18552025. APPLICATION LAYER KEY GENERATION simplified abstract (Alipay (Hangzhou) Information Technology Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

APPLICATION LAYER KEY GENERATION

Organization Name

Alipay (Hangzhou) Information Technology Co., Ltd.

Inventor(s)

Lin Huang of Hangzhou (CN)

Yunding Jian of Hangzhou (CN)

Wei Fu of Hangzhou (CN)

Hongjian Cao of Hangzhou (CN)

Wanqiao Zhang of Hangzhou (CN)

Yujia Liu of Hangzhou (CN)

APPLICATION LAYER KEY GENERATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18552025 titled 'APPLICATION LAYER KEY GENERATION

Simplified Explanation

The abstract describes a method and apparatus for generating application layer keys in Bluetooth connections. Here is a simplified explanation of the patent application:

  • Determining connection mode for Bluetooth connection
  • Generating application layer key based on connection mode, link layer dynamic parameter, and key identifier
  • Obtaining link layer dynamic parameter and key identifier from external Bluetooth device

Potential Applications

The technology can be applied in secure communication protocols, IoT devices, and wireless data transfer systems.

Problems Solved

The technology solves the problem of secure key generation in Bluetooth connections, ensuring data privacy and protection against unauthorized access.

Benefits

The benefits of this technology include enhanced security, improved data encryption, and reliable communication in Bluetooth devices.

Potential Commercial Applications

The technology can be utilized in Bluetooth-enabled devices, smart home systems, healthcare devices, and automotive systems for secure data transfer and communication.

Possible Prior Art

One possible prior art could be the use of pre-shared keys or static keys for Bluetooth connections, which may not provide the same level of security as dynamically generated application layer keys.

Unanswered Questions

1. How does the method ensure the confidentiality and integrity of the generated application layer keys? 2. Are there any potential vulnerabilities or weaknesses in the key generation process that could be exploited by attackers?


Original Abstract Submitted

Embodiments of this specification provide an application layer key generation method and apparatus. According to the method in the embodiments, a connection mode used when a Bluetooth connection to an external Bluetooth device is established is first determined, an application layer key generation function is determined according to the determined connection mode, a link layer dynamic parameter used at a link layer is obtained, an application layer key identifier agreed upon with the external Bluetooth device is obtained, and an application layer key is generated by using the application layer key generation function, the link layer dynamic parameter, and the application layer key identifier.