Method and apparatus for fast crytographic key generation
First Claim
Patent Images
1. A method for generation of a cryptographic key by a wireless communication device, comprising:
- generating a first public key for encrypting a first wireless communication;
generating, after termination of the first wireless communication and prior to initiation of a second secure wireless communication of the wireless communication device with a desired communication device, a second public key for transmission to the desired communication device, wherein the second public key is independent of the first public key;
storing the second public key in a memory of the wireless communication device prior to initiation of the second secure wireless communication with the desired communication device;
initiating, in response to a user input, the second secure wireless communication of the wireless communication device with the desired communication device; and
transmitting the second public key to the desired communication device if the second public key is available in the memory.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for fast generation of a cryptographic key. A processor within a wireless communication device generates a public key upon termination of wireless communication. When a user of the wireless communication device desires to initiate a secure communication subsequent to the previous communication, the public key that was generated upon termination of the previous communication is used to engage in secure communications with a second communication device.
9 Citations
15 Claims
-
1. A method for generation of a cryptographic key by a wireless communication device, comprising:
-
generating a first public key for encrypting a first wireless communication; generating, after termination of the first wireless communication and prior to initiation of a second secure wireless communication of the wireless communication device with a desired communication device, a second public key for transmission to the desired communication device, wherein the second public key is independent of the first public key; storing the second public key in a memory of the wireless communication device prior to initiation of the second secure wireless communication with the desired communication device; initiating, in response to a user input, the second secure wireless communication of the wireless communication device with the desired communication device; and transmitting the second public key to the desired communication device if the second public key is available in the memory. - View Dependent Claims (12, 14)
-
-
2. A wireless communication device for generation of a cryptographic key, comprising:
-
means for generating a first public key for encrypting a first wireless communication; means for generating, after termination of the first wireless communication and prior to initiation of a second secure wireless communication with a desired communication device, a second public key for transmission to the desired communication device, wherein the second public key is independent of the first public key; means for storing the second public key in memory prior to initiation of the second secure wireless communication with the desired communication device; means for initiating, in response to a user input, the second secure wireless communication with the desired communication device; and means for transmitting the second public key to the desired communication device if the second public key is available in the memory. - View Dependent Claims (13, 15)
-
-
3. A wireless communication device for generation of a cryptographic key, comprising:
-
a processor for; generating a first public key to encrypt a first wireless communication; generating, after termination of the first wireless communication and prior to initiation of a second secure wireless communication with a desired communication device, a second public key for transmission to the desired communication device; storing the second public key in memory prior to initiation of the second secure wireless communication with the desired communication device initiating, in response to a user input, the second secure wireless communication with the desired communication device; and transmitting the second public key to the desired communication device if the second public key is available in the memory; the memory for storing the second public key, wherein the second public key is independent of the first public key. - View Dependent Claims (10, 11)
-
-
4. A processor for generation of a cryptographic key, said processor being configured to:
-
generate a first public key for encrypting a first wireless communication; generate, after termination of the first wireless communication and prior to initiation of a second secure wireless communication with a desired communication device, a second public key for transmission to the desired communication device, wherein the second public key is independent of the first public key; store the second public key in memory prior to initiation of the second secure wireless communication with the desired communication device; initiate, in response to a user input, the second secure wireless communication with the desired communication device; and transmit the second public key to the desired communication device if the second public key is available in the memory. - View Dependent Claims (8, 9)
-
-
5. A memory comprising instructions for generation of a cryptographic key, wherein the instructions upon execution cause a computer to:
-
generate a first public key for encrypting a first wireless communication; generate, after termination of the first wireless communication and prior to initiation of a second secure wireless communication with a desired communication device, a second public key for transmission to the desired communication device, wherein the second public key is independent of the first public key; store the second public key in memory prior to initiation of the second secure wireless communication with the desired communication device; initiate, in response to a user input, the second secure wireless communication with the desired communication device; and transmit the second public key to the desired communication device if the second public key is available in the memory. - View Dependent Claims (6, 7)
-
Specification