Cryptography – Communication system using cryptography – Wireless communication
Reexamination Certificate
2007-10-02
2007-10-02
Barron, Gilberto (Department: 2132)
Cryptography
Communication system using cryptography
Wireless communication
C380S042000, C380S044000, C380S273000, C380S274000
Reexamination Certificate
active
10617642
ABSTRACT:
An encryption system and method that may encrypt all of the transmitted and received data packets on the data link layer without collisions on the Initialization Vector (IV). In the encryption system and method a new final key value may be generated and applied to every transmitted and received data packet. The encryption system and method provide for a novel three phase algorithmic process for generating a final secret key.
REFERENCES:
patent: 5144664 (1992-09-01), Esserman et al.
patent: 5327365 (1994-07-01), Fujisaki et al.
patent: 5420928 (1995-05-01), Aiello et al.
patent: 5473693 (1995-12-01), Sprunk
patent: 5515307 (1996-05-01), Aiello et al.
patent: 6108583 (2000-08-01), Schneck et al.
patent: 6118869 (2000-09-01), Kelem et al.
patent: 6931132 (2005-08-01), Billhartz et al.
patent: 2006/0078124 (2006-04-01), Whelan et al.
“ANSI/IEEE Std 802.11—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications”, IEEE, 1999, Retrieved from the Internet on Nov. 4, 2006: <URL: http://grouper.ieee.org/groups/802/11/>.
Housley et al., “Alternate Temporal Key Hash”, IEEE, Apr. 2002, Retrieved from the Internet on Nov. 4, 2006: <URL: http://grouper.ieee.org/groups/802/11/>.
Walker, J., “Unsafe at any key size; An analysis of the WEP encapsulation”, IEEE, Oct. 2000, Retrieved from the Internet on Nov. 4, 2006: <URL: http://grouper.ieee.org/groups/802/11/>.
Housley et al., “Temporal Key Hash”, IEEE, Dec. 2001, Retrieved from the Internet on Apr. 23, 2007: URL: <http://grouper.ieee.org/groups/802/11/Documents/D1T501-550.html>.
F-Secure Corporation;Protecting Wireless LANs; White Paper; Apr. 2002; 7 pages; F-Secure, Inc, F-Secure Corporation; San Jose, CA and Espoo, Finland.
B.P. Crow, I. Widjaja, J.G.Kim, P.Sakai;Investigation of the IEEE 802.11 Medium Access Control(MAC)Sublayer Functions; 1997, 8 pages; IEEE; 0-8166-7780-5/97.
U.S. Department of Commerce/National Institute of Standards and Technology;Data Encryption Standards(DES); 1999; FIPS PUB 46-3; Federal Information Processing Standards Publication, Category: Computer Security, Subcategory: Cryptography; 22 pages.
Park Young Ho
Shin Jung Gil
You Kwang-Bock
Alston & Bird LLP
Barron Gilberto
Dinh Minh
nDosa Technologies, Inc.
LandOfFree
Cryptographic method and computer program product for use in... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic method and computer program product for use in..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic method and computer program product for use in... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3869278