Method for transferring an encryption key

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S284000, C380S285000

Reexamination Certificate

active

06393127

ABSTRACT:

FIELD OF THE INVENTION
The present invention relates, in general, to secure communication, and, more particularly, to the transfer of encryption keys for secure communications.
BACKGROUND OF THE INVENTION
In order to provide secure communications between devices, it is generally necessary to utilize some form of encryption. Various types of encryption techniques are available in the marketplace. These different techniques all have the same basic premise that both ends of the communication have knowledge of the encryption key being used by the other.
From time-to-time, it becomes necessary to change the encryption keys so that the secure communications will not be compromised over time by an eavesdropper. Presently, a source device, such as a Key Variable Loader (KVL) manufactured by Motorola Inc. is utilized to change the encryption keys in various target devices. These target devices include any device that utilizes encryption (e.g. radio base stations, mobile and portable radios, and console interface unit, and digital interface unit used in communication systems). A source device, such as the KVL, is generally coupled to the target device by some form of wireline, such as a cable. The direct connect enables the KVL to communicate with the source device directly. As a result, the new encryption keys being transferred are transferred in the clear (i.e. not encrypted) to the target devices.
However, since the KVL is designed to work with a variety of equipment, the cable connection requires that availability of a number of cables to be able to interface with the different target equipment. Therefore, a need exists to provide a device and system that does not require the myriad of cables necessary to service the various target equipment. A solution to this is to use a wireless interconnect such as an infra-Red (IR) connection or a Radio Frequency (RF) connection to transfer the data. Using a wireless means to transfer the data can leave the transfer open to intercept and can result in the encryption key transfer process being compromised. Therefore, a need exists for the ability to transfer replacement encryption keys over a wireless connection to the targets in a secure manner.


REFERENCES:
patent: 4649233 (1987-03-01), Bass et al.
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5651066 (1997-07-01), Moriyasu et al.
patent: 5706348 (1998-01-01), Gray et al.
patent: 5841864 (1998-11-01), Klayman et al.
patent: 5909491 (1999-06-01), Luo
Schneier, Bruce, Applied Cryptography, 1996 pp. 15-17.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for transferring an encryption key does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for transferring an encryption key, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for transferring an encryption key will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2879401

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.