Method of generating a public key for an electronic device and electronic device
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-009/30
H04L-009/08
H04L-009/32
출원번호
US-0622774
(2015-02-13)
등록번호
US-9832018
(2017-11-28)
우선권정보
EP-07109971 (2007-06-11)
발명자
/ 주소
Neumann, Heike
Hubmer, Paul
출원인 / 주소
NXP B.V.
인용정보
피인용 횟수 :
0인용 특허 :
5
초록
A method for generating a public key for an electronic device is provided, wherein the method comprises generating a public key 103 based on a private key and a unique identifier associated with the electronic device 200.
대표청구항▼
1. A method for generating a public key for an electronic device, the method comprising: receiving a unique serial number from the electronic device, wherein a private key is chosen for the unique serial number;generating a public key based on both the private key and the received serial number, whe
1. A method for generating a public key for an electronic device, the method comprising: receiving a unique serial number from the electronic device, wherein a private key is chosen for the unique serial number;generating a public key based on both the private key and the received serial number, wherein the received serial number diversifies a primary base point;storing the generated public key, the unique serial number, and a certificate in a memory in the electronic device; andauthenticating the electronic device by sending the stored public key, the stored serial number, and the stored certificate to a reader, wherein the reader is configured to verify the certificate. 2. The method according to claim 1, further comprising: generating a secondary base point based on both the primary base point and the unique serial number. 3. The method according to claim 1, wherein the primary base point is a base point over a prime field or elliptic curves. 4. The method according to claim 1, further comprising: calculating a secondary base point g′ according to g′=gID, wherein ID denotes the unique serial number, and g denotes the primary base point; andcalculating the public key y according to y=g′x, wherein y denotes the public key and x denotes the private key. 5. The method according to claim 1, further comprising: authenticating the electronic device by using an asymmetric proof algorithm. 6. The method according to claim 5, wherein the asymmetric proof algorithm is a Zero Knowledge Proof of Knowledge algorithm. 7. The method according to claim 6, wherein the Zero Knowledge Proof of Knowledge algorithm is an ElGamal type encryption scheme. 8. The method of claim 1, wherein the primary base point is defined by a manufacturer. 9. The method of claim 1, further comprising: determining whether g′resp matches g′r·yc. 10. The method of claim 9, further comprising: when g′resp matches g′r·yc, authenticating the electronic device. 11. The method of claim 1, wherein the electronic device is a security token. 12. The method of claim 11, wherein the security token is a smart card. 13. The method of claim 11, wherein the security token is a USB security token. 14. A non-transitory computer-readable medium, in which a computer program is stored which, when being executed by a processor, authenticates an electronic device, the non-transitory computer readable medium comprising: instructions for receiving a unique serial number from the electronic device, wherein a private key is chosen for the unique serial number;instructions for generating a public key based on both the private key and the received serial number, wherein the received serial number diversifies a primary base point;instructions for storing the generated public key, the unique serial number, and a certificate in a memory in the electronic device; andinstructions for authenticating the electronic device by sending the stored public key, the stored serial number, and the stored certificate to a reader, wherein the reader is configured to verify the certificate.
Cohen Joshua L. ; Dean Cecil A. ; du Breuil Thomas L. ; Heer Daniel Nelson ; Maher David P. ; Poteat Vance Eugene ; Rance Robert John, Electronic identifiers for network terminal devices.
Sako Kazue,JPX ; Miyauchi Hiroshi,JPX, Encryption key processing system to be incorporated into data recovery system or key setting system for generating encryption key.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.