Security system and method
First Claim
1. A method for exchanging random numbers, comprising:
- generating a first random number;
generating a first challenge code using the first random number and a secret code, wherein generating the first challenge code uses an exclusive OR function;
transmitting the first challenge code from a first device to a second device, the first and second devices knowing the secret code;
extracting the first random number from the first challenge code at the second device using the secret code;
generating a second random number at the second device;
generating a second challenge code using the extracted first random number and the second random number, wherein generating the second challenge code uses an exclusive OR function;
transmitting the second challenge code from the second device to the first device; and
extracting the second random number from the second challenge code.
4 Assignments
0 Petitions
Accused Products
Abstract
A first embodiment provides a process and system for simple, secure exchange of random numbers between two devices by combining a random number and a secret code (e.g., password) to generate a first challenge code, extracting the random number using the password at the second device, combining the first random number with a second random number, and returning the combination to the first device, which extracts the second random number from the second challenge code using its first random number. A CRC can be added to authenticate the sender. Another embodiment provides a system and method for generating a seedless pseudo-random number. The Yet another embodiment provides a system and method for generating data encryption coding with variable clocking.
34 Citations
42 Claims
-
1. A method for exchanging random numbers, comprising:
-
generating a first random number; generating a first challenge code using the first random number and a secret code, wherein generating the first challenge code uses an exclusive OR function; transmitting the first challenge code from a first device to a second device, the first and second devices knowing the secret code; extracting the first random number from the first challenge code at the second device using the secret code; generating a second random number at the second device; generating a second challenge code using the extracted first random number and the second random number, wherein generating the second challenge code uses an exclusive OR function; transmitting the second challenge code from the second device to the first device; and extracting the second random number from the second challenge code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for exchanging random numbers, comprising:
-
a circuit for generating a first random number; a circuit for generating a first challenge code using the first random number and a secret code, wherein an exclusive OR function is used for generating the first challenge code; a circuit for transmitting the first challenge code from a first device to a second device using a wireless link, the first and second devices knowing the secret code; a circuit for extracting the first random number from the first challenge code at the second device using the secret code; a circuit for generating a second random number at the second device; a circuit for generating a second challenge code using the extracted first random number and the second random number, wherein an exclusive OR function is used for generating the second challenge code; a circuit for transmitting the second challenge code from the second device to the first device; and a circuit for extracting the second random number from the second challenge code. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
14. A method for exchanging random numbers, comprising:
-
sharing a secret code between first and second devices in a secure environment; generating a first random number; generating a first challenge code by exclusive ORing (XORing) the first random number and the secret code; transmitting the first challenge code from a first device to a second device in a non-secure environment, the first and second devices knowing the secret code; extracting the first random number from the first challenge code at the second device using the secret code and inverse XORing; generating a second random number at the second device, wherein the first random number is of higher quality than the second random number; generating a second challenge code by XORing the extracted first random number and the second random number; transmitting the second challenge code from the second device to the local device in a non-secure environment; and extracting the second random number from the second challenge code at the first device by inverse XORing. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
15. A method for authenticating a data source using a cyclical redundancy check on encrypted data, comprising:
-
receiving a challenge containing an encrypted random number from a remote device; receiving a cyclical redundancy check purporting to correspond to the encrypted random number; decrypting the random number; checking the random number against the cyclical redundancy check; establishing a communications link with the remote device if the random number matches the cyclical redundancy check; not establishing a communications link with the remote device if the random number does not match the cyclical redundancy check. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
Specification