Method and arrangement in a communication network
First Claim
Patent Images
1. An ad hoc communications network comprising:
- a first device having an optical device; and
a second device having a pair of keys, the pair of keys comprising a secret key and a public key, the first device having a user that trusts the second device wherein the public key is hashed to a bit string, wherein the bit string is encoded to a graphical string, the graphical string being visible for the user of the first device, the first device having means for obtaining the graphical string by means of the optical device, and the first device having means for authenticating the second device by means of the obtained string.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to the problem of establishing of security that arises within an ad hoc network
The problem is solved by using an optical device at a first device to read a public key that is encoded to a graphical string at a second device, which key is required for establishing security.
36 Citations
10 Claims
-
1. An ad hoc communications network comprising:
-
a first device having an optical device; and
a second device having a pair of keys, the pair of keys comprising a secret key and a public key, the first device having a user that trusts the second device wherein the public key is hashed to a bit string, wherein the bit string is encoded to a graphical string, the graphical string being visible for the user of the first device, the first device having means for obtaining the graphical string by means of the optical device, and the first device having means for authenticating the second device by means of the obtained string. - View Dependent Claims (2, 3, 4, 5)
-
-
6. Method for establishing a security relation between a first device and a second device within an ad hoc communications network, the first device having an optical device, the second device hiving a pair of keys comprising a secret key and a public key, the first device having a user that trusts the second device, the method comprising the steps of:
-
hashing the public key to a bit string;
encoding the bit string to a graphical string;
making the graphical string visible for the user of the first device;
the first device obtaining the graphical string by means of the optical device; and
the first device authenticating the second device by means of the obtained graphical string. - View Dependent Claims (7, 8, 9, 10)
-
Specification