Secure self learning system
First Claim
1. A method of determining a key to be used for encrypting and decrypting information transmitted between two stations, comprising the steps of:
- storing a key in a first station during manufacturing, the key being generated using first information, second information, and a key generation routine;
storing the second information in the first station;
storing a key generation routine and the first information in a second station during manufacturing;
transmitting the second information from first station to the second station during learning;
receiving the second information by the second station during learning; and
calculating, during learning, a key in the second station using the second information which has been received, the first information which has been stored during manufacturing, and the key generation routine.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for the remote control of devices having a secure self learn capability. The system includes an encoder and a decoder, the encoder encoding variable information including a user key using a non-linear algorithm to produce an encoded value transmitted to the decoder, the decoder decoding the value using the same algorithm. In a learning mode a new encoder is to be added to the system. The new encoder produces an encoded value using a key generation seed. The decoder, upon receiving the encoded key generation seed, produces a decoding key based upon the decoded key generation seed. The decoding key is stored in the decoder memory allowing valid recognition of the new encoder in a secure manner.
-
Citations
24 Claims
-
1. A method of determining a key to be used for encrypting and decrypting information transmitted between two stations, comprising the steps of:
-
storing a key in a first station during manufacturing, the key being generated using first information, second information, and a key generation routine; storing the second information in the first station; storing a key generation routine and the first information in a second station during manufacturing; transmitting the second information from first station to the second station during learning; receiving the second information by the second station during learning; and calculating, during learning, a key in the second station using the second information which has been received, the first information which has been stored during manufacturing, and the key generation routine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for determining a key to be used for encrypting and decrypting information transmitted between two stations, comprising:
-
a memory which stores a key in a first station during manufacturing, the key being generated using first information, second information, and a key generation routine; a memory which stores the second information in the first station; a memory which stores a key generation routine and the first information in a second station during manufacturing; means for transmitting the second information from first station to the second station during learning; means for receiving the second information by the second station during learning; and means for calculating, during learning, a key in the second station using the second information which has been received, the first information which has been stored during manufacturing, and the key generation routine. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification