Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2011-03-22
2011-03-22
Chen, Shin-Hon (Department: 2431)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
C713S155000, C380S044000, C380S273000
Reexamination Certificate
active
07913096
ABSTRACT:
An arrangement for the cipher controlled exploitation of data resources (e.g., securely storing and retrieving sensitive data or securely registering and logging on a computer system) includes the steps of providing a subscriber identity module carrying a security algorithm; generating at least one, e.g., two, random values; subjecting the random value to the at least one security algorithm to generate at least one, e.g., two, session keys; processing the session keys via a mixer function such as a hash function to produce a cipher key; and using the cipher key thus produced for exploiting the data resources.
REFERENCES:
patent: 5534857 (1996-07-01), Laing et al.
patent: 6373946 (2002-04-01), Johnston
patent: 6504932 (2003-01-01), Vasnier et al.
patent: 6591364 (2003-07-01), Patel
patent: 6690930 (2004-02-01), Dupre
patent: 7177425 (2007-02-01), Ben-Chuan et al.
patent: 2002/0165008 (2002-11-01), Sashihara et al.
patent: 2003/0028763 (2003-02-01), Malinen et al.
patent: 2004/0024846 (2004-02-01), Randall et al.
patent: 2004/0204124 (2004-10-01), Campbell
patent: 2004/0210766 (2004-10-01), Kroselberg
patent: 2005/0021940 (2005-01-01), Ma
patent: 2005/0037752 (2005-02-01), Kwan et al.
patent: 0 537 925 (1993-04-01), None
patent: 1 223 495 (2002-07-01), None
patent: WO 00/31608 (2000-06-01), None
patent: WO 02/054210 (2002-07-01), None
Menezes, et al., “Handbook of Applied Cryptography”, Chapter 9, CRC Press, Inc., pp. 320-383, (1997).
“Secure Hash Standard”, Federal Information Processing Standards Publication 180-2, pp. i-iv, 1-71, (Aug. 1, 2002).
“3 GPP TS 03.20”, Global System for Mobile Communications, 3rdGeneration Partnership Project; Digital cellular telecommunications system (Phase 2+); Security related network functions, pp. 1-95, (2000).
“ETSI TS 100 977”, Global System for Mobile Communications, Digital cellular telecommunications system (Phase 2+); Specification of the Subscriber Identity Module—Mobile Equipment (SIM—ME) interface, pp. 1-170, (2000).
Caprella Ettore Elio
Leone Manuel
Chen Shin-Hon
Finnegan Henderson Farabow Garrett & Dunner L.L.P.
Telecom Italia S.P.A.
LandOfFree
Method and system for the cipher key controlled exploitation... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for the cipher key controlled exploitation..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for the cipher key controlled exploitation... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2692427