WO2004068264A3 - System and method for creating electronic signatures - Google Patents
System and method for creating electronic signatures Download PDFInfo
- Publication number
- WO2004068264A3 WO2004068264A3 PCT/IB2004/000249 IB2004000249W WO2004068264A3 WO 2004068264 A3 WO2004068264 A3 WO 2004068264A3 IB 2004000249 W IB2004000249 W IB 2004000249W WO 2004068264 A3 WO2004068264 A3 WO 2004068264A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signature
- unique
- server
- sequence
- representation
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/30—Compression, e.g. Merkle-Damgard construction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US44412603P | 2003-01-31 | 2003-01-31 | |
| US60/444,126 | 2003-01-31 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2004068264A2 WO2004068264A2 (en) | 2004-08-12 |
| WO2004068264A3 true WO2004068264A3 (en) | 2004-12-29 |
Family
ID=32825399
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IB2004/000249 WO2004068264A2 (en) | 2003-01-31 | 2004-01-30 | System and method for creating electronic signatures |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2004068264A2 (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7698557B2 (en) * | 2003-12-22 | 2010-04-13 | Guardtime As | System and method for generating a digital certificate |
| SG186515A1 (en) * | 2011-06-30 | 2013-01-30 | Trusted Hub Ltd | Method and system for digitally signing a document |
| CN110881048B (en) * | 2019-12-16 | 2021-11-09 | 苏宁云计算有限公司 | Safety communication method and device based on identity authentication |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1992003000A1 (en) * | 1990-08-02 | 1992-02-20 | Bell Communications Research, Inc. | Method for secure time-stamping of digital documents |
-
2004
- 2004-01-30 WO PCT/IB2004/000249 patent/WO2004068264A2/en active Application Filing
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1992003000A1 (en) * | 1990-08-02 | 1992-02-20 | Bell Communications Research, Inc. | Method for secure time-stamping of digital documents |
Non-Patent Citations (2)
| Title |
|---|
| ASOKAN N ET AL: "SERVER-SUPPORTED SIGNATURES", PROCEEDINGS OF THE EUROPEAN SYMPOSIUM ON RESEARCH IN COMPUTER SECURITY (ESORICS), SPRINGER VERLAG, BERLIN, DE, September 1996 (1996-09-01), pages 131 - 143, XP000972234 * |
| SCHNEIER B: "APPLIED CRYPTOGRAPHY. PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C, PASSAGE", APPLIED CRYPTOGRAPHY. PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C, NEW YORK, JOHN WILEY & SONS, US, 1996, pages 39 - 40, XP002299789, ISBN: 0-471-11709-9 * |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2004068264A2 (en) | 2004-08-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106453222B (en) | Electronic license management method based on ELA electronic license node network system | |
| AU4713801A (en) | Client-side boot domains and boot rules | |
| US20040243811A1 (en) | Electronic signature method with a delegation mechanism, and equipment and programs for implementing the method | |
| EP1094424A3 (en) | Digital signing method | |
| ATE419705T1 (en) | METHOD AND DEVICE FOR CERTIFICATION OF DATA | |
| WO2005086569A3 (en) | System, method and apparatus for electronic authentication | |
| MXPA03010476A (en) | System and method for transmitting reduced information from a certificate to perform encryption operations. | |
| TW200511795A (en) | Three way validation and authentication of boot files transmitted from server to client | |
| EP0845733A3 (en) | Implementing digital signatures for data streams and data archives | |
| WO2007137166A3 (en) | Dynamic web services system and method for use of personal trusted devices and identity tokens | |
| JP3635017B2 (en) | Time authentication system, server device, time authentication method, and recording medium | |
| WO2002048848A3 (en) | Method and appartus for delegating digital signatures to a signature server | |
| WO2005104686A3 (en) | Dynamic executable | |
| WO2001095068A3 (en) | A method for the application of implicit signature schemes | |
| CN103841089A (en) | Digital signature method, system and server | |
| WO2009057338A1 (en) | Signature generating device, signature verifying device, their methods, and their programs | |
| DK1456999T3 (en) | Procedure for electronic signature | |
| Yu et al. | Public cloud data auditing with practical key update and zero knowledge privacy | |
| EP1482704A3 (en) | Distributed authentication in a protocol-based sphere of trust in which a given external connection outside the sphere of trust may carry communications from multiple sources | |
| WO2006028488A3 (en) | Authentication of users and computer systems | |
| EP1536310A3 (en) | System and method for verifying validity of a product | |
| EP3852302B1 (en) | Method for creating a blockchain digital identity, based on an electronic signature | |
| WO2004068264A3 (en) | System and method for creating electronic signatures | |
| EP3316162A8 (en) | Method and system for creating an electronic signature of a document associated to a person by means of the voice print of the person, and corresponding method for verifying the electronic signature | |
| Hwang et al. | On the security enhancement for anonymous secure e-voting over computer network |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC (EPO FORM 1205A DATED 10.10.2005) |
|
| 122 | Ep: pct application non-entry in european phase |