Methods and apparatus for finding a shared secret without compromising non-shared secrets
First Claim
Patent Images
1. A method of finding a shared secret, comprising:
- hashing first information associated with a first entity coupled to a communication channel to form a first hashed secret;
hashing second information associated with a second entity coupled to the communication channel to form a second hashed secret;
sending the first hashed secret to the second entity via the communication channel; and
comparing the first and second hashed secrets.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus for finding a shared secret without compromising non-shared secrets are disclosed. The methods and apparatus hash first information associated with a first entity coupled to a communication channel to form a first hashed secret and hash second information associated with a second entity coupled to the communication channel to form a second hashed secret. The methods and apparatus send the first hashed secret to the second entity via the communication channel and compare the first and second hashed secrets to find the shared secret.
-
Citations
68 Claims
-
1. A method of finding a shared secret, comprising:
-
hashing first information associated with a first entity coupled to a communication channel to form a first hashed secret;
hashing second information associated with a second entity coupled to the communication channel to form a second hashed secret;
sending the first hashed secret to the second entity via the communication channel; and
comparing the first and second hashed secrets. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for finding a shared secret, comprising:
-
a first entity coupled to a communication channel, wherein the first entity hashes first information to form a first hashed secret; and
a second entity coupled to the communication channel, wherein the second entity hashes second information to form a second hashed secret, and wherein the first entity is adapted to send the first hashed secret to the second entity via the communication channel and the second entity is adapted to compare the first and second hashed secrets. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A machine accessible medium having data stored thereon that, when executed, causes a machine to:
-
hash first information associated with a first entity coupled to a communication channel to form a first hashed secret;
receive a second hashed secret at the first entity from the second entity via the communication channel; and
compare the first and second hashed secrets to find a shared secret. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A system for negotiating a data transfer via a communication channel, comprising:
-
a first entity coupled to the communication channel and having first secure information stored therein; and
a second entity coupled to the communication channel and having second secure information stored therein, wherein the first and second entities are programmed to;
hash the first and second secure information to form first and second hashed information;
transmit at least one of the first and second hashed information via the communication channel;
compare the first and second hashed information to find matching secure information; and
initiate the data transfer in response to finding the matching secure information. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. A method of sending an application from an application server to a communication device via a communication channel, comprising:
-
receiving a first group of hashed secrets from the communication device;
comparing the first group of hashed secrets to a second group of hashed secrets associated with the application server;
identifying a shared secret among the first and second groups of hashed secrets; and
sending an application associated with the shared secret to the communication device via the communication channel. - View Dependent Claims (54, 55, 56, 57)
-
-
58. An application server, comprising:
-
secure information stored within the application server;
a communications interface adapted to be coupled to a communication channel; and
a processor unit programmed to cause the application server to;
receive a first group of hashed information from a communication device via the communications interface;
hash at least a portion of the secure information to form a second group of hashed information;
compare the first group of hashed information to the second group of hashed information; and
identify a shared secret among the first and second groups of hashed information. - View Dependent Claims (59, 60)
-
-
61. A machine accessible medium having data stored thereon that, when executed, causes a machine to:
-
receive a first group of hashed secrets from a communication device;
compare the first group of hashed secrets to a second group of hashed secrets associated with an application server;
identify a shared secret among the first and second groups of hashed secrets; and
send an application associated with the shared secret to the communication device via the communication channel. - View Dependent Claims (62, 63)
-
-
64. A communication device, comprising:
-
secure information stored within the communication device;
a communications interface adapted to communicate via a communication channel; and
a processor unit programmed to cause the communication device to;
receive a first group of hashed information via the communication channel;
hash at least a portion of the secure information to form a second group of hashed information;
compare the first and second groups of hashed information to identify matching information; and
receive data via the communication channel based on the matching information. - View Dependent Claims (65, 66)
-
-
67. A method of finding a shared secret, comprising:
-
receiving encoded data via a communication channel;
encoding local data; and
comparing the received encoded data to the encoded local data to find the shared secret. - View Dependent Claims (68)
-
Specification