Method and arrangement in a communication network
First Claim
1. An ad hoc communications network (N) comprising a first device (A) having an optical device (O) and a second device (B) having a pair of keys, the key pair constituting a secret key and a public key, the first device (A) having a user (U) that trusts the second device (B), characterised by the public key being hashed to a bit string, the bit string being encoded to a graphical string (S), the graphical string being visible for the user (U) of the first device (A), the first device (A) having means for obtaining the graphical string by means of the optical device (O), the first device (A) having means for authenticating the second device (B) by means of the obtained string.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to the problem of establishing of security that arises within an ad hoc network
The problem is solved by using an optical device at a first device to read a public key that is encoded to a graphical string at a second device, which key is required for establishing security.
-
Citations
10 Claims
-
1. An ad hoc communications network (N) comprising
a first device (A) having an optical device (O) and a second device (B) having a pair of keys, the key pair constituting a secret key and a public key, the first device (A) having a user (U) that trusts the second device (B), characterised by the public key being hashed to a bit string, the bit string being encoded to a graphical string (S), the graphical string being visible for the user (U) of the first device (A), the first device (A) having means for obtaining the graphical string by means of the optical device (O), the first device (A) having means for authenticating the second device (B) by means of the obtained string.
-
6. Method for establishing a security relation between a first device (A) and a second device (B) within an ad hoc communications network (N),
the first device (A) having an optical device (O), the second device (13) having a pair of keys constituting a secret key and a public key, the first device (A) having a user that trusts the second device (B), the method comprising the steps of: -
hashing the public key to a bit string;
encoding the bit string to a graphical string (S);
making the graphical string (S) visible for the user of the first device (A), the first device (A) obtaining the graphical string (S) by means of the optical device (O), the first device (A) authenticating the second device (B) by means of the obtained graphical string (S). - View Dependent Claims (7, 8, 9, 10)
-
Specification