×

METHOD FOR SECURING TRANSMISSION DATA AND SECURITY SYSTEM FOR IMPLEMENTING THE SAME

  • US 20110314284A1
  • Filed: 06/17/2011
  • Published: 12/22/2011
  • Est. Priority Date: 06/21/2010
  • Status: Abandoned Application
First Claim
Patent Images

1. A method for securing transmission data to be implemented by a security system that includes a first security module associated with first verification data and a second security module associated with second verification data, the first security module including a first public key and a first private key corresponding to the first public key, the second security module including a second public key and a second private key corresponding to the second public key, said method comprising the steps of:

  • a) configuring the first security module to provide the first public key to the second security module;

    b) configuring the second security module to encrypt the second public key using the first public key, and to provide the encrypted second public key to the first security module;

    c) configuring the second security module to encrypt the second verification data associated therewith using the first public key received in step a), and to provide the encrypted second verification data to the first security module;

    d) configuring the first security module to decrypt the encrypted second public key received in step b) using the first private key, to thereby obtain the second public key;

    e) configuring the first security module to encrypt the first verification data associated therewith using the second public key obtained in step d), and to provide the encrypted first verification data to the second security module;

    f) configuring the first security module and the second security module to verify each other using the encrypted second verification data and the encrypted first verification data received in steps c) and e), respectively; and

    g) configuring the security system to allow data transmission through the first security module and the second security module when verification is successfully completed in step f).

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×