PEERING METHOD
First Claim
1. A method for peering between a first and a second trusted modules, each being installed in a different device, the device on which the first module is installed including a human-machine interface to communicate with a user, and the two devices having communication means allowing linking them together by an unsecure communication channel, the method comprising:
- receiving via the human-machine interface a command setting the device of the first trusted module in an operating mode such that the first trusted module takes control of at least one part of the communication means of the first device in order to set them in a secure operating mode and takes control of the human-machine interface;
establishing a temporarily secure communication between the first and the second trusted modules;
displaying on the human-machine interface a status signaling the set-up of the secure communication;
receiving via the human-machine interface a peering acceptance command; and
exchanging keys or secrets between the two modules through the temporarily secure communication channel in order to perform the peering.
0 Assignments
0 Petitions
Accused Products
Abstract
Some embodiments are directed to a method for peering between first and second modules each installed in a different device, the device of the first module includes a human-machine interface, and the two devices can be linked by an unsecure communication channel. The method can include: receiving via the human-machine interface a command setting the device of the first module in operating mode so the first module takes control of a part of the communication means of the first device in order to set them in a secure operating mode and takes control of the human-machine interface; establishing a temporarily secure communication between first and second modules; displaying on the human-machine interface a status signaling the set-up of the secure communication; receiving via the human-machine interface a peering acceptance command; and exchanging of keys/secrets between the modules through the temporarily secure communication channel to perform the peering.
4 Citations
6 Claims
-
1. A method for peering between a first and a second trusted modules, each being installed in a different device, the device on which the first module is installed including a human-machine interface to communicate with a user, and the two devices having communication means allowing linking them together by an unsecure communication channel, the method comprising:
-
receiving via the human-machine interface a command setting the device of the first trusted module in an operating mode such that the first trusted module takes control of at least one part of the communication means of the first device in order to set them in a secure operating mode and takes control of the human-machine interface; establishing a temporarily secure communication between the first and the second trusted modules; displaying on the human-machine interface a status signaling the set-up of the secure communication; receiving via the human-machine interface a peering acceptance command; and exchanging keys or secrets between the two modules through the temporarily secure communication channel in order to perform the peering. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification