Device arranged for exchanging data, and method of authenticating
First Claim
1. A first device arranged for exchanging data with a second device comprising receiving means for receiving from the second device a certificate for a public key (UPK) for the second device, and authenticating means for authenticating the second device as a strongly protected device upon a successful verification of the received certificate with a public key of a Certifying Authority (CAPK), if the public key of the Certifying Authority is available, and authenticating the second device as a weakly protected device upon a successful verification of the received certificate with a locally available public key (SPK).
1 Assignment
0 Petitions
Accused Products
Abstract
A first device (110) arranged for exchanging data with a second device (130). The first device (110) receives from the second device (130) a certificate comprising a public key (UPK) for the second device. The first device (110) then authenticates the second device (130) as a strongly protected device upon a successful verification of the received certificate with a public key (CAPK) of a Certifying Authority, if the public key of the Certifying Authority is available, and authenticates the second device (130) as a weakly protected device upon a successful verification of the received certificate with a locally available public key (SPK). The second device (130) does the same to achieve mutual authentication. Having authenticated each other, the devices (110, 130) can securely set up session keys and exchange data. The data preferably has associated DRM rules.
-
Citations
10 Claims
-
1. A first device arranged for exchanging data with a second device comprising
receiving means for receiving from the second device a certificate for a public key (UPK) for the second device, and authenticating means for authenticating the second device as a strongly protected device upon a successful verification of the received certificate with a public key of a Certifying Authority (CAPK), if the public key of the Certifying Authority is available, and authenticating the second device as a weakly protected device upon a successful verification of the received certificate with a locally available public key (SPK).
-
9. A method of authenticating a remote device, comprising
receiving from the remote device a certificate comprising a public key (UPK) for the remote device, authenticating the remote device as a strongly protected device upon a successful verification of the received certificate with a public key (CAPK) of a Certifying Authority, if the public key of the Certifying Authority is available, and authenticating the remote device as a weakly protected device upon a successful verification of the received certificate with a locally available public key (SPK).
Specification