Certificate-based pairing of key fob device and control unit
First Claim
1. A control unit comprising:
- a transceiver;
a memory to store instructions; and
a processor coupled to the transceiver and memory, wherein the processor is configured to execute the instructions to cause the control unit to;
receive a first transmission containing a certificate;
verify the authenticity of the certificate;
after verifying authenticity of the certificate, establish a first communication link using transceiver to execute a public key agreement protocol to generate a first common secret encryption key;
receive a second transmission containing an encrypted first public key, wherein the encrypted first public key is encrypted by the first common secret encryption key;
decrypt the encrypted first public key using the first common secret encryption key to determine the first public key;
after determining the first public key, establish a second communication link using the transceiver to execute a public key agreement protocol to generate a second common secret encryption key;
generate an operational key;
encrypt the operational key using the second common secret encryption key; and
transmit the encrypted operational key.
1 Assignment
0 Petitions
Accused Products
Abstract
A control unit, in a disclosed embodiment, includes a transceiver, memory, and a processor. The processor is coupled to the transceiver and memory and executes instructions from the memory to cause the control unit to receive a first transmission containing a certificate, verify the authenticity of the certificate, and, after verifying authenticity of the certificate, execute a public key agreement protocol to generate a first common secret encryption key, receive a second transmission containing an encrypted first public key that is encrypted by the first common secret encryption key, decrypt the encrypted first public key using the first common secret encryption key to determine the first public key, execute a public key agreement protocol to generate a second common secret encryption key, generate an operational key, encrypt the operational key using the second common secret encryption key, and transmit the encrypted operational key.
-
Citations
16 Claims
-
1. A control unit comprising:
-
a transceiver; a memory to store instructions; and a processor coupled to the transceiver and memory, wherein the processor is configured to execute the instructions to cause the control unit to; receive a first transmission containing a certificate; verify the authenticity of the certificate; after verifying authenticity of the certificate, establish a first communication link using transceiver to execute a public key agreement protocol to generate a first common secret encryption key; receive a second transmission containing an encrypted first public key, wherein the encrypted first public key is encrypted by the first common secret encryption key; decrypt the encrypted first public key using the first common secret encryption key to determine the first public key; after determining the first public key, establish a second communication link using the transceiver to execute a public key agreement protocol to generate a second common secret encryption key; generate an operational key; encrypt the operational key using the second common secret encryption key; and transmit the encrypted operational key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method to produce an encrypted operational key, the method comprising:
-
receiving a first transmission containing a certificate; verifying the authenticity of the certificate; after verifying authenticity of the certificate, executing a public key agreement protocol to generate a first common secret encryption key; receiving a second transmission containing an encrypted first public key, wherein the encrypted first public key is encrypted by the first common secret encryption key; using the first common secret encryption key to decrypt the encrypted first public key; after decrypting the first public key, executing a public key agreement protocol to generate a second common secret encryption key; generating an operational key; encrypting the operational key using the second common secret encryption key; and transmit the encrypted operational key. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
Specification