Cryptography – Communication system using cryptography – Wireless communication
Reexamination Certificate
2011-05-03
2011-05-03
Song, Hosuk (Department: 2435)
Cryptography
Communication system using cryptography
Wireless communication
C380S277000, C713S168000
Reexamination Certificate
active
07936878
ABSTRACT:
The present system having a secure wireless infrastructure with a key server acting as a key distribution center. The key server may be the core of the network, securely admitting new nodes or devices, deploying and updating keys and authorizing secure communications sessions. The system may also share secure keying information with a new device not already a member of a secure wireless network. The keying information may be used for authentication or encryption or both, and may be provided to the new device in a manner or mode which is not susceptible to exposure outside of the secure network. The keying information shared with the new device may be regarded as a birth key. Then the new device may send a birth key encrypted request to join the secure network via an exposed communication mode. The key server may respond with a birth key encrypted key encryption key.
REFERENCES:
patent: 5136643 (1992-08-01), Fischer
patent: 5325434 (1994-06-01), Spaanderman et al.
patent: 6097812 (2000-08-01), Friedman
patent: 6148342 (2000-11-01), Ho
patent: 7072587 (2006-07-01), Dietz et al.
patent: 7599497 (2009-10-01), Soppera
patent: 2004/0208632 (2004-10-01), Dietz et al.
patent: 2005/0010818 (2005-01-01), Paff et al.
patent: 1379052 (2004-01-01), None
patent: 1450233 (2004-08-01), None
patent: 1705854 (2006-09-01), None
patent: 2007042345 (2007-04-01), None
patent: 2007133298 (2007-11-01), None
Lowe, “Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR,” 20 pages, prior to Oct. 9, 2007.
Needham et al., “Using Encryption for Authentication in Large Networks of Computers,” Communications of the ACM, vol. 21, No. 12, pp. 993-999, Dec. 1978.
Otway et al., “Efficient and Timely Mutual Authentication,” ACM Operating Systems and Review, vol. 21, No. 1, 3 pages, Jan. 1987.
Schneier, Applied Cryptography Second Edition, Chapter 8, Key Management, pp. 176-177, 1996.
Universal Mobile Telecommunications System, (UMTS); Generic Authentication Architecture (GAA), Generic Bootstrapping Architecture, (3GPP TS 33.220 Version 6.3.0 Release 6), Technical Specification, 40 pages, Dec. 2004.
Zigbee Document 053474r07 Version 1.1, 396 pages, Sep. 5, 2005. This Document Will Be Provided By U.S. Mail.
Barnett et al., “A Secure Framework for Wireless Sensor Networks,” 9 pages, 2007.
Foo Kune Denis
Gonia Patrick S.
Kimball Joseph John
Phinney Thomas L.
Honeywell International , Inc.
Seager Tufte & Wickhem LLC
Song Hosuk
LandOfFree
Secure wireless instrumentation network system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure wireless instrumentation network system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure wireless instrumentation network system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2684523