On Wed, 17 Sep 2003, David Schwartz wrote:

>       In fact, you could just use an RSA public key as the identifier directly.
> This is likely not the best algorithm, but it's certainly an existence proof
> that such algorithms can be devised without difficulty.
> 
>       In fact, I'm going to call my patent attorney instead of sending this
> email. ;)

Too late. The details can be found in my final report for the US Army SBIR
program for developing "Security for Open Architecture Web-Centric 
Systems".

:)

--vadim

Reply via email to