System and methods for efficient authentication of medical...

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S157000, C713S173000

Reexamination Certificate

active

07965845

ABSTRACT:
A medical ad hoc wireless network (10) is deployed in a healthcare medical facility surrounding individual patients and including wireless nodes (A, B, . . . , Z). Before deployment, each node (A, B, . . . , Z) is pre-initialized with a public key certificate (22) and offers a trust and symmetric key distribution service (32). In joining the ad hoc network (10), a node (B) authenticates and registers to one randomly self-chosen node (A) by using certified public keys (20). Such node (A) becomes Trusted Portal (TPA) of the node (B). The node (B) dynamically registers to a new self-chosen TP node when its old TP node leaves the ad hoc network (10). The network (10) supports symmetric key authentication between nodes registered to the same TP node. Additionally, it supports symmetric key authentication between nodes registered to different TP nodes.

REFERENCES:
patent: 2002/0124169 (2002-09-01), Agrawal et al.
patent: 2003/0226013 (2003-12-01), Dutertre
patent: 2003/0233578 (2003-12-01), Dutertre
patent: 2004/0015689 (2004-01-01), Billhartz
patent: 2007/0214357 (2007-09-01), Baldus et al.
patent: 0131836 (2001-05-01), None
patent: 03107589 (2003-12-01), None
Bohio, M., et al.; Efficient identity-based security schemes for ad hoc network routing protocols; 2004; Ad Hoc Networks; vol. 2; pp. 309-317.
Deng, H., et al.; TIDS: threshold and identity-based security scheme for wireless ad hoc networks; 2004; Ad Hoc Networks; vol. 2; pp. 291-307.
Deng, H., et al.; Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks; 2004; IEEE Proc. Intl. Conf. Inf. Tech.: Coding and Computing.
Jolly, G., et al.; A Low-Energy Key Management Protocol for Wireless Sensor Networks; 2003; Proc. of 8th IEEE Intl. Symposium on Computers and Communication.
Needham, R. M., et al.; Using Encryption for Authentication in Large Networks of Computers; 1978; Communications of the ACM; vol. 21, No. 12; pp. 993-999.
Poosarla, R., et al.; A Cluster Based Secure Routing Scheme for Wireless Ad Hoc Networks; 2004; IEEE; pp. 171-175.
Schneier, B.; Applied Cryptography, Protocols, Algorithms, and Source Code in C; 1996; Applied Cryptography; John Wiley & Sons, NY; pp. 47-65, 566-572.
Venkatraman, L., et al.; A Novel Authentication Scheme for Ad Hoc Networks; 2000; IEEE Wireless Communications and Networking Conf.; vol. 3; pp. 1268-1273.
Zhu, S., et al.; Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach; 2003; Proc. of 11th IEEE Int. Conf. on Network Protocols.
Menezes, A. J., et al.; Handbook of Applied Cryptography; 1996; CRC Press; Chapter 10 “Identification and Entity Authentication”; pp. 385-424. Also at: www.cacr.math.uwaterloo.ca/hac/.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and methods for efficient authentication of medical... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and methods for efficient authentication of medical..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and methods for efficient authentication of medical... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2739235

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.