Securing a link between two devices
First Claim
Patent Images
1. A method for securing a communication link between a first device and a second device, the method comprising:
- generating a first cryptographic key;
generating a second cryptographic key;
hashing packets communicated between said first device and said second device over said communication link to create a hash result; and
hashing said first cryptographic key, said second cryptographic key and said hash result to generate a third cryptographic key to be used to secure said communication link.
4 Assignments
0 Petitions
Accused Products
Abstract
A cryptographic key is used to secure a communication link between a first device and a second device. Generating the cryptographic key is accomplished by a) generating a first cryptographic key, b) generating a second cryptographic key, c) applying a hash function to packets transmitted over the communication link to create a hash result, and d) applying the hash function to the first cryptographic key, the second cryptographic key and the hash result.
29 Citations
12 Claims
-
1. A method for securing a communication link between a first device and a second device, the method comprising:
-
generating a first cryptographic key; generating a second cryptographic key; hashing packets communicated between said first device and said second device over said communication link to create a hash result; and hashing said first cryptographic key, said second cryptographic key and said hash result to generate a third cryptographic key to be used to secure said communication link. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A first device comprising:
-
a communication interface through which said first device is able to establish a communication link with a second device; a processor; and a memory able to store executable code which, when executed by said processor, generates a first cryptographic key, generates a second cryptographic key, hashes packets communicated between said first device and said second device over said communication link to create a hash result, and hashes said first cryptographic key, said second cryptographic key and said hash result to generate a third cryptographic key. - View Dependent Claims (8)
-
-
9. A system comprising:
a first device and a second device able to communicate over a communication link, wherein said first device is to generate a cryptographic key from a first cryptographic key, a second cryptographic key and a hash result created by hashing packets communicated between said first device and said second device over said communication link, and wherein said second device is to generate said cryptographic key from said first cryptographic key, said second cryptographic key and said hash result. - View Dependent Claims (10, 11, 12)
Specification