发明名称 CONSTRAINED CRYPTOGRAPHIC KEYS
摘要 <p>A constrained proxy key is used to secure communications between two devices via an intermediary device. A first proxy key is generated at a host device (key generator device) based on a shared secret key, one or more constraints on the first proxy key, and a key derivation function. At least the shared secret key and key derivation function are known to the host device an a client device (authentication device). The first proxy key is sent to a proxy device to use in authenticating communications with the client device. An authenticated message is generated by the proxy device using the first proxy key and sent to the client device. The client device locally generates a second proxy key using the key derivation function, one or more constraints, and the shared secret key for authenticating the proxy device. The proxy device is authenticated if the client device successfully accesses the authenticated message from the proxy device using the second proxy key.</p>
申请公布号 EP2016702(A2) 申请公布日期 2009.01.21
申请号 EP20060851892 申请日期 2006.09.29
申请人 QUALCOMM INCORPORATED 发明人 GANTMAN, ALEXANDER;YALCINKAYA, TOLGA;ROSE, GREGORY GORDON;XIAO, LU
分类号 H04L9/32 主分类号 H04L9/32
代理机构 代理人
主权项
地址