Method for generating a password using public key cryptography
First Claim
1. In a communication system, a method for using public key cryptography to generate a password that enables an embedded software program within a base station, the method comprises the steps of:
- a) obtaining, by a system controller, a unique identification code for the base station and an embedded software code;
b) encrypting, by the system controller, the unique identification code and the embedded software code, via a private key, to produce the password;
c) transferring, by the system controller, the password to the base station;
d) upon receiving the password, decrypting, by the base station via a public key, the password to produce the unique identification code and the embedded software code;
e) comparing, by the base station, the unique identification code with an embedded unique identification code; and
f) when the unique identification code and the embedded unique identification code substantially match, storing, by the base station, the password.
3 Assignments
0 Petitions
Accused Products
Abstract
In a communication system, a password that enables an embedded software program within a base station can be generated using public key cryptography in the following manner. A system controller (103) obtains a unique identification code and an embedded software code for the base station (101). Once obtained, the system controller (103) encrypts the unique identification code and the embedded software code using a private key to produce a password. The password is transferred to the base station (101) where, upon receipt, is decrypted using a public key to produce the unique identification code and the embedded software code. The base station (101) compares the unique identification code and an embedded unique identification code (107) and, when they substantially match, the base station (101) stores the password.
-
Citations
16 Claims
-
1. In a communication system, a method for using public key cryptography to generate a password that enables an embedded software program within a base station, the method comprises the steps of:
-
a) obtaining, by a system controller, a unique identification code for the base station and an embedded software code; b) encrypting, by the system controller, the unique identification code and the embedded software code, via a private key, to produce the password; c) transferring, by the system controller, the password to the base station; d) upon receiving the password, decrypting, by the base station via a public key, the password to produce the unique identification code and the embedded software code; e) comparing, by the base station, the unique identification code with an embedded unique identification code; and f) when the unique identification code and the embedded unique identification code substantially match, storing, by the base station, the password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. In a base station that includes a plurality of embedded software programs and an embedded unique identification code, a method for using public key cryptography to verify a password is from a valid source, wherein the password enables at least one embedded software program of the plurality of embedded software programs, the method comprises the steps of:
-
a) upon a predetermined condition, decrypting, via a public key, the password to produce a unique identification code and an embedded software code; b) comparing, the unique identification code with the embedded unique identification code; and c) when the unique identification code and the embedded unique identification code substantially match, indicating that the password is genuine and the embedded software code is authorized. - View Dependent Claims (10)
-
-
11. A method for generating a password by using public key cryptography, wherein the public key cryptography comprises a private key, the method comprises the steps of:
-
a) obtaining an embedded unique identification code and an embedded software code; and b) encrypting the unique identification code and the embedded software code, via the private key, to produce the password. - View Dependent Claims (12, 13, 14)
-
-
15. In a communication unit that includes a plurality of embedded software programs and an embedded unique identification code, a method for using public key cryptography to verify a password is from a valid source, wherein the password enables at least one embedded software program of the plurality of embedded software programs, the method comprises the steps of:
-
a) upon a predetermined condition, decrypting, via a public key, the password to produce a unique identification code and an embedded software code; b) comparing, the unique identification code with the embedded unique identification code; and c) when the unique identification code and the embedded unique identification code substantially match, indicating that the password is genuine and the embedded software code is authorized. - View Dependent Claims (16)
-
Specification