Electrical computers and digital processing systems: support – Data processing protection using cryptography – Tamper resistant
Reexamination Certificate
2006-06-20
2006-06-20
Sheikh, Ayaz (Department: 2136)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
Tamper resistant
C713S171000, C340S550000, C380S271000, C361S816000, C361S817000, C361S818000, C324S156000, C324S627000, C324S628000
Reexamination Certificate
active
07065655
ABSTRACT:
A method is disclosed comprising placing a first device in an enclosure, placing a second device in the enclosure, sealing the enclosure, and after sealing the enclosure, causing the first device to exchange a key with the second device. After the key exchange, the first and second devices can be taken out of the enclosure and can use the key to communicate with each other securely and in an authenticated manner. The devices may be electronic devices or optical devices. The enclosure prevents electromagnetic radiation of a certain bandwidth from escaping and thus prevents an adversarial device from eavesdropping on communication between the first and second devices. The enclosure may include a filtering material such as a metal net. The enclosure may be, for example, a plastic bag or a glass container. The user may prepare two devices for a communication, such as a key exchange, by setting the two devices in a transfer mode, which may start the key exchange by a timer in one of the devices, then place them in the container, and seal the container. When the devices have finished the communication such as a key exchange, this fact may be signaled by sound or in some other manner by the devices. The container may have a separate compartment for each device and the compartments may be separated by a separation device such as a door comprised of filtering material. When both compartments are properly closed, the users may open the door allowing the two devices to discover each other and communicate or exchange encryption keys. The container may include a Bluetooth or other transmitter, connected to the outside world by means of cord device. The cord device may plug into a device outside of the container with which a key exchange is desired. A portable device is also disclosed in the form of for example, a floppy disc or a PCMCIA card.
REFERENCES:
patent: 4575621 (1986-03-01), Dreifus
patent: 4910090 (1990-03-01), Kuhlman et al.
patent: 4915222 (1990-04-01), Reidinger et al.
patent: 5063273 (1991-11-01), Bloks
patent: 5080096 (1992-01-01), Hooper et al.
patent: 5177791 (1993-01-01), Yeh et al.
patent: 5479341 (1995-12-01), Pihl et al.
patent: 5550529 (1996-08-01), Burge
patent: 5602536 (1997-02-01), Henderson et al.
patent: 5799083 (1998-08-01), Brothers et al.
patent: 5887063 (1999-03-01), Varadharajan et al.
patent: 5892367 (1999-04-01), Magee et al.
patent: 6181284 (2001-01-01), Madsen et al.
patent: 6292898 (2001-09-01), Sutherland
patent: 6657214 (2003-12-01), Foegelle et al.
patent: 6766160 (2004-07-01), Lemilainen et al.
Lucent Technologies - Inc.
Parthasarathy Pramila
Sheikh Ayaz
LandOfFree
Secure enclosure for key exchange does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure enclosure for key exchange, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure enclosure for key exchange will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3662838