×

Key conversion method for communication session encryption and authentication system

  • US 7,299,356 B2
  • Filed: 09/02/2003
  • Issued: 11/20/2007
  • Est. Priority Date: 09/02/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for mutual authentication of a first station and a second station, comprising:

  • providing a particular data random key at the first station, disassembling and veiling the particular data random key by forming a first conversion array seeded by a shared secret and then encrypting the first conversion array to produce a first encrypted data set, where access to the shared secret indicates authenticity of the first station;

    sending a first message to the second station including the first encrypted data set key, where the second station decrypts first encrypted data set and unveils and reassembles said particular data random key using the shared secret, and where the second station disassembles and veils a version of the particular data random key by forming a second conversion array seeded by the shared secret and then encrypts the second conversion array to produce a second encrypted data set, and sends a second message to the first station carrying the second encrypted data set, where access to the shared secret indicates authenticity of the second station;

    receiving the second message, and decrypting the second encrypted data set, and reassembling and unveiling the version of the particular data random key at the first station using the shared secret;

    determining at the first station if the version of the particular data random key matches an expected version the particular data random key, and if so providing an additional particular data random key at the first station, disassembling and veiling the additional particular data random key by forming a third conversion array seeded by the shared secret and then encrypting the third conversion array to produce a third encrypted data set, where access to the shared secret indicates authenticity of the first station;

    sending a third message to the second station including the third encrypted data set, where the second station decrypts the third encrypted data set and reassembles and unveils said additional particular data random key using the shared secret, and where the second station disassembles and veils a version of the additional particular data random key by forming a fourth conversion array seeded by the shared secret and then encrypts the fourth conversion array to produce a fourth encrypted data set, and sends a fourth message to the first station carrying the fourth encrypted data set, where access to the shared secret indicates authenticity of the second station;

    receiving the fourth message, and decrypting the fourth encrypted data set and reassembling and unveiling the version of the additional particular data random key at the first station using the shared secret;

    determining at the first station if the version of the additional data random key matches an expected version of the additional data random key, and if so disassembling and veiling the additional particular data random key by forming a fifth conversion array seeded by an additional shared secret and then encrypting the fifth conversion array to produce a fifth encrypted data set, where access to the additional shared secret indicates authenticity of the first station; and

    sending a fifth message to the second station including the fifth encrypted data set, where the second station decrypts the fifth encrypted data set, reassembles and unveils said additional particular data random key using the additional shared secret, and determines at the second station if a version of the additional data random key matches an expected version of the additional data random key.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×