Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2003-10-01
2009-10-20
Pich, Ponnoreay (Department: 2435)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S150000, C713S169000, C380S033000, C709S227000
Reexamination Certificate
active
07607012
ABSTRACT:
A method for securing a communication between at least one initiator (I) and one responder (R) generates a first key (KEr) within the responder (R), generates a second key (K) within the responder (R), computes an authentication code (C) using the first key (KEr) and the second key within said responder (R), transmits the second key (K) and the authentication code (C) from the responder (R) to the initiator (I) using a first communication channel, transmits the first key (KEr) from the responder (R) to the initiator (I) using a second communication channel, computes a verification code (C′) using the first key (KEr) and the second key (K) within the initiator (I), and compares the verification code (C′) with the authentication code (C) within the initiator.
REFERENCES:
patent: 5159632 (1992-10-01), Crandall
patent: 5450493 (1995-09-01), Maher
patent: 5953420 (1999-09-01), Matyas et al.
patent: 7284127 (2007-10-01), Gehrmann
patent: 2002/0087865 (2002-07-01), Eskicioglu
patent: 2002/0186846 (2002-12-01), Nyberg et al.
patent: 2004/0158715 (2004-08-01), Peyravian et al.
C. Kaufman et al., “Internet Key Exchange (IKEv2) Protocol,” IEFT Draft, Aug. 16, 2003, 99pp.
S. Sovio et al., “Final Technical Report—Specification of a Security Architecture for Distributed Terminals,” Nov. 15, 2002, IST-2000-25350—Shaman, 158pp.
“Information Technology—Security Techniques—Entity Authentication—Part 6: Mechanisms Based on Manual Data Transfer,” ISO/IEC JTC 1/SC 27 N XXXX, WD 9798-6, Apr. 27, 2003, 16pp.
C. Gehrmann et al., “Enhancements to Bluetooth Baseband Security,” 15pp.
C. Gehrmann et al., “Bluetooth Security Expert Group Improved Pairing Proposal,” Rev. 1.0, 14pp.
H. Tschofenig et al., “EAP IKEv2 Method,” IEFT Draft, Jun. 2003, 12pp.
D. Balfanz et al., “Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.”
Fressola Alfred A.
Nokia Corporation
Pich Ponnoreay
Ware Fressola Van Der Sluys & Adolphson LLP
LandOfFree
Method for securing a communication does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for securing a communication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for securing a communication will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4068785