Security key creation
First Claim
Patent Images
1. A method, comprising:
- authenticating, by a calling device, with a network;
obtaining, by the calling device and based on the authenticating, calling security parameters;
communicating, by the calling device, the calling security parameters to a network device;
communicating, by the calling device, an identifier, corresponding to a called device, to the network device to enable the network device to associate the calling security parameters with an identifier corresponding to the calling device;
receiving, by the calling device and from the network device, a calling parameters identifier associated with the calling security parameters;
communicating, by the calling device, the calling parameters identifier to the called device;
receiving, by the calling device, a called parameters identifier from the called device in response to communicating the calling parameters identifier to the called device;
communicating, by the calling device, the called parameters identifier to the network device;
receiving, by the calling device and from the network device, called security parameters in response to communicating the called parameters identifier to the network device;
creating, by the calling device, a security key based on the calling security parameters and the called security parameters; and
communicating, by the calling device, with the called device using the security key.
1 Assignment
0 Petitions
Accused Products
Abstract
A device may obtain calling security parameters, may communicate the calling security parameters to a network device, and may receive, from the network device, a calling parameters identifier associated with the calling security parameters. The device may communicate the calling parameters identifier to a called device, may receive a called parameters identifier from the called device, and may communicate the called parameters identifier to the network device. The device may receive called security parameters from the network device, may create a security key based on the calling security parameters and the called security parameters, and may communicate with the called device using the security key.
-
Citations
20 Claims
-
1. A method, comprising:
-
authenticating, by a calling device, with a network; obtaining, by the calling device and based on the authenticating, calling security parameters; communicating, by the calling device, the calling security parameters to a network device; communicating, by the calling device, an identifier, corresponding to a called device, to the network device to enable the network device to associate the calling security parameters with an identifier corresponding to the calling device; receiving, by the calling device and from the network device, a calling parameters identifier associated with the calling security parameters; communicating, by the calling device, the calling parameters identifier to the called device; receiving, by the calling device, a called parameters identifier from the called device in response to communicating the calling parameters identifier to the called device; communicating, by the calling device, the called parameters identifier to the network device;
receiving, by the calling device and from the network device, called security parameters in response to communicating the called parameters identifier to the network device;creating, by the calling device, a security key based on the calling security parameters and the called security parameters; and communicating, by the calling device, with the called device using the security key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A called device, comprising:
a processor to; receive a calling parameters identifier from a calling device, authenticate with a network; obtain, based on the authenticating, called security parameters, provide the called security parameters to a network device in response to receiving the calling parameters identifier, communicate an identifier, corresponding to the called device, to the network device to enable the network device to associate the called security parameters with an identifier corresponding to the calling device, receive a called parameters identifier in response to communicating the called security parameters to the network device, provide the called parameters identifier to the calling device, provide the calling parameters identifier to the network device, receive calling security parameters from the network device in response to communicating the calling parameters identifier to the network device, and produce a security key based on the called security parameters and the calling security parameters. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. One or more non-transitory computer-readable storage media, comprising:
one or more instructions that, when executed by a processor of a network device, cause the processor to; receive calling security parameters from a calling device, receive an identifier, corresponding to a called device, from the calling device, associate the identifier with the calling security parameters, authenticate the called device, based on the identifier, associate the calling security parameters with a calling parameters identifier, communicate the calling parameters identifier to the calling device in response to receiving the calling security parameters from the calling device, receive the calling parameters identifier from the called device, identify the calling security parameters associated with the calling parameters identifier, communicate the calling security parameters to the called device in response to receiving the calling parameters identifier, receive called security parameters from the called device, associate the called security parameters with a called parameters identifier, communicate the called parameters identifier to the called device in response to receiving the called security parameters from the called device, receive the called parameters identifier from the calling device, identify the called security parameters based on the called parameters identifier, and communicate the called security parameters to the calling device in response to receiving the called parameters from the calling device, the calling security parameters and the called security parameters being used to create security keys. - View Dependent Claims (16, 17, 18, 19, 20)
Specification