Method and device for agreeing shared key between first communication device and second communication device
First Claim
1. A method for agreeing upon a shared key between first communication and second communication devices, comprising:
- agreeing upon security parameters by the first and second communication devices;
determining a first security value by the second communication device based on the security parameters previously agreed upon;
transmitting the first security value from the second communication device to the first communication device;
determining second and third security values by the first communication device based on the first security value and the security parameters previously agreed upon;
transmitting the second and third security values from the first communication device to the second communication device;
authenticating the first communication device by the second communication device, if the second security value matches a fourth security value determined by the second communication device based on the security parameters previously agreed upon;
determining, by the first and second communication devices upon successful authentication of the first communication device, a shared key based on the third security value and the security parameters previously agreed upon.
1 Assignment
0 Petitions
Accused Products
Abstract
Based on security parameters previously agreed upon by first and second communication devices, a first security value is determined by the second communication device and transmitted to the first communication device. The first communication device determines second and third security values based on the security parameters and the first security value and transmits the second and third security values to the second communication device. The second communication device determines a fourth security value based on the security parameters and, if the second security value matches the fourth security value, authenticates the first communication device. Upon successful authentication of the first communication device, a shared key is determined by both communication devices based on the third security value and the security parameters.
28 Citations
7 Claims
-
1. A method for agreeing upon a shared key between first communication and second communication devices, comprising:
-
agreeing upon security parameters by the first and second communication devices; determining a first security value by the second communication device based on the security parameters previously agreed upon; transmitting the first security value from the second communication device to the first communication device; determining second and third security values by the first communication device based on the first security value and the security parameters previously agreed upon; transmitting the second and third security values from the first communication device to the second communication device; authenticating the first communication device by the second communication device, if the second security value matches a fourth security value determined by the second communication device based on the security parameters previously agreed upon; determining, by the first and second communication devices upon successful authentication of the first communication device, a shared key based on the third security value and the security parameters previously agreed upon. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A first device that is communicably connectable to a second communication device, comprising:
a computer processor that executes; receiving a first security value determined by the second communication device based on security parameters previously agreed upon by the first and second communication devices; determining second and third security values based on the received first security value and the security parameters previously agreed upon and transmitting the second and third security values to the second communication device, wherein a fourth security value is determinable by the second communication device based on the security parameters previously agreed upon for authenticating the first communication device when the second security value matches the fourth security value; and determining upon successful authentication of the first communication device by the second communication device, a shared key based on the third security value and the security parameters previously agreed upon.
Specification