que l'accès aux clés plubliques est réservé aux utilisateurs qui ont donné leur signature numérique et qui ont accepté de suivre les règles dudit système. Ces règles peuvent également garantir qu'un paiement est fait en contrepartie de l'utilisation d'une clé publique et privée. En outre, les utilisateurs peuvent imposer leurs propres règles et leurs propres exigences en matière de politique, pour des transactions effectuées dans le système.
Latest bibliographic data on file with the International Bureau