×

Security system for handheld wireless devices using time-variable encryption keys

  • US 8,732,459 B2
  • Filed: 12/21/2012
  • Issued: 05/20/2014
  • Est. Priority Date: 06/26/2006
  • Status: Active Grant
First Claim
Patent Images

1. A portable wireless personal communication system for cooperating with a remote certification authority to employ time variable secure key information pursuant to a predetermined encryption algorithm to facilitate convenient, secure encrypted communication over a network, comprisinga. a body mounted key generating component adapted to be mounted on an individual'"'"'s body for wirelessly broadcasting within the immediate proximity of the individual a key signal corresponding to the time variable secure key information under the control of the certification authority in order to facilitate secure wireless communication with the individual in accordance with the encryption algorithm;

  • andb. a handheld wireless component adapted to receive the key signal broadcast by the key generating component for use in implementing secure communication in accordance with the predetermined encryption algorithm via signals transceived over a wireless link that forms part of a communication channel connected at one end to said handheld wireless component and connected at the other end to third parties that are or have communicated with the certification authority in accordance with the encryption algorithm,wherein said certification authority implements the encryption algorithm to allow encrypted communication between the certification authority and each of the individuals over the wireless network, said certification authority including a memory for storing an operating program and for storing subscriber identification information adapted to be associated with time variable key information corresponding to the time variable keys generated in each of the corresponding key generating components and used by the respective handheld components to form an encrypted message for broadcast over the wireless network to the certification authority wherein the certification authority can authenticate any encrypted message forwarded to said certification authority as coming from a particular individual by implementing an authentication routine of the encryption algorithm using the associated time variable key information.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×