Securing a link between two devices
First Claim
Patent Images
1. A method for securing a communication link between a first device and a second device, the method comprising:
- generating a first cryptographic key;
generating a second cryptographic key;
applying a hash function to packets communicated over said communication link to create a hash result; and
applying said hash function to said first cryptographic key, said second cryptographic key and said hash result to generate a third cryptographic key to be used to secure said communication link.
4 Assignments
0 Petitions
Accused Products
Abstract
A cryptographic key is used to secure a communication link between a first device and a second device. Generating the cryptographic key is accomplished by a) generating a first cryptographic key, b) generating a second cryptographic key, c) applying a hash function to packets transmitted over the communication link to create a hash result, and d) applying the hash function to the first cryptographic key, the second cryptographic key and the hash result.
43 Citations
12 Claims
-
1. A method for securing a communication link between a first device and a second device, the method comprising:
-
generating a first cryptographic key;
generating a second cryptographic key;
applying a hash function to packets communicated over said communication link to create a hash result; and
applying said hash function to said first cryptographic key, said second cryptographic key and said hash result to generate a third cryptographic key to be used to secure said communication link. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A device comprising:
-
a communication interface through which said device is able to establish a communication link with another device;
a processor; and
a memory able to store executable code which, when executed by said processor, generates a first cryptographic key, generates a second cryptographic key, applies a hash function to packets communicated over said communication link to create a hash result, and applies said hash function to said first cryptographic key, said second cryptographic key and said hash result to generate a third cryptographic key. - View Dependent Claims (8)
-
-
9. A system comprising:
a first device and a second device able to communicate over a communication link, wherein said first device and said second device are each to generate a cryptographic key from a first cryptographic key, a second cryptographic key and a hash result created by hashing packets communicated over said communication link. - View Dependent Claims (10, 11, 12)
Specification