Electronic signature method

作者: Jean-Philippe Wary , Guillaume Bailliard

DOI:

关键词:

摘要: The invention concerns a method whereby telephony operator acts as recording authority and certification for secure transactions between subscriber provider. communications the (101) (113) are signed with symmetrical algorithm (108c, 117C). provider countersigned in accordance PKI technologies (117E, 124A), an asymmetric algorithm. Two configurations possible, either signs his own dual-key, after validation, content of each subscriber/provider transactions, or implements non-repudiable signature transfer, its network, to remote terminal (in secret key technology). This enables reduce resources required subscriber's terminal. also have better visibility on operations which carried out guarantee validity transactions.

参考文章(10)
Marco Aurelio Garib, Secret key messaging ,(2001)
Heikki Rautila, Jan Kåll, Kalevi Ratschunas, Method and system for connecting a mobile terminal to a database ,(2000)
Ryoichi Sasaki, Kazuo Takaragi, Nobuhiro Kurashiki, Takayoshi Shiraishi, Electronic transaction system ,(1988)
Antti Vaha-Sipila, Jari Maenpaa, Electronic commerce system ,(2000)
Chris Hibbert, Frank Jaffe, Jyri Virkki, Milton Anderson, Sheveling Chang, Elaine Palmer, Jeffrey Kravitz, Method and system for processing electronic documents ,(1997)
Lester L. Waters, Jeffrey F. Spelman, Robert B. Seidensticker, Matthew W. Thomlinson, Barbara L. Fox, System and method for secure electronic commerce transactions ,(1995)
Jeffrey R. Austin, Method and system for authentication ,(1989)