encryption method
A key and equipment technology, applied in the field of encryption, can solve the problems of key information being intercepted, information thieves or others embezzling, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] Systems, devices, and methods will now be described using example embodiments. Example embodiments are presented in this disclosure for purposes of illustration, and are not intended to be limiting or limiting on the scope of the disclosure or the claims presented in this application.
[0019] The disclosed embodiments provide a technical advantage in which two devices can configure encryption / decryption for secure communications over a channel between the two devices without exchanging keys over any channel or by any other exchange method or key-related information as part of configuring or initiating encryption / decryption. An advantage is also provided wherein the key or key-related information need not be provided to or stored on any device prior to configuring secure communications. In contrast to encryption methods that require the exchange of keys or key-related information by communication devices when setting up secure communications, the embodiment avoids the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


