US 12,244,696 B2
Ecdhe key exchange for server authentication and a key server
John A Nix, Evanston, IL (US)
Assigned to IoT and M2M Technologies, LLC, Evanston, IL (US)
Filed by IoT and M2M Technologies, LLC, Evanston, IL (US)
Filed on Mar. 12, 2024, as Appl. No. 18/602,866.
Application 18/602,866 is a continuation of application No. 18/210,776, filed on Jun. 16, 2023, granted, now 11,943,343.
Application 18/210,776 is a continuation of application No. 17/253,111, granted, now 11,683,163, issued on Jun. 20, 2023, previously published as PCT/US2019/037911, filed on Jun. 19, 2019.
Claims priority of provisional application 62/687,411, filed on Jun. 20, 2018.
Prior Publication US 2024/0267206 A1, Aug. 8, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/32 (2006.01); H04L 9/00 (2022.01); H04L 9/06 (2006.01); H04L 9/08 (2006.01); H04L 9/14 (2006.01); H04L 9/30 (2006.01)
CPC H04L 9/0841 (2013.01) [H04L 9/006 (2013.01); H04L 9/0662 (2013.01); H04L 9/0825 (2013.01); H04L 9/085 (2013.01); H04L 9/14 (2013.01); H04L 9/3066 (2013.01)] 13 Claims
OG exemplary drawing
 
1. A method for a device to authenticate with a server over a wireless network, the method performed by the device, the method comprising:
a) storing, in a memory, (i) a first point on an elliptic curve, and (ii) a shared key, wherein the shared key is received by the server;
b) generating a value from a secure hash of at least the shared key;
c) selecting a first integer as a first subset of the value;
d) receiving, from the server via a radio connected to the wireless network, (i) a random number and (ii) a second point on the elliptic curve, the second point comprising a public key for the server;
e) deriving a device private key and corresponding device public key for the elliptic curve;
f) deriving a shared secret comprising an elliptic curve point addition of (i) the first integer multiplied by the first point and (ii) the device private key multiplied by the public key for the server;
g) deriving a symmetric ciphering key from a key derivation function with the shared secret;
h) generating a ciphertext by encrypting with the symmetric key (i) a device digital signature for at least the random number, and (ii) a device certificate; and
i) transmitting, to the server via the radio connected to the wireless network, the ciphertext.