Cryptography – Key management – Key distribution
Reexamination Certificate
2011-06-21
2011-06-21
Gee, Jason K (Department: 2434)
Cryptography
Key management
Key distribution
C713S157000, C713S173000
Reexamination Certificate
active
07965845
ABSTRACT:
A medical ad hoc wireless network (10) is deployed in a healthcare medical facility surrounding individual patients and including wireless nodes (A, B, . . . , Z). Before deployment, each node (A, B, . . . , Z) is pre-initialized with a public key certificate (22) and offers a trust and symmetric key distribution service (32). In joining the ad hoc network (10), a node (B) authenticates and registers to one randomly self-chosen node (A) by using certified public keys (20). Such node (A) becomes Trusted Portal (TPA) of the node (B). The node (B) dynamically registers to a new self-chosen TP node when its old TP node leaves the ad hoc network (10). The network (10) supports symmetric key authentication between nodes registered to the same TP node. Additionally, it supports symmetric key authentication between nodes registered to different TP nodes.
REFERENCES:
patent: 2002/0124169 (2002-09-01), Agrawal et al.
patent: 2003/0226013 (2003-12-01), Dutertre
patent: 2003/0233578 (2003-12-01), Dutertre
patent: 2004/0015689 (2004-01-01), Billhartz
patent: 2007/0214357 (2007-09-01), Baldus et al.
patent: 0131836 (2001-05-01), None
patent: 03107589 (2003-12-01), None
Bohio, M., et al.; Efficient identity-based security schemes for ad hoc network routing protocols; 2004; Ad Hoc Networks; vol. 2; pp. 309-317.
Deng, H., et al.; TIDS: threshold and identity-based security scheme for wireless ad hoc networks; 2004; Ad Hoc Networks; vol. 2; pp. 291-307.
Deng, H., et al.; Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks; 2004; IEEE Proc. Intl. Conf. Inf. Tech.: Coding and Computing.
Jolly, G., et al.; A Low-Energy Key Management Protocol for Wireless Sensor Networks; 2003; Proc. of 8th IEEE Intl. Symposium on Computers and Communication.
Needham, R. M., et al.; Using Encryption for Authentication in Large Networks of Computers; 1978; Communications of the ACM; vol. 21, No. 12; pp. 993-999.
Poosarla, R., et al.; A Cluster Based Secure Routing Scheme for Wireless Ad Hoc Networks; 2004; IEEE; pp. 171-175.
Schneier, B.; Applied Cryptography, Protocols, Algorithms, and Source Code in C; 1996; Applied Cryptography; John Wiley & Sons, NY; pp. 47-65, 566-572.
Venkatraman, L., et al.; A Novel Authentication Scheme for Ad Hoc Networks; 2000; IEEE Wireless Communications and Networking Conf.; vol. 3; pp. 1268-1273.
Zhu, S., et al.; Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach; 2003; Proc. of 11th IEEE Int. Conf. on Network Protocols.
Menezes, A. J., et al.; Handbook of Applied Cryptography; 1996; CRC Press; Chapter 10 “Identification and Entity Authentication”; pp. 385-424. Also at: www.cacr.math.uwaterloo.ca/hac/.
Baldus Heribert
Sanchez Sanchez David
Gee Jason K
Koninklijke Philips Electronics N. V.
LandOfFree
System and methods for efficient authentication of medical... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and methods for efficient authentication of medical..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and methods for efficient authentication of medical... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2739235