User transparent registration process for secure communication
First Claim
Patent Images
1. A method for secure communication, the method comprising:
- receiving a request at a first device to communicate with a second device;
determining existence of an encryption key between the first device and the second device;
initiating creation of the encryption key in response to a determination that the encryption key does not exist, the initiating occurring without user input;
communicating with the second device using the encryption key; and
performing user authentication of the communication.
13 Assignments
0 Petitions
Accused Products
Abstract
A method for secure communication. The method includes receiving a request at a first device to communicate with a second device. The method also includes determining if an encryption key exists between the first device and the second device. Creation of the encryption key is initiated in response to a determination that that encryption key does not exist. The initiation of the creation of the encryption key occurs without user input. The method further includes communicating with the second device using the encryption key and performing user authentication of the communication.
-
Citations
24 Claims
-
1. A method for secure communication, the method comprising:
-
receiving a request at a first device to communicate with a second device;
determining existence of an encryption key between the first device and the second device;
initiating creation of the encryption key in response to a determination that the encryption key does not exist, the initiating occurring without user input;
communicating with the second device using the encryption key; and
performing user authentication of the communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for secure communication, the system comprising:
a first device connected via a network to a second device, the first device including instructions to implement a method comprising;
receiving a request at the first device to communicate with the second device;
determining if an encryption key exists between the first device and the second device;
initiating creation of the encryption key in response to a determination that the encryption key does not exist, the initiating occurring without user input;
communicating with the second device via the network using the encryption key; and
performing user authentication of the communication. - View Dependent Claims (20, 21, 22, 23)
-
24. A computer program product for secure communication, the computer program product comprising:
a storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method comprising;
receiving a request at a first device to communicate with a second device;
determining if an encryption key exists between the first device and the second device;
initiating creation of the encryption key in response to a determination that the encryption key does not exist, the initiating occurring without user input;
communicating with the second device using the encryption key; and
performing user authentication of the communication.
Specification