Language selection

Search

Patent 2363655 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2363655
(54) English Title: METHOD FOR CREATING AND PRESERVING AN IDENTIFIER
(54) French Title: CREATION ET CONSERVATION D'UN IDENTIFICATEUR
Status: Deemed Abandoned and Beyond the Period of Reinstatement - Pending Response to Notice of Disregarded Communication
Bibliographic Data
(51) International Patent Classification (IPC):
  • H04L 9/32 (2006.01)
(72) Inventors :
  • HILTUNEN, MATTI (Finland)
  • LIUKKONEN, JUKKA (Finland)
  • VATANEN, HARRI (United Kingdom)
(73) Owners :
  • SONERA SMARTTRUST OY
(71) Applicants :
  • SONERA SMARTTRUST OY (Finland)
(74) Agent: NORTON ROSE FULBRIGHT CANADA LLP/S.E.N.C.R.L., S.R.L.
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2000-02-17
(87) Open to Public Inspection: 2000-08-24
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/FI2000/000124
(87) International Publication Number: WO 2000049767
(85) National Entry: 2001-08-16

(30) Application Priority Data:
Application No. Country/Territory Date
990336 (Finland) 1999-02-17

Abstracts

English Abstract


A method for creating a global unambiguous identifier for predetermined data
structures and for storing identifiers created. In the method, an unambiguous
identifier is created from a key and/or keys associated with an encryption
and/or signing procedure and/or from key holder information and/or other
information. From the identifier, an unambiguous hash code is generated using
e.g. a hash function. The hash codes thus generated are stored in a
centralized place so that each hash code is unambiguously associated with a
given juridical person and a given key pair. The hash code can be used e.g. as
a part of encrypted messages sent by a mobile station in a mobile
communication system so that the user can infer from the identifier how the
message can be decrypted into plain language.


French Abstract

La présente invention concerne un procédé permettant, d'une part la création d'un identificateur global univoque destiné à des structures de données, et d'autre part la conservation en mémoire des identificateurs créés. Pour créer un identificateur univoque, le procédé consiste à partir d'au moins une clé associée à une procédure de cryptage et/ou de signature, et/ou à partir d'au moins une information portant éventuellement sur le détenteur de la clé. Pour générer un code de hachage univoque, on part de l'identificateur que l'on soumet à une fonction de hachage. Le code de hachage ainsi généré est ensuite stocké dans un lieu centralisé de façon que chaque code de hachage soit associé de façon univoque à une personne morale et à une paire de clés définie. Dans le corps d'un message crypté envoyé par une station mobile d'un système de communications mobile, ce code de hachage peut être utilisé de façon que l'utilisateur puisse déduire de l'identificateur la façon dont le message peut se décrypter en langage clair.

Claims

Note: Claims are shown in the official language in which they were submitted.


7
CLAIMS
1. Method for creating an unique identifier
for predetermined data structures and for storing
identifiers created, in which method
an unique identifier is created from initial data
including a key and/or keys associated with an encryp-
tion and/or signing method, key holder information
and/or other information;
a hash code is generated from the identifier which
is a reference pointer to the information from which
the hash code has been generated; and
the hash codes thus generated are stored in a cen-
tralized place so that each hash code is unambiguously
associated with a given juridical person, charac-
terized in that the method further comprises the
steps of:
keeping a record of the identifiers created by means
of a counter,
formatting the counter to a value zero before creat-
ing the identifier,
attaching the counter to the initial data of the
unique identifier to be created,
checking whether the identifier created is unique,
and if the identifier is not unique, then the value of
the counter is increased and the identifier is re-
created, otherwise
the creation process is stopped.
2. Method as defined in claim 1, char-
acterized in that the method further comprises
the steps of:
checking the value of the counter, and
if the value of the counter exceeds the allowed value,
the creation of the identifier is started from the be-
ginning.
3. Method as defined in claim 1, character-
ized in that prior to creating the identifier, the

8
value of the counter is formatted to a first free
value.
4. Method as defined in claims 1 - 3, char-
acterized in that the hash code is generated using a
hash function.
5. Method as defined in claims 1 - 4, charac-
terized in that a reference pointer consisting of a
given part of the hash code is used.
6. Method as defined in claims 1 - 4, charac-
terized in that that the last five bytes of the hash
code are used as a reference pointer.
7. Method as defined in claims 1 - 6, char-
acterized in that the encryption method used is the
public and private key method.
8. Method as defined in claims 1 - 7, charac-
terized in that the hash codes and the public informa-
tion from which the hash code has been generated are
placed in the custody of a trusted third party.

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02363655 2001-08-16
WO 00/49767 PCT/FI00/00124
1
METHOD FOR CREATING AND PRESERVING AN IDENTIFIER
FIELD OF THE INVENTION
The present invention relates to telecommuni-
cation. In particular, the present invention concerns
a new type of method for creating a global unambiguous
identifier for predetermined data structures. Moreo-
ver, the invention relates to concentrated and reli-
able storage of identifiers.
BACKGROUND OF THE INVENTION
The volume of data communication is continu-
ously increasing. The increase entails growing demands
on the security and reliability of data communication.
Many enterprises have their offices scattered around
the world. This is one the factors requiring the pro-
vision of secure data transmission. Various encryption
methods have long been used for data protection. One
of these methods is the public and private key method.
In the following, reference is made to the
public and private key method, but let this be only an
example of the method used.
Encryption is used to prevent transmitted in-
formation from getting into the wrong hands in a plain
language form. The public and private key method is a
means used to achieve this end. At present, the public
keys of private persons are often only locally known
to other people, and finding out the keys requires a
considerable deal of work. The availability of public
key pairs must be simple and feasible in hardware-
independent environments. These factors make it possi-
ble for encryption and signature by the public and
private key method to meet the objective aimed at -
simplicity and efficiency.
The problem at present is the management of
key pairs. As queries for keys may have to be made
globally in any part of the network, using local data

CA 02363655 2001-08-16
WO 00/49767 PCT/FI00/OOI24
2
bases is difficult or almost impossible. Likewise, the
key pair has to be provided with unambiguous data al
lowing the key pair to be associated with the holder
of the key. This is another problem which has not yet
been properly solved.
The object of the present invention is to
eliminate the drawbacks referred to above or at least
to significantly alleviate them.
A specific object of the invention is to dis
close a new type of method whereby the management of
encryption keys is converted from a distributed system
into a centralized one. A further object of the inven
tion is to disclose a method in which an unambiguous
hash code is generated from each key comprised in an
encryption procedure and from the juridical person as-
sociated with the key. This hash code functions as an
identifier by means of which the key pair and the key
holder are associated with each other.
As for the features characteristic of the
present invention, reference is made to the claims.
BRIEF DESCRIPTION OF THE INVENTION
The method of the invention relates to the
creation of a global unambiguous identifier for prede-
termined data structures and to the storage of the
identifiers created. In the method, a juridical name
is added to encryption keys, preferably to a public
encryption and signing key. In addition to the keys
and juridical name, it is possible to add to the
structure to be created even other information to en-
sure that the structure will be unambiguous, i.e. that
a corresponding structure has never been created be-
fore.
From the structure thus created, a hash code
is generated by a function appropriate for the pur-
pose, e.g. a hash function. One of such functions is
the MD5 (MD, Message Digest). The hash function works

CA 02363655 2001-08-16
WO 00/49767 PCT/FI00/00124
3
in a way that makes it impossible to deduce from the
result the starting values used to generate the hash
code. The hash code created works as a reference
pointer pointing to the data from which it has been
generated. In other words, if a hash code created from
information representing a given person is known,
then, based on the hash code, it will be possible to
unambiguously determine the public keys in use and the
juridical person behind the keys. As the hash code
produced by the hash function may be very long, it is
possible to use a given part of the hash code, e.g.
the last five bytes, to identify a desired party. Five
bytes is sufficient to cover over 1000 billion differ-
ent identifiers.
To make the availability of the key pairs as
simple as possible, the hash codes created and the
public information from which the hash code has been
generated are placed in the custody of a trusted third
party (TTP).
The hash code of the present invention can be
used e.g. as a part of an encrypted short message in a
mobile communication system. This part unambiguously
tells the receiver of the message whose public keys
are needed to decrypt the message.
The present invention provides the advantage
that the authenticity of information received is rec-
ognized locally. If the local data is changed, then
the identifier changes as well. Further, the invention
does not restrict the structure of the pointer record
in any way. Another advantage of the invention is that
the unambiguous hash code created constitutes a kind
of "fist" by means of which the receiver can easily
ascertain who is the sender and which keys are needed
to decrypt the information received.

CA 02363655 2001-08-16
WO 00/49767 PCT/FI00/00124
4
LIST OF ILLUSTRATIONS
In the following, the invention will be de-
scribed in detail by the aid of a few of its embodi-
ments, wherein
Fig. 1 illustrates a preferred method accord-
ing to the invention for creating an unambiguous iden-
tifier, and
Fig. 2 represents the registration of an
identifier according to Fig. 1.
Fig. 1 presents an example illustrating the
creation of an identifier, e.g. a net identification.
In this example, encryption is implemented using the
public and private key method. The method illustrated
in Fig. 1 is designed to create an unambiguous identi-
fier for associating a key pair with the holder of the
keys. In this example, the identifier is created from
a public key pair and the juridical name of the holder
of the key pair. 'Juridical name' refers to the person
who has the right to use the encryption keys.
The procedure of creating an identifier is
started by first creating a secret and a public en-
cryption key. The identifiers created are recorded by
means of a running counter, which is at first reset to
zero (3). The juridical name (4) is associated with
the (public) keys created. From the public keys, coun-
ter and juridical name, a hash code (5) is generated.
The hash code is produced e.g. using the MD5 function
(MD, Message Digest). This is a one-way function,
which means that the starting values used to generate
the hash code can not be deduced from this function.
Part of the hash code , a . g . the last f ive bytes of the
hash code, may be used as a reference to the juridical
name.
Next, a check is performed to establish
whether the reference number obtained is already in
use (6). The counter value is incremented by one if
the identifier is already in use (7). Incrementing the

CA 02363655 2001-08-16
WO 00/49767 PCT/FI00/00124
counter has the effect that the identifier to be gen-
erated next will differ somewhat from the previous
identifier attempted. If at this point the counter
value exceeds an allowed limit (11), e.g. 232, then the
5 creation of the identifier is started again from the
beginning.
If the reference number is free, then the
reference number just created is reserved in a refer-
ence index ( 8 ) . The ref erence index i s maintained a . g .
by a trusted third party. If for some reason the at-
tempt to reserve (9) the reference number failed, then
the counter value is incremented by one (7) and action
is resumed at step 5 if the counter did not exceed a
maximum allowed value. If the maximum value was ex-
ceeded (11), then the creation of the identifier is
started from the beginning.
The counter value and the public keys are
saved to an X5 index (10). X5 index means a database
of juridical persons, maintained by a trusted third
party. The reference index reference pointer is set to
contain a pointer to the juridical person in the X5
index. Thus, the juridical person has now been associ-
ated with a given net identification.
Fig. 2 illustrates a situation where an iden
tifier thus created is to be registered. 'Card issuer'
(CI) means e.g. an operator or card manufacturer. In
this example, 'card' means a subscriber identity mod
ule (SIM) as used in mobile stations. The card issuer
(CI) sends a request for the registration of an iden
tifier to a certificate authority (CA) (21). The CA is
a so-called trusted third party, which functions as an
independent party and is in no way linked with the
parties using it. In the custody of or available to
the CA is a NIDS (Net ID Server) . The CA sends to the
NIDS a request for making a reservation (22). The NIDS
checks whether the same identifier is already in use.
If the identifier is not in use, then the NIDS will

CA 02363655 2001-08-16
WO 00/49767 PCT/FI00/00124
6
send the CA information confirming successful reserva-
tion (23). The CA sends a confirmation (24) of suc-
cessful registration to the card issuer.
The card issuer may also verify himself
whether a given identifier is already in use or check
whether a given identifier was successfully reserved.
To carry out a verification, the CI sends to the NIDS
a request to check a given NID (25) . As a result, the
NIDS sends the card issuer an answer to the inquiry
(26) .
The invention is not restricted to the exam-
ples of its embodiments described above, but many
variations are possible within the scope of the inven-
tive idea defined in the claims.

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Inactive: Dead - No reply to Office letter 2003-12-04
Application Not Reinstated by Deadline 2003-12-04
Deemed Abandoned - Failure to Respond to Maintenance Fee Notice 2003-02-17
Inactive: Status info is complete as of Log entry date 2003-01-10
Inactive: Status info is complete as of Log entry date 2003-01-09
Inactive: Adhoc Request Documented 2003-01-09
Inactive: Delete abandonment 2003-01-09
Inactive: Abandoned - No reply to Office letter 2002-12-04
Inactive: Abandoned - No reply to Office letter 2002-11-19
Inactive: Transfer information requested 2002-09-04
Inactive: Correspondence - Transfer 2002-08-07
Inactive: Single transfer 2002-05-06
Inactive: Courtesy letter - Evidence 2002-04-18
Inactive: Single transfer 2002-02-26
Inactive: Courtesy letter - Evidence 2002-01-22
Inactive: Cover page published 2002-01-18
Inactive: Notice - National entry - No RFE 2002-01-15
Inactive: First IPC assigned 2002-01-15
Application Received - PCT 2001-12-28
Application Published (Open to Public Inspection) 2000-08-24

Abandonment History

Abandonment Date Reason Reinstatement Date
2003-02-17

Maintenance Fee

The last payment was received on 2001-08-16

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
MF (application, 2nd anniv.) - standard 02 2002-02-18 2001-08-16
Basic national fee - standard 2001-08-16
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
SONERA SMARTTRUST OY
Past Owners on Record
HARRI VATANEN
JUKKA LIUKKONEN
MATTI HILTUNEN
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative drawing 2002-01-17 1 7
Claims 2001-08-16 2 73
Abstract 2001-08-16 1 62
Description 2001-08-16 6 248
Drawings 2001-08-16 2 26
Cover Page 2002-01-18 2 45
Notice of National Entry 2002-01-15 1 193
Request for evidence or missing transfer 2002-08-19 1 108
Courtesy - Abandonment Letter (Office letter) 2003-01-08 1 167
Courtesy - Abandonment Letter (Maintenance Fee) 2003-03-17 1 178
PCT 2001-08-16 8 320
Correspondence 2002-01-15 1 30
Correspondence 2002-04-18 1 20
Correspondence 2002-09-04 1 18