Systems and methods to securely generate shared keys

A public key and shared secret technology, which is applied in the field of systems and methods for safely generating shared keys, can solve the problems of not dealing with mobile device requirements, not dealing with confidentiality requirements, and limited implementation methods

Active Publication Date: 2007-05-23
RES IN MOTION LTD
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These mechanisms are limited in how they are implemented and do not address the needs of mobile devices
In addition, these mechanisms do not address the need to achieve perfect forward secrecy such that when a breach of security does occur, all previously exchanged messages remain secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods to securely generate shared keys
  • Systems and methods to securely generate shared keys
  • Systems and methods to securely generate shared keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Referring to Figure 1, a block diagram of a first example communication system between fixed and wireless systems is shown. The overall cable diagram shows a network environment using the present invention. The figure illustrates an example embodiment of the invention and focuses on a network topology including wireless mobile devices. In this figure there are systems 20 and 22 that provide the service, and systems 30 and 32 that consume the service. There are one or more networks between the service provider (also referred to herein as a service provider) and the service user, and one or more connections enabling data flow between the two systems.

[0015] Turning now to FIG. 1, the service provider 20 or 22 may be any number of possible computers that provide services to users. For those skilled in the art, some well-known service providers may be computers on the Internet within an Internet Service Provider (ISP) or Application Service Provider (ASP). Service prov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for secure bidirectional communication between two systems is described. A first key pair and a second key pair are generated, the latter including a second public key that is generated based upon a shared secret. First and second public keys are sent to a second system, and third and fourth public keys are received from the second system. The fourth public key is generated based upon the shared secret. A master key for encrypting messages is calculated based upon a first private key, a second private key, the third public key and the fourth public key. For re-keying, a new second key pair having a new second public key and a new second private key is generated, and a new fourth public key is received. A new master key is calculated using elliptic curve calculations using the new second private key and the new fourth public key.

Description

technical field [0001] The present application relates to apparatus and methods for establishing a trusted and secure relationship between two messaging systems to exchange data. More specifically, this application describes apparatus and methods for establishing a trusted relationship between a wireless handheld device ("mobile device") and a message center or host system using a password-based authentication method. The apparatus and methods described herein are applicable in landline environments as well as wireless environments. Background technique [0002] In the computer industry, there are several currently known strong password-based encryption mechanisms. Some of these implementations include Encryption Key Exchange (EKE), Password Derived Moduli (PDM), and Simple Authenticated Password Exponential Key Exchange (SPEKE). These mechanisms are limited in implementation and do not address the needs of mobile devices. Additionally, these mechanisms do not address the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/14H04L9/08
CPCH04L9/3066H04L9/0844H04L9/0891H04L2209/80
Inventor 迈克尔·K·布朗赫伯特·A·利特尔大卫·维克托·麦克法兰迈克尔·S·布朗黛娜·莱亚·玛丽·戴维斯
Owner RES IN MOTION LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products