Method for securing a communication

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S150000, C713S169000, C380S033000, C709S227000

Reexamination Certificate

active

07607012

ABSTRACT:
A method for securing a communication between at least one initiator (I) and one responder (R) generates a first key (KEr) within the responder (R), generates a second key (K) within the responder (R), computes an authentication code (C) using the first key (KEr) and the second key within said responder (R), transmits the second key (K) and the authentication code (C) from the responder (R) to the initiator (I) using a first communication channel, transmits the first key (KEr) from the responder (R) to the initiator (I) using a second communication channel, computes a verification code (C′) using the first key (KEr) and the second key (K) within the initiator (I), and compares the verification code (C′) with the authentication code (C) within the initiator.

REFERENCES:
patent: 5159632 (1992-10-01), Crandall
patent: 5450493 (1995-09-01), Maher
patent: 5953420 (1999-09-01), Matyas et al.
patent: 7284127 (2007-10-01), Gehrmann
patent: 2002/0087865 (2002-07-01), Eskicioglu
patent: 2002/0186846 (2002-12-01), Nyberg et al.
patent: 2004/0158715 (2004-08-01), Peyravian et al.
C. Kaufman et al., “Internet Key Exchange (IKEv2) Protocol,” IEFT Draft, Aug. 16, 2003, 99pp.
S. Sovio et al., “Final Technical Report—Specification of a Security Architecture for Distributed Terminals,” Nov. 15, 2002, IST-2000-25350—Shaman, 158pp.
“Information Technology—Security Techniques—Entity Authentication—Part 6: Mechanisms Based on Manual Data Transfer,” ISO/IEC JTC 1/SC 27 N XXXX, WD 9798-6, Apr. 27, 2003, 16pp.
C. Gehrmann et al., “Enhancements to Bluetooth Baseband Security,” 15pp.
C. Gehrmann et al., “Bluetooth Security Expert Group Improved Pairing Proposal,” Rev. 1.0, 14pp.
H. Tschofenig et al., “EAP IKEv2 Method,” IEFT Draft, Jun. 2003, 12pp.
D. Balfanz et al., “Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.”

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for securing a communication does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for securing a communication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for securing a communication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4068785

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.