Ex Parte Billhartz - Page 2



         Appeal No. 2006-2434                                                       
         Application No. 10/197,148                                                 
                                     BACKGROUND                                     
         Claim 1 is representative of the claimed invention and is                  
         reproduced as follows:                                                     
         1. A mobile ad-hoc network comprising:                                     
         a first node for generating an authentication request, said first          
         node having a first public key and a first private key associated          
         therewith; and                                                             
              a second node having a second public key and a second                 
         private key associated therewith;                                          
              said first node receiving a certificate of authenticity               
         responsive to the authentication request, the certificate of               
         authenticity being generated by a certifying authority and                 
         comprising the second public key, the certifying authority having          
         a public authentication key and a private authentication key               
         associated therewith and generating the certificate of                     
         authenticity using the private authentication key;                         
              said first node decrypting the certificate of authenticity            
         using the public authentication key and verifying that the second          
         public key belongs to said second node based upon the decrypted            
         certificate of authenticity;                                               
              said first node sending challenge data to said second node            
         upon verification that the second public key belongs to said               
         second node;                                                               
              said second node encrypting the challenge data using the              
         second private key and returning the encrypted challenge data              
         back to said first node;                                                   
              said first node decrypting the encrypted challenge data               
         using the verified second public key and authenticating said               
         second node if the decryption of the encrypted challenge data              
         yields the original challenge data;                                        
              said first node sending a session key encrypted with the              
         second public key to said second node for use with subsequent              
         data transfers therebetween upon authenticating said second node.          





                                         2                                          




Page:  Previous  1  2  3  4  5  6  Next 

Last modified: November 3, 2007