Ad-hoc radio communication verification system

Cryptography – Cellular telephone cryptographic authentication – Initialization

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S283000, C455S411000

Reexamination Certificate

active

09884672

ABSTRACT:
An aspect of the present invention is to easily verify data integrity in data transmission and reception by means of an ad-hoc radio connection. A requester and requested end of an establishment of a cipher communication path are defined as source A and destination B, respectively. A predetermined verification data generation algorithm ID1is arranged in advance between source A and destination B. Source A sends its own public key Kp to destination B, and at the same time generates verification data Xp based on Kp using ID1 and outputs Xp to its own verification image display section. On the other hand, destination B receives data Kx that is transmitted from source A as Kp, then generates verification data Xx based on Kx using ID1and outputs Xx to its own verification image display section. A verifier determines that data integrity is secured if Xp and Xx displayed in the verification image display sections of source A and destination B match.

REFERENCES:
patent: 5225664 (1993-07-01), Iijima
patent: 5909491 (1999-06-01), Luo
patent: 6772331 (2004-08-01), Hind et al.
patent: 6775770 (2004-08-01), Davis et al.
patent: 6886095 (2005-04-01), Hind et al.
patent: 2001/0013890 (2001-08-01), Narayanaswami
patent: 2002/0038392 (2002-03-01), De La Huerga
patent: 0809379 (1997-11-01), None
patent: 0919945 (1999-06-01), None
Vainio (Juha T. Vainio, “Bluetooth Security”); http://www.niksula.cs.hut.fi/˜jiitv/bluesec.html.
Schneier (Bruce Schneier, “Applied Cryptography, Protocols, Algorithms and Source Code in C”, 2nd edition, 1996 ISBN: 0471128457).
Flanagan (David Flanagan, “Java in a Nutshell”, 3rd Edition, 1999, ISBN: 1565924878), p. 22 and 26.
Schneier (Bruce Schneier, “Applied Cryptography, Protocols, Algorithms and Source Code in C”, 2nd edition, 1996 ISBN: 0471128457), p. 351-353.
Schneier (Bruce Schneier, “Applied Cryptography, Protocols, Algorithms and Source Code in C”, 2nd edition, 1996 ISBN: 0471128457), p. 433-438.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Ad-hoc radio communication verification system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Ad-hoc radio communication verification system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Ad-hoc radio communication verification system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3727947

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.