User transparent registration process for secure communication
First Claim
Patent Images
1. A method for secure communication, the method comprising:
- detecting a first device in proximity to a second device, wherein the detecting is performed using a gateway communication link;
receiving a request at the first device to communicate with the second device to establish an audio conversation between a plurality of users;
automatically performing a registration process using a key exchange protocol in response to receiving the request, the registration process comprising;
determining existence of an encryption key between the first device and the second device; and
initiating creation of the encryption key in response to a determination that the encryption key does not exist, the initiating occurring without user input, and wherein the creation includes;
at each of the first device and the second device, generating a unique public key, exchanging the unique public keys, and creating an encryption key based on the exchanged unique public key;
communicating with the second device using the encryption key to secure the audio conversation;
wherein the first device is a vehicle and the second device is a telephone, the first device and second device communicating via wireless link, and further wherein the gateway communication link is interfaced to a human-vehicle interface (HVI) over a vehicle network, the HVI enabling one of the plurality of users to initiate the request; and
performing user authentication of the communication.
13 Assignments
0 Petitions
Accused Products
Abstract
A method for secure communication. The method includes receiving a request at a first device to communicate with a second device. The method also includes determining if an encryption key exists between the first device and the second device. Creation of the encryption key is initiated in response to a determination that that encryption key does not exist. The initiation of the creation of the encryption key occurs without user input. The method further includes communicating with the second device using the encryption key and performing user authentication of the communication.
18 Citations
18 Claims
-
1. A method for secure communication, the method comprising:
-
detecting a first device in proximity to a second device, wherein the detecting is performed using a gateway communication link; receiving a request at the first device to communicate with the second device to establish an audio conversation between a plurality of users; automatically performing a registration process using a key exchange protocol in response to receiving the request, the registration process comprising; determining existence of an encryption key between the first device and the second device; and initiating creation of the encryption key in response to a determination that the encryption key does not exist, the initiating occurring without user input, and wherein the creation includes; at each of the first device and the second device, generating a unique public key, exchanging the unique public keys, and creating an encryption key based on the exchanged unique public key; communicating with the second device using the encryption key to secure the audio conversation; wherein the first device is a vehicle and the second device is a telephone, the first device and second device communicating via wireless link, and further wherein the gateway communication link is interfaced to a human-vehicle interface (HVI) over a vehicle network, the HVI enabling one of the plurality of users to initiate the request; and performing user authentication of the communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for secure communication, the system comprising:
-
a first device connected via a network to a second device, the first device including instructions to implement a method comprising; detecting the first device in proximity to the second device, wherein the detecting is performed using a gateway communication link; receiving a request at the first device to communicate with the second device to establish an audio conversation between a plurality of users; automatically performing a registration process using a key exchange protocol in response to receiving the request, the registration process comprising; determining existence of an encryption key between the first device and the second device; and initiating creation of the encryption key in response to a determination that the encryption key does not exist, the initiating occurring without user input, and wherein the creation includes; at each of the first device and the second device, generating a unique public key, exchanging the unique public keys, and creating an encryption key based on the exchanged unique public key; communicating with the second device using the encryption key to secure the audio conversation; wherein the first device is a vehicle and the second device is a telephone, the first device and second device communicating via wireless link, and further wherein the gateway communication link is interfaced to a human-vehicle interface (HVI) over a vehicle network, the HVI enabling one of the plurality of users to initiate the request; and performing user authentication of the communication. - View Dependent Claims (14, 15, 16)
-
-
17. A computer program product for secure communication, the computer program product comprising:
-
a storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method comprising; detecting a first device in proximity to a second device, wherein the detecting is performed using a gateway communication link; receiving a request at the first device to communicate with the second device to establish an audio conversation between a plurality of users; automatically performing a registration process using a key exchange protocol in response to receiving the request, the registration process comprising; determining existence of an encryption key between the first device and the second device; and initiating creation of the encryption key in response to a determination that the encryption key does not exist, the initiating occurring without user input, and wherein the creation includes; at each of the first device and the second device, generating a unique public key, exchanging the unique public keys, and creating an encryption key based on the exchanged unique public key; communicating with the second device using the encryption key to secure the audio conversation; wherein the first device is a vehicle and the second device is a telephone, the first device and second device communicating via wireless link, and further wherein the gateway communication link is interfaced to a human-vehicle interface (HVI) over a vehicle network, the HVI enabling one of the plurality of users to initiate the request; and performing user authentication of the communication.
-
-
18. A method for secure communication, the method comprising:
-
receiving a request at a human vehicle interface (HVI) to communicate between a vehicle and a cellular telephone to establish an audio conversation between a plurality of users, wherein the request is one of an initiated call and a received call; automatically performing a registration process using a key exchange protocol in response to receiving the request, the registration process comprising; determining existence of an encryption key between the vehicle and the cellular telephone; and initiating creation of the encryption key in response to a determination that the encryption key does not exist, the initiating occurring without user input, and wherein the creation includes; at each of the vehicle and the cellular telephone, generating a unique public key, exchanging the unique public keys, and creating an encryption key based on the exchanged unique public key; communicating with the cellular telephone using the encryption key to secure the audio conversation; and wherein the vehicle and the cellular telephone communicating via wireless link, and performing user authentication of the communication.
-
Specification