Techniques for establishing secure electronic communication between parties using wireless mobile devices
First Claim
Patent Images
1. A method comprising:
- establishing, with a local electronic device, a wireless communication session with a remote electronic device using a short-range wireless protocol;
receiving a security key with the local electronic device from the remote electronic device without use of a trusted key authority using the short-range wireless protocol;
transmitting, with the local electronic device, the security key from the remote electronic device to an other electronic device; and
using the other electronic device to engage in secure communications using the security key.
1 Assignment
0 Petitions
Accused Products
Abstract
Use of electronic devices to communicate using a cryptographic key that has been exchanged by parties using mobile wireless devices. Two or more individuals may exchange identification information using a short-range wireless protocol so that the individuals may physically see and verify each other'"'"'s identities, which may eliminate the need for a trusted third party to be involved in a security key exchange.
-
Citations
42 Claims
-
1. A method comprising:
-
establishing, with a local electronic device, a wireless communication session with a remote electronic device using a short-range wireless protocol;
receiving a security key with the local electronic device from the remote electronic device without use of a trusted key authority using the short-range wireless protocol;
transmitting, with the local electronic device, the security key from the remote electronic device to an other electronic device; and
using the other electronic device to engage in secure communications using the security key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
a control circuit;
a memory coupled with the control circuit to store a security key;
a wireless receiver coupled with the control circuit and the memory to receive the security key from a remote wireless device in response to a first predetermined user input, wherein the security key is received via communications using a short-range wireless protocol, and further wherein the security key is received without use of a trusted key authority; and
a wireless transmitter coupled with the control circuit and the memory to transmit the security key to an other electronic device in response to a second predetermined user input without use of a trusted key authority. - View Dependent Claims (10, 11, 12, 13)
-
-
14. An article comprising a computer-readable medium having stored thereon instructions that, when executed, cause one or more processors to:
-
establish, with a local electronic device, a wireless communication session with a remote electronic device using a short-range wireless protocol;
receive a security key with the local electronic device from the remote electronic device without use of a trusted key authority using the short-range wireless protocol;
transmit, with the local electronic device, the security key from the remote electronic device to an other electronic device; and
use the other electronic device to engage in secure communications using the security key. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A system comprising:
-
one or more substantially omni-directional antennae;
a control circuit;
a memory coupled with the control circuit to store a security key;
a wireless receiver coupled with the control circuit, at least one of the antennae and the memory to receive the security key from a remote wireless device in response to a first predetermined user input, wherein the security key is received via communications using a short-range wireless protocol, and further wherein the security key is received without use of a trusted key authority; and
a wireless transmitter coupled with the control circuit, at least one of the antennae and the memory to transmit the security key to an other electronic device in response to a second predetermined user input without use of a trusted key authority. - View Dependent Claims (23, 24, 25, 26)
-
-
27. A method comprising:
-
establishing, with a local cellular-enabled electronic device, a wireless communication session with a remote cellular-enabled electronic device using a non-cellular, short-range wireless protocol;
receiving a security key with the local cellular-enabled electronic device from the remote cellular-enabled electronic device without use of a trusted key authority using the non-cellular, short-range wireless protocol;
transmitting, with the local cellular-enabled electronic device, the security key from the remote cellular-enabled electronic device to an other electronic device without use of a trusted key authority; and
using the other electronic device to engage in secure communications using the security key. - View Dependent Claims (28, 29, 30)
-
-
31. A method comprising:
-
establishing, with a local mobile electronic device, a wireless communication session with a remote mobile electronic device using a short-range wireless protocol and utilizing a security key;
receiving a identifying information corresponding to an electronic device with the local mobile electronic device from the remote mobile electronic device;
transmitting, with the local mobile electronic device, the identifying information from the remote mobile electronic device to an other electronic device; and
using the other electronic device to engage in communications with the electronic device corresponding to the identifying information. - View Dependent Claims (32, 33, 34, 35, 36)
-
-
37. An article comprising a computer-readable medium having stored thereon instructions that, when executed, cause one or more processors to:
-
establish, with a local cellular-enabled electronic device, a wireless communication session with a remote cellular-enabled electronic device using a short-range wireless protocol and utilizing a security key;
receive a identifying information corresponding to an electronic device with the local cellular-enabled electronic device from the remote cellular-enabled electronic device;
transmit, with the local cellular-enabled electronic device, the identifying information from the remote cellular-enabled electronic device to an other electronic device; and
use the other electronic device to,engage in communications with the electronic device corresponding to the identifying information. - View Dependent Claims (38, 39, 40, 41, 42)
-
Specification