Cryptographic method using dual encryption keys and a...

Cryptography – Communication system using cryptography – Wireless communication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S277000, C455S003010, C455S463000, C713S176000

Reexamination Certificate

active

07835525

ABSTRACT:
A cryptographic method using dual encryption keys and a wireless local area network (LAN) system therefor includes (a) generating a first group key in N wireless terminals forming an ad-hoc group, where N is equal to or greater than two, (b) generating a second group key in a main wireless terminal to perform a key distribution center function among the N wireless terminals, and transmitting the second group key to (N−1) sub wireless terminal, and (c) encoding data using the second group key, and transmitting the encoded data between the N wireless terminals. Data security in a wireless LAN system of an ad-hoc network is increased by creating a first group key having a low frequency of use using a group password, and using a random key generation algorithm to create, distribute, and modify a second group key in a wireless terminal functioning as a key distribution center.

REFERENCES:
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 6195751 (2001-02-01), Caronni et al.
patent: 6295361 (2001-09-01), Kadansky et al.
patent: 6889321 (2005-05-01), Kung et al.
patent: 7269728 (2007-09-01), Li
patent: 2002/0095586 (2002-07-01), Doyle et al.
patent: 2002/0095587 (2002-07-01), Doyle et al.
patent: 2002/0095601 (2002-07-01), Hind et al.
patent: 2002/0186846 (2002-12-01), Nyberg et al.
patent: 2003/0149874 (2003-08-01), Balfanz et al.
patent: 2003/0159044 (2003-08-01), Doyle et al.
patent: 2003/0210787 (2003-11-01), Billhartz et al.
patent: 2003/0226013 (2003-12-01), Dutertre
patent: 2003/0233538 (2003-12-01), Dutertre
patent: 2004/0015689 (2004-01-01), Billhartz
N. Asokan and Philip Ginzboorg “Key agreement in Ad-hoc Networks”Computer Communications, vol. 23, No. 17, Nov. 1, 2000, p. 1627-1637.
Bruce Schneier “Applied Cryptography” Second edition published by John Wiley & Sons, Inc 1996, p. 180 Section 8.6 “Key Updating”.
Menezes, et al. “Handbook of Applied Cryptography”, CRC Press, pp. 551-553, (Oct. 1996).
“Specification of the Bluetooth System; Wireless Connections Made Easy; Profiles; v1.0B”, (Dec. 1999).
Waldvogel et al, “The VersaKey . . . ”, IEEE J. on Selected Areas in Communi . . . , 17(9):1614-1631 (Sep. 1999).
Wong, Chung Kei, et al., “Secure Group Communications Using Key Graphs”, IEEE/ACM Transactions on Networking, vol. 8, No. 1, pp. 16-30, (Feb. 2000).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cryptographic method using dual encryption keys and a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptographic method using dual encryption keys and a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic method using dual encryption keys and a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4252097

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.