Key sharing method and device
First Claim
Patent Images
1. A method, performed by a first device, of sharing a key, the method comprising:
- determining one of a plurality of different communication methods for exchanging a key between the first device and a second device, based on pre-set ranking information;
receiving a key of the second device from the second device by using the determined communication method;
determining one of a plurality of different authentication methods for authenticating the received key of the second device; and
authenticating the received key using the determined authentication method, whereinthe determining of one of a plurality of different authentication methods comprises determining to use a first authentication method based on the key being received from the second device using a short-range communication method and determining to use a second authentication method, different from the first authentication method, based on the key being received from the second device using a long-range communication method.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided is a method, performed by a first device, of sharing a key, the method including: determining a communication method for exchanging a key between the first device and a second device, based on pre-set channel ranking information; receiving a key of the second device from the second device by using the determined communication method; and authenticating the received key of the second device.
42 Citations
14 Claims
-
1. A method, performed by a first device, of sharing a key, the method comprising:
-
determining one of a plurality of different communication methods for exchanging a key between the first device and a second device, based on pre-set ranking information; receiving a key of the second device from the second device by using the determined communication method; determining one of a plurality of different authentication methods for authenticating the received key of the second device; and authenticating the received key using the determined authentication method, wherein the determining of one of a plurality of different authentication methods comprises determining to use a first authentication method based on the key being received from the second device using a short-range communication method and determining to use a second authentication method, different from the first authentication method, based on the key being received from the second device using a long-range communication method. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A first device for sharing a key with a second device, the first device comprising:
-
communication circuitry; and a processor configured to; determine one of a plurality of different communication methods for exchanging a key between the first and second devices, based on pre-set ranking information; control to transmit a key of the first device to the second device by using the determined communication method; control to receive a key of the second device from the second device by using the determined communication method; determine one of a plurality of a different authentication methods for authenticating the received key of the second device; and authenticate the received key using the determined authentication method, wherein the determining of one of a plurality of different authentication methods comprises determining to use a first authentication method based on the key being received from the second device using a short-range communication method and determining to use a second authentication method, different from the first authentication method, based on the key being received from the second device using a long-range communication. - View Dependent Claims (11, 12, 13)
-
-
14. A non-transitory computer-readable recording medium having recorded thereon a computer program, which, when executed by a computer of a first device for sharing a key with a second device, controls the first device to perform operations comprising:
-
determining one of a plurality of different communication methods for exchanging a key between the first device and a second device, based on pre-set ranking information; receiving a key of the second device from the second device by using the determined communication method; determining one of a plurality of different authentication methods for authenticating the received key of the second device; and authenticating the received key using the determined authentication method, wherein the determining of one of a plurality of different authentication methods comprises determining to use a first authentication method based on the key being received from the second device using a short-range communication method and determining to use a second authentication method, different from the first authentication method, based on the key being received from the second device using a long-range communication method.
-
Specification