SECURE COMMUNICATIONS BETWEEN DEVICES
First Claim
1. A method of establishing secure communication between a first mobile computing device and a second mobile computing device, comprising:
- generating a first self-signed key at the first mobile computing device, the first self-signed key including a first public key and a first private key;
pairing the first device with a second device, the pairing including receiving user input of a passcode and after receiving the user input sending the first public key to the second mobile computing device and receiving a second public key from the second mobile computing device;
storing the second public key in a database of trusted devices, the database of trusted devices being stored in the first mobile computing device;
receiving in the first mobile computing device a list of mobile computing devices connected to a mobile network;
matching the list of mobile computing device against the database of trusted devices; and
establishing secure communication between the first mobile computing device and the second mobile computing device.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of establishing secure communication between a first mobile computing device and a second mobile computing device includes generating a first self-signed key at the first mobile computing device, pairing the first device with a second device, the pairing including receiving user input of a passcode and after receiving the user input sending the first public key to the second mobile computing device and receiving a second public key from the second mobile computing device, storing the second public key in a database of trusted devices, the database of trusted devices being stored in the first mobile computing device, receiving in the first mobile computing device a list of mobile computing devices connected to a mobile network, matching the list of mobile computing device against the database of trusted devices, and establishing secure communication between the first mobile computing device and the second mobile computing device.
89 Citations
29 Claims
-
1. A method of establishing secure communication between a first mobile computing device and a second mobile computing device, comprising:
-
generating a first self-signed key at the first mobile computing device, the first self-signed key including a first public key and a first private key; pairing the first device with a second device, the pairing including receiving user input of a passcode and after receiving the user input sending the first public key to the second mobile computing device and receiving a second public key from the second mobile computing device; storing the second public key in a database of trusted devices, the database of trusted devices being stored in the first mobile computing device; receiving in the first mobile computing device a list of mobile computing devices connected to a mobile network; matching the list of mobile computing device against the database of trusted devices; and establishing secure communication between the first mobile computing device and the second mobile computing device. - View Dependent Claims (2, 3, 6)
-
-
4. A computer program product to perform a method of providing personalized content, tangibly embodied in a non-transitory computer readable media, comprising instructions for causing a processor to:
-
generate a first self-signed key at the first mobile computing device, the first self-signed key including a first public key and a first private key; pair the first device with a second device, the pairing including receiving user input of a passcode and after receiving the user input send the first public key to the second mobile computing device and receive a second public key from the second mobile computing device; store the second public key in a database of trusted devices, the database of trusted devices being stored in the first mobile computing device; receive in the first mobile computing device a list of mobile computing devices connected to a mobile network; match the list of mobile computing device against the database of trusted devices; and establish secure communication between the first mobile computing device and the second mobile computing device. - View Dependent Claims (5)
-
-
7. A method of establishing secure communication between a first mobile computing device and a second mobile computing device, comprising:
-
connecting the first mobile computing device to a Wi-Fi hot spot; receiving in the first mobile computing device a list of mobile computing devices connected to the Wi-Fi hot spot; receiving in the first mobile computing device user input selecting the second mobile computing device; sending a request via the Wi-Fi hot spot to the second mobile computing device requesting pairing; receiving user input in the first mobile device entering a pairing code; sending the pairing code to the second mobile device via the Wi-Fi hot spot; receiving indication from the second mobile computing device that the first mobile computing device and the second mobile communication device are paired; and establishing secure communication between the first mobile computing device and the second mobile computing device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method of establishing secure communication between a first mobile computing device and a second mobile computing device, comprising:
-
connecting the second mobile computing device to a Wi-Fi hot spot; receiving in the second mobile computing device a list of mobile computing devices connected to the Wi-Fi hot spot; receiving in the first mobile computing device user input selecting the second mobile computing device; receiving a request via the Wi-Fi hot spot from the first mobile computing device requesting pairing; displaying a pairing code on a display of the second mobile computing device; receiving the pairing code from the first mobile device via the Wi-Fi hot spot; and sending an indication to the first mobile computing device that the first mobile device and the second mobile communication device are paired. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method of establishing secure communication between a first mobile computing device and a second mobile computing device, comprising:
-
connecting the first mobile computing device to a Wi-Fi hot spot; receiving in the first mobile computing device a list of mobile computing devices connected to the Wi-Fi hot spot; identifying in the list at least one device having complementary capabilities to the first mobile computing device, the at least one device including the second mobile computing device; exchanging identity codes with the second mobile computing device via the Wi-Fi hot spot; determining whether a received identity code from the second mobile computing device matches a stored identity code; sending an indication to the second mobile computing device that the received identity code matches a stored identity code for the second mobile computing device; receiving an indication from the second mobile computing device that a sent identity code matches a stored identity code for the first mobile computing device; and establishing secure communication between the first mobile computing device and the second mobile computing device. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification