Apparatus and method for encryption key generation
First Claim
1. A method for operating an encryption system, comprising:
- broadcasting a first number;
receiving an authenticating request from a first individual subscriber unit (ISU);
generating a second number based on the authenticating request and information from a database, the database containing first ISU information and second ISU information; and
transmitting the second number to a second ISU, wherein the first and the second ISUs generate a same encryption key, and the first ISU generates the encryption key based on the first number and the second ISU generates the encryption key based on the first and the second numbers.
0 Assignments
0 Petitions
Accused Products
Abstract
An encryption key generation system generates encryption keys at both an originating terminal and a terminating terminal of a wireless network. A central controller generates a shared secret based on the identification information of a requesting terminal and a first number, which may be random. The central controller broadcasts the first number to all terminals. A second number is generated by the central controller incorporating the shared secret data and the terminating terminal'"'"'s identification information. The requesting terminal generates the shared secret data using the first number and predetermined algorithms and generates an encryption key based on the first number and the shared secret data. The terminating terminal decodes the shared secret data from the second number, and generates the same encryption key using the first number and the shared secret data.
122 Citations
21 Claims
-
1. A method for operating an encryption system, comprising:
-
broadcasting a first number; receiving an authenticating request from a first individual subscriber unit (ISU); generating a second number based on the authenticating request and information from a database, the database containing first ISU information and second ISU information; and transmitting the second number to a second ISU, wherein the first and the second ISUs generate a same encryption key, and the first ISU generates the encryption key based on the first number and the second ISU generates the encryption key based on the first and the second numbers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An encryption system that includes at least one ISU comprising:
-
a database; and a central controller coupled to the ISU and the database, wherein the central controller broadcasts a first number, receives an authentication request from a first ISU of the at least one ISU, generates a second number based on the authentication request and first ISU information and second ISU information retrieved from the database, and transmits the second number to a second ISU of the at least one ISU, the first ISU generating an encryption key based on the first number and the second ISU generating the encryption key based on the first and second numbers. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification