SYSTEMS, DEVICES, AND METHODS FOR SECURELY TRANSMITTING A SECURITY PARAMETER TO A COMPUTING DEVICE
First Claim
1. A method of transmitting one or more security parameters to a first computing device from a second computing device, the method performed at the second computing device, the method comprising:
- receiving an image or audio signal, wherein the image or audio signal is a representation of first data, the first data comprising a password, wherein the password is not derived from a security parameter stored on the first computing device;
determining the password from the image or audio signal; and
performing a key exchange with the first computing device over a communication channel between the first and second computing devices, wherein second data is exchanged between the first and second computing devices in accordance with a key exchange protocol, such that a key is derived at each of the first and second computing devices using the password, and wherein the one or more security parameters is transmitted to the first computing device during the key exchange;
wherein said performing further comprisescomputing a confirmation value based on at least the one or more security parameters, and using the key derived at the second computing device, andtransmitting the confirmation value to the first computing device, wherein the one or more security parameters are authenticated when the confirmation value is successfully verified at the first computing device.
4 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at least one embodiment, a representation of first data comprising a password is generated at the first computing device as an image or audio signal. The image or audio signal is transmitted from the first computing device to the second computing device. The password is determined from the image or audio signal at the second computing device. A key exchange is performed between the first computing device and the second computing device wherein a key is derived at each of the first and second computing devices. In at least one embodiment, one or more security parameters (e.g. one or more public keys) are exchanged between the first and second computing devices, and techniques for securing the exchange of security parameters or authenticating exchanged security parameters are generally disclosed herein.
83 Citations
20 Claims
-
1. A method of transmitting one or more security parameters to a first computing device from a second computing device, the method performed at the second computing device, the method comprising:
-
receiving an image or audio signal, wherein the image or audio signal is a representation of first data, the first data comprising a password, wherein the password is not derived from a security parameter stored on the first computing device; determining the password from the image or audio signal; and performing a key exchange with the first computing device over a communication channel between the first and second computing devices, wherein second data is exchanged between the first and second computing devices in accordance with a key exchange protocol, such that a key is derived at each of the first and second computing devices using the password, and wherein the one or more security parameters is transmitted to the first computing device during the key exchange; wherein said performing further comprises computing a confirmation value based on at least the one or more security parameters, and using the key derived at the second computing device, and transmitting the confirmation value to the first computing device, wherein the one or more security parameters are authenticated when the confirmation value is successfully verified at the first computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A second computing device comprising a processor and a memory, the processor configured to execute one or more application modules, said one or more application modules comprising:
-
a module configured to receive an image or audio signal, wherein the image or audio signal is a representation of first data, the first data comprising a password, wherein the password is not derived from a security parameter stored on the first computing device; a module configured to determine the password from the image or audio signal; and a module configured to perform a key exchange with the first computing device over a communication channel between the first and second computing devices, wherein second data is exchanged between the first and second computing devices in accordance with a key exchange protocol, such that a key is derived at each of the first and second computing devices using the password, and wherein the one or more security parameters is transmitted to the first computing device during the key exchange; wherein said module configured to perform a key exchange is further configured to compute a confirmation value based on at least the one or more security parameters, and using the key derived at the second computing device, and to transmit the confirmation value to the first computing, wherein the one or more security parameters are authenticated when the confirmation value is successfully verified at the first computing device. - View Dependent Claims (18)
-
-
19. A computer readable storage medium comprising instructions that, when executed by a processor of a second computing device, cause the second computing device to perform acts of a method of transmitting one or more security parameters to a first computing device, the method performed at the second computing device, the acts comprising:
-
receiving an image or audio signal, wherein the image or audio signal is a representation of first data, the first data comprising a password, wherein the password is not derived from a security parameter stored on the first computing device; determining the password from the image or audio signal; and performing a key exchange with the first computing device over a communication channel between the first and second computing devices, wherein second data is exchanged between the first and second computing devices in accordance with a key exchange protocol, such that a key is derived at each of the first and second computing devices using the password, and wherein the one or more security parameters is transmitted to the first computing device during the key exchange; wherein said performing further comprises computing a confirmation value based on at least the one or more security parameters, and using the key derived at the second computing device, and transmitting the confirmation value to the first computing device, wherein the one or more security parameters are authenticated when the confirmation value is successfully verified at the first computing device. - View Dependent Claims (20)
-
Specification