Professional Documents
Culture Documents
Roberts
(Us)
Notice:
Edmunds (GB)
(*)
US 6,931,128 B2
Aug. 16,2005
(51)
* cited by examiner
(52)
us. Cl.
(58)
References Cited
U.S. PATENT DOCUMENTS
5,381,481 A
1/1995
5,412,730 A
5/1995
5,428,686 A
6/1995
6,327,660 B1 * 12/2001
6,357,046 B1 *
WO 98/55717
12/1998
........... .. H04L/9/08
OTHER PUBLICATIONS
risk of eavesdropping.
IIIPUI
mm
TEXT
MASTER
mm
WWI
mm
amen/non
IIGDULE
3B1
RANDOM
BIT
SEQUENCE
moon
seen
CIPHER
1011
SEQUENCE
214
m
OTHER an
SEQUENCE
"I I"
smumcs
% szmnon
IDDULE
RANDOISEED
m
snowmen
PAYLOAD
m
OUTPUT
OTHER
BII
05420321
1
Hanan/1140"" DEVICE
311
U.S. Patent
Aug. 16,2005
Sheet 2 6f 6
2 .:
US 6,931,128 B2
2:
AN
EB
E5
.02
N
583
AN
cm:
2;
U.S. Patent
Aug. 16,2005
Sheet 3 6f 6
US 6,931,128 B2
(3125v:32
EN
U.S. Patent
Aug. 16,2005
Sheet 6 6f 6
@FID
US 6,931,128 B2
i\'6D1
l
READ RANDOM SEED
'v 602
F\- 503
L
CENERATE KEY
]\ 604
N 605
@
FIG. 6
US 6,931,128 B2
1
dropping.
back into the plain teXt so that the data may be properly
decipher the cipher teXt and thus cannot interpret the data.
45
key is changed.
55
65
US 6,931,128 B2
3
draWings in Which:
FIG. 1 illustrates an exemplary system that provides a
10
15
25
40
55
The magnetic hard disk drive 127, magnetic disk drive 128,
and optical disk drive 130 are connected to the system bus
123 by a hard disk drive interface 132, a magnetic disk
and other data for the computer 120. Although the exem
US 6,931,128 B2
5
printers.
The computer 120 may operate in a netWorked environ
25
45
tion technology.
55
65
US 6,931,128 B2
7
the master secret and a seed so that the master secret and the
10
Step (6): Append the hashed result from step (4) to the B
35
master secret 306 are input into key generation module 307
to generate key bit sequence 308. The master secret 306 Was
seed.
Pihash can be iterated as many times as is necessary to
US 6,931,128 B2
9
10
S1 and S2 are the tWo halves of the master secret and each
last byte of S1 Will be the same as the ?rst byte of S2. For
of the secret.
15
is de?ned as folloWs.
are then input to the key generation module 607 (act 603).
The key generation module 607 at the decryption device 202
1(S2, label+seed);
hexadecimal format:
25
73 6C 69 74 68 79 2O 74 6F 76 65 73
module 309, the key is then be used to decrypt the cipher text
310 (act 605) from the data packet 204 to thereby regenerate
35
45
employed; and
Where Pihash is PiSHA-l if the SHA-1 hash algorithm
is employed.
Note that the entire master secret is passed into the Pihash
function rather than dividing the master secret into tWo
halves.
the plain text 203 that Was initially encrypted at the encryp
tion device 201.
One advantage of the present invention is that the seed
used to generate the key contains a random bit sequence.
This makes it more dif?cult for an eavesdropper to identify
the encryption key or master secret to thereby be able to
encrypt the data packet (act 604). The key is then supplied
After the key is generated (act 406), the generated key 308
secret. Once the master secret lifetime has expired, the ?rst
the key to encrypt the plain text 203 to thereby form cipher
text 310 (act 407). The identi?cation of the enciphering and
deciphering modules may also be negotiated during the
55
Next, the encrypted data (i.e., cipher text 310) and the
65
US 6,931,128 B2
11
12
packet;
10
15
protocol.
45
computer system.
packet.
55
65
US 6,931,128 B2
14
13
10
computer system;
computer system;
computer-executable instructions for performing an act of
15
packets;
data packets;
25
computer system.
27. A method in accordance With claim 26, Wherein the
second computer system comprises a Wireless device.
28. A method in accordance With claim 21, Wherein the
random seed includes a bit sequence that represents the
current time.
40
CERTIFICATE OF CORRECTION
PATENT NO.
: 6,931,128 B2
Page 1 of 1
DATED
INVENTOR(S)
It is certified that error appears in the above-identi?ed patent and that said Letters Patent is
hereby corrected as shown below:
Column 11
,, W451i,
JON W. DUDAS