Cryptography – Cellular telephone cryptographic authentication – Initialization
Reexamination Certificate
2007-05-08
2007-05-08
Zand, Kambiz (Department: 2134)
Cryptography
Cellular telephone cryptographic authentication
Initialization
C380S283000, C455S411000
Reexamination Certificate
active
09884672
ABSTRACT:
An aspect of the present invention is to easily verify data integrity in data transmission and reception by means of an ad-hoc radio connection. A requester and requested end of an establishment of a cipher communication path are defined as source A and destination B, respectively. A predetermined verification data generation algorithm ID1is arranged in advance between source A and destination B. Source A sends its own public key Kp to destination B, and at the same time generates verification data Xp based on Kp using ID1 and outputs Xp to its own verification image display section. On the other hand, destination B receives data Kx that is transmitted from source A as Kp, then generates verification data Xx based on Kx using ID1and outputs Xx to its own verification image display section. A verifier determines that data integrity is secured if Xp and Xx displayed in the verification image display sections of source A and destination B match.
REFERENCES:
patent: 5225664 (1993-07-01), Iijima
patent: 5909491 (1999-06-01), Luo
patent: 6772331 (2004-08-01), Hind et al.
patent: 6775770 (2004-08-01), Davis et al.
patent: 6886095 (2005-04-01), Hind et al.
patent: 2001/0013890 (2001-08-01), Narayanaswami
patent: 2002/0038392 (2002-03-01), De La Huerga
patent: 0809379 (1997-11-01), None
patent: 0919945 (1999-06-01), None
Vainio (Juha T. Vainio, “Bluetooth Security”); http://www.niksula.cs.hut.fi/˜jiitv/bluesec.html.
Schneier (Bruce Schneier, “Applied Cryptography, Protocols, Algorithms and Source Code in C”, 2nd edition, 1996 ISBN: 0471128457).
Flanagan (David Flanagan, “Java in a Nutshell”, 3rd Edition, 1999, ISBN: 1565924878), p. 22 and 26.
Schneier (Bruce Schneier, “Applied Cryptography, Protocols, Algorithms and Source Code in C”, 2nd edition, 1996 ISBN: 0471128457), p. 351-353.
Schneier (Bruce Schneier, “Applied Cryptography, Protocols, Algorithms and Source Code in C”, 2nd edition, 1996 ISBN: 0471128457), p. 433-438.
Noguchi Tetsuya
Shimotono Susumu
Doughert Anne Vachon
Lenovo (Singapore) Pte. Ltd
Munoz-Bustamante Carlos
Poltorak Peter
Zand Kambiz
LandOfFree
Ad-hoc radio communication verification system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Ad-hoc radio communication verification system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Ad-hoc radio communication verification system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3727947