A METHOD FOR GENERATING PSUEDO RANDOM NUMBERS

    公开(公告)号:CA2260683C

    公开(公告)日:2003-03-18

    申请号:CA2260683

    申请日:1999-02-04

    Abstract: The present invention is a method for outputting larger bit size pseudo-rand om number z; that is cryptographically secure. Since larger bit size pseudo- random numbers are being outputted, larger bit size segments of messages may be encrypted resulting in a speedier encryption process than encryption processes of the prior art. In one embodiment, the present invention is a pseudo-random number generator defined by a modular exponenti al function xi = g xt-i mod p . The output of the pseudo-random number generator being a pseudo-random number zi comprising a j-1 bit size segment of xi. The value of j being less than or equal to m-2c (i.e., j~m-2c). In an embodiment of the present invention, the pseudo-random number zi includes the j least significant bits of xi excluding the least significant bit of xi .

    32.
    发明专利
    未知

    公开(公告)号:DE69806886D1

    公开(公告)日:2002-09-05

    申请号:DE69806886

    申请日:1998-10-19

    Inventor: PATEL SARVAR

    Abstract: The present invention strengthens authentication protocols by making it more difficult for handset impersonators to gain system access using replay attacks. This goal is accomplished using challenge codes as a parameter for determining authentication codes, whereby different challenge codes cause different authentication codes to be generated. In one embodiment, the challenge codes are functions of challenge types (e.g., global or unique challenges) and/or handset states (e.g., call origination, page response, registration, idle, and SSD-A update). This embodiment prevents handset impersonators from successfully utilizing replay attacks to impersonate a legitimate handset if the legitimate handset is in a different state than the handset impersonator, or if the legitimate handset is responding to a different challenge type than the handset impersonator.

    Method for determining temporary mobile identifiers and managing use thereof

    公开(公告)号:AU4475099A

    公开(公告)日:2000-03-16

    申请号:AU4475099

    申请日:1999-08-26

    Inventor: PATEL SARVAR

    Abstract: In the method for managing the use of temporary mobile identifiers (TIDs), the mobile and the network each store a list of TIDs for the mobile. Newly determined TIDs are added to the respective TID list such that the TIDs are stored in chronological order. To determine a new TID, the network sends a first challenge to the mobile and the mobile sends a second challenge to the network as part of a TID update protocol. The network and the mobile then determine the new TID based on the first and second challenges. As communication between the mobile and the network continues, the respective TID lists are updated. Namely, when either the network or the mobile confirms a TID, the TIDs older than the confirmed TID are deleted from the TID list. In communicating with one another, the mobile will use the oldest TID on its TID list, while the network will use the newest TID on its TID list.

    METHOD FOR DETERMINING TEMPORARY MOBILE IDENTIFIERS AND MANAGING USE THEREOF

    公开(公告)号:CA2276871A1

    公开(公告)日:2000-02-28

    申请号:CA2276871

    申请日:1999-07-02

    Inventor: PATEL SARVAR

    Abstract: In the method for managing the use of temporary mobile identifiers (TIDs), the mobile and the network each store a list of TIDs for the mobile. Newly determined TIDs are added to the respective TID list such that the TIDs are stored in chronological order. To determine a new TID, the network sends a first challenge to the mobile and the mobile sends a second challenge to the network as part of a TID update protocol. The network and the mobile then determine the new TID based on the first and second challenges. As communication between the mobile and the network continues, the respective TID lists are updated. Namely, when either the network or the mobile confirms a TID, the TIDs older than the confirmed TID are deleted from the TID list. In communicating with one another, the mobile will use the oldest TID on its TID list, while the network will use the newest TID on its TID list.

    METHOD FOR ESTABLISHING A KEY USING OVER-THE-AIR COMMUNICATION AND PASSWORD PROTOCOL AND PASSWORD PROTOCOL

    公开(公告)号:CA2277754A1

    公开(公告)日:2000-01-31

    申请号:CA2277754

    申请日:1999-07-20

    Abstract: In the password protocol, the communicating parties exchange calculation results, which each include an exponential, to generate a key. In generating the calculation results, each party adds the password to their respective exponential. If the authorizing information previously sent by one party is acceptable to the other party, then this other party uses the key established according to the password protocol. The channel authorizing information is slant over a secure communication channel. The secure communication channel is also used in other embodiments to verify a hash on at least one calculation result sent between the parties. If the hash is verified, then a key is established using the calculation results sent between the parties

    METHOD FOR TRANSFERRING SENSITIVE INFORMATION USING INITIALLY UNSECURED COMMUNICATION

    公开(公告)号:CA2277750A1

    公开(公告)日:2000-01-31

    申请号:CA2277750

    申请日:1999-07-20

    Inventor: PATEL SARVAR

    Abstract: In the method for transferring sensitive information using unsecured communication, a first party receives a public key of a second party, produces an encryption result by performing keyed encryption on at least a first random number using the public key, and transfers the encryption result to the second party over an unsecured communication channel. The second party decrypts this encryption result to obtain the first random number. Authorizing information is then transferred from the first party to the second party over a first encrypted and authenticated communication channel established using the first random number. Sensitive information is further transferred from the second party to the first party over a second encrypted and authenticated communication channel established using the first random number if the second party accepts the authorizing information. Numerous applications exist for the system and method, including the wireless industry wherein the first party is a mobile and the second party is a network.

    EFFECTIVE USE OF DIALED DIGITS IN CALL ORIGINATION

    公开(公告)号:CA2254616A1

    公开(公告)日:1999-07-05

    申请号:CA2254616

    申请日:1998-11-30

    Inventor: PATEL SARVAR

    Abstract: The present invention strengthens authentication protocols by making it more difficult for handset impersonators to perform call origination using replay attacks. The present invention accomplishes this goal by using the most significant digits of a telephone number being dialed as a parameter for determining authentication codes. Using the most significant digits makes it more difficult for impersonators to successfully use replay attacks on call origination, wherein the replay attacks involve the appendage of digits to a telephone number to be dialed.

    STRENGTHENING THE AUTHENTICATION PROTOCOL

    公开(公告)号:CA2248482A1

    公开(公告)日:1999-04-27

    申请号:CA2248482

    申请日:1998-09-30

    Inventor: PATEL SARVAR

    Abstract: The present invention strengthens authentication protocols by making it more difficult for handset impersonators to gain system access using replay atta cks. This goal is accomplished using challenge codes as a parameter for determining authen tication codes, whereby different challenge codes cause different authentication codes to be generated. In one embodiment, the challenge codes are functions of challenge typ es (e.g., global or unique challenges) and/or handset states (e.g., call origination, page response, registration, idle, and SSD-A update). This embodiment prevents handset imperson ators from successfully utilizing replay attacks to impersonate a legitimate handset i f the legitimate handset is in a different state than the handset impersonator, or if the legitimate handset is responding to a different challenge type than the handset impersonato r.

    COMUNICACION INALAMBRICA SEGURA.
    40.
    发明专利

    公开(公告)号:MX2010003677A

    公开(公告)日:2010-04-21

    申请号:MX2010003677

    申请日:2008-10-08

    Inventor: PATEL SARVAR

    Abstract: En una modalidad, el m?todo realizado por el equipo (100) m?vil para autentificar la comunicaci?n con una red (400) incluye generar las claves que usan la autentificaci?n celular y el cifrado de voz (S610, 620) y luego generar un clave de autentificaci?n (S630) basado en estas claves. La clave de autentificaci?n se usa para generar un c?digo de autentificaci?n del mensaje esperado en la autentificaci?n de la red de acuerdo con el protocolo de seguridad del acuerdo de autentificaci?n y clave.

Patent Agency Ranking