US Patent Application 18225199. METHOD AND DEVICE TO ESTABLISH A WIRELESS SECURE LINK WHILE MAINTAINING PRIVACY AGAINST TRACKING simplified abstract

From WikiPatents
Jump to navigation Jump to search

METHOD AND DEVICE TO ESTABLISH A WIRELESS SECURE LINK WHILE MAINTAINING PRIVACY AGAINST TRACKING

Organization Name

KONINKLIJKE PHILIPS N.V.


Inventor(s)

JOHANNES ARNOLDUS CORNELIS Bernsen of Eindhoven (NL)

METHOD AND DEVICE TO ESTABLISH A WIRELESS SECURE LINK WHILE MAINTAINING PRIVACY AGAINST TRACKING - A simplified explanation of the abstract

This abstract first appeared for US patent application 18225199 titled 'METHOD AND DEVICE TO ESTABLISH A WIRELESS SECURE LINK WHILE MAINTAINING PRIVACY AGAINST TRACKING

Simplified Explanation

- This patent application is about a method and devices for establishing a secure wireless link between two devices. - The method involves a pairing protocol where the first device sends identifying information over the wireless channel. - The identifying information can be used to identify the device or the user of the device. - The first device encrypts and transmits the identifying information along with random information using the public key of the second device. - The second device receives the encrypted information and uses its private key to extract the identifying information. - The devices then use a secret related to the identifying information to derive a session key. - The session key is used to establish a secure wireless link between the two devices.


Original Abstract Submitted

This application relates to devices and a method to establish a secure wireless link for communication between a first and a second device over a wireless physical channel, wherein a paring protocol requires sending over the wireless channel identifying information by the first device, the identifying information being data suitable for identifying the device sending the identifying information, or a user thereof, wherein the first device encrypts and transmits the identifying information and random information by using a public key information of the second device. The second device receives the encrypted identifying and random information and, using private key information associated with the public key information, it extracts the identifying information. The devices use a secret uniquely related to the identifying information to derive a session key and then use the session key to establish the secure wireless link.