Secure enclosure for key exchange
First Claim
1. A method comprising:
- placing a first device in an enclosure;
placing a second device in the enclosure; and
the enclosure is comprised of a first and second compartment, wherein the first and second compartment are separated by a separation device; and
placing the first device in the first compartment and the second device in the second compartment;
sealing the enclosure while the first device and the second device are in the enclosure;
causing the first device to exchange a key with the second device while the first device and the second device are in the enclosure and while the enclosure is sealed;
removing the first device and the second device from the enclosure after the key exchange; and
using the key to allow the first device and the second device to communicate with each other using methods of encryption;
wherein the enclosure is coated with a filtering material, wherein the filtering material of the enclosure prevents electromagnetic radiation of a particular bandwidth from escaping from the enclosure.
8 Assignments
0 Petitions
Accused Products
Abstract
A method is disclosed comprising placing a first device in an enclosure, placing a second device in the enclosure, sealing the enclosure, and after sealing the enclosure, causing the first device to exchange a key with the second device. After the key exchange, the first and second devices can be taken out of the enclosure and can use the key to communicate with each other securely and in an authenticated manner. The devices may be electronic devices or optical devices. The enclosure prevents electromagnetic radiation of a certain bandwidth from escaping and thus prevents an adversarial device from eavesdropping on communication between the first and second devices. The enclosure may include a filtering material such as a metal net. The enclosure may be, for example, a plastic bag or a glass container. The user may prepare two devices for a communication, such as a key exchange, by setting the two devices in a transfer mode, which may start the key exchange by a timer in one of the devices, then place them in the container, and seal the container. When the devices have finished the communication such as a key exchange, this fact may be signaled by sound or in some other manner by the devices. The container may have a separate compartment for each device and the compartments may be separated by a separation device such as a door comprised of filtering material. When both compartments are properly closed, the users may open the door allowing the two devices to discover each other and communicate or exchange encryption keys. The container may include a Bluetooth or other transmitter, connected to the outside world by means of cord device. The cord device may plug into a device outside of the container with which a key exchange is desired. A portable device is also disclosed in the form of for example, a floppy disc or a PCMCIA card.
33 Citations
27 Claims
-
1. A method comprising:
-
placing a first device in an enclosure; placing a second device in the enclosure; and the enclosure is comprised of a first and second compartment, wherein the first and second compartment are separated by a separation device; and
placing the first device in the first compartment and the second device in the second compartment;sealing the enclosure while the first device and the second device are in the enclosure; causing the first device to exchange a key with the second device while the first device and the second device are in the enclosure and while the enclosure is sealed; removing the first device and the second device from the enclosure after the key exchange; and using the key to allow the first device and the second device to communicate with each other using methods of encryption; wherein the enclosure is coated with a filtering material, wherein the filtering material of the enclosure prevents electromagnetic radiation of a particular bandwidth from escaping from the enclosure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 21, 22, 23)
-
-
13. A method comprising steps of:
-
placing a first device into an enclosure; connecting the first device to a transmitter, wherein the transmitter is connected to a first end of a cord device the first end of the cord device being inside the enclosure; sealing the enclosure while the first device is in the enclosure and while the first device is connected to the transmitter; wherein the cord device has a second end which is outside the enclosure; and
wherein the method further comprised of connecting a second device which lies outside the enclosure, to the second end of the cord device; andafter connecting the first device to the first end of the cord device and after connecting the second device to the second end of the cord device, causing the first device to exchange a key with the second device while the first device is in the sealed enclosure; removing the first device from the enclosure after the key exchange; and using the key to allow the first device and the second device to communicate with each other using methods of encryption with the first device outside of the enclosure. - View Dependent Claims (14, 15, 16, 17)
-
-
18. An apparatus comprising:
-
means for causing a first device to exchange a key with a second device; and means for preventing a third device from determining a key which is exchanged between the first device and the second device, and wherein the means for preventing the third device from determining the key is comprised of an enclosure having a filtering material; wherein the enclosure is adapted to that it can completely surround both the first device and the second device in order to prevent the third device from determining the key. - View Dependent Claims (19, 20, 24, 25, 26, 27)
-
Specification