×

Scheme, system and equipment for inter-equipment authentication and key delivery

  • US 7,010,688 B1
  • Filed: 11/01/1999
  • Issued: 03/07/2006
  • Est. Priority Date: 10/30/1998
  • Status: Expired due to Fees
First Claim
Patent Images

1. An equipment authentication and cryptographic communication system, comprising:

  • user-end equipment, system-end equipment, and a key center for administrating authentication of equipment in said system, wherein;

    said user-end equipment provided with individual user-end equipment information issued by said key center and individual user-end equipment secret information corresponding to said individual user-end equipment'"'"'s information, and said user-end equipment transmits said individual user-end equipment information to said system-end equipment;

    said system-end equipment receives said individual user-end equipment information from said user-end equipment, reproduces by a system conversion said individual user-end equipment secret information from said received individual user-end equipment information using an equivalent secret key cryptographic algorithm of the key center, and authenticates said user-end equipment by confirming that said user-end equipment legitimately has said individual user-end equipment secret information by using a challenge response utilizing a common key cryptographic algorithm; and

    said user-end equipment and said system-end equipment execute a cryptographic communication with each other using said individual user-end equipment secret information,said system-end equipment is provided with a secret-key cryptographic algorithm, and reproduces said individual user-end equipment secret information by a system conversion of said individual user-end equipment information using a secret key,said system-end equipment and said user-end equipment are both provided with common secret information shared therebetween by exchanging individually held secret information,said system-end equipment and said user-end equipment (a) exchange with each other individually held secret information, and (b) generate new secret information by combining said individually held secret information and said secret information exchanged therebetween according to a predetermined procedure,said system-end equipment and said user-end equipment use said individual user-end equipment secret information for encrypting said new secret information, which is provided by combining said information and said exchanged information, andsaid system-end equipment and said user-end equipment (a) individually generate random digits, (b) exchange said generated random digits with each other, and (c) share the same secret information particular to said system-end equipment and said user-end equipment by combining said generated random digits and said exchanged random digits according to a predetermined procedure.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×