METHOD FOR SECURING TRANSMISSION DATA AND SECURITY SYSTEM FOR IMPLEMENTING THE SAME
First Claim
1. A method for securing transmission data to be implemented by a security system that includes a first security module associated with first verification data and a second security module associated with second verification data, the first security module including a first public key and a first private key corresponding to the first public key, the second security module including a second public key and a second private key corresponding to the second public key, said method comprising the steps of:
- a) configuring the first security module to provide the first public key to the second security module;
b) configuring the second security module to encrypt the second public key using the first public key, and to provide the encrypted second public key to the first security module;
c) configuring the second security module to encrypt the second verification data associated therewith using the first public key received in step a), and to provide the encrypted second verification data to the first security module;
d) configuring the first security module to decrypt the encrypted second public key received in step b) using the first private key, to thereby obtain the second public key;
e) configuring the first security module to encrypt the first verification data associated therewith using the second public key obtained in step d), and to provide the encrypted first verification data to the second security module;
f) configuring the first security module and the second security module to verify each other using the encrypted second verification data and the encrypted first verification data received in steps c) and e), respectively; and
g) configuring the security system to allow data transmission through the first security module and the second security module when verification is successfully completed in step f).
0 Assignments
0 Petitions
Accused Products
Abstract
A method for securing transmission data is to be implemented by a security system including first and second security modules. The first security module provides a first public key to the second security module. The second security module encrypts a second public key and second verification data associated therewith using the first public key, and provides the encrypted second public key and the encrypted second verification data to the first security module. The first security module decrypts the encrypted second public key using a first private key, encrypts first verification data associated therewith using the second public key, and provides the encrypted first verification data to the second security module. The first and second security modules verify each other using the encrypted second and first verification data, respectively. The security system allows data transmission through the first and second security modules when verification is successfully completed.
40 Citations
18 Claims
-
1. A method for securing transmission data to be implemented by a security system that includes a first security module associated with first verification data and a second security module associated with second verification data, the first security module including a first public key and a first private key corresponding to the first public key, the second security module including a second public key and a second private key corresponding to the second public key, said method comprising the steps of:
-
a) configuring the first security module to provide the first public key to the second security module; b) configuring the second security module to encrypt the second public key using the first public key, and to provide the encrypted second public key to the first security module; c) configuring the second security module to encrypt the second verification data associated therewith using the first public key received in step a), and to provide the encrypted second verification data to the first security module; d) configuring the first security module to decrypt the encrypted second public key received in step b) using the first private key, to thereby obtain the second public key; e) configuring the first security module to encrypt the first verification data associated therewith using the second public key obtained in step d), and to provide the encrypted first verification data to the second security module; f) configuring the first security module and the second security module to verify each other using the encrypted second verification data and the encrypted first verification data received in steps c) and e), respectively; and g) configuring the security system to allow data transmission through the first security module and the second security module when verification is successfully completed in step f). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A security system for securing transmission data, said security system comprising:
-
a first security module that is associated with first verification data, and that includes a first encryption/decryption unit, a first verification unit, and a first key-generating unit for generating an accessible first public key and a first private key corresponding to the first public key; and a second security module that is associated with second verification data, that is configured to obtain the first public key from said first security module, and that includes a second encryption/decryption unit, a second verification unit, and a second key-generating unit for generating a second public key and a second private key corresponding to the second public key; said second encryption/decryption unit being operable to encrypt the second public key and the second verification data using the first public key, and to provide the encrypted second public key and the encrypted second verification data to said first security module; said first encryption/decryption unit being operable to decrypt the encrypted second public key and the encrypted second verification data using the first private key to thereby obtain the second public key and the second verification data, to encrypt the first verification data using the second public key thus obtained, and to provide the encrypted first verification data to said second security module; said first verification unit being operable to verify said second security module based upon the second verification data decrypted and obtained by said first encryption/decryption unit; said second encryption/decryption unit being further operable to decrypt the encrypted first verification data using the second private key to obtain the first verification data; said second verification unit being operable to verify said first security module based upon the first verification data decrypted and obtained by said second encryption/decryption unit; said security system being operable to allow data transmission through said first security module and said second security module when verification between said first security module and said second security module is successfully completed. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification