Systems, devices, and methods for securely transmitting a security parameter to a computing device
First Claim
1. A method of transmitting one or more security parameters from a first computing device to a second computing device, the method being performed at the first computing device, the method comprising:
- generating an image for transmission to the second computing device, wherein the image is a representation of first data, the first data comprising a password, wherein the password is not derived from the one or more security parameters;
transmitting the image to the second computing device at which the password is determinable from the image; and
performing a key exchange with the second computing device over a communication channel between the first and second computing devices, wherein second data is exchanged between the first and second computing devices in accordance with a key exchange protocol, such that a key is derived at each of the first and second computing devices using the password, and wherein the one or more security parameters is transmitted to the second computing device during the key exchange;
wherein said performing further comprisescomputing a confirmation value based on at least the one or more security parameters and the key derived at the first computing device, andtransmitting the confirmation value to the second computing device, wherein the one or more security parameters are authenticated when the confirmation value is successfully verified at the second computing device;
and wherein the one or more security parameters comprise one or more public keys stored on the first computing device.
4 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at least one embodiment, a representation of first data comprising a password is generated at the first computing device as an image or audio signal. The image or audio signal is transmitted from the first computing device to the second computing device. The password is determined from the image or audio signal at the second computing device. A key exchange is performed between the first computing device and the second computing device wherein a key is derived at each of the first and second computing devices. In at least one embodiment, one or more security parameters (e.g. one or more public keys) are exchanged between the first and second computing devices, and techniques for securing the exchange of security parameters or authenticating exchanged security parameters are generally disclosed herein.
-
Citations
16 Claims
-
1. A method of transmitting one or more security parameters from a first computing device to a second computing device, the method being performed at the first computing device, the method comprising:
-
generating an image for transmission to the second computing device, wherein the image is a representation of first data, the first data comprising a password, wherein the password is not derived from the one or more security parameters; transmitting the image to the second computing device at which the password is determinable from the image; and performing a key exchange with the second computing device over a communication channel between the first and second computing devices, wherein second data is exchanged between the first and second computing devices in accordance with a key exchange protocol, such that a key is derived at each of the first and second computing devices using the password, and wherein the one or more security parameters is transmitted to the second computing device during the key exchange; wherein said performing further comprises computing a confirmation value based on at least the one or more security parameters and the key derived at the first computing device, and transmitting the confirmation value to the second computing device, wherein the one or more security parameters are authenticated when the confirmation value is successfully verified at the second computing device; and wherein the one or more security parameters comprise one or more public keys stored on the first computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A first computing device comprising a processor and a memory, the processor configured to perform a method of transmitting one or more security parameters to a second computing device by executing one or more application modules, said one or more application modules comprising:
-
a module configured to generate an image for transmission to the second computing device, wherein the image is a representation of first data, the first data comprising a password, wherein the password is not derived from the one or more security parameters; a module configured to transmit the image to the second computing device at which the password is determinable from the image; and a module configured to perform a key exchange with the second computing device over a communication channel between the first and second computing devices, wherein second data is exchanged between the first and second computing devices in accordance with a key exchange protocol, such that a key is derived at each of the first and second computing devices using the password, and wherein the one or more security parameters is transmitted to the second computing device during the key exchange; wherein said module configured to perform a key exchange is further configured to compute a confirmation value based on at least the one or more security parameters and the key derived at the first computing device, and to transmit the confirmation value to the second computing device, wherein the one or more security parameters are authenticated when the confirmation value is successfully verified at the second computing device and wherein the one or more security parameters comprise one or more public keys stored on the first computing device. - View Dependent Claims (14)
-
-
15. A non-transitory computer readable storage medium comprising instructions that, when executed by a processor of a first computing device, cause the first computing device to perform acts of a method of transmitting one or more security parameters to a second computing device, the method performed at the first computing device, the acts comprising:
-
generating an image for transmission to the second computing device, wherein the image is a representation of first data, the first data comprising a password, wherein the password is not derived from the one or more security parameters; transmitting the image to the second computing device at which the password is determinable from the image; and performing a key exchange with the second computing device over a communication channel between the first and second computing devices, wherein second data is exchanged between the first and second computing devices in accordance with a key exchange protocol, such that a key is derived at each of the first and second computing devices using the password, and wherein the one or more security parameters is transmitted to the second computing device during the key exchange; wherein said performing further comprises computing a confirmation value based on at least the one or more security parameters and the key derived at the first computing device, and transmitting the confirmation value to the second computing device, wherein the one or more security parameters are authenticated when the confirmation value is successfully verified at the second computing device; and wherein the one or more security parameters comprise one or more public keys stored on the first computing device. - View Dependent Claims (16)
-
Specification