Motorola 6412 iii firmware updating
Digital signatures are important because any change whatsoever to the message in an EC is detectable from an analysis of the message and the digital signature. 64b illustrates another account database maintained by an account authority for use with the system of FIG. Accordingly, while much of the present invention is described in detail herein with respect to computers, networks, integrated circuits, computer chips, and devices, no specific software or logic circuit is intended nor is required to be used in the practicing of the present invention.
In this regard, the digital signature is used to “authenticate” a message contained within the EC (hereinafter referred to as “Message Authentication”). 64 illustrates a preferred ABDS system in accordance with a second aspect of the present invention. 64a illustrates an account database maintained by an account authority for use with the system of FIG. Indeed, it would be a matter of routine skill to select appropriate computers, networks, integrated circuits, computer chips, and devices in implementing the invention in a particular business application.
A particular implementation 100 of the CADS system in the context of an electronic transaction between a purchaser 102 and an online merchant 110 is illustrated in FIG. Under this system, a purchaser 102 using, for example, a computer 104 creates a purchase order in the form of an electronic message. 41 illustrates a flowchart of steps performed by an account authority in the business application of FIG. Using the unique identifier (acct ID) 216, the account authority 212 is able to retrieve the associated public key 218, which is necessary for authenticating the message and the sender of the EC 206 (i.e., based on Factor A Entity Authentication).
If the hash value calculated by the recipient equals the hash value of the decrypted digital signature, then the recipient determines that the content of the message contained in the EC was not altered in transmission, which necessarily would have changed the hash value. 58 illustrates a flowchart of steps performed by an intermediate party in the business application of FIG. Finally, a method in accordance with the fourth aspect of the present invention includes applying dynamic risk analysis to a specific message to gauge the risk that the digital signature for the message was fraudulently originated and, thus, to determine whether or not to perform an instruction contained within the message.
In performing Message Authentication, the recipient also authenticates the sender of the EC, in so much as the recipient thereby confirms that the sender of the EC possessed the private key corresponding to the public key used successfully to authenticate the message. 57 illustrates a flowchart of steps performed by an account holder in the business application of FIG. As used herein, an “account holder” is generally any person possessing a device that is capable of generating a digital signature using a private key retained therein; the private key corresponding with a public key associated with an account upon which the person is authorized to act.
The message digest is encrypted by an electronic device generally using a private key of a public-private key pair used in asymmetric cryptography. 67 illustrates another preferred ABDS system in accordance with a second aspect of the present invention. 68 illustrates a flowchart of steps performed by an account holder in the system of FIG. The detailed description set forth herein is not intended nor is to be construed to limit the present invention or otherwise to exclude any such other embodiments, adaptations, variations, modifications and equivalent arrangements of the present invention, the present invention being limited solely by the claims appended hereto and the equivalents thereof.
The resulting ciphertext itself usually constitutes the digital signature, which typically is appended to the message to form the EC. 66 illustrates a flowchart of steps performed by an account authority in the system of FIG. Those skilled in the art will understand and appreciate that the sequence(s) and/or temporal order of the steps of various processes described and claimed herein are those considered by the inventors to be the best mode contemplated by them for carrying out the inventions.