Jump to content

17878478. ULTRA-WIDEBAND SESSION KEY SHARING SCHEME simplified abstract (APPLE INC.)

From WikiPatents

ULTRA-WIDEBAND SESSION KEY SHARING SCHEME

Organization Name

APPLE INC.

Inventor(s)

Ryuji Ishiguro of San Francisco CA (US)

ULTRA-WIDEBAND SESSION KEY SHARING SCHEME - A simplified explanation of the abstract

This abstract first appeared for US patent application 17878478 titled 'ULTRA-WIDEBAND SESSION KEY SHARING SCHEME

Simplified Explanation

The abstract describes a shared session key generation scheme for establishing a secure session between two devices.

  • The first device retrieves the public key of the second device.
  • Using the public key of the second device and its own private key, the first device generates a session key.
  • The first device establishes a secure session with the second device using the generated session key.
  • The second device encrypts a message using a session key it generated.
  • The first device decrypts the message using the session key it generated, which is a duplicate of the second device's session key.

Potential Applications

  • Secure communication between devices
  • Secure data transfer
  • Secure remote access

Problems Solved

  • Ensures secure communication between devices
  • Prevents unauthorized access to transmitted data
  • Protects against message interception and decryption

Benefits

  • Simplifies the process of generating and sharing session keys
  • Provides a secure method for establishing a session between devices
  • Enables encrypted communication and data transfer


Original Abstract Submitted

Aspects of the disclosure include a shared session key generation scheme. A method for a shared session key generation scheme includes retrieving, by a first device, a public key of a second device. The first device can generate a first session key, based at least in part on the public key of the second device and a private key of the first device. The first device can establish a secure session with the second device based at least in part on generating the first session key. The first device can receive a message from the second device via the secure session, the message being encrypted by a second session key generated by the second device, the first session key being a duplicate of the second session key. The first device can decrypt the message using the first session key.

(Ad) Transform your business with AI in minutes, not months

Custom AI strategy tailored to your specific industry needs
Step-by-step implementation with measurable ROI
5-minute setup that requires zero technical skills
Get your AI playbook

Trusted by 1,000+ companies worldwide

Cookies help us deliver our services. By using our services, you agree to our use of cookies.