Method for establishing a communication between two devices
First Claim
1. A method for establishing an encrypted communication by using keys, between an electronic first device associated with a trusted first authority and an electronic second device, the method comprising the steps of:
- making a first secret key available to the first device for encrypted communication between the first authority and the first device, said first authority being able to generate the first secret key;
providing a trusted second authority, associated with the second device and distinct and autonomous with respect to said first authority, the second authority being able to generate a second secret key for the encrypted communication between the second authority and the second device;
making the second secret key available to the second device; and
providing a communication key to the first and second devices to be used in said communication, through at least one of said first and second authorities.
1 Assignment
0 Petitions
Accused Products
Abstract
A method establishes a communication between a first electronic device associated with a first trusted authority and a second electronic device. The method includes: making a first key available to the first device for the communication between the first authority and the first device. A second trusted authority, associated with the second device and distinct and autonomous with respect to the first authority, generates a second key in order to communicate with the second device. Furthermore, the method includes: making the second key available to the second device; and providing the first and second devices with a communication key, to be used communication between the first and second devices, through at least one of the first and second authorities.
53 Citations
30 Claims
-
1. A method for establishing an encrypted communication by using keys, between an electronic first device associated with a trusted first authority and an electronic second device, the method comprising the steps of:
-
making a first secret key available to the first device for encrypted communication between the first authority and the first device, said first authority being able to generate the first secret key;
providing a trusted second authority, associated with the second device and distinct and autonomous with respect to said first authority, the second authority being able to generate a second secret key for the encrypted communication between the second authority and the second device;
making the second secret key available to the second device; and
providing a communication key to the first and second devices to be used in said communication, through at least one of said first and second authorities. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 30)
-
-
15. An encrypted communication system using keys, comprising:
-
an electronic first device associated with a trusted first authority, the first device including;
means for receiving a first secret key from the first authority; and
means for receiving a communication key from the first authority an electronic second device associated with a trusted second authority, the second device including;
means for receiving a second secret key from the second authority;
means for receiving the communication key from the first authority; and
means for having an encrypted communication with the first device using the communication key to encrypt the communication. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A method for establishing an encrypted communication between an electronic first device associated with a trusted first authority and an electronic second device associated with a trusted second authority, the method comprising:
-
receiving at the first device a first secret key from the first authority;
using the first secret key for encrypted communication between the first device and the first authority;
receiving at the second device a second secret key from the second authority;
using the second secret key for encrypted communication between the second device and the second authority;
receiving, at the first and second devices, a communication key from the first authority; and
using the communication key for encrypted communication between the first and second devices. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification