Method and system for the cipher key controlled exploitation...

Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S155000, C380S044000, C380S273000

Reexamination Certificate

active

07913096

ABSTRACT:
An arrangement for the cipher controlled exploitation of data resources (e.g., securely storing and retrieving sensitive data or securely registering and logging on a computer system) includes the steps of providing a subscriber identity module carrying a security algorithm; generating at least one, e.g., two, random values; subjecting the random value to the at least one security algorithm to generate at least one, e.g., two, session keys; processing the session keys via a mixer function such as a hash function to produce a cipher key; and using the cipher key thus produced for exploiting the data resources.

REFERENCES:
patent: 5534857 (1996-07-01), Laing et al.
patent: 6373946 (2002-04-01), Johnston
patent: 6504932 (2003-01-01), Vasnier et al.
patent: 6591364 (2003-07-01), Patel
patent: 6690930 (2004-02-01), Dupre
patent: 7177425 (2007-02-01), Ben-Chuan et al.
patent: 2002/0165008 (2002-11-01), Sashihara et al.
patent: 2003/0028763 (2003-02-01), Malinen et al.
patent: 2004/0024846 (2004-02-01), Randall et al.
patent: 2004/0204124 (2004-10-01), Campbell
patent: 2004/0210766 (2004-10-01), Kroselberg
patent: 2005/0021940 (2005-01-01), Ma
patent: 2005/0037752 (2005-02-01), Kwan et al.
patent: 0 537 925 (1993-04-01), None
patent: 1 223 495 (2002-07-01), None
patent: WO 00/31608 (2000-06-01), None
patent: WO 02/054210 (2002-07-01), None
Menezes, et al., “Handbook of Applied Cryptography”, Chapter 9, CRC Press, Inc., pp. 320-383, (1997).
“Secure Hash Standard”, Federal Information Processing Standards Publication 180-2, pp. i-iv, 1-71, (Aug. 1, 2002).
“3 GPP TS 03.20”, Global System for Mobile Communications, 3rdGeneration Partnership Project; Digital cellular telecommunications system (Phase 2+); Security related network functions, pp. 1-95, (2000).
“ETSI TS 100 977”, Global System for Mobile Communications, Digital cellular telecommunications system (Phase 2+); Specification of the Subscriber Identity Module—Mobile Equipment (SIM—ME) interface, pp. 1-170, (2000).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for the cipher key controlled exploitation... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for the cipher key controlled exploitation..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for the cipher key controlled exploitation... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2692427

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.