Method and arrangement for the computer-aided exchange of...

Cryptography – Particular algorithmic function encoding – Public key

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

06952475

ABSTRACT:
The invention relates to a method which can be used to declare a session key (K) between a first computer unit (U) and a second computer unit (N) without it being possible for an unauthorized third party to obtain useful information regarding the keys or the identity of the first computer unit (U). This is achieved by embedding the principle of El-Gamal key interchange in the method with additional formation of a digital signature using a hash value whose input variable contains at least variables which can be used to infer the session key unambiguously.

REFERENCES:
patent: 5153919 (1992-10-01), Reeds, III et al.
patent: 5214700 (1993-05-01), Pinkas et al.
patent: 5222140 (1993-06-01), Beller et al.
patent: 5515441 (1996-05-01), Faucher
patent: 6064741 (2000-05-01), Horn et al.
patent: 6526509 (2003-02-01), Horn et al.
patent: 6539479 (2003-03-01), Wu
patent: 195 14 084 (1996-07-01), None
patent: 195 18 544 (1996-08-01), None
patent: 195 18 546 (1996-08-01), None
patent: 0 661 844 (1995-07-01), None
patent: 96/37064 (1996-11-01), None
Ashar Aziz et al. “Privacy and Authentication for Wireless Local Area Networks”, IEEE Personal Communications, First Quarter 1994, pp. 25-31.
Mike Beller: “Proposed Authentication and Key Agreement Protocol for PCS”, Joint Experts Meeting on Privacy and Authentication for personal Communications, P&A JEM 1993, pp. 1-11.
Chris Carrol et al.: “Efficient key distribution for slow computing devices: Achieving fast over the air activation for wireless systems”, IEEE Conference Security & Privacy, Oakland 1998, pp. 66-76.
J. Zhou et al.: “Undeniable billing in mobile communications”, Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, Oct. 25-30, 1998, Dallas, TX, pp. 284-290.
Michael J. Beller et al.: “Privacy and Authentication on a Portable Communications System”, IEEE Journal on Selected Areas in Communications, vol. 11, No. 6, Aug. 1993, pp. 821-829.
Whitfield Diffie et al.: “Authentication and Authenticated Key Exchanges”, Designs, Codes and Cryptography, vol. 2, 1992, pp. 107-125.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and arrangement for the computer-aided exchange of... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and arrangement for the computer-aided exchange of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and arrangement for the computer-aided exchange of... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3464606

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.