Method for establishing a communication between two devices
First Claim
1. A method comprising:
- establishing an encrypted communication by using keys, the encrypted communication between a first electronic device associated with a first trusted authority and a second electronic device associated with a second trusted authority, the establishing including;
providing a first identity associated with the first electronic device, a second identity associated with the second electronic device, a further first identity associated with the first trusted authority, and a further second identity associated with the second trusted authority;
making a first secret key associated with the first electronic device available to the first electronic device for encrypted communication between the first trusted authority and the first electronic device, said first trusted authority being able to generate the first secret key;
making a second secret key available to the second electronic device, the second trusted authority being able to generate the second secret key for encrypted communication between the second trusted authority and the second electronic device;
making available the second identity and the further second identity to the first electronic device upon connection of the second electronic device with the first electronic device;
transmitting a message by the first electronic device to the first trusted authority, said message containing the second identity and the further second identity, wherein the message is encrypted with the first secret key;
generating by the first trusted authority a public key associated with the second electronic device, said public key generated from the received second identity;
generating by said first trusted authority a communication key to be used in a communication between said first electronic device and said second electronic device;
sending by the first trusted authority a first message to the first electronic device, said first message containing the communication key, wherein the first message is encrypted with the first secret key; and
sending by the first trusted authority a second message, different than the first message, to the second electronic device, said second message containing the communication key, wherein the second message is encrypted with the public key associated with the second device;
wherein the second electronic device is not associated with the first trusted authority and the first electronic device is not associated with the second trusted authority and the second trusted authority is distinct and autonomous with respect to the first trusted authority.
1 Assignment
0 Petitions
Accused Products
Abstract
A method establishes a communication between a first electronic device associated with a first trusted authority and a second electronic device. The method includes: making a first key available to the first device for the communication between the first authority and the first device. A second trusted authority, associated with the second device and distinct and autonomous with respect to the first authority, generates a second key in order to communicate with the second device. Furthermore, the method includes: making the second key available to the second device; and providing the first and second devices with a communication key, to be used communication between the first and second devices, through at least one of the first and second authorities.
55 Citations
32 Claims
-
1. A method comprising:
-
establishing an encrypted communication by using keys, the encrypted communication between a first electronic device associated with a first trusted authority and a second electronic device associated with a second trusted authority, the establishing including; providing a first identity associated with the first electronic device, a second identity associated with the second electronic device, a further first identity associated with the first trusted authority, and a further second identity associated with the second trusted authority; making a first secret key associated with the first electronic device available to the first electronic device for encrypted communication between the first trusted authority and the first electronic device, said first trusted authority being able to generate the first secret key; making a second secret key available to the second electronic device, the second trusted authority being able to generate the second secret key for encrypted communication between the second trusted authority and the second electronic device; making available the second identity and the further second identity to the first electronic device upon connection of the second electronic device with the first electronic device; transmitting a message by the first electronic device to the first trusted authority, said message containing the second identity and the further second identity, wherein the message is encrypted with the first secret key; generating by the first trusted authority a public key associated with the second electronic device, said public key generated from the received second identity; generating by said first trusted authority a communication key to be used in a communication between said first electronic device and said second electronic device; sending by the first trusted authority a first message to the first electronic device, said first message containing the communication key, wherein the first message is encrypted with the first secret key; and sending by the first trusted authority a second message, different than the first message, to the second electronic device, said second message containing the communication key, wherein the second message is encrypted with the public key associated with the second device; wherein the second electronic device is not associated with the first trusted authority and the first electronic device is not associated with the second trusted authority and the second trusted authority is distinct and autonomous with respect to the first trusted authority. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An encrypted communication system using keys, the system comprising:
-
a first electronic device associated with a first trusted authority, the first electronic device configured to; receive a first secret key from the first trusted authority; transmit a second identity and a further second identity to the first trusted authority; receive a first message having a communication key, the first message encrypted with the first secret key; a second electronic device associated with a second trusted authority and not associated with said first trusted authority, the first electronic device not associated with said second trusted authority, and the second trusted authority is distinct and autonomous with respect to the first trusted authority, the second electronic device configured to; receive a second secret key from the second trusted authority; receive a second message having the communication key, the second message encrypted with a public key, the second message received from the first trusted authority, the second message different than the first message; and communication means for having an encrypted communication between the first electronic device and the second electronic device using the communication key to encrypt the communication, wherein said communication key is generated and sent by only said first trusted authority. - View Dependent Claims (11, 12, 13)
-
-
14. A method for establishing an encrypted communication between a first electronic device associated with a first trusted authority and a second electronic device associated with a second trusted authority, the method comprising:
-
receiving at the first electronic device a first secret key from the first trusted authority, said first electronic device not being associated with said second trusted authority; using the first secret key for encrypted communication between the first electronic device and the first trusted authority; receiving at the second electronic device a second secret key from the second trusted authority, said second electronic device not being associated with said first trusted authority; using the second secret key for encrypted communication between the second electronic device and the second trusted the authority; making available the second identity and the further second identity to the first electronic device or making available the first identity and the further first identity to the second electronic device upon connection of the second electronic device with the first electronic device; transmitting the second identity and the further second identity by the first electronic device to the first trusted authority or transmitting the first identity and the further first identity by the second electronic device to the second trusted authority; receiving at the first electronic device, a first message having a communication key, the first message encrypted with the first secret key or a first public key, the first message received from only one of the first trusted authority or the second trusted authority respectively; receiving at the second electronic device, a second message having the communication key, the second message encrypted with a public key or the second secret key, the second message received from the only one of the first trusted authority or the second trusted authority respectively, the second message different than the first message; and using the received communication key for encrypted communication between the first and second electronic devices. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A trusted authority device comprising:
-
a transceiver configured to; receive a first identity from a first device, the first identity associated with the first device, the first device associated with the trusted authority; and receive a second identity and a second further identity from the first device, the second identity associated with a second device and the further second identity associated with a second trusted authority device, wherein the second device is not associated with the trusted authority device and the first device is not associated with the second trusted authority device and the second trusted authority device is distinct and autonomous with respect to the trusted authority device; a processor, the processor configured to; generate a secret key from the first identity, generate a public key from the second identity, and generate a communication key from the first identity and the second identity, wherein the communication key is useful to encrypt and decrypt communication between the first device and the second device; and a storage unit configured to; store the secret key, store the public key and store the communication key; and wherein the transceiver is further configured to; transmit a first message to the first device, the first message having the communication key, wherein the first message is encrypted with the secret key, and transmit a second message to the second device, the second message different than the first message, the second message having the communication key, wherein the second message is encrypted with the public key. - View Dependent Claims (27, 28, 29, 30, 31, 32)
-
Specification