17878478. ULTRA-WIDEBAND SESSION KEY SHARING SCHEME simplified abstract (APPLE INC.)
ULTRA-WIDEBAND SESSION KEY SHARING SCHEME
Organization Name
Inventor(s)
Ryuji Ishiguro of San Francisco CA (US)
ULTRA-WIDEBAND SESSION KEY SHARING SCHEME - A simplified explanation of the abstract
This abstract first appeared for US patent application 17878478 titled 'ULTRA-WIDEBAND SESSION KEY SHARING SCHEME
Simplified Explanation
The abstract describes a shared session key generation scheme for establishing a secure session between two devices.
- The first device retrieves the public key of the second device.
- Using the public key of the second device and its own private key, the first device generates a session key.
- The first device establishes a secure session with the second device using the generated session key.
- The second device encrypts a message using a session key it generated.
- The first device decrypts the message using the session key it generated, which is a duplicate of the second device's session key.
Potential Applications
- Secure communication between devices
- Secure data transfer
- Secure remote access
Problems Solved
- Ensures secure communication between devices
- Prevents unauthorized access to transmitted data
- Protects against message interception and decryption
Benefits
- Simplifies the process of generating and sharing session keys
- Provides a secure method for establishing a session between devices
- Enables encrypted communication and data transfer
Original Abstract Submitted
Aspects of the disclosure include a shared session key generation scheme. A method for a shared session key generation scheme includes retrieving, by a first device, a public key of a second device. The first device can generate a first session key, based at least in part on the public key of the second device and a private key of the first device. The first device can establish a secure session with the second device based at least in part on generating the first session key. The first device can receive a message from the second device via the secure session, the message being encrypted by a second session key generated by the second device, the first session key being a duplicate of the second session key. The first device can decrypt the message using the first session key.
(Ad) Transform your business with AI in minutes, not months
Trusted by 1,000+ companies worldwide