Method for ensuring data transmission security, communication system and communication device
First Claim
1. A system for checking that earlier derived encryption keys, a first encryption key in a first device and a second encryption key in a second device, are the same, comprising:
- a first device and a second device;
the first device comprising;
a first control block and a first communication block;
the second device comprising;
a second control block and a second communication block;
wherein said first communication block and said second communication block are configured to establish a connection between said first and second devices;
wherein said first control block is configured to;
generate a random string,calculate a first check string based at least partly on said random string and said first encryption key, anddisplay said random string and said first check string;
wherein said second control block is configured to;
receive said random string and said first check string,calculate a second check string based at least partly on said random string and said second encryption key, andcompare the correspondence of said first and second check strings to verify that said first encryption key and said second encryption key are the same, andindicate the result of the comparison.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method for ensuring data transmission security between a first and a second communication device in short-range wireless communication. To set up a secure data transmission connection, the communication devices conduct a key exchange stage to generate at least one shared key between the communication devices. After said key exchange stage at least a first and a second check string is formed, said strings being based at least on a unique short random string and on the keys generated in each communication device at said key exchange stage. Thus, the security of the connection that is set up is ensured by comparing the correspondence of said check strings. The invention also relates to a communication system and a communication device, in which the method will be applied.
-
Citations
27 Claims
-
1. A system for checking that earlier derived encryption keys, a first encryption key in a first device and a second encryption key in a second device, are the same, comprising:
-
a first device and a second device; the first device comprising;
a first control block and a first communication block;the second device comprising;
a second control block and a second communication block;wherein said first communication block and said second communication block are configured to establish a connection between said first and second devices; wherein said first control block is configured to; generate a random string, calculate a first check string based at least partly on said random string and said first encryption key, and display said random string and said first check string; wherein said second control block is configured to; receive said random string and said first check string, calculate a second check string based at least partly on said random string and said second encryption key, and compare the correspondence of said first and second check strings to verify that said first encryption key and said second encryption key are the same, and indicate the result of the comparison. - View Dependent Claims (2)
-
-
3. A method for checking that earlier derived first encryption key in a first device and a second encryption key in a second device are the same, the method comprising:
-
generating, by the first device, a random string, calculating, by the first device, a first check string based at least partly on said random string and said first encryption key, and displaying, by the first device, said random string and said first check string; wherein said random string is for enabling the second device to calculate a second check string based at least partly on said random string and said second encryption key; wherein said first check string is for comparing the correspondence of said first and second check strings to verify that said first encryption key and said second encryption key are the same. - View Dependent Claims (4)
-
-
5. A method for checking that earlier derived encryption keys, a first encryption key in a first device and a second encryption key in a second device, are the same, comprising:
-
receiving, by the second device, a random string and a first check string, calculating, by the second device, a second check string based at least partly on said random string and said second encryption key, and comparing, by the second device, the correspondence of said first and second check strings to verify that said first encryption key and said second encryption key are the same, and indicating, by the second device, the result of the comparison.
-
-
6. A system for checking that earlier derived encryption keys, a first encryption key in a first device and a second encryption key in a second device, are the same, comprising:
-
a first device and a second device; the first device comprising;
a first control block and a first communication block;the second device comprising;
a second control block and a second communication block;wherein said first communication block and said second communication block are configured to establish a connection between said first and second devices; wherein said first control block is configured to; generate a random string, calculate a first check string based at least partly on said random string and said first encryption key, display said random string and said first check string, and transmit said random string to said second device; wherein said second control block is configured to; receive said random string, calculate a second check string based at least partly on said random string and said second encryption key, and display said second check string.
-
-
7. A method for checking that earlier derived encryption keys, a first encryption key in a first device and a second encryption key in a second device, are the same, comprising:
-
receiving, by the second device, a random string, calculating, by the second device, a second check string based at least partly on said random string and said second encryption key, and displaying, by the second device, said second check string; wherein said random string is for enabling the first device to calculate a first check string based at least partly on said random string and said first encryption key; wherein said second check string is for comparing the correspondence of said first and second check strings to verify that said first encryption key and said second encryption key are the same.
-
-
8. A device comprising:
-
a memory; a processing device configured to generate a random string, and to calculate a first check string based at least partly on said random string and a first encryption key; and a display configured to display said random string and said first check string; wherein said random string is for enabling a second device to calculate a second check string based at least partly on said random string and a second encryption key; and wherein the processing device is further configured to compare the correspondence of said first and second check strings to verify that said first encryption key and said second encryption key are the same. - View Dependent Claims (9, 10, 11)
-
-
12. A device comprising:
-
a memory; a receiver configured to receive a random string and a first check string calculated in a first device based at least partly on the random string and a first encryption key; and a processing device configured to; calculate a second check string based at least partly on said random string and a second encryption key, compare the correspondence of said first and second check strings to verify that said first encryption key and said second encryption key are the same, and indicate the result of the comparison. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A device comprising:
-
a memory; a receiver configured to receive a random string, a processing device configured to calculate a second check string based at least partly on said random string and a second encryption key; and a display configured to display the second check string; and wherein said second check string is for comparing the correspondence of said first and second check strings to verify that said first encryption key and said second encryption key are the same. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
Specification