Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for providing information security for wireless transmissions

Inactive Publication Date: 2007-06-28
MOTOROLA INC +1
View PDF17 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The convenience offered to consumers results in a challenge for the vendors to create smaller and faster devices while providing a high level of security for information computed and transmitted.
These problems are generally easy to solve for numbers that are small in size, but become increasingly difficult as lager numbers are used.
One of the differences among the systems is how large the numbers have to be so that the system is too hard to solve given present and anticipated computing power.
Elliptic curve cryptosystems are based on an exceptionally difficult mathematical problem, Thus, elliptic curve systems can maintain security equivalent to many other systems while using much smaller public keys.
The first level of a cryptosystem involves encrypting a message between correspondent A and correspondent B. This level is vulnerable to attack since there is no way for correspondent A to verify whether or not correspondent B sent the message, or if a third party in the guise of correspondent B sent the message.
As a result, both correspondents would unwittingly divulge their information to the third party.
Therefore, the signature verifies that the message sent by a correspondent is sent from that correspondent, but it does not verify the identity of the correspondent.
However, implementing the above mentioned cryptosystems requires computational power, which is limited on such wireless devices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for providing information security for wireless transmissions
  • Method for providing information security for wireless transmissions
  • Method for providing information security for wireless transmissions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] For convenience, like numerals in the description refer to like structures in the drawings. Further, although the description refers only to pagers, it is intended that the description includes wireless devices in general.

[0024] Referring to FIG. 1, a paging system is represented generally by the numeral 100. A first pager 102 is operatively coupled with a first home terminal 104 through a wireless communication. The first home terminal 104 is operatively coupled to a second home terminal 106 via a network 108 and the second home terminal 106 in turn is operatively coupled to a second pager 110. The pagers 102, 110 are typically coupled to their respective home terminals 104, 106 by radio frequency. The network 108 is typically a public switched telephone network (PSTN), but can include a data network, and the Internet.

[0025] Before a pager 102 can communicate with the home terminal 104 it must be registered. Every pager 102 contains a subscriber unit address and a public k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A wireless communication system includes a pager or similar device that communicates to a home terminal. The home terminal confirms the identify of the pager and attaches a certificate to the message for ongoing transmission. Where the recipient is also a pager, an associated home terminal verifies the transmission and forwards it in a trusted manner without the certificate to the recipient.

Description

[0001] This application is a continuation of U.S. patent application Ser. No. 09 / 680,501 filed on Oct. 5, 2000.[0002] The present invention relates generally to cryptographic schemes, and specifically to cryptographic schemes relating to wireless applications. BACKGROUND OF THE INVENTION [0003] Information security is required to secure many types of transactions performed electronically using a wide range of computing and communication technologies. As consumers demand more flexible, convenient services, technologies such as wireless networks, paging infrastructures and smart cards are being deployed to support critical, information sensitive applications including account inquiries, electronic cash, secure communications and access control. One of the key features of each of these technologies is that they offer consumers the convenience of service anywhere, any time. The convenience offered to consumers results in a challenge for the vendors to create smaller and faster devices w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/32
CPCH04L9/321H04L9/3247H04L9/3263H04L2209/56H04L2209/80H04W12/069H04W12/106
Inventor DAVIS, WALTERAYERST, DOUGLASVANSTONE, SCOTT
Owner MOTOROLA INC