Cryptographic method and computer program product for use in...

Cryptography – Communication system using cryptography – Wireless communication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S042000, C380S044000, C380S273000, C380S274000

Reexamination Certificate

active

10617642

ABSTRACT:
An encryption system and method that may encrypt all of the transmitted and received data packets on the data link layer without collisions on the Initialization Vector (IV). In the encryption system and method a new final key value may be generated and applied to every transmitted and received data packet. The encryption system and method provide for a novel three phase algorithmic process for generating a final secret key.

REFERENCES:
patent: 5144664 (1992-09-01), Esserman et al.
patent: 5327365 (1994-07-01), Fujisaki et al.
patent: 5420928 (1995-05-01), Aiello et al.
patent: 5473693 (1995-12-01), Sprunk
patent: 5515307 (1996-05-01), Aiello et al.
patent: 6108583 (2000-08-01), Schneck et al.
patent: 6118869 (2000-09-01), Kelem et al.
patent: 6931132 (2005-08-01), Billhartz et al.
patent: 2006/0078124 (2006-04-01), Whelan et al.
“ANSI/IEEE Std 802.11—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications”, IEEE, 1999, Retrieved from the Internet on Nov. 4, 2006: <URL: http://grouper.ieee.org/groups/802/11/>.
Housley et al., “Alternate Temporal Key Hash”, IEEE, Apr. 2002, Retrieved from the Internet on Nov. 4, 2006: <URL: http://grouper.ieee.org/groups/802/11/>.
Walker, J., “Unsafe at any key size; An analysis of the WEP encapsulation”, IEEE, Oct. 2000, Retrieved from the Internet on Nov. 4, 2006: <URL: http://grouper.ieee.org/groups/802/11/>.
Housley et al., “Temporal Key Hash”, IEEE, Dec. 2001, Retrieved from the Internet on Apr. 23, 2007: URL: <http://grouper.ieee.org/groups/802/11/Documents/D1T501-550.html>.
F-Secure Corporation;Protecting Wireless LANs; White Paper; Apr. 2002; 7 pages; F-Secure, Inc, F-Secure Corporation; San Jose, CA and Espoo, Finland.
B.P. Crow, I. Widjaja, J.G.Kim, P.Sakai;Investigation of the IEEE 802.11 Medium Access Control(MAC)Sublayer Functions; 1997, 8 pages; IEEE; 0-8166-7780-5/97.
U.S. Department of Commerce/National Institute of Standards and Technology;Data Encryption Standards(DES); 1999; FIPS PUB 46-3; Federal Information Processing Standards Publication, Category: Computer Security, Subcategory: Cryptography; 22 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cryptographic method and computer program product for use in... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptographic method and computer program product for use in..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic method and computer program product for use in... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3869278

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.