US 11,943,343 B2
ECDHE key exchange for server authentication and a key server
John A. Nix, Evanston, IL (US)
Assigned to IoT and M2M Technologies, LLC, Evanston, IL (US)
Filed by IoT and M2M Technologies, LLC, Evanston, IL (US)
Filed on Jun. 16, 2023, as Appl. No. 18/210,776.
Application 18/210,776 is a continuation of application No. 17/253,111, granted, now 11,683,163, previously published as PCT/US2019/037911, filed on Jun. 19, 2019.
Claims priority of provisional application 62/687,411, filed on Jun. 20, 2018.
Prior Publication US 2023/0336332 A1, Oct. 19, 2023
Int. Cl. H04L 9/32 (2006.01); H04L 9/00 (2022.01); H04L 9/06 (2006.01); H04L 9/08 (2006.01); H04L 9/14 (2006.01); H04L 9/30 (2006.01)
CPC H04L 9/0841 (2013.01) [H04L 9/006 (2013.01); H04L 9/0662 (2013.01); H04L 9/0825 (2013.01); H04L 9/085 (2013.01); H04L 9/14 (2013.01); H04L 9/3066 (2013.01)] 9 Claims
OG exemplary drawing
 
1. A method for a server to authenticate a device over a wireless network, the method performed by the server, the method comprising:
a) storing, in a memory, (i) a first point on an elliptic curve, and (ii) a shared key, wherein the shared key is stored by the device;
b) generating a value from a secure hash of at least the shared key;
c) selecting (i) a first integer as a first subset of the value and (ii) a second integer as a second subset of the value;
d) receiving, via a radio connected to the wireless network and from the device, a second point on the elliptic curve from the node, the second point comprising a public key for the device;
e) deriving a shared secret comprising an elliptic curve point addition of (i) the first integer multiplied by the public key for the device and (ii) the second integer multiplied by the first point;
f) deriving a symmetric ciphering key from a key derivation function with the shared secret;
g) receiving, via a radio connected to the wireless network and from the device, a ciphertext comprising (i) a device digital signature and (ii) a device certificate;
h) decrypting the ciphertext with the symmetric ciphering key in order to read the device digital signature and the device certificate; and
i) verifying the device digital signature using a device static public key from the device certificate.