CA2081258A1 - System for authenticating communication participants - Google Patents

System for authenticating communication participants

Info

Publication number
CA2081258A1
CA2081258A1 CA2081258A CA2081258A CA2081258A1 CA 2081258 A1 CA2081258 A1 CA 2081258A1 CA 2081258 A CA2081258 A CA 2081258A CA 2081258 A CA2081258 A CA 2081258A CA 2081258 A1 CA2081258 A1 CA 2081258A1
Authority
CA
Canada
Prior art keywords
key value
code word
function
communication participants
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA2081258A
Other languages
French (fr)
Other versions
CA2081258C (en
Inventor
Jurgen Jacob Spaanderman
Klaas Pieter Vlieg
Maria Leo Wenas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke KPN NV
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2081258A1 publication Critical patent/CA2081258A1/en
Application granted granted Critical
Publication of CA2081258C publication Critical patent/CA2081258C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/045Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B

Abstract

Known methods for authenticating communication participants add a code word to a command signal, which code word is a crytographic function of the command signal and a key value which in its turn is a function of a master key value and a change code word. The master key value has a permanently fixed value, in contrast to the change code word which serves to change the key value. The method according to the invention makes use of a key value which is a function of at least one previous key value, the master key value with the permanently fixed value, which, once it has been discovered or leaked, substantially weakens the encryption, no longer being required. <IMAGE>
CA002081258A 1991-10-25 1992-10-23 System for authenticating communication participants Expired - Fee Related CA2081258C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NL9101796A NL9101796A (en) 1991-10-25 1991-10-25 METHOD FOR AUTHENTICATING COMMUNICATION PARTICIPANTS, METHOD FOR USING THE METHOD AND FIRST COMMUNICATION PARTICIPANT AND SECOND COMMUNICATION PARTICIPANT FOR USE IN THE SYSTEM.
NL9101796 1991-10-25

Publications (2)

Publication Number Publication Date
CA2081258A1 true CA2081258A1 (en) 1993-04-26
CA2081258C CA2081258C (en) 1998-06-30

Family

ID=19859853

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002081258A Expired - Fee Related CA2081258C (en) 1991-10-25 1992-10-23 System for authenticating communication participants

Country Status (11)

Country Link
US (1) US5325434A (en)
EP (1) EP0538946B1 (en)
JP (1) JP2687072B2 (en)
AT (1) ATE163337T1 (en)
AU (1) AU660194B2 (en)
CA (1) CA2081258C (en)
DE (1) DE69224455T2 (en)
ES (1) ES2113406T3 (en)
FI (1) FI924830A (en)
NL (1) NL9101796A (en)
NO (1) NO305530B1 (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0818783A3 (en) * 1991-07-16 1999-04-14 Canon Kabushiki Kaisha Magneto optical recording medium and method
US5644710A (en) * 1995-02-13 1997-07-01 Eta Technologies Corporation Personal access management system
US5737418A (en) * 1995-05-30 1998-04-07 International Game Technology Encryption of bill validation data
US5787175A (en) * 1995-10-23 1998-07-28 Novell, Inc. Method and apparatus for collaborative document control
US5761306A (en) 1996-02-22 1998-06-02 Visa International Service Association Key replacement in a public key cryptosystem
JPH10229392A (en) 1997-02-13 1998-08-25 Rohm Co Ltd Authentication system and authentication method
TW338865B (en) * 1997-06-03 1998-08-21 Philips Eloctronics N V Authentication system
KR100492968B1 (en) * 1999-05-29 2005-06-07 삼성전자주식회사 Apparatus and method for transmitting a channel signal gated in the control only substate of cdma communications system
US7804961B2 (en) * 2000-12-19 2010-09-28 Qualcomm Incorporated Method and apparatus for fast crytographic key generation
US20040236939A1 (en) * 2003-02-20 2004-11-25 Docomo Communications Laboratories Usa, Inc. Wireless network handoff key
FR2886027A1 (en) * 2005-05-20 2006-11-24 Proton World Internatinal Nv SEQUENCING ERROR DETECTION IN THE EXECUTION OF A PROGRAM
US7936878B2 (en) * 2006-04-10 2011-05-03 Honeywell International Inc. Secure wireless instrumentation network system
US20070248232A1 (en) * 2006-04-10 2007-10-25 Honeywell International Inc. Cryptographic key sharing method
JP5178163B2 (en) * 2007-11-27 2013-04-10 三菱電機株式会社 Security support device
TWI631507B (en) * 2016-03-04 2018-08-01 德凡特未來股份有限公司 Motion recognition apparatus and control method
GB2600538B (en) * 2020-09-09 2023-04-05 Tymphany Worldwide Enterprises Ltd Method of providing audio in a vehicle, and an audio apparatus for a vehicle

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4074066A (en) * 1976-04-26 1978-02-14 International Business Machines Corporation Message verification and transmission error detection by block chaining
US4193131A (en) * 1977-12-05 1980-03-11 International Business Machines Corporation Cryptographic verification of operational keys used in communication networks
US4218738A (en) * 1978-05-05 1980-08-19 International Business Machines Corporation Method for authenticating the identity of a user of an information system
SE426128B (en) * 1981-04-08 1982-12-06 Philips Svenska Ab METHOD FOR TRANSFER OF DATA MESSAGES BETWEEN TWO STATIONS, AND TRANSFER PLANT FOR EXECUTING THE METHOD
GB8322176D0 (en) * 1983-08-17 1983-09-21 Manchester City Council Vehicle docking system
US4599489A (en) * 1984-02-22 1986-07-08 Gordian Systems, Inc. Solid state key for controlling access to computer software
US4799061A (en) * 1985-11-18 1989-01-17 International Business Machines Corporation Secure component authentication system
US4688250A (en) * 1986-01-29 1987-08-18 Rca Corporation Apparatus and method for effecting a key change via a cryptographically protected link
US4805216A (en) * 1987-01-08 1989-02-14 Compfax Corporation Method and apparatus for continuously acknowledged link encrypting
JPH01284037A (en) * 1988-05-10 1989-11-15 Nec Corp Line ciphering device
US4864615A (en) * 1988-05-27 1989-09-05 General Instrument Corporation Reproduction of secure keys by using distributed key generation data
ATE99819T1 (en) * 1989-03-08 1994-01-15 Siemens Nixdorf Inf Syst METHOD OF GENERATION OF A RANDOM NUMBER FOR THE ENCRYPTED TRANSMISSION OF DATA, USING A VARIABLE SEED VALUE.
US4933971A (en) * 1989-03-14 1990-06-12 Tandem Computers Incorporated Method for encrypting transmitted data using a unique key
JP2791587B2 (en) * 1989-11-27 1998-08-27 株式会社ユーシン Remote control device
US5148479A (en) * 1991-03-20 1992-09-15 International Business Machines Corp. Authentication protocols in communication networks
US5177791A (en) * 1991-08-30 1993-01-05 International Business Machines Corp. Secure translation of usage-control values for cryptographic keys

Also Published As

Publication number Publication date
AU660194B2 (en) 1995-06-15
NO924077L (en) 1993-04-26
US5325434A (en) 1994-06-28
ATE163337T1 (en) 1998-03-15
AU2729092A (en) 1993-04-29
EP0538946B1 (en) 1998-02-18
NL9101796A (en) 1993-05-17
ES2113406T3 (en) 1998-05-01
EP0538946A1 (en) 1993-04-28
JP2687072B2 (en) 1997-12-08
NO305530B1 (en) 1999-06-14
CA2081258C (en) 1998-06-30
JPH07202879A (en) 1995-08-04
DE69224455T2 (en) 1998-07-16
FI924830A (en) 1993-04-26
NO924077D0 (en) 1992-10-21
FI924830A0 (en) 1992-10-23
DE69224455D1 (en) 1998-03-26

Similar Documents

Publication Publication Date Title
CA2081258A1 (en) System for authenticating communication participants
MX9602432A (en) Method and apparatus to control a signal decoder operation in a transmission system.
AU1680395A (en) Cryptographic system and method with key escrow feature
EP0782322A3 (en) Method of and apparatus for embedding data into an electronic document
CA2179973A1 (en) Image transmission apparatus, image transmission system, and communication apparatus
CA2224317A1 (en) Procedure for marking binary coded data sets
EP0659019A3 (en) Method of and system for enhancing distorted graphical information.
EP0647924A3 (en) Encryption key control system for mail processing system having data center verification.
ES2167522T3 (en) DATA RECORDING.
EP0292247A3 (en) Authenticator
EP1133163A3 (en) Method for data copyright control
WO1998033325A3 (en) Method and system for transferring content information and supplemental information relating thereto
EP1326449A3 (en) Data decoding method and decoding system
GB2236232B (en) Voice information service system utilizing approximately matched input character string and key word,and the method for the approximate matching thereof
CA2300495A1 (en) Technique for multi-rate coding of a signal containing information
RU94022746A (en) METHOD OF SECURING TWO-POINT COMMUNICATIONS IN SYSTEMS INTENDED FOR HIDDEN COMMUNICATIONS
AU6291394A (en) Method for coding or decoding time-varying image, and apparatuses for coding/decoding
CA2147641A1 (en) Copying Machine with Encryption Function
EP0650290A3 (en) System and method for encoding facsimile data.
EP0367215A3 (en) Transmission line encoding/decoding system
CA2086941A1 (en) Error protection for vlc coded data
NO982773L (en) Transforming a sequence of m-bit information words into a modulated signal
WO1998020645A3 (en) Improved tri-signature security architecture systems and methods
EP0645937A3 (en) Image reproduction system, image recording system thereof, method to generate an image representation and its use.
ES2105978A1 (en) Hair extensions

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed