Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for creating a secure network using identity credentials of batches of devices

A security network and equipment technology, applied in the field of security transactions, can solve problems such as fraud, achieve good security, improve security, and reduce the effect of possibility

Inactive Publication Date: 2009-03-11
GEMPLU
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This raises security and authentication issues, as it is possible for rogue users to add their fraudulent key pairs to the device after manufacture, allowing trusted devices to be used to commit fraud on the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for creating a secure network using identity credentials of batches of devices
  • System and method for creating a secure network using identity credentials of batches of devices
  • System and method for creating a secure network using identity credentials of batches of devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to facilitate the understanding of the principles and features of the present invention, the following description refers to the implementation of an exemplary embodiment. Specifically, the present invention is described for a device scenario using smart card devices, where each smart card is assigned a different key pair. These smart cards are grouped by manufacturing batch, each batch having a unique credential (eg a digital certificate associated therewith). A particular embodiment of such a system is described in the context of a device using a SIM card in conjunction with the GSM mobile communication system. Furthermore, the invention is described in connection with a PKI system, which allows encryption and decryption through private and public keys, verification or authentication through digital notarization entities or public certificates issued by certification authorities.

[0040] It should be understood, however, that this is not the only embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for creating a trusted network capable of facilitating secure transactions via an open network using batch credentials, such as batch PKI certificates, is presented. A certificate is bound to a group, or batch, or devices. This certificate is referenced by an activation authority upon processing a request for service by a device. Information regarding the device batch certificate is maintained in a permanent, or escrow, database. A user identity is bound to a device, as a device key is used to sign a user key created on the device in the presence of the user, and a copy of the device key is later used to decrypt the signed user key upon its transmission and receipt.

Description

technical field [0001] The present invention generally relates to enabling secure transactions over communication networks through credentials, such as PKI certificates. More specifically, the present invention relates to the use of certificates or other notarized certificates for bulk devices to authenticate and authenticate commercial devices on communication networks. Background technique [0002] With the advent of the Internet, the number of online transactions has also increased dramatically. As such transactions increase, so do issues such as transaction security, authentication of transaction parties, non-repudiation of transactions, and authentication and verification of devices used in such transactions. To address these issues, a public key infrastructure (PKI) has been developed in which a certification authority (CA) issues digital certificates and a pair of associated keys to individuals and organizations participating in electronic commerce over an open netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G07F7/10G06Q20/00H04L29/06H04L29/08
CPCG06Q20/3829G06Q20/02H04L63/0823H04L2209/80H04L63/12H04L63/104H04L67/30H04L9/3294H04L9/3268H04L2209/56H04L9/006H04L29/08918
Inventor L·梅里恩J·-L·卡拉拉Y·贝比克P·米勒
Owner GEMPLU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products