Abstract:
A key updater for a first party operating on a network generates a mutually distilled key for communication between the first party and a second party. The key updater determines a set of verifying parties operating on the network needed to authenticate the mutually distilled key, wherein each verifying party of the set of verifying parties operates on the network. The key updater iteratively executes a key equivalency test for each verifying party in the set of verifying parties to determine a nonce sum until the key equivalency test has been executed for each of the verifying parties in the set of verifying parties or until it is determined that at least one node on the network has been compromised. The key updater generates a final key for communication between the first party and the second party based on the nonce sum and the mutually distilled key.
Abstract:
A key updater for a first party operating on a network generates a mutually distilled key for communication between the first party and a second party. The key updater determines a set of verifying parties operating on the network needed to authenticate the mutually distilled key, wherein each verifying party of the set of verifying parties operates on the network. The key updater iteratively executes a key equivalency test for each verifying party in the set of verifying parties to determine a nonce sum until the key equivalency test has been executed for each of the verifying parties in the set of verifying parties or until it is determined that at least one node on the network has been compromised. The key updater generates a final key for communication between the first party and the second party based on the nonce sum and the mutually distilled key.
Abstract:
A mobility management system and a traditional telecommunication switching system provide telecommunication terminal features by the mobility management system executing a software architecture that utilizes a unique terminal management application for each type of wireless terminal and a unique terminal emulator application for each type of telecommunication link that interconnects the mobility management system to the telecommunication switching system. There is an individually assigned telecommunication link for each wireless terminal. The terminal management applications and the terminal emulator applications communicate utilizing an internal message protocol. In response to a wireless terminal requesting actuation of a feature, a terminal management application converts that request into the required internal protocol messages and transmits the internal protocol messages to the terminal emulator application that controls the telecommunication link assigned to the wireless terminal. In response to the internal protocol messages, the terminal emulator application emulates the type of telecommunication terminal that normally would be connected to the assigned telecommunication link. The telecommunication switching system is responsive to the emulation to provided the requested feature as if telecommunication terminal was connected to the assigned link. The responses of the telecommunication switching system received via the assigned telecommunication link are converted to internal protocol messages and transmitted back to the terminal management application. The terminal management application converts and transmits the responses to the wireless terminal. The same internal protocol messages are used to invoke a particular feature regardless of the telecommunication terminal type or telecommunication link type.