Generating Secure Device Secret Key
First Claim
1. A method in a device for providing secret information, comprising:
- receiving, at the device, a request for secret information from a requesting device;
determining whether the requesting device has previously received the requested secret information;
when the requesting device has not previously received the requested secret information;
encrypting, in the device, the secret information; and
transmitting the encrypted secret information to the requesting device.
6 Assignments
0 Petitions
Accused Products
Abstract
Methods, devices, systems and computer program products are provided to facilitate cryptographically secure retrieval of secret information that is embedded in a device. The embedded secret information can include a random number that is not custom-designed for any specific requestor of the secret information. Upon receiving a request for the embedded secret information, an encrypted secret is provided to the requestor that enables the recovery of the embedded secret information by only the requestor. Moreover, a need for maintenance of a database of the embedded secret information and the associated requestors is eliminated.
5 Citations
20 Claims
-
1. A method in a device for providing secret information, comprising:
-
receiving, at the device, a request for secret information from a requesting device; determining whether the requesting device has previously received the requested secret information; when the requesting device has not previously received the requested secret information; encrypting, in the device, the secret information; and transmitting the encrypted secret information to the requesting device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer readable storage device storing instructions executable by one or more processors which, upon such execution, cause the one or more processors to perform operations comprising:
-
receiving a request for secret information from a first requesting device; determining whether the first requesting device has previously received the requested secret information; when the requesting device has not previously received the requested secret information; encrypting the secret information; and transmitting the encrypted secret information to the requesting device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method in a first device for securely exporting secret information to a second device, comprising:
-
receiving, at the first device, a request for secret information from the second device; encrypting, in the first device, the secret information; transmitting the encrypted secret information to the second device; and recording, in the first device, the transmission of the secret information to the second device. - View Dependent Claims (20)
-
Specification