Systems and methods for communication protection

Cryptography – Communication system using cryptography – Wireless communication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S189000, C713S162000

Reexamination Certificate

active

09862477

ABSTRACT:
A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers are not used for identification and authorization during communication between the mobile unit and a base station. Instead, a set of private identifiers is determined and is known only to the phone company and the base stations controlling the mobile phone calls. These private identifiers allow dynamic and continual updating of the mobile phone and base station directories with current valid identifiers that are used for communication between the devices.

REFERENCES:
patent: 5579376 (1996-11-01), Kennedy, III et al.
patent: 6181931 (2001-01-01), Alldredge
patent: WO-00/1339 (2000-03-01), None
Random number generation for residual life of mobile phone movement Hui-Nien Hung; Pei-Chun Lee; Yi-Bing Lin; Networking, Sensing and Control, 2004 IEEE International Conference on vol. 1, Mar. 21-23, 2004 pp. 30-33 vol. 1.
The random-access control channel of a cellular mobile radio system Ling, Y.K.; Cattermole, K.W.; Teletraffic Symposium, 6th. Sixth United Kingdom May 24-26, 1989 pp. 14/1-14/7.
Security enhancements for A5/1 without loosing hardware efficiency in future mobile systems Komninos, N.; Honary, B.; Darnell, M.; 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489) May 8-10, 2002 pp. 324-328.
Copy of International Search Report dated Feb. 8, 2002, 3 pages.
Dahlia Malkhi, et al.; “Secure Execution of Java Applets Using a Remote Playground”; AT&T Labs Research, Florham Park, NJ; 1988 IEEE; pp. 40-51.
RSA Security; “Are Passwords Really Free? A Closer Look at the Hidden Costs of Password Security”; pp. 1-8.
Ian Goldberg and Marc Briceno “GSM Cloning”; www.isaac.cs.berkely.edu/isaac/gsm-faq.html; May 21, 2001, pp. 1-5.
“GSM Cloning”; www.isaac.cs.berekely.edu/isaac/gsm.html; May 21, 2001, pp. 1-4.
Pescatore; “Secure Use of the World Wide Web: Keeping Browers and Servers from Getting Snared”, Trusted Information System; ISBN # 0-7803-327706; pp. 36-38.
Hynninen, “Experiences in Mobile Phone Fraud”, Helsinki University of Technology, Department of Computer Science and Engineering, pp. 1-18 (May 21, 2001).
Feb. 8, 2002 International Search Report for PCT/US-01/16541.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Systems and methods for communication protection does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Systems and methods for communication protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for communication protection will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3810759

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.