Cryptography – Communication system using cryptography – Wireless communication
Reexamination Certificate
2003-07-07
2010-11-16
Vu, Kimyen (Department: 2435)
Cryptography
Communication system using cryptography
Wireless communication
C380S277000, C455S003010, C455S463000, C713S176000
Reexamination Certificate
active
07835525
ABSTRACT:
A cryptographic method using dual encryption keys and a wireless local area network (LAN) system therefor includes (a) generating a first group key in N wireless terminals forming an ad-hoc group, where N is equal to or greater than two, (b) generating a second group key in a main wireless terminal to perform a key distribution center function among the N wireless terminals, and transmitting the second group key to (N−1) sub wireless terminal, and (c) encoding data using the second group key, and transmitting the encoded data between the N wireless terminals. Data security in a wireless LAN system of an ad-hoc network is increased by creating a first group key having a low frequency of use using a group password, and using a random key generation algorithm to create, distribute, and modify a second group key in a wireless terminal functioning as a key distribution center.
REFERENCES:
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 6195751 (2001-02-01), Caronni et al.
patent: 6295361 (2001-09-01), Kadansky et al.
patent: 6889321 (2005-05-01), Kung et al.
patent: 7269728 (2007-09-01), Li
patent: 2002/0095586 (2002-07-01), Doyle et al.
patent: 2002/0095587 (2002-07-01), Doyle et al.
patent: 2002/0095601 (2002-07-01), Hind et al.
patent: 2002/0186846 (2002-12-01), Nyberg et al.
patent: 2003/0149874 (2003-08-01), Balfanz et al.
patent: 2003/0159044 (2003-08-01), Doyle et al.
patent: 2003/0210787 (2003-11-01), Billhartz et al.
patent: 2003/0226013 (2003-12-01), Dutertre
patent: 2003/0233538 (2003-12-01), Dutertre
patent: 2004/0015689 (2004-01-01), Billhartz
N. Asokan and Philip Ginzboorg “Key agreement in Ad-hoc Networks”Computer Communications, vol. 23, No. 17, Nov. 1, 2000, p. 1627-1637.
Bruce Schneier “Applied Cryptography” Second edition published by John Wiley & Sons, Inc 1996, p. 180 Section 8.6 “Key Updating”.
Menezes, et al. “Handbook of Applied Cryptography”, CRC Press, pp. 551-553, (Oct. 1996).
“Specification of the Bluetooth System; Wireless Connections Made Easy; Profiles; v1.0B”, (Dec. 1999).
Waldvogel et al, “The VersaKey . . . ”, IEEE J. on Selected Areas in Communi . . . , 17(9):1614-1631 (Sep. 1999).
Wong, Chung Kei, et al., “Secure Group Communications Using Key Graphs”, IEEE/ACM Transactions on Networking, vol. 8, No. 1, pp. 16-30, (Feb. 2000).
Jang Kyung-hun
Lee In-sun
Park Jong-ae
Lee & Morse P.C.
Samsung Electronics Co,. Ltd.
Shan April Y
Vu Kimyen
LandOfFree
Cryptographic method using dual encryption keys and a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic method using dual encryption keys and a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic method using dual encryption keys and a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4252097