Method for using an access card to create a secure...

Cryptography – Key management – Having particular key generator

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S255000, C713S163000, C713S172000

Reexamination Certificate

active

06980651

ABSTRACT:
A method for creating a secure sub-network on a public network that includes a set of devices. The secure sub-network is to include a subset of devices from among the set of devices. An access card is provided having a first private key comprised thereon. The access card is scanned to determine the first private key, by the subset of devices. A master device is determined from among the subset of devices. A second private key is selected and a public key is computed based on the second private key, by the master device. The second private key is only known to the master device. The public key is sent to the set of devices, by the master device. A shared encryption key is computed, and an encryption is requested of any subsequent messages between any of the devices comprising the subset of devices using the shared encryption key.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 5604801 (1997-02-01), Dolan et al.
patent: 6134326 (2000-10-01), Micali
patent: 6141750 (2000-10-01), Micali
patent: 6226383 (2001-05-01), Jablon
patent: 6490680 (2002-12-01), Scheidt et al.
patent: 6636968 (2003-10-01), Rosner et al.
patent: 6708273 (2004-03-01), Ober et al.
patent: 6718467 (2004-04-01), Trostle
Diffie et al, “New Directions in Cryptography” Nov. 1976, IEEE Transactions on Information Theory, Col. IT-22, No. 6, p. 644-654.
Hassler, “Security Fundamentals for E-Commerce”, 2001, Artech House Inc., p. 52,53,166,167.
Steiner et al, “Diffie-Hellman Key Distribution Extended to Group Communication”, 1996, ACM, p. 31-37.
Mayer et al, “Secure Protocol Transformation via “Expansion”: From Two-Party to Groups”, 1999, ACM, p. 83-92.
Tuvell, “Challenges Concerning Public-Key in DCE”, Dec. 1996, Open Software Foundation, Request for Comments 98.0 p. 1-24.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for using an access card to create a secure... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for using an access card to create a secure..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for using an access card to create a secure... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3466391

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.