WO2002069105A2 - Wireless encryption apparatus and method - Google Patents

Wireless encryption apparatus and method Download PDF

Info

Publication number
WO2002069105A2
WO2002069105A2 PCT/US2002/005834 US0205834W WO02069105A2 WO 2002069105 A2 WO2002069105 A2 WO 2002069105A2 US 0205834 W US0205834 W US 0205834W WO 02069105 A2 WO02069105 A2 WO 02069105A2
Authority
WO
WIPO (PCT)
Prior art keywords
encrypted information
transmission
level
information
yield
Prior art date
Application number
PCT/US2002/005834
Other languages
French (fr)
Other versions
WO2002069105A3 (en
Inventor
Keith Benson
Original Assignee
Imbros Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Imbros Corporation filed Critical Imbros Corporation
Priority to AU2002242267A priority Critical patent/AU2002242267A1/en
Publication of WO2002069105A2 publication Critical patent/WO2002069105A2/en
Publication of WO2002069105A3 publication Critical patent/WO2002069105A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/04Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Algebra (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention provides for a host web server (210) to encrypt and transmit information to a mobile client (240) such that the decrypted clear information (220) at no time exists in a third party WAP server (230) used at an intermediate point in the transmission to the mobile client (240). This is done by the web server (210) providing two or three or more layers of encryption prior to the SSL level of encryption of the clear information (220). Therefore, when the WAP server (230) decrypts the SSL level of encryption and encrypts the result by the WTLS protocol, then no clear information (220) exists in the WAP Server (230).

Description

WIRELESS ENCRYPTION APPARATUS AND METHOD
Field of the Invention The present invention involves wireless communication. More specifically, the present invention involves wireless encryption apparatus, methods, and architecture.
Background of the Invention
Wireless communication is known. To provide security for wireless communication, various encryption schemes have been developed. More recently attempts have been made to provide a encrypted security scheme for popular acceptance that would allow web-enabled mobile phones to communicate with a host web server in a secure, encrypted manner.
The Wireless Application Protocol ("WAP") has been developed. Attempts have been made to develop a popular acceptable system using WAP for secure encrypted communications between a host web server and a web-enabled mobile phone, or other mobile client. However, to date these efforts have not met with popular acceptance because of a critical failure in the existing attempts.
Figure 1 describes the prior art and its problem. A host web server 110 contains clear information in a template format 120 which may include, for example, an address field, a name field, a content field, and any other content field. (Herein "clear information" refers to the underlying unencrypted information either before or after transmission.) The web host server
110 may be operated, for example, by a bank 170. In the prior art, the clear information 120 to be transmitted to the mobile client 140 is first encrypted at the host web server according to the SSL (secure socket layer) encryption standard. This encryption standard results in an encrypted message with no format 121 which is then transmitted to a WAP server 130. This transmission is made over the Internet 150 in . a secure encrypted manner. The WAP server 130 receives the encrypted message 121 through the Internet 150 and then decrypts the SSL encryption, yielding decrypted clear information 120, in the WAP server 130. The WAP server then encrypts the clear decoded information 120 using the WTLS (Wireless Transport Layer Security) protocol. The WTLS encrypted information is then transmitted by a wireless infrastructure to the mobile client 140. The wireless transmission is a secure wireless transmission 160 in a WTLS encrypted format. The mobile client 140 decrypts the WTLS encrypted message, yielding clear information in its template 120 in the mobile client 140.
The WAP server 130 may, for example, be operated by a telephone company ("teleco") 131. The mobile client 140 may be a web-enabled mobile phone, or other portable wireless web-enabled device.
Infrastructure for this prior art approach has been heavily invested in by various industrial players, but it has not received wide acceptance. This has not received wide acceptance because the decoded clear information 120 exists in the WAP server 130, which is owned, operated and controlled by a third party operator, which may be a teleco 131 or other company. This decoded clear information 120 exists in the WAP server 130 after the decryption of the SSL layer of the message received by the WAP server 130 from the host web server 110, and before the WTLS encryption of the clear information 120 by the WAP server prior to wireless transmission 160 to the mobile client 140. This allows the WAP server 130 and its operator 131 to read, copy, manipulate and exploit the clear information 120, perhaps without the knowledge of the web host server 110 operator 170.
This is a prohibitive issue for many potential users with host web servers 110 such as banks 170, because they are unwilling to let a WAP server operator 131 review all their most confidential client information 120. This is particularly aggravated by the potential for the WAP server operator 131 to be in direct competition with the host web server operator 170. For example, the host web server operator 170 may be a bank, whereas the WAP server operator 131 may be a telephone company with a wholly owned bank subsidiary in direct competition with the host web server operator 170.
In Figure 1, when the direction of the communication is reversed from the mobile client 140 to the web host server 110, the same problem of the clear information 120 in the WAP server 130 applies.
The same situation may also be prohibitive for the user of the mobile client 140 that does not want their personal decrypted information 120 intercepted by a third party 131.
Therefore, there is a frustrated need to provide, using the existing new WAP infrastructure, a method and apparatus for secure transmission from a host web server 110 to a mobile wireless client 140 in a secure encrypted manner that does not provide for the decrypted clear information 120 to exist at any instant in the WAP server 130 operated by a third party 131 and potential competitor with the host web server 170.
Therefore it is an object of the present invention to provide an apparatus and method for secure transmission from a host web server 110 to a mobile wireless client 140 in a secure encrypted manner that does not provide for the decrypted clear information 120 to exist at any instant in the WAP server 130 operated by a third party 131 and potential competitor with the host web server 170.
Summary of the Invention The present invention provides for a host web server 210 to encrypt and transmit information to a mobile client 240 such that the decrypted clear information 220 at no time exists in a third party WAP server 230 used at an intermediate point in the transmission to the mobile client 240. This is done by the web server 210 providing two or three or more layers of encryption prior to the SSL level of encryption of the clear information 220. Therefore, when the WAP server 230 decrypts the SSL layer of encryption and encrypts the result by the WTLS protocol, then no clear information 220 exists in the WAP server 230. For example, the host web server 210 may use ECC (elliptical curve cryptography) to encrypt the clear information 220 prior to the SSL encryption and transmission to the WAP server 230. The mobile client 240 would then receive a transmission, decrypt the WTLS encryption layer, then decrypt the ECC encryption layer to yield the clear information 220.
In an alternative embodiment, the web server may encrypt two layers of ECC before the SSL encryption and transmission to the WAP server. Then, the mobile client would decrypt the WTLS layer, and the ECC level two encryption, and a smart card within the mobile client would decrypt the ECC level one encryption, to yield the clear information 320 in the smart card 341 inside the mobile client 340. In this way, the clear information 320 would exist only in the web server 310, and the smart card 341. The clear information 320 would not exist in the WAP server 330 or in the mobile client 340 (which mobile client 340 in itself may be controllable and accessible by a third party wireless telephone company.) Brief Description of the Drawings
Figure 1 shows the prior art architecture for encrypted web-enable transmission to a mobile client using WAP. Figure 2 shows a representation of the present invention using a single layer of encryption in addition to the SSL layer of encryption.
Figure 3 shows an alternative embodiment of the present invention using two levels of encryption in addition to the SSL level of encryption.
Detailed Description of the Preferred Embodiments
Figure 2 shows a representation of the present invention. The web host server 210 contains clear information 220. The clear information is encrypted, in the preferred embodiment using elliptical curve encryption ("ECC"), yielding ECC encrypted information 221. The ECC encrypted information 221 is then SSL encrypted and transmitted as a secure Internet transmission 250 to a WAP server 230. The WAP server 230 decrypts the SSL layer yielding the ECC encrypted information 221. The WAP server 230 then encrypts using WTLS (Wireless Transmission Layer Security) the ECC encrypted information 221, and transmits the ECC WTLS encrypted information as a secure wireless 260 transmission to the mobile client 240. The mobile client 240 then decrypt the WTLS encryption layer of the transmitted information yielding the ECC encrypted information 221. The mobile client 240 then decrypts the ECC layer of encryption yielding the clear information 220 in the mobile client 240.
The problem of clear code 120 is the WAP server 130, is also found when the process is reversed for communication from the mobile client 140 to the host web server 110. The present invention also applies to this reverse problem, when the invention process is repeated and reversed for communication from the mobile client 240 through the WAP server 230 to the host web server 210. That is, the clear coded 220 in the mobile client 240 is encrypted using ECC to yield ECC encrypted information 221. This is then encrypted using WTLS and transmitted a secure wireless transmission 260 to the WAP server 230. The WAP server 230 then decrypts WTLS layer of encryption to yield ECC encrypted information 221. The ECC encrypted information 221 is then encrypted by the WAP server 230 to yield according to the SSL protocol to yield ECC/SSL encrypted information. This is transmitted in a secure Internet transmission 250 to the host web server 210. The host web server 210 then decrypts the SSL layer of encryption to yield ECC encrypted information 221. The host web server 210 then decrypts this to yield clear information 220 in the host web server 210.
Figure 3 shows an alternative embodiment of the present invention using additional layers of encryption. The host web server 310 containing clear information 320 encrypts the clear information 320 (preferably using the ECC method in the preferred embodiment), yielding the ECC encrypted level one information 322. This information is given another layer of ECC encryption yielding ECC encrypted information level two 323. The ECC level two encryption is then encrypted according to the SSL protocol protocol and transmitted to the WAP server 330. The ECC level two SSL encrypted information is transmitted in a secure Internet transmission 331 to the WAP server 330. The WAP server 330 then decrypts the SSL level of encryption yielding the ECC encryption level two information. This information is then encrypted according to the WTLS protocol to yield ECC level two/WTLS encrypted information which is transmitted to the mobile client 340 in a secure wireless transmission 342. The mobile client 340 then decrypts the WTLS layer of encryption yielding the ECC level two information 323. The mobile client 340 then decrypts the ECC level to information 323 yielding ECC level one information 324. The mobile client 340 then transmits the ECC level one information 324 to a smart card 341 attached to or inserted in the mobile client 340. The smart card 341 then decrypts the ECC level one information yielding the clear information 320. The smart card 341 in the preferred embodiment is part of a smart card system. Smart cards are referred to and described in Australian Provisional Application AUPQ8774, filed June 22, 2000 for Electronic Recordal of Currency and accessing or switching the different SIM cards or smart cards is described in PCT Publication WO 00/11624 and South African Patent 97/0097 (1997) incorporated herein entirely by this reference.
The alternative embodiment of Fig. 3 also applies for the reverse process of transmission from the smart card 341 to the mobile client 340 to the WAP server 330 to the host web server 310. That is, the clear information 320 in the smart card 341 is encrypted using ECC to obtain ECC level 1 encrypted information 324. This is then transmitted to the mobile client 340 where the ECC level 1 information 324 is received. This information is encrypted using ECC to obtain ECC level 2 information 323. This is then encrypted using WTLS and transmitted in a secure wireless transmission 342 to the WAP server 330. The WAP 330 decrypts the WTLS layer yielding ECC encrypted level 2 information 323. This is encrypted with SSL to yield ECC level 2/SSL encrypted information, which is transmitted in a secure Internet transmission 331 to the host web server 310. The host web server 310 decrypts the SSL layer yielding ECC encrypted level 2 information 323. This is then decrypted with ECC yielding ECC encrypted level 1 information 322. This is then decrypted using ECC, yielding clear information 320 in the host web server 310. The mobile client 240, 340 may be a web-enabled phone, PDA (personal digital assistant), palm pilot, personal PC, laptop PC with wireless modem, or any other mobile communication device.
The Funge system with the smart card 341 described herein contemplates a mobile phone 340, or PDAs or other mobile unit 340 with a smart card 341 inserted, with enabling features incorporated on the smart card 341. The smart card 341 is adapted to be used in the cover of the battery compartment of the mobile unit 340. The cover has one or two slots to insert a smart card 341 and the cover has contacts and circuitry to screen and connect the smart card 341 with a mobile unit 340. The SSL encryption/decryption method can be a strong 124 bit key encryption by a mainframe machine or the web server 110. The mobile device 240, 340 is a thin client that may do a less robust decryption, for example a 64 bit or 8 bit key decryption. The smart card 341 may be the thinnest client in the system with the weakest decryption. However, the mobile device 340 and the smart card 341 would be harder to eavesdrop on than the wireless transmission 342, and would therefore require a less robust encryption.
In an alternative embodiment, the smart card 341 may be any alternative encryption/decryption enabled device. The preferred embodiments describe SSL transmission over the Internet, but any transmission security protocol can be used in place of the SSL, and any telecom transmission system other than the Internet may be used. The preferred embodiment describes the WTLS protocol and wireless transmission, but in its place any other transmission security protocol may be used and any other communication link may be used in place of the wireless transmission. The preferred embodiment describes a WAP server using the WTLS protocol, in its place any other transmission protocol server may be used.
The transmission information contemplated in the preferred embodiment is information from a web server to a web-enabled mobile phone, but any other type of transmission may be used, for example SMS (short message system), FTP, or otherwise. If SMS is used then an SMS gateway server would be used in place of a WAP server.
In the preferred embodiment a mobile client 240, 340 may be thought of as a "thin" client communicating with the host web server 210, 310.
In one preferred embodiment of the present invention by Funge Systems, Inc., the Elliptical Curve Cryptography (ECC) is provided by the Certicom Corporation One Pass Protocol. Certicom SSL Plus and Certicom Security Builder tool kits are also used for the security and encryption features. Certicom's WTLS Plus tool kit is also used to implement the WAP portions of the invention in a preferred embodiment using the WAP Identity Module (WIM) standard. One preferred embodiment of the present invention uses an embedded version of Certicom's ECC 5 enabled Security Builder 6, and release 7 of Certicom's One Past Protocol (OPP7). The Certicom Corporation is located in Toronto, Ontario Canada.
An alternative embodiment of the present invention uses the Realm Secure Vector Protocol (RSVP) One Time Password (OTP) system. RSVP is provided by Real Technology, Inc. The RSVP server model used in a preferred embodiment is RSVP Fortress Server 12 and provides 128 bit encryption.
In the preferred embodiment, the ECC (elliptical curve cryptography) technique is described. However, any alternative encryption methods that are applicable could be, used, such as those by RSA, Inc., or AES, or others. The preferred embodiments shown in Figures 2 and 3 show alternately one or two layers of encryption before the SSL protocol level of encryption. However, any number of additional levels of encryption may be added for specific purposes and decrypted by one or more additional units attached to the mobile client 240, 340 in addition to the smart card 341 or other .devices.
The embodiments described herein are merely illustrative of the principles of this invention. Other arrangements and advantages may be devised by those skilled in the art without departing from the spirit and scope of the invention. Accordingly, the invention should be deemed not to be limited to the above detailed description but only by the spirit and scope of the claims which follow, and their equivalents.

Claims

What is claimed is:
1. A programmable apparatus comprising:
(a) a web server;
(b) means in the web server for encrypting clear information to yield first level encrypted information;
(c) means in the web server for encrypting, by a transmission security protocol, the first level encrypted information to yield transmission encrypted information; and
(d) means in the web server to transmit the transmission encrypted information.
2. The apparatus in claim 1 , further comprising:
(a) means for receiving transmission encrypted information;
(b) means for decrypting, by the transmission security protocol, the received transmission encrypted information, to yield received first level encrypted information; and
(c) means for decrypting the received first level encrypted information to yield received clear information.
3. The invention in claim 1 wherein, the web server is adapted for operation by a for profit business entity.
4. The invention in claim 1, wherein the transmission security protocol is Secure Socket
Layers (SSL).
5. The invention in claim 1, wherein the encryption means yielding first level encryption information uses Elliptical Curve Cryptography (ECC).
6. The invention in claim 1, where the means to transmit uses the Internet, and is adapted to transmit to a WAP server.
7. The invention in claim 2, where the means to receive uses the Internet, and is adapted to receive from a WAP server.
8. A programmable apparatus comprising:
(a) a web server;
(b) means in the web server for encrypting clear information to yield first level encrypted information;
(c) means for encrypting the first level encrypted information to yield second level encrypted information;
(d) means in the web server for encrypting, by a transmission security protocol, the second level encrypted information to yield transmission encrypted information; and
(e) means in the web server to transmit the transmission encrypted information.
9. The apparatus in claim 8, further comprising:
(a) means for receiving transmission encrypted information;
(b) means for decrypting, by the transmission security protocol, the transmission encrypted information, to yield second level encrypted information; (c) means for decrypting the second level encrypted information, to yield first level encrypted information; and
(d) means for decrypting the first level encrypted information to yield clear information.
10. The invention in claim 8 wherein, the web server is adapted to operation by a for profit business entity.
11. The invention in claim 8, wherein the transmission security protocol is Secure Socket Layers (SSL).
12. The invention in claim 8, wherein
(a) the encryption means yielding first level encryption information uses Elliptical Curve Cryptography (ECC); and
(b) the encryption means yielding second level encryption information uses Elliptical Curve Cryptography (ECC).
13. The invention in claim 8, where the means to transmit uses the Internet, and is adapted to transmit to a WAP server.
14. The invention in claim 9, where the means to receive uses the Internet, and is adapted to receive from a WAP server.
15. A programmable apparatus comprising:
(a) a mobile client;
(b) means in the mobile client for receiving transmission encrypted information;
(c) means for decrypting, using a transmission security protocol, the transmission encrypted information to yield first level encrypted information; and
(d) means for decrypting the first level encrypted information to yield clear information.
16. The apparatus in claim 15 further comprising:
(a) means for encrypting clear information to yield first level encrypted information; (b) means for encrypting, by the transmission security protocol, the first level encrypted information, to yield transmission encrypted information; and
(c) means to transmit the transmission encrypted information.
17. The invention in claim 15, wherein the transmission security protocol is Wireless Transport Layer Security (WTLS).
18. The invention in claim 15, wherein the encryption means yielding first level encryption information uses Elliptical Curve Cryptography (ECC).
19. The invention in claim 16, where the means to transmit uses wireless transmission, and is adapted to transmit to a WAP server.
20. The invention in claim 15, where the means to receive uses wireless reception, and is adapted to receive from a WAP server.
21. A programmable apparatus comprising: (a) a mobile client;
(b) means in the mobile client for receiving transmission encrypted information;
(c) means for decrypting, using a transmission security protocol, the transmission encrypted information to yield second level encrypted information;
(d) means for decrypting the second level encrypted information to yield first level encrypted information, and
(e) means for decrypting the first level encrypted information to yield clear information.
22. The apparatus in claim 21 further comprising:
(a) means for encrypting clear information to yield first level encrypted information; (b) means for encrypting the first level encrypted information to yield second level encrypted information;
(c) means for encrypting, by the transmission security protocol, the second level encrypted information, to yield transmission encrypted information; and
(d) means to transmit the transmission encrypted information.
23. The invention in claim 21, wherein the transmission security protocol is Wireless Transport Layer Security (WTLS).
24. The invention in claim 21 , wherein
(a) the encryption means yielding first level encryption information uses Elliptical Curve Cryptography (ECC); and
(b) the encryption yielding second level encryption information uses Elliptical Curve Cryptography (ECC).
25. The invention in claim 22, where the means to transmit uses wireless transmission, and is adapted to transmit to a WAP server.
26. The invention in claim 21, where the means to receive uses wireless reception, and is adapted to receive from a WAP server.
27. A programmable apparatus comprising:
(a) a web server adapted for operation by a for profit business entity; (b) means in the web server for encrypting clear information to yield first level encrypted information, wherein the encryption means yielding first level encryption information uses Elliptical Curve Cryptography (ECC);
(c) means in the web server for encrypting, by a transmission security protocol, the first level encrypted information to yield transmission encrypted information, wherein the transmission security protocol is Secure Socket Layers (SSL);
(d) means in the web server to transmit the transmission encrypted information, where the means to transmit uses the Internet, and is adapted to transmit to a WAP server; (e) means for receiving transmission encrypted information where the means to receive uses the Internet, and is adapted to receive from a WAP server;
(f) means for decrypting, by the transmission security protocol, the received transmission encrypted information, to yield received first level encrypted information; and (g) means for decrypting the received first level encrypted information to yield received clear information.
28. A programmable apparatus comprising:
(a) a web server adapted to operation by a for profit business entity; (b) means in the web server for encrypting clear information to yield first level encrypted information, wherein the encryption means yielding first level encryption information uses Elliptical Curve Cryptography (ECC);
(c) means for encrypting the first level encrypted information to yield second level encrypted information, wherein the encryption means yielding second level encryption information uses Elliptical Curve Cryptography (ECC);
(d) means in the web server for encrypting, by a transmission security protocol, the second level encrypted information to yield transmission encrypted information, wherein the transmission security protocol is Secure Socket Layers (SSL);
(e) means in the web server to transmit the transmission encrypted information, where the means to transmit uses the Internet, and is adapted to transmit to a WAP server;
(f) means for receiving transmission encrypted information, where the means to receive uses the Internet, and is adapted to receive from a WAP server; (g) means for decrypting, by the transmission security protocol, the transmission encrypted information, to yield second level encrypted information;
(h) means for decrypting the second level encrypted information, to yield first level encrypted information; and (i) means for decrypting the first level encrypted information to yield clear information.
29. A programmable apparatus comprising:
(a) a mobile client;
(b) means in the mobile client for receiving transmission encrypted information, where the means to receive uses wireless reception, and is adapted to receive from a WAP server;
(c) means for decrypting, using a transmission security protocol, the transmission encrypted information to yield first level encrypted information, wherein the transmission security protocol is Wireless Transport Layer Security (WTLS), and wherein the encryption means yielding first level encryption information uses Elliptical Curve Cryptography (EEC) ; (d) means for decrypting the first level encrypted information to yield clear information;
(e) means for encrypting clear information to yield first level encrypted information;
(f) means for encrypting, by the transmission security protocol, the first level encrypted information, to yield transmission encrypted information; and
(g) means to transmit the transmission encrypted information, where the means to transmit uses wireless transmission and is adapted to transmit to a WAP server.
30. A programmable apparatus comprising: (a) a mobile client; (b) means in the mobile client for receiving transmission encrypted information, where the means to receive uses wireless reception, and is adapted to receive from a WAP server;
(c) means for decrypting, using a transmission security protocol, the transmission encrypted information to yield second level encrypted information, wherein the transmission security protocol is Wireless Transport Layer Security (WTLS);
(d) means for decrypting the second level encrypted information to yield first level encrypted information;
(e) means for decrypting the first level encrypted information to yield clear information;
(f) means for encrypting clear information to yield first level encrypted information, where the encryption means yielding first level encryption information uses Elliptical Curve
Cryptography (ECC);
(g) means for encrypting the first level encrypted information to yield second level encrypted information, where the encryption means yielding second level encryption information uses Elliptical Curve Cryptography (ECC); (h) means for encrypting, by the transmission security protocol, the second level encrypted information, to yield transmission encrypted information; and
(i) means to transmit the transmission encrypted information, where the means to transmit uses wireless transmission, and is adapted to transmit to a WAP server.
31. A method for a programmable apparatus, the method comprising:
(a) encrypting, with a web server, clear information to yield first level encrypted information; (b) encrypting, by a transmission security protocol, the first level encrypted information to yield transmission encrypted information; and
(c) transmitting the transmission encrypted information.
32. The invention in claim 31 , further comprising:
(a) receiving transmission encrypted information;
(b) decrypting, by the transmission security protocol, the received transmission encrypted information, to yield received first level encrypted information; and
(c) decrypting the received first level encrypted information to yield received clear information.
33. The invention in claim 31 wherein, the web server is adapted for operation by a for profit business entity.
34. The invention in claim 31, wherein the transmission security protocol is Secure Socket Layers (SSL).
35. The invention in claim 31, wherein the encrypting yielding first level encryption information uses Elliptical Curve Cryptography (ECC).
36. The invention in claim 31, where the transmitting step uses the Internet, and is adapted to transmit to a WAP server.
37. The invention in claim 32, where the receiving step uses the Internet, and is adapted to receive from a WAP server.
38. A method for a programmable apparatus, the method comprising: (a) encrypting, with a web server, clear information to yield first level encrypted information;
(b) encrypting the first level encrypted information to yield second level encrypted information;
(c) encrypting, by a transmission security protocol, the second level encrypted information to yield transmission encrypted information; and
(d) transmitting the transmission encrypted information.
39. The invention in claim 38, further comprising: >> (a) receiving transmission encrypted information; (b) decrypting, by the transmission security protocol, the transmission encrypted information, to yield second level encrypted information;
(c) decrypting the second level encrypted information, to yield first level encrypted information; and
(d) decrypting the first level encrypted information to yield clear information.
40. The invention in claim 38 wherein, the web server is adapted to operation by a for profit business entity.
41. The invention in claim 38, wherein the transmission security protocol is Secure Socket
Layers (SSL).
42. The invention in claim 38, wherein (a) the encrypting step yielding first level encryption information uses Elliptical Curve
Cryptography (ECC); and
(b) the encrypting step yielding second level encryption information uses Elliptical Curve Cryptography (ECC).
43. The invention in claim 38, where the transmitting step uses the Internet, and is adapted to transmit to a WAP server.
44. The invention in claim 39, where the receiving step uses the Internet, and is adapted to receive from a WAP server.
45. A method for a programmable apparatus, the method comprising:
(a) receiving, with a mobile client, transmission encrypted information;
(b) decrypting, using a transmission security protocol, the transmission encrypted information to yield first level encrypted information; and (c) decrypting the first level encrypted information to yield clear information.
46. The invention in claim 45 further comprising:
(a) encrypting clear information to yield first level encrypted information; (b) encrypting, by the transmission security protocol, the first level encrypted information, to yield transmission encrypted information; and
(c) transmitting the transmission encrypted information.
47. The invention in claim 45, wherein the transmission security protocol is Wireless Transport Layer Security (WTLS).
48. The invention in claim 45, wherein the encrypting step yielding first level encryption information uses Elliptical Curve Cryptography (ECC).
49. The invention in claim 46, where the transmitting step uses wireless transmission, and is adapted to transmit to a WAP server.
50. The invention in claim 45, where the receiving step uses wireless reception, and is adapted to receive from a WAP server.
51. A method for a programmable apparatus, the method comprising:
(a) receiving, with a mobile client, transmission encrypted information;
(b) decrypting, using a transmission security protocol, the transmission encrypted information to yield second level encrypted information;
(c) decrypting the second level encrypted information to yield first level encrypted information, and
(d) decrypting the first level encrypted information to yield clear information.
52. The method in claim 51 further comprising:
(a) encrypting clear information to yield first level encrypted information;
(b) encrypting the first level encrypted information to yield second level encrypted information;
(c) encrypting, by the transmission security protocol, the second level encrypted information, to yield transmission encrypted information; and
(d) transmitting the transmission encrypted information.
53. The invention in claim 51, wherein the transmission security protocol is Wireless Transport Layer Security (WTLS).
54. The invention in claim 51 , wherein
(a) the encrypting step yielding first level encryption information uses Elliptical Curve Cryptography (ECC); and
(b) the encrypting step yielding second level encryption information uses Elliptical Curve Cryptography (ECC).
55. The invention in claim 52, where the transmitting step uses wireless transmission, and is adapted to transmit to a WAP server.
56. The invention in claim 51, where the receiving step uses wireless reception, and is adapted to receive from a WAP server.
57. A method for a programmable apparatus, the method comprising:
(a) encrypting, with a web server, clear information to yield first level encrypted information, wherein the encrypting step yielding first level encryption information uses Elliptical Curve Cryptography (ECC);
(b) encrypting, by a transmission security protocol, the first level encrypted information to yield transmission encrypted information, wherein the transmission security protocol is Secure Socket Layers (SSL);
(c) transmitting the transmission encrypted information, where the transmitting step uses the Internet, and is adapted to transmit to a WAP server;
(d) receiving transmission encrypted information where the receiving step uses the Internet, and is adapted to receive from a WAP server;
(e) decrypting, by the transmission security protocol, the received transmission encrypted information, to yield received first level encrypted information; and (f) decrypting the received first level encrypted information to yield received clear information.
58. A method for a programmable apparatus, the method comprising:
(a) encrypting, with a web server, clear information to yield first level encrypted information, wherein the encrypting step yielding first level encryption information uses Elliptical Curve Cryptography (ECC);
(b) encrypting the first level encrypted information to yield second level encrypted information, wherein the encrypting step yielding second level encryption information uses Elliptical Curve Cryptography (ECC);
(c) encrypting, by a transmission security protocol, the second level encrypted information to yield transmission encrypted information, wherein the transmission security protocol is Secure Socket Layers (SSL);
(d) transmitting the transmission encrypted information, where the transmitting step uses the Internet, and is adapted to transmit to a WAP server;
(e) receiving transmission encrypted information, where the receiving step uses the Internet, and is adapted to receive from a WAP server;
(f) decrypting, by the transmission security protocol, the transmission encrypted information, to yield second level encrypted information;
(g) decrypting the second level encrypted information, to yield first level encrypted information; and (h) decrypting the first level encrypted information to yield clear information.
59. A method for a programmable apparatus, the method comprising:
(a) receiving, with a mobile client, transmission encrypted information, where the receiving step uses wireless reception, and is adapted to receive from a WAP server; (b) decrypting, using a transmission security protocol, the transmission encrypted information to yield first level encrypted information, wherein the transmission security protocol is Wireless Transport Layer Security (WTLS), and wherein the encrypting step yielding first level encryption information uses Elliptical Curve Cryptography (EEC) ; (c) decrypting the first level encrypted information to yield clear information;
(d) encrypting clear information to yield first level encrypted information;
(e) encrypting, by the transmission security protocol, the first level encrypted information, to yield transmission encrypted information; and (f) transmitting the transmission encrypted information, where the transmitting step uses wireless transmission and is adapted to transmit to a WAP server.
60. A method for a programmable apparatus, the method comprising:
(a) receiving, with a mobile client, transmission encrypted information, where the receiving step to transmit uses wireless reception, and is adapted to receive from a WAP server;
(b) decrypting, using a transmission security protocol, the transmission encrypted information to yield second level encrypted information, wherein the transmission security protocol is Wireless Transport Layer Security (WTLS);
(c) decrypting the second level encrypted information to yield first level encrypted information;
(d) decrypting the first level encrypted information to yield clear information;
(e) encrypting clear information to yield first level encrypted information, where the encrypting step yielding first level encryption information uses Elliptical Curve Cryptography (ECC); (f) encrypting the first level encrypted information to yield second level encrypted information, where the encrypting step yielding second level encryption information uses Elliptical Curve Cryptography (ECC); (g) encrypting, by the transmission security protocol, the second level encrypted information, to yield transmission encrypted information; and
(h) transmitting the transmission encrypted information, where the transmitting step uses wireless transmission, and is adapted to transmit to a WAP server.
61. A machine readable memory medium containing instructions which when executed by a programmable apparatus causes the apparatus to execute a method, the method comprising:
(a) encrypting, with a web server, clear information to yield first level encrypted information; (b) encrypting, by a transmission security protocol, the first level encrypted information to yield transmission encrypted information; and
(c) transmitting the transmission encrypted information.
62. The invention in claim 61, further comprising: (a) receiving transmission encrypted information;
(b) decrypting, by the transmission security protocol, the received transmission encrypted information, to yield received first level encrypted information; and
(c) decrypting the received first level encrypted information to yield received clear information.
63. The invention in claim 61 wherein, the web server is adapted for operation by a for profit business entity.
64. The invention in claim 61, wherein the transmission security protocol is Secure Socket Layers (SSL).
65. The invention in claim 61, wherein the encrypting yielding first level encryption information uses Elliptical Curve Cryptography (ECC).
66. The invention in claim 61, where the transmitting step uses the Internet, and is adapted to transmit to a WAP server.
67. The invention in claim 62, where the receiving step uses the Internet, and is adapted to receive from a WAP server.
68. A machine readable memory medium, containing instructions which when executed by a programmable apparatus causes the apparatus to execute a method, the method comprising: (a) encrypting, with a web server, clear information to yield first level, encrypted information;
(b) encrypting the first level encrypted information to yield second level encrypted information;
(c) encrypting, by a transmission security protocol, the second level encrypted information to yield transmission encrypted information; and
(d) transmitting the transmission encrypted information.
69. The invention in claim 68, further comprising: (a) receiving transmission encrypted information;
(b) decrypting, by the transmission security protocol, the transmission encrypted information, to yield second level encrypted information;
(c) decrypting the second level encrypted information, to yield first level encrypted information; and
(d) decrypting the first level encrypted information to yield clear information.
70. The invention in claim 68 wherein, the web server is adapted to operation by a for profit business entity.
71. The invention in claim 68, wherein the transmission security protocol is Secure Socket Layers (SSL).
72. The invention in claim 68, wherein (a) the encrypting step yielding first level encryption information uses Elliptical Curve
Cryptography (ECC); and
(b) the encrypting step yielding second level encryption information uses Elliptical Curve Cryptography (ECC).
73. The invention in claim 68, where the transmitting step uses the Internet, and is adapted to transmit to a WAP server.
74. The invention in claim 69, where the receiving step uses the Internet, and is adapted to receive from a WAP server.
75. A machine readable memory medium, containing instructions which when executed by a programmable apparatus causes the apparatus to execute a method, the method comprising:
(a) receiving, with a mobile client, transmission encrypted information;
(b) decrypting, using a transmission security protocol, the transmission encrypted information to yield first level encrypted information; and
(c) decrypting the first level encrypted information to yield clear information.
76. The invention in claim 75 further comprising:
(a) encrypting clear information to yield first level encrypted information;
(b) encrypting, by the transmission security protocol, the first level encrypted information, to yield transmission encrypted information; and (c) transmitting the transmission encrypted information.
77. The invention in claim 75, wherein the transmission security protocol is Wireless Transport Layer Security (WTLS).
78. The invention in claim 75, wherein the encrypting step yielding first level encryption information uses Elliptical Curve Cryptography (ECC).
79. The invention in claim 76, where the transmitting step uses wireless transmission, and is adapted to transmit to a WAP server.
80. The invention in claim 75, where the receiving step uses wireless reception, and is adapted to receive from a WAP server.
81. A machine readable memory medium, containing instructions which when executed by a programmable apparatus causes the apparatus to execute a method, the method comprising:
(a) receiving, with a mobile client, transmission encrypted information; (b) decrypting, using a transmission security protocol, the transmission encrypted information to yield second level encrypted information;
(c) decrypting the second level encrypted information to yield first level -encrypted information, and
(d) decrypting the first level encrypted information to yield clear information.
82. The method in claim 81 further comprising:
(a) encrypting clear information to yield first level encrypted information;
(b) encrypting the first level encrypted information to yield second levej encrypted information; (c) encrypting, by the transmission security protocol, the second level encrypted information, to yield transmission encrypted information; and (d) transmitting the transmission encrypted information.
83. The invention in claim 81, wherein the transmission security protocol is Wireless Transport Layer Security (WTLS).
84. The invention in claim 81, wherein (a) the encrypting step yielding first level encryption information uses Elliptical Curve
Cryptography (ECC); and
(b) the encrypting step yielding second level encryption information uses Elliptical Curve Cryptography (ECC).
85. The invention in claim 82, where the transmitting step uses wireless transmission, and is adapted to transmit to a WAP server.
86. The invention in claim 81, where the receiving step uses wireless reception, and is adapted to receive from a WAP server.
87. A machine readable memory medium, containing instructions which when executed by a programmable apparatus causes the apparatus to execute a method, the method comprising:
(a) encrypting, with a web server, clear information to yield first level encrypted information, wherein the encrypting step yielding first level encryption information uses Elliptical Curve Cryptography (ECC);
(b) encrypting, by a transmission security protocol, the first leyel encrypted information to yield transmission encrypted information, wherein the transmission security protocol is Secure Socket Layers (SSL); (c) transmitting the transmission encrypted information, where the transmitting step uses the Internet, and is adapted to transmit to a WAP server;
(d) receiving transmission encrypted information where the., receiving step uses the Internet, and is adapted to receive from a WAP server; (e) decrypting, by the transmission security protocol, the received transmission encrypted information, to yield received first level encrypted information; and
(f) decrypting the received first level encrypted information to yield received clear information.
88. A machine readable memory medium, containing instructions which when executed by a programmable apparatus causes the apparatus to execute a method, the method comprising:
(a) encrypting, with a web server, clear information to yield first level encrypted information, wherein the encrypting step yielding first level encryption information uses
Elliptical Curve Cryptography (ECC); (b) encrypting the first level encrypted information to yield second level encrypted information, wherein the encrypting step yielding second level encryption information uses
Elliptical Curve Cryptography (ECC);
(c) encrypting, by a transmission security protocol, the second level encrypted information to yield transmission encrypted information, wherein the transmission security protocol is Secure Socket Layers (SSL);
(d) transmitting the transmission encrypted information, where the transmitting step uses the Internet, and is adapted to transmit to a WAP server; (e) receiving transmission encrypted information, where the receiving step uses the Internet, and is adapted to receive from a WAP server;
(f) decrypting, by the transmission security protocol, the transmission encrypted information, to yield second level encrypted information; (g) decrypting the second level encrypted information, to yield first level encrypted information; and
(h) decrypting the first level encrypted information to yield clear information.
89. A machine readable memory medium, containing instructions which when executed by a programmable apparatus causes the apparatus to execute a method, the method comprising:
(a) receiving, with a mobile client, transmission encrypted information, where the receiving step uses wireless reception, and is adapted to receive from a WAP server;
(b) decrypting, using a transmission security protocol, the transmission encrypted information to yield first level encrypted information, wherein the transmission security protocol is Wireless Transport Layer Security (WTLS), and wherein the encrypting step yielding first level encryption information uses Elliptical Curve Cryptography (EEC) ;
(c) decrypting the first level encrypted information to yield clear information;
(d) encrypting clear information to yield first level encrypted information;
(e) encrypting, by the transmission security protocol, the first level encrypted information, to yield transmission encrypted information; and
(f) transmitting the transmission encrypted information, where the transmitting step uses wireless transmission and is adapted to transmit to a WAP server.
90. A machine readable memory medium, containing instructions which when executed by a programmable apparatus causes the apparatus to execute a method, the method comprising:
(a) receiving, with a mobile client, transmission encrypted information, . where the receiving step to transmit uses wireless reception, and is adapted to receive from a WAP server; (b) decrypting, using a transmission security protocol, the transmission . encrypted information to yield second level encrypted information, wherein the transmission security protocol is Wireless Transport Layer Security (WTLS);
(c) decrypting the second level encrypted information to yield first level encrypted information; (d) decrypting the first level encrypted information to yield clear information;
(e) encrypting clear information to yield first level encrypted information, where the encrypting step yielding first level encryption information uses Elliptical Curve Cryptography (ECC);
(f) encrypting the first level encrypted information to yield second level encrypted information, where the encrypting step yielding second level encryption information uses
Elliptical Curve Cryptography (ECC);
(g) encrypting, by the transmission security protocol, the second leyel encrypted information, to yield transmission encrypted information; and
(h) transmitting the transmission encrypted information, where the transmitting step uses wireless transmission, and is adapted to transmit to a WAP server.
PCT/US2002/005834 2001-02-27 2002-02-26 Wireless encryption apparatus and method WO2002069105A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2002242267A AU2002242267A1 (en) 2001-02-27 2002-02-26 Wireless encryption apparatus and method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US27141801P 2001-02-27 2001-02-27
US60/271,418 2001-02-27

Publications (2)

Publication Number Publication Date
WO2002069105A2 true WO2002069105A2 (en) 2002-09-06
WO2002069105A3 WO2002069105A3 (en) 2002-12-05

Family

ID=23035465

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/005834 WO2002069105A2 (en) 2001-02-27 2002-02-26 Wireless encryption apparatus and method

Country Status (2)

Country Link
AU (1) AU2002242267A1 (en)
WO (1) WO2002069105A2 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4328414A (en) * 1979-12-11 1982-05-04 Atalla Technovations Multilevel security apparatus and method
US4965568A (en) * 1989-03-01 1990-10-23 Atalla Martin M Multilevel security apparatus and method with personal key
US5577209A (en) * 1991-07-11 1996-11-19 Itt Corporation Apparatus and method for providing multi-level security for communication among computers and terminals on a network
US5604490A (en) * 1994-09-09 1997-02-18 International Business Machines Corporation Method and system for providing a user access to multiple secured subsystems
US5845068A (en) * 1996-12-18 1998-12-01 Sun Microsystems, Inc. Multilevel security port methods, apparatuses, and computer program products

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4328414A (en) * 1979-12-11 1982-05-04 Atalla Technovations Multilevel security apparatus and method
US4965568A (en) * 1989-03-01 1990-10-23 Atalla Martin M Multilevel security apparatus and method with personal key
US5577209A (en) * 1991-07-11 1996-11-19 Itt Corporation Apparatus and method for providing multi-level security for communication among computers and terminals on a network
US5604490A (en) * 1994-09-09 1997-02-18 International Business Machines Corporation Method and system for providing a user access to multiple secured subsystems
US5845068A (en) * 1996-12-18 1998-12-01 Sun Microsystems, Inc. Multilevel security port methods, apparatuses, and computer program products

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
AKL S. ET AL.: 'Cryptographic solution to a multilevel security problem' CRYPTO '82 pages 237 - 249, XP002954789 *

Also Published As

Publication number Publication date
WO2002069105A3 (en) 2002-12-05
AU2002242267A1 (en) 2002-09-12

Similar Documents

Publication Publication Date Title
US9112680B2 (en) Distribution of credentials
CN102801730B (en) Information protection method and device for communication and portable devices
CN1889419B (en) Method and apparatus for realizing encrypting
EP2304894B1 (en) Multipad encryption
HK1065193A1 (en) Authentification of a user across communication sessions
CN101167298A (en) Method and device for accessing a sim card housed in a mobile terminal
JPH0934356A (en) High-bandwidth cryptographic system with low-bandwidth cryptographic module
US8032753B2 (en) Server and system for transmitting certificate stored in fixed terminal to mobile terminal and method using the same
CN102088352B (en) Data encryption transmission method and system for message-oriented middleware
US20020021804A1 (en) System and method for data encryption
EP1447734A2 (en) Reconfigurable secure input device
EP1368951B1 (en) A system for encryption of wireless transmissions from personal palm computers to world wide web terminals
CN101587458A (en) Operation method and device for intelligent storing card
CN1649295A (en) Device and its method for end-to-end enciphering and deenciphering in clony system
JP2005122567A (en) Information processing method and system delegating authentication information between devices
KR101146509B1 (en) Internet banking transaction system and the method that use maintenance of public security card to be mobile
WO2002069105A2 (en) Wireless encryption apparatus and method
JP2005123996A (en) Information processing method for transferring authentication-use information between devices, and information processing system therefor
JP2003309552A (en) Control system for electronic certificate by portable telephone
JPH02291740A (en) Key delivery system with signature function
Cimato Design of an authentication protocol for GSM Javacards
CN109347735A (en) A kind of secure data exchange method based on application integration plug-in unit
KR100458955B1 (en) Security method for the Wireless LAN
JP2000307565A (en) Communication method, its device and ic card
KR20110069873A (en) Data communication using portable terminal

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP