Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for securing a communicaton link between a first and a second device

A communication link and equipment technology, applied to public key and key distribution of secure communication

Active Publication Date: 2010-12-08
RES IN MOTION LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are various security issues with the use of cryptography

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for securing a communicaton link between a first and a second device
  • Method and apparatus for securing a communicaton link between a first and a second device
  • Method and apparatus for securing a communicaton link between a first and a second device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In the following detailed description, numerous specific details are given in order to provide a thorough understanding of embodiments of the invention. However, it will be understood by those skilled in the art that embodiments of the invention may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the embodiments of the invention.

[0020] refer to figure 1 , figure 1 is a schematic diagram of an example system according to some embodiments of the invention. System 100 includes mobile device 102 and wireless smart card reader 104 . Mobile device 102 and wireless smart card reader 104 are capable of communicating via wireless communication link 106 . Examples of wireless LAN standards for the wireless communication link 106 include, but are not limited to, the Institute of Electrical and Electronics Engineers (IEEE) Wireless LAN MAC and Phy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A cryptographic key is used to secure a communication link (106) between a first device (102) and a second device (104). Generating the cryptographic key is accomplished by a) generating a first cryptographic key, b) generating a second cryptographic key, c) applying a hash function to packets transmitted over the communication link (106) to create a hash result, and d) applying the hash functionto the first cryptographic key, the second cryptographic key and the hash result.

Description

technical field [0001] The invention relates to the protection of links between devices. Background technique [0002] In general, wireless communications are insecure and vulnerable to attacks. Various techniques can be employed to protect wireless communication links or make them less vulnerable. For example, cryptographic techniques may be used to protect wireless communication links. In a symmetric key system (also known as a "secret key system"), two communicating devices store a single public key. In a public key system (also known as a "public-private pair system"), each communication device stores its own private key and freely distributes its own public key. [0003] There are various security problems with the use of cryptography. For example, there is a need to share secrets between two communicating devices in a secure, authenticated manner. Especially in the case of mobile devices, one may wish to keep the secret known to only those two devices, without th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04
CPCG07F7/0886H04L9/08G06Q20/341H04L9/30H04L2209/80G07F7/1008G06Q20/40975G07F7/1016G06Q20/327H04L9/0844
Inventor 迈克尔·K·布朗赫伯特·利特尔迈克尔·S·布朗尼尔·亚当斯迈克尔·麦卡路姆黛娜·戴维斯
Owner RES IN MOTION LTD