Method and apparatus for efficiently initializing secure communications among wireless devices
First Claim
1. A method for initializing secure communications between a first device and a second device, said first and second devices each having a public key of a Certificate Authority and a device certificate, said device certificate having a unique hardware identifier associated with said respective device, and a public key associated with said respective device, said method comprising the steps of:
- establishing a session between said first device and said second device;
negotiating two-way session encryption and mutual authentication requirements between said first and said second device;
exchanging device certificates of said first device and said second device;
cryptographically verifying the received certificate using the public key of said Certificate Authority;
exchanging challenges created by each of said first and second devices;
responding to said respective challenges by signing said received challenge, using the receiving device'"'"'s private key, said private keys residing in the respective protected write-only storage in each said device;
returning said signed challenges;
cryptographically verifying that said received challenge signature is of the challenge previously sent by said receiving device;
establishing a key agreement between said first and second devices; and
, establishing secure communications if all of said prior verifying steps succeed.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for efficiently establishing secure communications between mobile devices in a radio network. The present invention utilizes public key cryptography and unique hardware identifiers to enable authorizations for access to wireless networks, such as picocells. The present invention prevents the mobile user from maintaining a plurality of secrets such as user identifier/password pairs, PINs, or encryption keys, for access to each device to which he might require access.
-
Citations
21 Claims
-
1. A method for initializing secure communications between a first device and a second device, said first and second devices each having a public key of a Certificate Authority and a device certificate, said device certificate having a unique hardware identifier associated with said respective device, and a public key associated with said respective device, said method comprising the steps of:
-
establishing a session between said first device and said second device;
negotiating two-way session encryption and mutual authentication requirements between said first and said second device;
exchanging device certificates of said first device and said second device;
cryptographically verifying the received certificate using the public key of said Certificate Authority;
exchanging challenges created by each of said first and second devices;
responding to said respective challenges by signing said received challenge, using the receiving device'"'"'s private key, said private keys residing in the respective protected write-only storage in each said device;
returning said signed challenges;
cryptographically verifying that said received challenge signature is of the challenge previously sent by said receiving device;
establishing a key agreement between said first and second devices; and
,establishing secure communications if all of said prior verifying steps succeed. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A program for initializing secure communications between a first device and a second device, said first and second devices each having a public key of a Certificate Authority and a device certificate, said device certificate having a unique hardware identifier associated with said respective device, and a public key associated with said respective device, said program code comprising:
-
computer program code means for establishing a session between said first device and said second device;
computer program code means for negotiating two-way session encryption and mutual authentication requirements between said first and said second device;
computer program code means for exchanging device certificates of said first device and said second device;
computer program code means for cryptographically verifying the received certificate using the public key of said Certificate Authority;
computer program code means for exchanging challenges created by each of said first and second devices;
computer program code means for responding to said respective challenges by signing said received challenge, using the receiving device'"'"'s private key, said private keys residing in respective write-only storage in each said device;
computer program code means for returning said signed challenges;
computer program code means for cryptographically verifying that said received challenge signature is of the challenge previously sent by said receiving device;
computer program code means for establishing a key agreement between said first and said second devices; and
,computer program code means for establishing secure communications if all of said prior verifying steps succeed. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for initializing secure communications between a first device and a second device, said first and second devices each having a public key of a Certificate Authority and a device certificate, said device certificate having a unique hardware identifier associated with said respective device, and a public key associated with said respective device, said system comprising:
-
a communications mechanism for establishing a session between said first device and said second device, negotiating two-way session encryption and mutual authentication requirements between said first and said second device, and exchanging device certificates of said first device and said second device;
a verifier for cryptographically verifying the received certificate using the public key of said Certificate Authority;
a negotiation mechanism for exchanging challenges created by each of said first and second devices, responding to said respective challenges by signing said received challenge, using the receiving device'"'"'s private key, said private keys residing in the respective write-only storage in each said device, returning said signed challenges, crytographically verifying that said received challenge signature is of the challenge previously sent by said receiving device, establishing a key agreement between said first and said second devices; and
, establishing secure communications if all of said prior verifying steps succeed. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification