Key management technique for establishing a secure channel

作者: W. Dale Hopkins

DOI:

关键词:

摘要: A key management technique establishes a secure channel through an indeterminate number of nodes in network. The comprises enrolling smart card with unique per card. is derived from private that assigned and distinctive to systems base issuer. An enrolled contains stored public entity-identifier the secret key. further transacting at point entry transaction creates PIN encryption identifier uniquely identifies sequence number. also communicating point-to-point encrypted form plurality network, recovering issuer server using

参考文章(12)
Jonathan Oseas, Walter L. Tuchman, Richard E. Lennon, Stephen M. Matyas, Paul N. Prentice, Carl H. W. Meyer, Cryptographic verification of operational keys used in communication networks ,(1977)
Walter L. Tuchman, Richard E. Lennon, Stephen M. Matyas, Robert C. Elander, Robert E. Shuck, Carl H. W. Meyer, Cryptographic application for interbank verification ,(1981)
Stephen M. Matyas, Donald B. Johnson, Julian Thomas, John D. Wilkins, Randall J. Easter, An Van Le, Phil C. Yeh, Ronald M. Smith, Method and apparatus for validating entry of cryptographic keys ,(1991)
Jieh-Shan Wang, James F. Chen, Counterfeit-proof identification card ,(1994)
William A. Merz, Michael J. Kelly, Robert S. DeBellis, Lucina L. Green, Randall J. Easter, Edward J. D'Avignon, Vincent A. Spano, Phil Chi-Chung Yeh, Ronald M. Smith, Method and apparatus for providing public key security control for a cryptographic processor ,(2000)
Suzanne C. Cutino, Virgil M. Davis, Steven John Pringle, Michael J. Berg, Frederick Sidney Conklin, Internet loading system using smart card ,(1998)
K. Ohta, Efficient identification and signature schemes Electronics Letters. ,vol. 24, pp. 115- 116 ,(1988) , 10.1049/EL:19880076