Method of distributing a public key
First Claim
1. A method of distributing the public key of an asymmetric key pair with a private key and the public key from a mobile station to a key managing computer, the method comprising the steps of:
- communicating a password (OTP) from the key managing (203) computer to the mobile station (209) of a registered user (201) by means of a secure channel (202) to thereby provide a shared secret;
at the mobile station and at the key managing computer, generating a first code (MAC1) and a second code (MACT1), respectively, based on the same predefined generation method, which codes (MAC1;
MACT1) are generated from the password (OTP);
by means of the mobile station (209), transmitting the public key and the first code (MAC1) to the key managing computer (203);
at the key managing computer (203), receiving the public key and the first code (MAC1) from the mobile station (209);
checking the authenticity of the registered user (201) based on comparing the first code (MAC1) and the second code (MACT1).
3 Assignments
0 Petitions
Accused Products
Abstract
A method of distributing the public key of an asymmetric key pair with a private key and the public key from a mobile station to a key managing computer, the method comprising the steps of: communicating a password (OTP) from the key managing (203) computer to the mobile station (209) of a registered user (201) by means of a secure channel (202) to thereby provide a shared secret; at the mobile station and at the key managing computer, generating a first code (MAC1) and a second code (MACT1), respectively, based on the same predefined generation method, which codes (MAC1; MACT1) are generated from the password (OTP); by means of the mobile station (209), transmitting the public key and the first code (MAC1) to the key managing computer (203); at the key managing computer (203), receiving the public key and the first code (MAC1) from the mobile station (209); checking the authenticity of the registered user (201) based on comparing the first code (MAC1) and the second code (MAC1).
79 Citations
22 Claims
-
1. A method of distributing the public key of an asymmetric key pair with a private key and the public key from a mobile station to a key managing computer, the method comprising the steps of:
-
communicating a password (OTP) from the key managing (203) computer to the mobile station (209) of a registered user (201) by means of a secure channel (202) to thereby provide a shared secret;
at the mobile station and at the key managing computer, generating a first code (MAC1) and a second code (MACT1), respectively, based on the same predefined generation method, which codes (MAC1;
MACT1) are generated from the password (OTP);
by means of the mobile station (209), transmitting the public key and the first code (MAC1) to the key managing computer (203);
at the key managing computer (203), receiving the public key and the first code (MAC1) from the mobile station (209);
checking the authenticity of the registered user (201) based on comparing the first code (MAC1) and the second code (MACT1). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 22)
-
-
14. An application module arranged on a smart card, which is registered to a user for use of the smart card in a mobile station;
- and wherein the application module is configured to
receive a password entered by the user, and to generate and store an asymmetric key pair with a public key and a private key characterized in that the application module further is configured to;
generate a first code based on the same predefined generation method as is used for generating a second code at a specified key managing computer, which first and second codes are generated from the password as a Message Authentication Code;
via the mobile station, transmit the public key and the first code to the specified key managing computer to enable authentication of the registered user'"'"'s public key, based on comparing the first and second code. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
- and wherein the application module is configured to
Specification