Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices
First Claim
1. An system to securely communicate location coordinate information over an insecure communication channel, comprising:
- a tracking device to communicate first cipher seed values with a location coordinate monitoring station, the first tracking device generating a first synchronous key; and
a coordinate monitoring station that includes at least one hardware component that;
generates the first synchronous key independent of the location coordinate monitoring station, andselects randomly at least one asynchronous vector pair from an Affine Transform Table to encrypt with the first synchronous key before transmitting at least one of the asynchronous vector pairs to the tracking device, wherein the tracking device decrypts the asynchronous vector pairs using the first synchronous key and receives and transmits messages utilizing encryption based on the at least one of the asynchronous vector pairs and on the first synchronous key.
12 Assignments
0 Petitions
Accused Products
Abstract
A system for securing information. The system includes a first tracking device associated with an object or an individual. In one embodiment, the first tracking device generates independently a synchronous secret key and a server generates independently the synchronous secret key. Over an insecure communication channel, the server communicates an asynchronous vector pair encrypted with the synchronous secret key with the tracking device. To securely communicate information, messages are encrypted and decrypted using the asynchronous vector pair between the tracking device and the server. To further secure message information, a set of random numbers may be further utilized with the asynchronous vector pair to further encrypt and decrypt the messages communicated between the tracking device and the server.
-
Citations
16 Claims
-
1. An system to securely communicate location coordinate information over an insecure communication channel, comprising:
-
a tracking device to communicate first cipher seed values with a location coordinate monitoring station, the first tracking device generating a first synchronous key; and a coordinate monitoring station that includes at least one hardware component that; generates the first synchronous key independent of the location coordinate monitoring station, and selects randomly at least one asynchronous vector pair from an Affine Transform Table to encrypt with the first synchronous key before transmitting at least one of the asynchronous vector pairs to the tracking device, wherein the tracking device decrypts the asynchronous vector pairs using the first synchronous key and receives and transmits messages utilizing encryption based on the at least one of the asynchronous vector pairs and on the first synchronous key. - View Dependent Claims (2, 3, 4)
-
-
5. A system that securely communicates information over an insecure communication channel, the system comprising:
-
a server; a tracking device associated with an object, the tracking device exchanging a first cipher code with the server; wherein the tracking device and the server each independently generates a first secret key utilizing the first cipher code and a first selected random number only known respectively to either the tracking device or the server; and wherein the server encrypts an Affine Transform table of asynchronous vector encryption and decryption transform pairs with the first secret key to form a first signal and communicates the first signal to the tracking device, wherein the server and the tracking device communicate messages utilizing encryption based on at least one of the asynchronous vector encryption transform pairs and on the first secret key. - View Dependent Claims (6, 7, 8, 9, 10)
-
-
11. A method for securely communicating location coordinates between at least one of a first party and a second party, comprising:
-
accessing an insecure communication channel by the first party and the second party; selecting a first secret random number independently by a first party; selecting a second secret random number independently by a second party; independently computing by the first and the second party a first synchronous key, wherein at least one of accessing, selecting a first secret random number, or selecting a second secret random number is implemented using hardware; transmitting a first asymmetric vector transform pair randomly selected from an Affine Transform Table and encrypted using the first synchronous key by at least one of the first party and the second party; and encrypting and decrypting one or more message contents between the first party and the second party using the first asymmetric vector transform pair together with the first synchronous key. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method to securely communicate location coordinates of the tracking device over an insecure communication channel, the method comprising:
-
performing at least one cipher key exchange between the tracking device and a monitoring station; calculating independently by the first tracking device at least one synchronous key utilizing a first secret key of the tracking device in response to receiving the at least one cipher key exchange; calculating independently by the monitoring station at least one synchronous key utilizing a second secret key by the monitoring station in response to receiving the at least one cipher key exchange; communicating at least one asynchronous vector transform pairs selected randomly from an Affine Transform Table and encrypted with the at least one synchronous key between the monitoring station and the first tracking device; communicating at least one random number set encrypted with at least one synchronous key between the monitoring station and the first tracking device; compressing messages comprising the location coordinates of tracking device to a reduced byte representation in response to detecting redundant location coordinates;
wherein the reduced byte representation improves message security and decreases likelihood of detecting the location coordinates of the tracking device; andencrypting the messages utilizing the at least one of asynchronous vector transform pairs and the at least one synchronous key to securely communicate the messages between the first tracking device and the monitoring station.
-
Specification