Method and apparatus for encrypted authentication
First Claim
1. A method for encrypted authentication between a sending device and receiving device, the sending device transmitting at least a first type of data and a second type of data that is different from the first type of data, and the receiving device receiving at least the first type of data and the second type of data, wherein a result of encrypted authentication performed on the first type of data is applied to the second of data;
- wherein the result of the encrypted authentication is a result of receiving an encrypted exchange key generated by the sending device and decrypting the encrypted exchange key using an authentication key between the sending and receiving devices to obtain an exchange key; and
wherein the method comprises;
receiving the first type of data that is encrypted using an exchange key generated by the sending device and decrypting the first type of data using the decrypted exchange key; and
receiving the second type of data and decrypting the second type of data using the decrypted exchange key.
1 Assignment
0 Petitions
Accused Products
Abstract
A sink device including a first data processing unit and a second data processing unit authenticates the processing units, when turned on, to generate first authentication keys having the same data. When a data request is issued from the sink device to the source device, device authentication is made between the source device and the first data processing unit to generate second authentication keys having the same data. The source device encrypts an exchange key using the second authentication key, and sends the encrypted exchange key to the first data processing unit. The first data processing unit decrypts the encrypted exchange key using the second authentication key, encrypts the decrypted exchange key using the first authentication key, and sends the encrypted exchange key to the second data processing unit. The second data processing unit decrypts the encrypted exchange key using the first authentication key to obtain an exchange key.
-
Citations
12 Claims
-
1. A method for encrypted authentication between a sending device and receiving device, the sending device transmitting at least a first type of data and a second type of data that is different from the first type of data, and the receiving device receiving at least the first type of data and the second type of data, wherein a result of encrypted authentication performed on the first type of data is applied to the second of data;
-
wherein the result of the encrypted authentication is a result of receiving an encrypted exchange key generated by the sending device and decrypting the encrypted exchange key using an authentication key between the sending and receiving devices to obtain an exchange key; and wherein the method comprises; receiving the first type of data that is encrypted using an exchange key generated by the sending device and decrypting the first type of data using the decrypted exchange key; and receiving the second type of data and decrypting the second type of data using the decrypted exchange key.
-
-
2. A method for encrypted authentication between a sending device and receiving device, the sending device transmitting at least a first type of data and a second type of data that is different from the first type of data, and the receiving device receiving at least the first type of data and the second type of data, wherein a result of encrypted authentication performed on the first type of data is applied to the second type of data;
-
wherein the result of the encrypted authentication is the result of receiving an encrypted exchange key generated by the receiving device and decrypting the encrypted exchange key using an authentication key between the sending and receiving devices to obtain an exchange key; and wherein the method comprises; receiving the first type of data encrypted using an exchange key generated by the receiving device and decrypting the first type of data using the decrypted exchange key; and receiving the second type of data and decrypting the second type of data using the decrypted exchange key.
-
-
3. A method for encrypted authentication between a first device and a second device, the first device configured to transmit or receive at least a first type of data and a second type of data that is different from the first type of data, and the second device configured to transmit or receive at least the first type of data and the second type of data, wherein a result of encrypted authentication performed on the first type of data is applied to the second type of data, the method comprising:
-
generating first authentication keys for device authentication with a first data processing unit and a second data processing unit of the first device; and generating second authentication keys for device authentication with the first data processing unit of the first device and the second device; wherein the first data processing unit; decrypts data sent from the second device using the second authentication key, the data being encrypted using the second authentication key, encrypts the decrypted data using the first authentication key, and sends the encrypted data to the second data processing unit; and wherein the second data processing unit decrypts the encrypted data received from the first data processing unit using the first authentication key. - View Dependent Claims (4)
-
-
5. A method for encrypted authentication between a first device and a second device, the first device configured to transmit or receive at least a first type of data and a second type of data that is different from the first type of data, and the second device configured to transmit or receive at least the first type of data and the second type of data, wherein a result of encrypted authentication performed on the first type of data is applied to the second type of data, the method comprising:
-
generating authentication keys for device authentication between the first data processing unit of the first device and the second device; wherein the first data processing unit; decrypts data sent from the second device using the authentication key, the data being encrypted by the authentication key, and sends the authentication key to a second data processing unit of the first device; and wherein the second data processing unit decrypts data sent from the second device using the authentication key received from the first data processing unit, the data being encrypted by the authentication key. - View Dependent Claims (6)
-
-
7. An apparatus for encrypted authentication between a first device and a second device, the first device configured to transmit or receive at least a first type of data and a second type of data that is different from the first type of data and the second device configured to transmit or receive at least the first type of data and the second type of data, the apparatus comprising:
-
an authentication-key generating section configured to authenticate the second device that transmits at least the first type of data and the second type of data and the first device to generate authentication keys; and a processing section configured to apply a result of encrypted authentication in the processing of the first type of data using the authentication keys to the processing of the second type of data. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification