21.
    发明专利
    未知

    公开(公告)号:BR9902804A

    公开(公告)日:2000-03-28

    申请号:BR9902804

    申请日:1999-07-20

    Inventor: PATEL SARVAR

    Abstract: According to the two party authentication method, a first party generates and transfers a random number to a second party as a first challenge. The second party increments a count value in response to the first challenge, generates a first challenge response by performing a keyed cryptographic function (KCF) on the first challenge and the count value using a first key, and transfers the count value, as a second challenge, and the first challenge response to the first party. The first party verifies the second party based on the first challenge, the second challenge and the first challenge response. The first party also generates a second challenge response by performing the KCF on the second challenge using the first key, and transfers the second challenge response to the second party. The second party verifies the first party based on the second challenge and the second challenge response. For instance, the first and second parties can be a network and mobile, respectively, in a wireless system. Also, based on the first and second challenges, both the first and second parties may generate another key.

    METHOD FOR SECURING OVER-THE-AIR COMMUNICATION IN A WIRELESS SYSTEM

    公开(公告)号:CA2277758A1

    公开(公告)日:2000-01-31

    申请号:CA2277758

    申请日:1999-07-20

    Inventor: PATEL SARVAR

    Abstract: In the method for securing over-the-air communication in wireless system, a mobile sends a system access request and dummy data associated with the system access request to a network. The network sends a first data stream including a first data portion to the mobile in response to the system access request and the dummy data. The mobile extracts the first data portion from the first bit stream, and sends a second bit stream to the network. The second bit stream includes a second data portion. The mobile and the network both generate a key based on the first data portion and the second data portion, and establish a first encrypted and authenticated communication channel in cooperation using the key. The mobile then transfers authorizing information to the network over the fist encrypted and authenticated communication channel. If accepted, a second encrypted and authenticated communication channel is established. The network then sends sensitive information such as the root or A-key to the mobile over the second encrypted and authenticated communication channel.

    A METHOD FOR GENERATING PSUEDO RANDOM NUMBERS

    公开(公告)号:CA2260683A1

    公开(公告)日:1999-09-04

    申请号:CA2260683

    申请日:1999-02-04

    Abstract: The present invention is a method for outputting larger bit size pseudo-random number z; that is cryptographically secure. Since larger bit size pseudorandom numbers are being outputted, larger bit size segments of messages may be encrypted resulting in a speedier encryption process than encryption processes of the prior art. In one embodiment, the present invention is a pseudo-random number generator defined by a modular exponential function xi = g xt-i mod p . The output of the pseudo-random number generator being a pseudo-random number zi comprising a j-1 bit size segment of xi. The value of j being less than or equal to m-2c (i.e., j~m-2c). In an embodiment of the present invention, the pseudo-random number zi includes the j least significant bits of xi excluding the least significant bit of xi.

    25.
    发明专利
    未知

    公开(公告)号:DE602005001637T2

    公开(公告)日:2008-06-05

    申请号:DE602005001637

    申请日:2005-02-15

    Abstract: In the method, a value of a first cryptosync for a communication session is derived based on a value of a second cryptosync. The second cryptosync has a longer life than the first cryptosync.

    26.
    发明专利
    未知

    公开(公告)号:DE69937322D1

    公开(公告)日:2007-11-29

    申请号:DE69937322

    申请日:1999-07-20

    Inventor: PATEL SARVAR

    Abstract: In the method for updating secret shared data (SSD) in a wireless communication system, a first party outputs a first random number as a first challenge wherein the first party is one of a network and a mobile. A second party generates a second random number in response to the first challenge. The second party is the mobile if the first party is the network, and the second party is the network if the first party is the mobile. The second party generates a first challenge response by performing a keyed cryptographic function (KCF) on the first challenge and the second random number using a secondary key, which is not the SSD and is derived from a root key. The second party then transfers the second random number, as a second challenge, and the first challenge response to the first party. The first party verifies the second party based on the first and second challenges and the first challenge response, generates a second challenge response by performing the KCF on the second challenge using the secondary key, and transfers the second challenge response to the second party. The second party verifies the first party based on the second challenge and the second challenge response. Both parties respectively establish the SSD based on the first and second challenges.

    27.
    发明专利
    未知

    公开(公告)号:DE60117726T2

    公开(公告)日:2006-11-09

    申请号:DE60117726

    申请日:2001-08-14

    Inventor: PATEL SARVAR

    Abstract: The present invention is a key conversion system for deterministically and reversibly converting a first key value of a first communications system into a second key value of a second communication system. For example, the key conversion system generates a first intermediate value from at least a portion of the first key value using a first random function. At least a portion of the first intermediate value is provided to a second random function to produce a second value. An exclusive-or is performed on at least a portion of the first key value and at least a portion of the second value to generate a second intermediate value. At least a portion of the second intermediate value is provided to a third random function to produce a third value. By performing an exclusive-or on at least a portion of the third value and at least a portion of the first intermediate value, the key conversion system produces at least a first portion of the second key value, and at least a second portion of the second key value is produced as the second intermediate value.

    28.
    发明专利
    未知

    公开(公告)号:DE60103737T2

    公开(公告)日:2005-07-07

    申请号:DE60103737

    申请日:2001-11-19

    Inventor: PATEL SARVAR

    Abstract: A message authentication system for generating a message authentication code (MAC) uses a single iteration of a keyed compression function when a message fits within an input block of the compression function, thereby improving efficiency. For messages that are larger than a block, the MAC system uses nested hash functions. The MAC system and method can use portions of the message as inputs to the nested hash functions. For example, the message authentication system can split the message into a first portion and a second portion. A hash function is performed using the first portion of the message as an input to achieve an intermediate result, and a keyed hash function is performed using a second portion of the message and the intermediate result as inputs. Thus, less of the message needs to be processed by the inner hash function, thereby improving efficiency, especially for smaller messages.

    29.
    发明专利
    未知

    公开(公告)号:AT268963T

    公开(公告)日:2004-06-15

    申请号:AT01309740

    申请日:2001-11-19

    Inventor: PATEL SARVAR

    Abstract: A message authentication system for generating a message authentication code (MAC) uses a single iteration of a keyed compression function when a message fits within an input block of the compression function, thereby improving efficiency. For messages that are larger than a block, the MAC system uses nested hash functions. The MAC system and method can use portions of the message as inputs to the nested hash functions. For example, the message authentication system can split the message into a first portion and a second portion. A hash function is performed using the first portion of the message as an input to achieve an intermediate result, and a keyed hash function is performed using a second portion of the message and the intermediate result as inputs. Thus, less of the message needs to be processed by the inner hash function, thereby improving efficiency, especially for smaller messages.

    30.
    发明专利
    未知

    公开(公告)号:DE60001630D1

    公开(公告)日:2003-04-17

    申请号:DE60001630

    申请日:2000-10-23

    Abstract: Secure communication protocols are disclosed in which two parties generate a shared secret which may be used as a secure session key for communication between the parties. The protocols are based on Diffie-Hellman type key exchange in which a Diffie-Hellman value is combined with a function of at least a password using the group operation such that the Diffie-Hellman value may be extracted by the other party using the inverse group operation and knowledge of the password. In one embodiment, each of the parties explicitly authenticates the other party, while in another embodiment, the parties utilize implicit authentication relying on the generation of an appropriate secret session key to provide the implicit authentication. Typically, the parties will be a client computer and a server computer. In accordance with other embodiments of the invention, in order to protect against a security compromise at the server, the server is not in possession of the password, but instead is provided with, and stores, a so-called password verifier which is a function of the password and where the password itself cannot be determined from the value of the password verifier.

Patent Agency Ranking