PORTABLE CERTIFICATION AUTHORITY
    1.
    发明申请
    PORTABLE CERTIFICATION AUTHORITY 审中-公开
    便携式认证机构

    公开(公告)号:US20080046716A1

    公开(公告)日:2008-02-21

    申请号:US11465620

    申请日:2006-08-18

    IPC分类号: H04L9/00

    摘要: A portable electronic device is operable as a portable certification authority. The portable electronic device stores a pair of keys of a public key infrastructure, issued by a parent certification authority and generates a certificate dependent upon the pair of keys. The private key and corresponding public key certificate are transmitted to a network device of a second agency to allow the device to be authenticated by any node of the network of the first agency that posses anchor information of the parent certification authority. This enables the device of the second agency to be authenticated by a network node of the first agency.

    摘要翻译: 便携式电子设备可操作为便携式认证机构。 便携式电子设备存储由父证书颁发机构颁发的公开密钥基础设施的一对密钥,并且生成依赖于一对密钥的证书。 私钥和相应的公钥证书被发送到第二代理机构的网络设备,以允许设备由具有父认证机构的锚定信息的第一代理机构的网络的任何节点进行认证。 这使得第二代理机构的设备能够被第一代理机构的网络节点认证。

    AD-HOC NETWORK KEY MANAGEMENT
    2.
    发明申请
    AD-HOC NETWORK KEY MANAGEMENT 有权
    AD-HOC网络关键管理

    公开(公告)号:US20080046732A1

    公开(公告)日:2008-02-21

    申请号:US11464744

    申请日:2006-08-15

    摘要: An ad hoc network includes a first node, a second node, and a third node. The first node and second node share a first shared secret key, and the first node and third node share a second shared secret key. The second node and third node share a temporal key. The first node generates a unique key, encrypts the unique key with a first shared secret key to generate a first encrypted unique key and transmits the first encrypted unique key to the second node. The first node encrypts the unique key with a second shared secret key to generate a second encrypted unique key and transmits the second encrypted unique key to the third node. To establish the temporal key, the second node decrypts the first encrypted unique key and the third node decrypts the second encrypted unique key thereby each generating the unique key.

    摘要翻译: 自组织网络包括第一节点,第二节点和第三节点。 第一节点和第二节点共享第一共享秘密密钥,并且第一节点和第三节点共享第二共享秘密密钥。 第二节点和第三节点共享一个临时密钥。 第一节点生成唯一密钥,用第一共享秘密密钥加密唯一密钥以生成第一加密唯一密钥,并将第一加密唯一密钥发送到第二节点。 第一节点用第二个共享秘密密钥加密唯一密钥,以生成第二加密唯一密钥,并将第二加密唯一密钥发送到第三个节点。 为了建立时间密钥,第二节点解密第一加密唯一密钥,第三节点解密第二加密唯一密钥,从而每个生成唯一密钥。

    METHOD AND SYSTEM FOR MUTUAL AUTHENTICATION OF WIRELESS COMMUNICATION NETWORK NODES
    3.
    发明申请
    METHOD AND SYSTEM FOR MUTUAL AUTHENTICATION OF WIRELESS COMMUNICATION NETWORK NODES 有权
    无线通信网络认证方法与系统

    公开(公告)号:US20070283153A1

    公开(公告)日:2007-12-06

    申请号:US11420968

    申请日:2006-05-30

    IPC分类号: H04L9/00

    摘要: A method and system for mutually authenticating a first node and a second node operating in a wireless communication network enables mutual authentication when the first node and the second node are unable to directly authenticate each other. The method includes identifying, at the first node, a third node that can authenticate both the first node and the second node (step 215). Authentication data for authenticating the first node with the third node is then transmitted from the first node to the third node (step 220). Keying material that is received from the third node is then processed at the first node (step 225). A shared secret mutual authentication protocol is then processed, whereby the first node and the second node are mutually authenticated by proving that they each have authenticated with the third node and each have the keying material (step 230).

    摘要翻译: 在第一节点和第二节点不能直接相互认证的情况下,用于相互认证第一节点和在无线通信网络中操作的第二节点的方法和系统使得能够进行相互认证。 该方法包括在第一节点处识别能够认证第一节点和第二节点的第三节点(步骤215)。 然后从第一节点向第三节点发送用于认证具有第三节点的第一节点的认证数据(步骤220)。 然后在第一节点处处理从第三节点接收的键控材料(步骤225)。 然后处理共享秘密相互认证协议,由此第一节点和第二节点通过证明它们各自已经与第三节点进行认证并且每个都具有密钥材料来相互认证(步骤230)。

    METHOD FOR PRODUCING TRUNCATED MESSAGE DIGESTS
    4.
    发明申请
    METHOD FOR PRODUCING TRUNCATED MESSAGE DIGESTS 审中-公开
    生产截断消息码的方法

    公开(公告)号:US20080010463A1

    公开(公告)日:2008-01-10

    申请号:US11456260

    申请日:2006-07-10

    IPC分类号: H04L9/00

    CPC分类号: H04L9/0643 H04L2209/20

    摘要: A truncated message digest of length L bits is generated from a message by preprocessing the message dependent upon the value L to obtain a modified message. As part of the preprocessing, the message is lengthened by insertion of additional values. A full length message digest is generated from the modified message and the truncated message digest is obtained by truncating the full length message digest to L bits. This approach results in truncated message digests that are secure and provide a large range of truncation options.

    摘要翻译: 通过根据值L预处理消息来从消息生成长度为L比特的截断的消息摘要以获得修改的消息。 作为预处理的一部分,消息通过插入附加值来延长。 从修改的消息生成全长消息摘要,并且通过将全长消息摘要截断为L比特来获得截断的消息摘要。 这种方法导致截断的消息摘要是安全的,并提供大范围的截断选项。