throbber
United States Patent (19)
`Chaum
`
`Patent Number:
`11
`45) Date of Patent:
`
`4,926,480
`May 15, 1990
`
`54). CARD-COMPUTER MODERATED SYSTEMS
`76 Inventor: David Chaum, 14652 Sutton St.,
`Sherman Oaks, Calif. 91403
`21 Appl. No.: 198,315
`(22
`Filed:
`May 24, 1988
`
`col For Transmitting Personal Information Between
`Organizations', Advances in Crytology. Proceedings of
`Crypto 86, Springer Verlag Press, 1987.
`Elgamal, "A Public Key Cryptosystem. And Signature
`Scheme Based On Discrete Logarithms', Advances in
`Cryptology. Proceedings of Crypto 84, Springer Verlag
`Press, 1985.
`Chaum et al., “An Improved Protocol For Demonstrat
`ing Possession Of Discrete Logarithms And Some
`Generalations', Advances in Cryptology. Proceedings of
`Eurocrypt 87, Springer Verlag Press, 1988.
`Rivest et al., “A Method For Obtaining Digital Signa
`tures And Public-Key Cryptosystems', Communica
`tions of the ACM, Feb. 1978, pp. 120-126.
`Rabin, "Digitalized Signatures And Public-Key Func
`tions. As Intractable As Factorization', MIT Technical
`Report MIT/LCS/TR-212, Jan. 1979.
`Peralta et al., “A Simple And Secure Way To Show
`The Validity Of Your Public Key', Proceedings of
`Crypto 87, Springer Verlag Press, 1988.
`Primary Examiner-Stephen C. Buczinski
`Assistant Examiner-Bernarr Earl Gregory
`Attorney, Agent, or Firm-Nixon & Vanderhye
`(57)
`ABSTRACT
`A user controlled card computer C and communicating
`tamper-resistant part T are disclosed that conduct se
`cure transactions with an external system S. All com
`munication between T and S is moderated by C, who is
`able to prevent T and S from leaking any message or
`pre-arranged signals to each other. Additionally, Scan
`verify that T is in immediate physical proximity. Even
`though S receives public key digital signatures through
`C that are checkable using public keys whose corre
`sponding private keys are known only to a unique T, S
`is unable to learn which transactions involve which T.
`It is also possible for S to allow strictly limited messages
`to be communicated securely between S and T.
`
`18 Claims, 9 Drawing Sheets
`
`63
`
`(56)
`
`Related U.S. Application Data
`Continuation-in-part of Ser. No. 524,896, Aug. 22,
`1983, Pat. No. 4,759,063, and Ser. No. 784,999, Oct. 7,
`1985, Pat. No. 4,759,064, and Ser. No. 168,802, Mar.
`16, 1988, abandoned, and Ser. No. 123,703, Oct. 23,
`987.
`(51) Int. Cl. .............................................. H04K 1/00
`52 U.S. C. ........................................ 380/23: 380/24;
`380/30; 235/379; 235/380; 235/382
`58 Field of Search .................................... 380/23-25,
`380/30, 43, 44, 47, 49,50; 235/379-382
`References Cited
`U.S. PATENT DOCUMENTS
`4,264,782 4/1981 Konheim ............................... 380/25
`4,393,269 7/1983 Konheim ............................... 380/25
`4,423,287 12/1983 Zeidler .....
`... 235/382 X
`4,529,870 7/1985 Chaum .....
`... 235/379 X
`4,590,470 5/1986 Koenig .................................. 380/23
`4,612,413 9/1986 Robert et al. ......................... 380/24
`4,625,076 11/1986 Okamoto et al. ..................... 380/23
`4,656,474 4/1987 Mollier et al........
`... 235/380 X
`4,667,087 5/1987 Quintana ............................. 235/380
`4,697,072 9/1987 Kawana .......
`... 235/379 X
`4,710,613 12/1987 Shigenaga........................... 235/380
`4,748,668 5/1988 Shamir et al. ......................... 380/30
`4,757,185 7/1988 Onishi ..........
`... 235/379
`4,759,063 7/1988 Chaum .................................. 380/30
`4,759,064 7/1988 Chaum .................................. 380/30
`4,782,455 1 1/1988 Morinouchi et al. ........... 235/380 X
`OTHER PUBLICATIONS
`Chaum, "Design Concept For Tamper Responding
`System', Proc. of Crypto 82, Plenum Press, 1983.
`Chaum et al., "A Secure And Privacy Protecting Proto
`ExTERNA
`SYSTEM
`
`S
`
`t35
`
`f 13
`(DATA ENTRY)
`
`
`
`
`
`
`
`120
`(TAMPER
`RESISTANT
`PART)
`
`TCL Exhibit 1010
`
`

`

`5,mm“
`
`S.
`
`1mt
`
`m.t.555Do”4<zmmhxm
`
`“.6;
`
`m
`
`a
`
`9.m1
`
`0
`
`%£52m<29LD
`
`tw:
`
`mu_:h
`
`unlawfiwmuimbmslwmn
`
`
`
`m,...............6"A552.F2398”.
`0V.«82%48.
`
`m.h
`
`TCL Exhibit 1010
`
`TCL Exhibit 1010
`
`
`
`

`

`4,926,480
`
`95$...5
`
`(09a53.n.vo332uguIma
`0V:33:
`mEu3DE
`
`«noofiég4new.
`
`U.S. Patent
`US. Patent
`
`Z "101,4.
`N.Genn
`
`May 15, 1990
`
`
`
`.->1Eoucm.InaNewBannoA.:3n.An-EMEoucEIx >n-vk.33nu.vk=.-_%Eoucm.
`
`8N
`
`Sheet 2 of 9
`
`.ofiéa983.a.&
`
`:33:3..
`
`.mone:..26$2EN...aMvanhafar—.5.6A..8.S.
`.qurdwfxaxxI2%
`
`adsIx8m
`
`
`
`
`
`
`
`
`
`
`
`
`
`cafe."NA.:63
`
`
`
`.qufltsE"NA.3.52
`
`
`TCL Exhibit 1010
`
`TCL Exhibit 1010
`
`
`
`

`

`US. Patent
`
`May 15, 1990
`
`Sheet 3 of9
`
`4,926,480
`
`Non
`
`vow.
`
`2
`
`an
`
`E038..xEoucm.1.
`
`
`
`8.:sA..33s.u.vp.52
`
`man
`
`r..612-vpinr51.23...32
`
`3m
`
`_._Ex5.8I$8
`
`
`
`__31:3A..32
`
`.32r.vh:522.2mm:+cu:.2:5:AE8m
`
`._:sA.
`
`mom.
`
`8n
`
`2m
`
`8.5E.agar
`
`:235x3+:33u:5
`
`$2+c2325xaA.E
`
`
`
`2.5T...:82:
`
`man
`
`TCL Exhibit 1010
`
`TCL Exhibit 1010
`
`
`
`
`
`
`
`

`

`mm,
`
`0y53%A..-“Lil4{FE.
`
`US. Patent
`
`v.35“
`
`AmaA8.3;4aasA.83;m>H=u:HsA.
`
`.339.aA3&3
`fleahaéa:3.F.«A...aS8vamaxE
`
`33asA.
`
`15.3.asA.a}...
`
`>23A2.3;
`
`..mMEsauAn1~A5,>u-vpa...1E852n>W.NS.M:a“0A:"FE
`
`maintaé
`
`3v.anoA-33
`
`Eoucm.I33V
`
`TCL Exhibit 1010
`
`TCL Exhibit 1010
`
`
`

`

`US. Patent May 15,1990
`
`Sheet 5 of 9
`
`4,926,480
`
`T
`
`501
`
`[51] I m'x
`[51] a c: m"
`
`He . 5
`C
`
`W
`
`502
`
` u - random
`v - random
`
`
`
`
`
`[52] . [51]“[211V
`[52] T <- : mxugx"
`
`
`
`504
`
`
`
`
`
`
`[53] ?-7 mug"
`[54.1] - [51])!
`[54-2] - CI
`[54-31 - q'
`[54.1] -> w: me
`[54.2] -> W: gxy
`[54.3] -> w: figmd
`
`
`
`
`
`
`7
`[57.] - [56] x
`[57] -> C: mu'wgv'w
`
`506
`w - random
`[56] - [551?W ,
`[5511' ‘_ : mxu WgXV W
`
`‘f'
`[581-[57]
`[58] -> w: m" g"
`
`.
`
`505
`
`
`
`
`[54.3] 7-? {(15421)
`
`u' - random
`v' - random
`[551 - [54.11"'[§4.21"
`
`[55] c <- : mm 93W
`
`, .
`
`[58] 7-? m"u'gV
`
`TCL Exhibit 1010
`
`TCL Exhibit 1010
`
`

`

`U.S. Patent
`
`May 15, 1990
`
`Sheet 6 of 9
`
`4,926,480
`
`9 "101,4
`
`209
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ipui: -> 1 [99]
`
`Z09
`
`TCL Exhibit 1010
`
`

`

`.b.3.u.vo5..yECU—LN.l0a«E
`
`9mgAfunmEaten..-.o
`1Eaten.I.m,.8“
`
`3
`
`mt
`
`UhSena
`
`h3oh
`
`6098..IatBu
`
`Mo.noA-5..
`
`m6,
`
`.mm2SEVE
`tat3..5%
`
`.min.92onu-vhan7EmBxGEE-at
`
`mamaasA.FE
`
`.0asA.as:
`
`2.82.onEx8EEasA-_E0yham.an425.3“Bxv.
`
`«2.3m5x8:.qunoA.atm.E..3E9.8“
`
`TCL Exhibit 1010
`
`TCL Exhibit 1010
`
`
`

`

`Sheet 8 of 9
`
`9
`
`.m.54.35..an
`
`.uaa$.awn...“:5A.3.3
`
`HaIfix;
`
`85.3:.«AoaéwA«ana::sA.3.3.
`
`
`U.S. Patent
`SU
`ma
`
`May 15, 1990
`
`I3oh
`
`as."oA.:2tEoUcEImDEm
`
`’Q..E.au.v.FRayEOUCSI.mWFE5%
`
`mom
`
`...na:noA.33.uaum.nwmfia.“a...8a
`
`RE
`
`aura..:egA.mrmsrpum083
`
`8 "101,4.
`a.Senn
`
`
`
`
`
`
`
`
`
`
`
`4,926,480
`4,926,480
`
`TCL Exhibit 1010
`
`TCL Exhibit 1010
`
`
`

`

`US. Patent May 15, 1990
`
`Sheet 9 of 9
`
`4,926,480
`
`H6 . 9
`
`902
`
`MW) 7-? 1
`s' - random
`a‘ - random
`
`[92.2] T <- : a'
`
`[92.1] T <.- : 3'
`
`901
`s - random
`a - random
`[911° c: szt‘
`
`[93] - 1(52[92.1]2t3+[92'«2})d‘
`[93] ., c: {(323.2 tmm )d
`
`[9319' 7-? f([91]s'2t'a')
`
`
`[94.1] . [9115-29
`[94.2] - 93
`[94.1] -) W: Sgs'Ltai-a'
`
`
`[94.2] -) w: 1(323'2t3+8')d'
`
`[94.2]6 7-? f([94.1])
`a" - Q([94.1]) xor b'
`[95.1 -f([94.]]ta':')d:
`[95.11c <-:1(3 3-2pm +a )d
`
`[95.2] c <- : a"
`[95.119" 2.? f([91]s-2ta'+[95.2])
`
`
`{96-11 - [95.1]
`..
`'
`[96.2] - [95.2]
`'
`[96.1] T <- : {(323'2‘a+a +a )d'
`
`[96.2] 1' <- : a"
`
`[96.119 7.? t(s2[92.112ta+I92-21+[95-21)
`b" - a xor [92.2] xor [96.2]
`
`TCL Exhibit 1010
`
`TCL Exhibit 1010
`
`

`

`1.
`
`CARD-COMPUTER MODERATED SYSTEMS
`
`10
`
`15
`
`35
`
`RELATED APPLICATIONS
`This application is a continuation-in-part of my prior
`co-pending applications noted below:
`(a) Ser. No. 06/524,896 filed August 22, 1983 and issued
`July 19, 1988 as U.S. Pat. No. 4,759,063;
`(b) Ser. No. 06/784,999 filed October 7, 1985 and issued
`July 19, 1988 as U.S. Pat. No. 4,759,064;
`(c) Ser. No. 07/168,802 filed March 16, 1988, now aban
`doned; and
`(d) Ser. No. 07/123,703 filed November 23, 1987.
`BACKGROUND OF THE INVENTION
`1. Field of the Invention.
`This invention relates to secure transaction systems,
`and more specifically to configurations and crypto
`graphic techniques for transactions between two sub
`systems moderated by a third subsystem.
`20
`2. Description of Prior Art.
`There are essentially three approaches to secure con
`sumer transactions in the known art based on active
`devices held by individuals. Each of these three has
`25
`some shortcomings solved by the others, but the tech
`niques are mutually exclusive.
`The first, and perhaps most obvious, known approach
`is based solely on portable tamper-resistant devices,
`such as are commonly called "IC,' "chip,' or "smart'
`cards. The active part of these cards is comprised today
`30
`of preferably one (but possibly more) integrated cir
`cuit(s), typically including input/output interface, mem
`ory, and often processing means.
`Security from the point of view of the card issuing
`organization under this approach derives primarily
`from the tamper-resistance of the card: the individual
`holding a card is assumed unable to modify or discover
`the content of some data stored within it. The card
`issuer should ensure that the logical structure of the
`card allows only the desired operations to be performed
`on this protected data. Security often also requires that
`the instructions requesting (and results of) these allowed
`operations be securely communicated to (and from) the
`card. Physically secured communication may be possi
`ble when the card is in direct mechanical contact with
`45
`(or at least quite near) other apparatus trusted by the
`card issuer. A more attractive basis for secure commu
`nication, however, is provided by cryptographic tech
`niques, which make direct contact or even proximity
`unnecessary. These techniques allow wider use while
`reducing the trust issuers must have in each terminal
`device within a system. The basis for security of such
`cryptographic communication must of course be keys
`placed within a card's protected storage initially or
`once otherwise secured communication is established.
`Care must also be taken in such systems to further
`protect issuers and individuals from terminal devices,
`even once cryptographically secured communication is
`established between the card and its issuer. This is so
`because modified or completely bogus terminals might
`benefit from making improper use of data provided
`them by individuals (such as, e.g., PIN codes) or from
`displaying misleading information (such as, e.g., im
`proper amounts of payment) to individuals. Solutions
`include a keyboard and display on board the card. The
`65
`keyboard ensures the issuer that input from the individ
`ual card holder is supplied securely to the issuer; the
`display allows the issuer to control messages shown to
`
`4,926,480
`2
`the individual. These humanly operable input and out
`put means are tamper-resistantly integrated with the
`secured chip(s), under this first approach. The recently
`demonstrated Visa/Toshiba "SuperSmart' card, for
`instance, is programmed to display a transaction code
`together with the amount of payment, which allows an
`onlooking shopkeeper (who is assumed able to assess
`the genuineness of a card) to have confidence that the
`transaction code will be honored for the amount dis
`played. (The shop's security would of course be im
`proved if it instead communicated through its own
`computer.)
`One fundamental shortcoming of this first approach is
`that security derives completely from tamper-resist
`ance. Little has been published on the topic of tamper
`resistance of portable computers (but see "Design con
`cepts for tamper-responding systems,' by the present
`applicant, in Proceedings of CRYPTO 82, D. Chaum,
`R. Rivest & A. Sherman, Eds., Plenum 1983). Never
`theless, the threat level such devices available today can
`withstand is certainly above that which could be perpe
`trated without sophisticated tools, but is also almost
`surely below that of a determined attack by a "national
`laboratory.' Moreover, a security system employing a
`single such technologically-based countermeasure may
`be quite vulnerable to unanticipated modes of attack.
`Such systems can even be a national vulnerability, as
`evidenced by attacks on consumer payment systems
`during international hostilities. If payments are to be a
`major early application of card systems, the above con
`siderations suggest that security which relies on tamper
`resistance alone should be copsidered unaccepta
`ble-particularly if each card contains the same master
`key.
`A second intrinsic shortcoming, of this approach
`based wholly on tamper-resistant devices, is that indi
`viduals have no effective way of ensuring the protec
`tion of their own interests. Few may regard a large
`card-issuing organization deliberately cheating them
`out of money in transactions of modest value as a credi
`ble scenario. Nevertheless, it is quite another thing to
`rule out cheating for economic gain by employees or
`others who gain access to all or even part of a system.
`The resulting economic losses to individuals are at least
`potentially detectable and recoverable. There are other
`aspects of a system, such as the ability to issue and re
`voke privileges, whose abuse may be detectable but is
`not fully recoverable: damage from a personal auton
`omy point of view is done by the initial denial of access
`to privileges and cannot be recovered once lost. Other
`dangers may not even be detectable: much data col
`lected in transactions can be considered sensitive from a
`personal privacy perspective. Cards might leak such
`sensitive data directly, or if they reveal universally
`identifying numbers or the like, much such data could
`be linked and collected together. Moreover, the privacy
`related data and the autonomy related decision making
`power of a system may come under control of an entity
`with significantly different intentions than that under
`which the system was originally accepted.
`A second known approach to secure transactions is
`based on apparatus comprising an externally interfaced
`tamper-resistant part that acts as an intermediary be
`tween external systems and a user-controlled worksta
`tion. An example of this approach is disclosed in U.S.
`Pat. No. 4,529,870, titled "Cryptographic identification,
`financial transaction, and credential device," issued to
`
`50
`
`55
`
`TCL Exhibit 1010
`
`

`

`10
`
`4,926,480
`4.
`3
`and stored in the workstation. When such a signature is
`the present applicant. The difference between the first
`released by the individual, the shop receiving it can
`and this second approach derives from the workstation:
`verify its validity. But the shop cannot be sure that
`it need not be trusted by anyone but the individual. This
`copies of the same signature have not also been given to
`allows the individual to develop substantial trust in the
`other shops, in general, without consulting some sort of
`workstation, because the individual is free to obtain its
`central registry of accepted signatures. Particularly for
`hardware and software from any source (or even to
`low value transactions, the cost of consulting such a
`construct it) and this personal workstation need not
`directory may be considerable. This problem can be
`have any structure or data that its owner cannot know
`addressed partly by new techniques that compromise
`or modify.
`the privacy of those attempting to show the same signa
`An advantage of such trustin workstations obtainable
`ture more than once, as described in co-pending appli
`by individuals is that it allows individuals to directly
`cation of the present applicant, titled "One-show blind
`benefit from the now widely known "public key digital
`signature systems,” filed 3/16/88, with U.S. Ser. No.
`signatures.” These can provide, for each transaction, a
`numerical receipt checkable by the individual's work
`168,802, now abandoned.
`More fundamental (but related) problems occur with
`station-and also verifiable by any third party arbiter or
`15
`digital signatures representing "credentials,” which are
`judge. A comprehensive set of such receipts retained by
`statements issued by organizations about individuals.
`the workstation can protect many of an individual's
`Such credentials are obtained by a special crypto
`recoverable interests. They allow, for instance, ulti
`graphic process using blind signatures and are then
`mately at least a proper settling of accounts.
`presented to gain access to privileges. A problem is that
`Other advantages are offered by trustable worksta
`tions. One is that they essentially open the possibility for
`a credential issued to one person for the purpose of
`allowing that person to gain access to some facility or
`a market in suitable hardware and software. This may
`service might too easily be lent to another person. In
`be able to meet the needs of individuals more effectively
`than tamper-resistant devices issued by organizations.
`deed, the signature itself might not even be lent, but
`Special devices adapted to various user preferences or
`communication with the (possibly remote) legitimate
`25
`holder of the credential may allow passable responses to
`disabilities are possible, for example, and the latest ad
`. queries by the person wishing to show the credential at
`vances in technology can be employed. Card issuing
`the point of access. Further problems may also result if
`organizations benefit, since they are freed from the
`additional credentials are obtained using such a bor
`burden of supplying the user interface part and of meet
`ing the demand for its features. The cost of these work
`rowed credential. Some of the credentials so obtained
`30
`might be "positive,” in the sense that it would be in the
`station features are instead shifted to the user, and can in
`effect be shared between issuer organizations, since a
`individual's interest to show them. Thus the lender
`might improperly benefit from the credentials earned by
`single workstation could even accommodate several
`tamper-resistant parts.
`the borrower. Others of these new credentials might be
`"negative,' in that they would be to the disadvantage of
`One thing that cannot be accomplished under this
`approach, however, is preventing the tamper-resistant
`the lender (and thus might inhibit such lending). No
`part from causing a loss of autonomy by partially disen
`matter how such negative credentials are obtained,
`though, they do raise what may be a fundamental prob
`franchising or locking individuals out of a system alto
`lem: individuals, even if they did initially agree to ac
`gether. Such a lockout might even be caused by a co
`vert message or signal sent to the tamper-resistant part
`cept a negative credential, may hide the existence of
`during an ordinary transaction, and the possibilities are
`such credentials (at least for some time) simply by dis
`carding them.
`greatly increased because the tamper-resistant part is
`A further limitation of published practical credential
`privy to all the individual's transaction data. Another
`mechanisms is that they do not provide the possibility
`fundamental limit on the protections obtainable under
`this approach, as with the first approach, relates to
`for credentials containing values secret from the indi
`45
`personal privacy. An individual is unable to effectively
`vidual. Such secrets are used today, for instance, as with
`ensure that the tamper resistant part does not in some
`some medical records.
`way secretly leak sensitive or identifying information
`OBJECTS OF THE INVENTION
`during transactions.
`Accordingly, it is an object of the present invention
`The third known approach may be characterized by
`50
`the complete absence of a tamper-resistant part: all
`to:
`improve organization's security in systems using per
`security derives from cryptographic protocols con
`sonal workstations, without diminishing the protections
`ducted between an external system and an individual's
`workstation. Individuals are ensured of protections for
`offered to individuals;
`their interests, including recoverability, autonomy, and
`improve individual's protections in systems based on
`tamper-resistance, without reducing the legitimately
`privacy. The shortcomings of this approach, in contrast
`needed security for organizations;
`with the previous two approaches, relate instead to
`accomplish the previous objects by providing for
`some aspects of security for organizations.
`cooperation between tamper-resistant parts and per
`An essential concept of this approach is "blind signa
`tures," as described in European Patent Publication
`sonal workstations;
`allow a tamper-resistant part to obtain a signature,
`0139313, titled "Blind signature systems,' dated 2/5/85,
`claiming priority on U.S. Ser. No. 524,896, now U.S.
`unobtainable by a workstation, from an external system,
`Pat. No. 4,759,063 by the present applicant, which is
`without allowing any additional information to be in
`incorporated herein by reference. In making a payment,
`cluded in or along with the signature;
`allow a tamper-resistant part to convince an external
`for instance, with this approach the individual obtains
`public key digital signatures through a blind signature
`system that it has obtained a signature as in the previous
`process. Each signature might represent the equivalent
`objective, without allowing it to leak any additional
`of one dollar, for example, and would be obtained by
`information;
`
`65
`
`35
`
`55
`
`TCL Exhibit 1010
`
`

`

`10
`
`30
`
`. 4,926,480
`6
`5
`FIG. 6 shows a flowchart of a preferred embodiment
`allow a tamper resistant part a role in creating a pri
`of a signature issuing protocol with blinding in accor
`vate key that gives it knowledge, unavailable to the
`dance with the teachings of the present invention.
`workstation, which is needed to use that private key,
`FIG. 7 shows a flowchart of a preferred embodiment
`while ensuring that the tamper-resistant part cannot
`of a signature possession showing protocol with sanitiz
`include any secret information in the corresponding
`ing in accordance with the teachings of the present
`public key;
`allow a certificate for a public key as in the previous
`invention.
`FIG. 8 shows a flowchart of a preferred embodiment
`object to be obtained from the external system by the
`of a protocol for a tamper-resistant part providing a
`workstation, without the system learning which public
`single bit to an external system with hiding in accor
`key it is certifying, thereby removing the need for uni
`dance with the teachings of the present invention.
`versal master keys in tamper-resistant parts;
`-
`allow a tamper-resistant part to issue signatures certi
`FIG. 9 shows a flowchart of a preferred embodiment
`of a protocol for a tamper-resistant part receiving a
`fying its agreement with certain messages;
`single bit from an external system with modifying in
`allow selection of such messages of the previous ob
`15
`accordance with the teachings of the present invention.
`ject to depend on state maintained by the tamper-resist
`ant part, including information not necessarily in the
`BRIEF SUMMARY OF THE INVENTION
`interest of an individual to retain (such as which one
`In accordance with these and other objects of the
`time-use signatures have already been shown or which
`present invention, a brief summary of an exemplary
`pseudonyms or credentials are owned by the individ
`20
`embodiment is presented. Some simplifications and
`ual);
`omissions may be made in the following summary,
`allow proximity of a tamper-resistant part associated
`which is intended to highlight and introduce some as
`with a workstation to be determined by a sensing sta
`pects of the present-invention, but not to limit its scope.
`tion;
`Detailed descriptions of preferred exemplary embodi
`allow the workstation to ensure that the external
`25
`ments adequate to allow those of ordinary skill in the art
`system cannot leak messages or signals to the tamper
`to make and use the inventive concepts will be provided
`resistant part in the above transactions;
`allow the workstation to ensure that the tamper
`later.
`A card computer C is held by an individual who can
`resistant part cannot leak messages or signals to the
`control its internal operation (almost) completely. The
`external system in the above transactions;
`individual has a tamper-resistant part T, over the inter
`allow a workstation to permit strictly limited
`nal operation of which the individual has essentially no
`amounts of data to be provided from an external system
`control. The individual also conducts transactions with
`to a tamper-resistant part, without the workstation
`one or more organizations or individuals that may col
`being able to learn the content of that data;
`lectively be called the external system S. The physical
`allow a workstation to permit a tamper-resistant part
`arrangement is such that all information transferred
`to issue strictly limited amounts of data to an external
`between T and S must pass through C as is shown in
`system, without such data becoming accessible to the
`FIG. 1. This gives C the chance to "moderate' such
`workstation;
`transfers by stopping a transfer altogether, allowing a
`allow the tamper-resistant part to convince the work
`transfer as requested by T or S, or modifying a transfer
`station of relationships between such strictly limited
`before it reaches the other party.
`data it receives and that which it issues; and
`A transaction protocol of the preferred embodiment
`allow efficient, economical, and practical apparatus
`shown in FIG. 2 allows a blind signature to be obtained
`and methods fulfilling the other objects of the inven
`by C from S. Within the signature is contained, in
`tion.
`blinded form, a public key q developed by cooperation
`Other objects, features, and advantages of the present
`45
`between C and T. The ability to form public key digital
`invention will be appreciated when the present descrip
`signatures that can be checked with q is at least in part
`tion and appended claims are read in conjunction with
`the drawing figures.
`held by T. Yet, C is ensured that q does not reveal any
`information chosen by T. Thus, C may be said to “neu
`BRIEF DESCRIPTION OF THE DRAWING
`tralize' a public key created by T and obtain a signed
`FIGURES
`certificate for it.
`Another transaction protocol, shown in FIG. 3, al
`FIG. 1 shows a combination block and functional
`diagram of a preferred embodiment including a tamper
`lows S, T, and C to develop essentially the same value,
`m, resulting from a challenge response sequence be
`resistant part, workstation, and external system in ac
`tween S and T. The protocol allows C to pad the value
`cordance with the teachings of the present invention.
`55
`of m and the exchanged messages by which it is devel
`FIG. 2 shows a flowchart of a preferred embodiment
`oped: neither Snor Tcan influence m (or the messages
`of a public key neutralization protocol in accordance
`sent in developing it) in such a way that any information
`with the teachings of the present invention.
`chosen by S or T is revealed to the other of the two.
`FIG. 3 shows a flowchart of a preferred embodiment
`of a distance bounding protocol with both outflow and
`Yet, both S and T are ensured that m results from and is
`60
`dependent on their respective challenge and response.
`inflow protection in accordance with the teachings of
`In developing m, single bits of challenge issued by S are
`the present invention.
`responded to by single bits from T. Because the amount
`FIG. 4 shows a flowchart of a preferred embodiment
`of computation required by the parties to process each
`of a digital signature protocol with obscuring in accor
`such single bit is extremely small, timing by S of the
`dance with the teachings of the present invention.
`65
`interval between its issue of a challenge bit and its re
`FIG. 5 shows a flowchart of a preferred embodiment
`ceipt of the corresponding response bit allows S to
`of a undeniable signature protocol with disguising in
`accordance with the teachings of the present invention.
`determine an upper bound on the distance to T.
`
`35
`
`50
`
`TCL Exhibit 1010
`
`

`

`5
`
`15
`
`4,926,480
`8
`7
`ated, C might also be any computer of any ownership or
`. A further protocol of the preferred embodiment,
`use. For clarity in exposition, however, C will be said to
`shown in FIG. 4, allows T to develop a digital signature
`on a message, m for instance, using the private key
`be held or owned by an individual that will use it in
`corresponding to public key q. This signature is trans
`transactions.
`It may be that C contains parts that are in general
`ferred from T to S by C in a way that allows C to ensure
`difficult for its owner to examine or modify, but the
`its correctness; the content of the message signed is
`security for organizations against abuses that might be
`controlled by T but verifiable by C. Because the result
`perpetrated against them by the individual holding C
`obtained by S is a public key digital signature, S can
`should not rely on this tamper-resistance. For example,
`verify that it was formed by the holder of the private
`it is anticipated that part of C may include memory
`key corresponding to q, and convince any third party of
`10
`this fact just by showing the signature. The signature is
`elements whose contents must be changed if C is to be
`useful to a different person. Another example is mem
`obscured by C to ensure that it does not leak any infor
`ory elements that are not usually readable, unless some
`mation from T.
`A related protocol of the preferred embodiment,
`pre-arranged PIN code, biometric, or the like is entered;
`such arrangements might protect the holder's data from
`shown in FIG. 5, allows T to show an undeniable signa
`inspection by someone else coming into possession of C.
`ture on a message, also using the private key corre
`sponding to public key q. Undeniable signatures are
`While such tamper-resistance does prevent the holder
`disclosed in a co-pending application, titled "Undeni
`from certain accesses and may provide improved secu
`rity for individuals, and indirectly for organizations, the
`able signature systems,” with U.S. Ser. No. 123,703,
`security of organizations against abuses by individuals
`filed 23/11/87, by the present applicant, which is in
`does not rely on it, and it primarily acts as a protection
`cluded herein by reference. Such showing of an undeni
`able signature by T involves S forming a challenge that
`of the owner against other individuals.
`can be convincingly responded to by T (with all but
`Tamper-resistant part T 120 is an information pro
`substantially negligible probability) only if T has
`cessing device, perhaps a general microcomputer. It
`formed the undeniable signature properly and particia
`derives input from interface 125 that is provided by C
`25
`pates informing the response. Such an undeniable signa
`110 and provides output through interface 125 to C 110.
`ture can be re-shown as often as desired, but only by
`It is intended to at least maintain some secrets from the
`cooperation of Teach time. Again, C is able to ensure
`individual who holds it and to have at least some struc
`that communication between T and S during this trans
`ture that is unmodifiable by the individual, that which at
`action is completely disguised, apart from the showing
`least prevents the individual from making some accesses
`30
`of the undeniable signature.
`to the secrets it contains. These secret values need not
`be explicitly stored in ordinary memory, elements; they
`A pair of yet other transaction protocols, whose uses
`may be encoded in the structure of T in some other
`are in some sense analogous to those of FIG. 2 and FIG.
`way, possibly in efforts to keep them more securely
`5, are shown in FIG. 6 and FIG. 7, respectively. The
`protocol of FIG. 6 allows T to receive a digital signa
`from individuals. Some of the secrets of T may of
`35
`course be stored in encrypted form by C.
`ture from S that is unobtainable by C, but C is able to
`It is anticipated that Ts might be supplied by organi
`ensure that only the signature on the desired message is
`learned by T. The protocol of FIG. 7 allows T to later
`zations to individuals. One way this might be accom
`convince S that it does have the signature of the particu
`plished is by direct issue of one. Tselected by an organi
`lar message and is responding to challenges, without
`zation to a specific individual. Another issuance proce
`allowing C to obtain the signature.
`dure, which may have advantages to individuals, allows
`Yet another pair of transaction protocols shown in
`the individual to choose between a plurality of Ts, per
`haps even in a way that prevents the organization from
`FIG. 8 and FIG. 9 allow the transfer of a s

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket