Secure packet radio network
First Claim
1. A method of operating a network comprising a network operator station and plurality of user stations, the method comprising:
- generating at least one key required for use bya plurality of user stations in the network,the at least one key being necessary forthe authentication of the user station;
wherein any one of the plurality of user stations are capable of being an intermediate user station;
transmitting to the network operator station, from a first user station requiring a key,a key request message containingfirst status data indicative thatthe key request message originates from
a user station lacking a key;
transmitting, from the network operator station to the first user station,a key data message containinga key for use by the first user station andsecond status data corresponding tothe first status data andidentifying the key data message as
a response to a key request message;
wherein any two user stations are capable of transmitting a key data message to each otherthrough one or more intermediate user stations, andwherein any user stationacting as an intermediate user station andreceiving the key data messageanalyzes the received key data message to determine whetherthe received key data message,contains the second status data, andforwards the key data message to the first user station if
the second status data thereof identifies the key data message as
a response to a key request message.
3 Assignments
0 Petitions
Accused Products
Abstract
A packet radio network comprises at least one network operator station and a number of user stations. The user stations transmit message data to one another, either directly or via intermediate stations. When stations are first activated, they transmit key request messages to the network operator station. Other, authenticated stations in the network will not communicate with the new station, but will pass the key request message to the network operator station. The network operator station transmits the necessary keys back to the new station via the other stations to permit the new station to operate. Each user station transmits key probe signals from time to time which advise other stations of its public key.
-
Citations
16 Claims
-
1. A method of operating a network comprising a network operator station and plurality of user stations, the method comprising:
-
generating at least one key required for use by a plurality of user stations in the network, the at least one key being necessary for the authentication of the user station; wherein any one of the plurality of user stations are capable of being an intermediate user station; transmitting to the network operator station, from a first user station requiring a key, a key request message containing first status data indicative that the key request message originates from
a user station lacking a key;transmitting, from the network operator station to the first user station, a key data message containing a key for use by the first user station and second status data corresponding to the first status data and identifying the key data message as
a response to a key request message;wherein any two user stations are capable of transmitting a key data message to each other through one or more intermediate user stations, and wherein any user station acting as an intermediate user station and receiving the key data message analyzes the received key data message to determine whether the received key data message, contains the second status data, and forwards the key data message to the first user station if
the second status data thereof identifies the key data message as
a response to a key request message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A network comprising;
-
a network operator station; and a plurality of user stations adapted to transmit message data to one another, via intermediate user stations, wherein any one of the plurality of user stations are capable of being an intermediate user station; wherein any two user stations are capable of transmitting a key data message to each other through one or more intermediate user stations, and each user station comprising; a transceiver for sending data to and receiving data from other stations in the network; and
processor means for;(a) generating a key request message for transmission to the network operator station, the key request message containing
first status data indicative that the message originates from
a first user station lacking a key, the key being necessary for the authentication of the user stations; and(b) receiving a key data message from the network operator station, the key data message containing
a key for use by the first user station and
second status data corresponding to
the first status data and
identifying the key data message as
a response to a key request message,the network operating such that any two user stations are capable of transmitting a key data message to each other through one or more intermediate user stations, and such that any user station acting as an intermediate user station and receiving the key data message analyzes the received key data message to determine whether the received key data message
contains the second status data, and
forwards the key data message to the first user station if
the second status data thereof identifies it as
a response to a key request message, thereby to enable the first user station to communicate with other stations in the network. - View Dependent Claims (14, 15)
-
-
16. A user station adapted for use in a network, the network comprising a network operator station and a plurality of user stations adapted to transmit message data to one another via intermediate user stations,
the user station comprising; -
a transceiver for sending data to and receiving data from other stations in the network; token reader means for reading identification data from a secure token associated with a user; and processor means for; (a) generating a key request message for transmission to the network operator station, the key request message containing first status data indicative that the message originates from
a first user station lacking a key, the key being necessary for the authentication of the user stations; and(b) receiving a key data message from the network operator station, the key data message containing a key for use by the first user station and second status data corresponding to
the first status data and
identifying the key data message as
a response to a key request message,the network operating such that any two user stations are capable of transmitting a key data message to each other through one or more intermediate user stations, and such that any user station acting as an intermediate user station and receiving the key data message analyzes the received key data message to determine whether the received key data message
contains the second status data, and
forwards the key data message to the first user station if
the second status data thereof identifies it as
a response to a key request message, thereby to enable the first user station to communicate with other stations in the network.
-
Specification