US20070150740A1 - Method for providing information security for wireless transmissions - Google Patents
Method for providing information security for wireless transmissions Download PDFInfo
- Publication number
- US20070150740A1 US20070150740A1 US11/483,176 US48317606A US2007150740A1 US 20070150740 A1 US20070150740 A1 US 20070150740A1 US 48317606 A US48317606 A US 48317606A US 2007150740 A1 US2007150740 A1 US 2007150740A1
- Authority
- US
- United States
- Prior art keywords
- correspondent
- public key
- intermediary
- message
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 17
- 238000000034 method Methods 0.000 title claims description 20
- 238000004891 communication Methods 0.000 claims abstract description 18
- 238000013475 authorization Methods 0.000 claims description 4
- 238000012795 verification Methods 0.000 claims description 4
- 238000012546 transfer Methods 0.000 claims description 3
- 238000009795 derivation Methods 0.000 claims description 2
- 239000000284 extract Substances 0.000 claims 1
- 238000005516 engineering process Methods 0.000 description 5
- 238000011084 recovery Methods 0.000 description 2
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present invention relates generally to cryptographic schemes, and specifically to cryptographic schemes relating to wireless applications.
- Information security is required to secure many types of transactions performed electronically using a wide range of computing and communication technologies.
- technologies such as wireless networks, paging infrastructures and smart cards are being deployed to support critical, information sensitive applications including account inquiries, electronic cash, secure communications and access control.
- One of the key features of each of these technologies is that they offer consumers the convenience of service anywhere, any time. The convenience offered to consumers results in a challenge for the vendors to create smaller and faster devices while providing a high level of security for information computed and transmitted.
- cryptosystems Information security is provided through the application of cryptographic systems (commonly referred to as cryptosystems).
- the two main classes of cryptosystems are symmetric and public key.
- a symmetric cryptosystem two users wishing to participate in a secure transaction must share a common key. Therefore, each user must trust the other not to divulge the key to a third party.
- Users participating in a secure transaction using public key cryptosystems will each have two keys, known as a key pair. One of the keys is kept secret and is referred to as the private key, while the other can be published and is referred to as the public key.
- applications use a combination of both these classes of cryptosystems to provide information security.
- Symmetric technologies are typically used to perform bulk data encryption
- public key technologies are commonly used to perform key agreement, key transport, digital signatures and encryption of small messages.
- Elliptic curve cryptosystems are based on an exceptionally difficult mathematical problem, Thus, elliptic curve systems can maintain security equivalent to many other systems while using much smaller public keys.
- the smaller key size has significant benefits in terms of the amount of information that must be exchanged between users, the time required for that exchange, the amount of information that must be stored for digital signature transactions, and the size and energy consumption of the hardware or software used to implement the system.
- the public key is a point (Q) on an elliptic curve (represented as a pair of field elements) and the private key is an integer (k).
- Elliptic curves are defined over an underlying field and may be implemented over the multiplicative group F p , (the integers modules a prime p) or characteristic 2 finite fields (F 2 m where m is a positive integer).
- Wireless devices including cellular telephones, two-way pagers, wireless modems, and contactless smart cards, are increasing in popularity because of the convenience they provide while maintaining a low cost and small form factor.
- a method of communicating between a pair of correspondents through an intermediary comprising the steps, registering one of said correspondents with said intermediary to share an identifier, preparing at said one correspondent a secure communication including a message between said correspondents, preparing a signature component including a derivation of said secure communication and said identifier forwarding said signature component to said intermediary and verifying said signature component at said intermediary, attaching to said communication a certificate of the public key and identity of the said one correspondent, and forwarding said communication and certificate to said other correspondent.
- FIG. 1 is a schematic drawing of a pager system
- FIG. 3 is a representation of a message transfer system for the system of FIG. 1
- FIG. 4 is a schematic representation of an alternative embodiment of a communication system.
- a paging system is represented generally by the numeral 100 .
- a first pager 102 is operatively coupled with a first home terminal 104 through a wireless communication.
- the first home terminal 104 is operatively coupled to a second home terminal 106 via a network 108 and the second home terminal 106 in turn is operatively coupled to a second pager 110 .
- the pagers 102 , 110 are typically coupled to their respective home terminals 104 , 106 by radio frequency.
- the network 108 is typically a public switched telephone network (PSTN), but can include a data network, and the Internet.
- PSTN public switched telephone network
- Every pager 102 contains a subscriber unit address and a public key C of the pager manufacturer or service provider (herein referred to as the company public key). This information is loaded at the manufacture stage.
- the company public key Q C is derived from a company private key d C .
- Each home terminal 104 has a private key d H and a public key Q H .
- the public key Q N is signed by the company private key d C to create a certificate denoted C M .
- the company public key Q C could be system wide or defined for a given region.
- a subscriber purchases a pager 102 from a retail outlet and the pager is then loaded with a home index 112 and identifier ID using the protocol outlined below.
- the home index is typically a 32-bit index which uniquely identifies the pager 102 and correlates it with a specific home terminal 104 .
- the subscriber calls a number, typically a toll-free number, to contact a service provider and a home terminal 104 is assigned.
- the home terminal 104 sends the pager 102 its public key Q H and its certificate C M .
- the pager verifies Q H , with the company public key Q C .
- the pager generates a private key d p and a corresponding public key Q p which is communicated to the home terminal 104 .
- the pager 102 sends to the home terminal 104 the necessary authorization information (including identification, credit card number, subscriber unit address, and the like) encrypted under the home terminal public key Q H ).
- the home terminal gets authorization from a central repository that this subscriber unit has not already been activated and thereby prevents counterfeiting of subscriber units.
- the home terminal 104 sets up a subscriber account and sends the pager 102 its home index and identifier ID encrypted under Q p and signed by the home terminal.
- Each pager 102 in a paging infrastructure 100 is registered with a home terminal using the registration protocol described above.
- the pagers have a private and public key pair, dp,Q p , each of which are approximately 20 bytes in length.
- the home terminals 104 have a private and public key pair dh, Q H each of which are approximately 25 bytes in length. It is desirable to have a longer key length at the home terminal for providing additional security. Further, since the home terminal 104 does not have the same power constraints as the pager 102 , the extra computational power required for the longer key is not a significant issue. The additional security at the home terminal 102 is important since a compromise of the home terminal would permit counterfeiting of subscriber units.
- each of the pagers 102 has a certificate registered for it at the home terminal 104 .
- the certificate, cert ca validates the public key Q p , and identity ID.
- Each of the home terminals maintains a table for the pagers and their associated certificate. Rather than having the pager sign the certificate and send the message to the home terminal, the certificate cert ca is signed by the pager's home terminal. The transmission process used to implement such a protocol is described in detail below.
- the first pager P 1 wishes to send a message M to a recipient, e.g. a second pager P 2 having a public key Q P 1 .
- the sender P 1 initially obtains an authentic copy of a recipient's public key Q P 2 .
- the first pager then transmits the signature, m a , and the signed, encrypted message, W, to the first home terminal.
- the signature, m a is used by the home terminal 104 associated with pager P 1 to verify that P 1 is a legitimate user.
- the message W and a nonce CN which is unique for each transmission, are coupled with the ID of P 1 and signed.
- the nonce is used to prevent replay of the transmission, W is a signed, encrypted form of the message M. Signing then encrypting is preferred over encrypting then signing.
- the bandwidth requirement of the transmission from the pager to the base are reduced since the pager does not have to transmit a certificate.
- the first home terminal 104 stores a pre-computed table of values which allows it to increase the speed of verifying P 1 's signature. Alternately, if verification is fast enough, as would be the case with a hardware implementation, the table of values is not required.
- the second home terminal, 106 receives the transmission and verifies Q P 1 using Cert ca (Q P 1 , ID P 1 ). To save bandwidth, the second home terminal 106 signs Q P 1 according to the signature function S dp 1 (W
- Q P1 has been validated by the signature of the home terminal 104 and therefore communicating between the second home terminal 106 and the second pager 110 in this manner keeps the certificates off the transmission channel and reduces bandwidth requirements.
- M consists of t bytes. If the Nyberg-Rueppel protocol is used for signing the message, t+20 bytes are required for S P 1 (M). A further 20 bytes a used to encrypt S P 1 (M), therefore W is t+40 bytes in length. Hashing h(W) uses 20 bytes if SHA-1 is used. The nonce CN uses 4 bytes and the identification ID P 1 uses 4 bytes. Once again, if Nyberg-Rueppel is We for signing, 20 additional bytes are used. Hence m a will be 48 bytes. Therefore, the transmission between the first pager and the first home terminal uses t+92 bytes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/483,176 US20070150740A1 (en) | 2000-10-05 | 2006-07-10 | Method for providing information security for wireless transmissions |
US12/848,745 US20110010540A1 (en) | 2000-10-05 | 2010-08-02 | Method for Providing Information Security for Wireless Transmissions |
US13/549,176 US9003182B2 (en) | 2000-10-05 | 2012-07-13 | Communication system and method for securely communicating a message between correspondents through an intermediary terminal |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US68050100A | 2000-10-05 | 2000-10-05 | |
US11/483,176 US20070150740A1 (en) | 2000-10-05 | 2006-07-10 | Method for providing information security for wireless transmissions |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US68050100A Continuation | 2000-10-05 | 2000-10-05 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/848,745 Continuation US20110010540A1 (en) | 2000-10-05 | 2010-08-02 | Method for Providing Information Security for Wireless Transmissions |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070150740A1 true US20070150740A1 (en) | 2007-06-28 |
Family
ID=24731380
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/483,176 Abandoned US20070150740A1 (en) | 2000-10-05 | 2006-07-10 | Method for providing information security for wireless transmissions |
US12/848,745 Abandoned US20110010540A1 (en) | 2000-10-05 | 2010-08-02 | Method for Providing Information Security for Wireless Transmissions |
US13/549,176 Expired - Fee Related US9003182B2 (en) | 2000-10-05 | 2012-07-13 | Communication system and method for securely communicating a message between correspondents through an intermediary terminal |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/848,745 Abandoned US20110010540A1 (en) | 2000-10-05 | 2010-08-02 | Method for Providing Information Security for Wireless Transmissions |
US13/549,176 Expired - Fee Related US9003182B2 (en) | 2000-10-05 | 2012-07-13 | Communication system and method for securely communicating a message between correspondents through an intermediary terminal |
Country Status (6)
Country | Link |
---|---|
US (3) | US20070150740A1 (de) |
EP (2) | EP2309670B1 (de) |
AU (1) | AU2001293598A1 (de) |
CA (2) | CA2793746C (de) |
HK (1) | HK1155869A1 (de) |
WO (1) | WO2002030038A2 (de) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110010540A1 (en) * | 2000-10-05 | 2011-01-13 | Certicom Corp. | Method for Providing Information Security for Wireless Transmissions |
US8943323B2 (en) | 2006-07-20 | 2015-01-27 | Blackberry Limited | System and method for provisioning device certificates |
US20150089220A1 (en) * | 2009-10-31 | 2015-03-26 | Dipen Patel | Technique For Bypassing an IP PBX |
US9641400B2 (en) | 2014-11-21 | 2017-05-02 | Afero, Inc. | Internet of things device for registering user selections |
US9699814B2 (en) | 2015-07-03 | 2017-07-04 | Afero, Inc. | Apparatus and method for establishing secure communication channels in an internet of things (IoT) system |
US9704318B2 (en) | 2015-03-30 | 2017-07-11 | Afero, Inc. | System and method for accurately sensing user location in an IoT system |
US9717012B2 (en) | 2015-06-01 | 2017-07-25 | Afero, Inc. | Internet of things (IOT) automotive device, system, and method |
US9729528B2 (en) | 2015-07-03 | 2017-08-08 | Afero, Inc. | Apparatus and method for establishing secure communication channels in an internet of things (IOT) system |
US9793937B2 (en) | 2015-10-30 | 2017-10-17 | Afero, Inc. | Apparatus and method for filtering wireless signals |
US9832173B2 (en) * | 2014-12-18 | 2017-11-28 | Afero, Inc. | System and method for securely connecting network devices |
US9894473B2 (en) | 2014-12-18 | 2018-02-13 | Afero, Inc. | System and method for securely connecting network devices using optical labels |
US10015766B2 (en) | 2015-07-14 | 2018-07-03 | Afero, Inc. | Apparatus and method for securely tracking event attendees using IOT devices |
US10045150B2 (en) | 2015-03-30 | 2018-08-07 | Afero, Inc. | System and method for accurately sensing user location in an IoT system |
US10178530B2 (en) | 2015-12-14 | 2019-01-08 | Afero, Inc. | System and method for performing asset and crowd tracking in an IoT system |
US10291595B2 (en) | 2014-12-18 | 2019-05-14 | Afero, Inc. | System and method for securely connecting network devices |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11080414B2 (en) | 2015-05-22 | 2021-08-03 | Huawei Device Co., Ltd. | Cryptographic unit for public key infrastructure (PKI) operations |
US11647006B2 (en) * | 2018-05-10 | 2023-05-09 | Telecom Italia S.P.A. | Protecting signaling messages in hop-by-hop network communication link |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5136647A (en) * | 1990-08-02 | 1992-08-04 | Bell Communications Research, Inc. | Method for secure time-stamping of digital documents |
US5241599A (en) * | 1991-10-02 | 1993-08-31 | At&T Bell Laboratories | Cryptographic protocol for secure communications |
US5604801A (en) * | 1995-02-03 | 1997-02-18 | International Business Machines Corporation | Public key data communications system under control of a portable security device |
US5649118A (en) * | 1993-08-27 | 1997-07-15 | Lucent Technologies Inc. | Smart card with multiple charge accounts and product item tables designating the account to debit |
US5748735A (en) * | 1994-07-18 | 1998-05-05 | Bell Atlantic Network Services, Inc. | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography |
US5850444A (en) * | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
US5883810A (en) * | 1997-09-24 | 1999-03-16 | Microsoft Corporation | Electronic online commerce card with transactionproxy number for online transactions |
US5903882A (en) * | 1996-12-13 | 1999-05-11 | Certco, Llc | Reliance server for electronic transaction system |
US5943426A (en) * | 1995-09-25 | 1999-08-24 | Motorola, Inc. | Method and apparatus for relaying digitally signed messages |
US6009173A (en) * | 1997-01-31 | 1999-12-28 | Motorola, Inc. | Encryption and decryption method and apparatus |
US6178507B1 (en) * | 1997-02-03 | 2001-01-23 | Certicom Corp. | Data card verification system |
US6301660B1 (en) * | 1997-07-31 | 2001-10-09 | Siemens Aktiengesellschaft | Computer system for protecting a file and a method for protecting a file |
US6370249B1 (en) * | 1997-07-25 | 2002-04-09 | Entrust Technologies, Ltd. | Method and apparatus for public key management |
US6601171B1 (en) * | 1999-02-18 | 2003-07-29 | Novell, Inc. | Deputization in a distributed computing system |
US6760752B1 (en) * | 1999-06-28 | 2004-07-06 | Zix Corporation | Secure transmission system |
US7142676B1 (en) * | 1999-06-08 | 2006-11-28 | Entrust Limited | Method and apparatus for secure communications using third-party key provider |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5870475A (en) * | 1996-01-19 | 1999-02-09 | Northern Telecom Limited | Facilitating secure communications in a distribution network |
US5878138A (en) * | 1996-02-12 | 1999-03-02 | Microsoft Corporation | System and method for detecting fraudulent expenditure of electronic assets |
US20010050990A1 (en) * | 1997-02-19 | 2001-12-13 | Frank Wells Sudia | Method for initiating a stream-oriented encrypted communication |
US6233577B1 (en) * | 1998-02-17 | 2001-05-15 | Phone.Com, Inc. | Centralized certificate management system for two-way interactive communication devices in data networks |
CA2333361C (en) * | 1998-06-05 | 2007-11-06 | British Telecommunications Public Limited Company | Communications network |
ES2289816T3 (es) * | 1998-07-16 | 2008-02-01 | Telemac Corporation | Metodo para la gestion de un servicio inalambrico de prepago. |
FI115372B (fi) * | 1998-09-18 | 2005-04-15 | Nokia Corp | Menetelmä matkaviestimen tunnistamiseksi, viestintäjärjestelmä ja matkaviestin |
ES2228486T3 (es) * | 1999-03-15 | 2005-04-16 | Thomson Licensing S.A. | Sistema global de proteccion contra copia para redes domesticas digitales. |
FR2791203A1 (fr) * | 1999-03-17 | 2000-09-22 | Schlumberger Systems & Service | Dispositif d'authentification d'un message lors d'une operation de traitement cryptographique dudit message |
GB9906305D0 (en) * | 1999-03-18 | 1999-05-12 | Bolero International Limited | Transaction support system |
US6973444B1 (en) * | 1999-03-27 | 2005-12-06 | Microsoft Corporation | Method for interdependently validating a digital content package and a corresponding digital license |
US6629150B1 (en) * | 1999-06-18 | 2003-09-30 | Intel Corporation | Platform and method for creating and using a digital container |
US6996710B1 (en) * | 2000-03-31 | 2006-02-07 | Intel Corporation | Platform and method for issuing and certifying a hardware-protected attestation key |
US6732101B1 (en) * | 2000-06-15 | 2004-05-04 | Zix Corporation | Secure message forwarding system detecting user's preferences including security preferences |
AU2001293598A1 (en) * | 2000-10-05 | 2002-04-15 | Certicom Corp. | A method for providing information security for wireless transmissions |
-
2001
- 2001-10-05 AU AU2001293598A patent/AU2001293598A1/en not_active Abandoned
- 2001-10-05 EP EP10183477.8A patent/EP2309670B1/de not_active Expired - Lifetime
- 2001-10-05 CA CA2793746A patent/CA2793746C/en not_active Expired - Lifetime
- 2001-10-05 WO PCT/CA2001/001410 patent/WO2002030038A2/en active Application Filing
- 2001-10-05 EP EP01973936A patent/EP1325586A2/de not_active Ceased
- 2001-10-05 CA CA2424897A patent/CA2424897C/en not_active Expired - Lifetime
-
2006
- 2006-07-10 US US11/483,176 patent/US20070150740A1/en not_active Abandoned
-
2010
- 2010-08-02 US US12/848,745 patent/US20110010540A1/en not_active Abandoned
-
2011
- 2011-09-23 HK HK11110109.4A patent/HK1155869A1/xx not_active IP Right Cessation
-
2012
- 2012-07-13 US US13/549,176 patent/US9003182B2/en not_active Expired - Fee Related
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5136647A (en) * | 1990-08-02 | 1992-08-04 | Bell Communications Research, Inc. | Method for secure time-stamping of digital documents |
US5241599A (en) * | 1991-10-02 | 1993-08-31 | At&T Bell Laboratories | Cryptographic protocol for secure communications |
US5649118A (en) * | 1993-08-27 | 1997-07-15 | Lucent Technologies Inc. | Smart card with multiple charge accounts and product item tables designating the account to debit |
US5748735A (en) * | 1994-07-18 | 1998-05-05 | Bell Atlantic Network Services, Inc. | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography |
US5604801A (en) * | 1995-02-03 | 1997-02-18 | International Business Machines Corporation | Public key data communications system under control of a portable security device |
US5943426A (en) * | 1995-09-25 | 1999-08-24 | Motorola, Inc. | Method and apparatus for relaying digitally signed messages |
US5850444A (en) * | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
US5903882A (en) * | 1996-12-13 | 1999-05-11 | Certco, Llc | Reliance server for electronic transaction system |
US6009173A (en) * | 1997-01-31 | 1999-12-28 | Motorola, Inc. | Encryption and decryption method and apparatus |
US6178507B1 (en) * | 1997-02-03 | 2001-01-23 | Certicom Corp. | Data card verification system |
US6370249B1 (en) * | 1997-07-25 | 2002-04-09 | Entrust Technologies, Ltd. | Method and apparatus for public key management |
US6301660B1 (en) * | 1997-07-31 | 2001-10-09 | Siemens Aktiengesellschaft | Computer system for protecting a file and a method for protecting a file |
US5883810A (en) * | 1997-09-24 | 1999-03-16 | Microsoft Corporation | Electronic online commerce card with transactionproxy number for online transactions |
US6601171B1 (en) * | 1999-02-18 | 2003-07-29 | Novell, Inc. | Deputization in a distributed computing system |
US6742114B1 (en) * | 1999-02-18 | 2004-05-25 | Novell, Inc. | Deputization in a distributed computing system |
US7142676B1 (en) * | 1999-06-08 | 2006-11-28 | Entrust Limited | Method and apparatus for secure communications using third-party key provider |
US6760752B1 (en) * | 1999-06-28 | 2004-07-06 | Zix Corporation | Secure transmission system |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9003182B2 (en) | 2000-10-05 | 2015-04-07 | Certicom Corp. | Communication system and method for securely communicating a message between correspondents through an intermediary terminal |
US20110010540A1 (en) * | 2000-10-05 | 2011-01-13 | Certicom Corp. | Method for Providing Information Security for Wireless Transmissions |
US8943323B2 (en) | 2006-07-20 | 2015-01-27 | Blackberry Limited | System and method for provisioning device certificates |
US20150089220A1 (en) * | 2009-10-31 | 2015-03-26 | Dipen Patel | Technique For Bypassing an IP PBX |
US9641400B2 (en) | 2014-11-21 | 2017-05-02 | Afero, Inc. | Internet of things device for registering user selections |
US10291595B2 (en) | 2014-12-18 | 2019-05-14 | Afero, Inc. | System and method for securely connecting network devices |
US9832173B2 (en) * | 2014-12-18 | 2017-11-28 | Afero, Inc. | System and method for securely connecting network devices |
US9894473B2 (en) | 2014-12-18 | 2018-02-13 | Afero, Inc. | System and method for securely connecting network devices using optical labels |
US10045150B2 (en) | 2015-03-30 | 2018-08-07 | Afero, Inc. | System and method for accurately sensing user location in an IoT system |
US10798523B2 (en) | 2015-03-30 | 2020-10-06 | Afero, Inc. | System and method for accurately sensing user location in an IoT system |
US9704318B2 (en) | 2015-03-30 | 2017-07-11 | Afero, Inc. | System and method for accurately sensing user location in an IoT system |
US9717012B2 (en) | 2015-06-01 | 2017-07-25 | Afero, Inc. | Internet of things (IOT) automotive device, system, and method |
US9729528B2 (en) | 2015-07-03 | 2017-08-08 | Afero, Inc. | Apparatus and method for establishing secure communication channels in an internet of things (IOT) system |
US10375044B2 (en) | 2015-07-03 | 2019-08-06 | Afero, Inc. | Apparatus and method for establishing secure communication channels in an internet of things (IoT) system |
US9699814B2 (en) | 2015-07-03 | 2017-07-04 | Afero, Inc. | Apparatus and method for establishing secure communication channels in an internet of things (IoT) system |
US10015766B2 (en) | 2015-07-14 | 2018-07-03 | Afero, Inc. | Apparatus and method for securely tracking event attendees using IOT devices |
US9793937B2 (en) | 2015-10-30 | 2017-10-17 | Afero, Inc. | Apparatus and method for filtering wireless signals |
US10178530B2 (en) | 2015-12-14 | 2019-01-08 | Afero, Inc. | System and method for performing asset and crowd tracking in an IoT system |
Also Published As
Publication number | Publication date |
---|---|
EP2309670B1 (de) | 2013-05-01 |
US20120284509A1 (en) | 2012-11-08 |
HK1155869A1 (en) | 2012-05-25 |
CA2793746C (en) | 2016-09-20 |
EP2309670A3 (de) | 2011-11-23 |
EP1325586A2 (de) | 2003-07-09 |
CA2793746A1 (en) | 2002-04-11 |
AU2001293598A1 (en) | 2002-04-15 |
WO2002030038A2 (en) | 2002-04-11 |
CA2424897A1 (en) | 2002-04-11 |
US9003182B2 (en) | 2015-04-07 |
CA2424897C (en) | 2015-08-04 |
EP2309670A2 (de) | 2011-04-13 |
WO2002030038A3 (en) | 2002-12-12 |
US20110010540A1 (en) | 2011-01-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9003182B2 (en) | Communication system and method for securely communicating a message between correspondents through an intermediary terminal | |
US6487661B2 (en) | Key agreement and transport protocol | |
US20030210789A1 (en) | Data transmission links | |
Horn et al. | Authentication protocols for mobile network environment value-added services | |
US7352866B2 (en) | Enhanced subscriber authentication protocol | |
US20070083766A1 (en) | Data transmission links | |
JP2005515701A6 (ja) | データ伝送リンク | |
EP1496644A2 (de) | Verfahren zur Unterschrift und zur Sitzungsschlüsselerzeugung | |
US20050182936A1 (en) | Key agreement and transport protocol with implicit signatures | |
EP0979496A2 (de) | Zweiweg-authentifizierung-protokoll | |
US20040250073A1 (en) | Protocol for hybrid authenticated key establishment | |
US20030044019A1 (en) | Key agreement and transport protocol | |
JP4307589B2 (ja) | 認証プロトコル | |
Lee et al. | AKA protocols for mobile communications | |
Mohammed et al. | Elliptic curve cryptosystems on smart cards | |
Yeun et al. | Secure software download for programmable mobile user equipment | |
Lee et al. | A 2-pass authentication and key agreement protocol for mobile communications | |
Tso et al. | ID-based key agreement for dynamic peer groups in mobile computing environments | |
Yang et al. | A new mutual authentication and key exchange protocol with balanced computational power for wireless settings | |
Das et al. | SPAM: secure protocol for authentication in mobile-communications | |
Kim et al. | New key recovery in WAKE protocol | |
Smith et al. | Secure mobile communication via identity-based cryptography and server-aided computations | |
Lee et al. | Temporary mobile user certificate for mobile information services in UMTS | |
Kohandani | ECE720 Project | |
unther Horn et al. | Authentication and Payment in Future Mobile Systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MOTOROLA INC., FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DAVIS, WALTER LEE;REEL/FRAME:018115/0419 Effective date: 20040205 Owner name: CERTICOM CORP., CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VANSTONE, SCOTT ALEXANDER;REEL/FRAME:018115/0415 Effective date: 20010814 Owner name: MOTOROLA INC., FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AYERST, DOUGLAS L;REEL/FRAME:018115/0429 Effective date: 20030206 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: BLACKBERRY LIMITED, ONTARIO Free format text: CHANGE OF NAME;ASSIGNOR:RESEARCH IN MOTION LIMITED;REEL/FRAME:034012/0007 Effective date: 20130709 |
|
AS | Assignment |
Owner name: MALIKIE INNOVATIONS LIMITED, IRELAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLACKBERRY LIMITED;REEL/FRAME:064104/0103 Effective date: 20230511 |