The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 02, 2019

Filed:

Jun. 06, 2016
Applicant:

Motorola Solutions, Inc., Schaumburg, IL (US);

Inventors:

Katrin Reitsma, Chicago, IL (US);

Michael F. Korus, Eden Prairie, MN (US);

Assignee:

MOTOROLA SOLUTIONS, INC., Chicago, IL (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/12 (2006.01); H04L 9/14 (2006.01); H04L 9/32 (2006.01); H04L 29/06 (2006.01); H04W 4/10 (2009.01); H04L 9/08 (2006.01); H04W 12/04 (2009.01); G06F 21/62 (2013.01);
U.S. Cl.
CPC ...
H04L 9/32 (2013.01); H04L 9/0866 (2013.01); H04L 9/0891 (2013.01); H04L 9/14 (2013.01); H04L 63/062 (2013.01); H04L 63/065 (2013.01); H04L 63/08 (2013.01); H04L 63/20 (2013.01); H04W 4/10 (2013.01); H04W 12/04 (2013.01);
Abstract

Method, server, and communication device for updating identity-based cryptographic private keys of compromised communication devices. One method includes receiving, at a server, a security status indicating that the security of a first communication device has been compromised. The first communication device is associated with a user and includes a first identity-based cryptographic private key and a first user identifier. The method also includes, responsive to receiving the security status, determining, with the server, a second user identifier based on the first user identifier. The method further includes determining, with the server, a second identity-based cryptographic private key based on the second user identifier. The method also includes distributing, via the server, the second identity-based cryptographic private key to a second communication device. The second communication device is associated with the user.


Find Patent Forward Citations

Loading…