发明名称 VERFAHREN ZUR ÜBERPRÜFUNG DER BENÜTZUNG VON ÖFFENTLICHEN SCHLÜSSELN WELCHE VON EINEM GELADENEN SYSTEM GENERIERT WERDEN
摘要 For a set (Lk) of embedded systems, an authorized operator with identifier (OP<SUB>j</SUB>) creates a mother public key (KpM) and a mother private key (KsM). The identifier (OP<SUB>j</SUB>), the range of identifiers referenced (Lk) and the mother public key (KpM) are published. For each embedded system (SN<SUB>i</SUB>), a diversified key (KsM<SUB>i</SUB>) is created from the identifier (SN<SUB>i</SUB>) and stored. For every public key (Kp) generated by an embedded system, a cryptographic control value (Sc<SUB>i</SUB>) is calculated on the public key (Kp), an algorithm identifier (CA 1 ) and the utilization parameters (U) of this key, using a zero knowledge signature algorithm, and a certification request message (MRCA) that includes control value (Sc<SUB>i</SUB>), the identifier of the operator (Op<SUB>j</SUB>), and identifier (SN<SUB>i</SUB>) is transmitted to a certification authority, which retrieves the identifier (Op<SUB>j</SUB>) and the value of the mother public key (KpM).
申请公布号 DE60006041(D1) 申请公布日期 2003.11.27
申请号 DE2000606041 申请日期 2000.02.10
申请人 BULL S.A., LOUVECIENNES 发明人 PINKAS, DENIS
分类号 G09C1/00;H04L9/08;H04L9/30;H04L9/32;(IPC1-7):H04L9/08 主分类号 G09C1/00
代理机构 代理人
主权项
地址
您可能感兴趣的专利