Claims
- 1. A server comprising:a bus; a host processor coupled to the bus; a memory element coupled to the bus; and a cryptographic device coupled to the bus, the cryptographic device including a processing unit, and a memory element accessible by the processing unit, the memory element to store at least a public key, a private key and arbitration software which, when executed by the processing unit, determines whether each of a plurality of digitally signed messages is valid, and returns the plurality of digitally signed messages to each of a plurality of parties upon determining that each of the plurality of messages is valid, each of the plurality of digitally signed messages further includes a list of signatures associated with the digitally signed message and either (i) an electronic document, or (ii) a hash value of the cryptographic device.
- 2. The server according to claim 1, wherein the cryptographic device is dedicated to exclusively operate as control arbitration between the plurality of parties.
- 3. The server of claim 1, wherein the cryptographic device further comprises an internal random number generator contained within the package, the random number generator to generate information to produce the public key and the private key.
- 4. The server of claim 1, wherein the arbitration software of the cryptographic device is non-modifiable.
- 5. The server of claim 1, further comprising an input to receive the plurality of digitally signed messages from a plurality of signatory nodes corresponding to the plurality of parties.
- 6. The server of claim 1, wherein the arbitration software of the cryptographic device is non-modifiable by a user.
- 7. A server to arbitrate execution of a digital agreement involving a plurality of parties, the server comprising:a bus; a memory element coupled to the bus, the memory element containing software to respond to an authentication message and to arbitrate execution of the digital agreement; and a host processor coupled to the bus, the host processor executing the software to at least determine whether a plurality of digitally signed messages from the corresponding plurality of parties arc valid and to provide the plurality of digitally signed messages to each of a plurality of parties when each of the plurality of messages is deemed to be valid, each of the plurality of digitally signed messages further includes a list of signatures associated with the digitally signed message and either (i) an electronic document, or (ii) a hash value of the cryptographic device.
- 8. The server of claim 7, further comprising a random number generator coupled to the bus.
- 9. A computer comprising:a memory element containing software to respond to an authentication message and to arbitrate execution of a digital agreement; and a processor coupled to the memory element, the processor executing the software to at least determine whether a plurality of digitally signed messages from a corresponding plurality of parties are valid and to provide the plurality of digitally signed messages to each of the plurality of parties when each of the plurality of messages is deemed to be valid, at least one of the plurality of digitally signed messages includes a list of signatories associated with the at least one digitally signed message.
- 10. The computer of claim 9, wherein the message includes either an electronic document or a hash value of the electronic document.
- 11. The computer of claim 9, further comprising a random number generator.
- 12. The computer of claim 9, wherein the processor is a general purpose microprocessor.
- 13. A method for digitally signing a digital agreement between a plurality of signatory nodes, comprising:receiving a query at an arbitration node by at least one signatory node, the query requesting information regarding a configuration of a cryptographic device situated in the arbitration node; receiving at the arbitration node a digital signature and a signatory list from each signatory node of the plurality of signatory nodes, each digital signature including a hash value of the digital agreement signed with a private key associated with its signatory node; and producing an acknowledgement for each signatory node of the plurality of signatory nodes upon confirmation that the digital agreement has been digitally signed by the plurality of signatory nodes.
- 14. The method of claim 13, wherein prior to producing the acknowledgement, the method comprises receiving a copy of the digital agreement.
- 15. The method of claim 14, wherein prior to producing the acknowledgement, the method comprises:comparing the signatory lists from each of the plurality of signatory nodes; if the signatory lists compare, recovering a hash value of the digital agreement for each digital signature provided by the plurality of signatory nodes using public keys associated with one of the signatory lists; and performing a hash operation on the copy of the digital agreement to produce a resultant hash value; comparing the resultant hash value with a hash value recovered from each digital signature; and producing the acknowledgement if the resultant hash value matches each hash value recovered from the digital signatures.
CROSS-REFERENCES TO RELATED APPLICATIONS
The named inventor of the present application has filed a number of United States Patent Applications entitled “An Apparatus And Method For Performing Secured Cryptographic Operations” (application Ser. No. 08/578,177, a Continuation of application Ser. No. 08/251,486, filed on Dec. 29, 1995), “A Method For Providing Secured Communications” (application Ser. No. 08/538,869, a Divisional of application Se. No. 08/251,486, filed on Oct. 4, 1995), “A Method For Providing A Roving Software License In A Hardware Agent-Based System” (U.S. Pat. No. 5,568,552). These applications are owned by the same assignee of the present Application.
US Referenced Citations (27)
Non-Patent Literature Citations (3)
Entry |
B. Schneier, Applied Cryptography, (1st Edition), 1994, John Wiley & Sons, Inc., pp. 34, 35, 99.* |
Bruce Schneier; Applied Cryptography; 1994; John Wiley & Sons, Inc.; pp. 19-24.* |
Applied Cryptography (Protocols, Alogorithms and Source Code in C), 2nd Edition, Bruce Schneier, 1996, pp. 101-124. |
Continuations (1)
|
Number |
Date |
Country |
Parent |
08/251486 |
Dec 1995 |
US |
Child |
08/678360 |
|
US |