OA18703A - Establishing a secret shared between a first communications device and at least one second communications device - Google Patents

Establishing a secret shared between a first communications device and at least one second communications device Download PDF

Info

Publication number
OA18703A
OA18703A OA1201800151 OA18703A OA 18703 A OA18703 A OA 18703A OA 1201800151 OA1201800151 OA 1201800151 OA 18703 A OA18703 A OA 18703A
Authority
OA
OAPI
Prior art keywords
data
représentation
communications device
computing device
shared secret
Prior art date
Application number
OA1201800151
Inventor
Guoqiang Zhang
José ARAUJO
Lars Andersson
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Publication of OA18703A publication Critical patent/OA18703A/en

Links

Abstract

A method performed by a Computing device (10) of establishing a secret shared between a first communications device (20) and at least one second communications device (30) is provided. The method comprises acquiring (S101), using a first means of communication with the first communications device (20), a first data representation from which the shared secret can be derived. The method further comprisesgenerating (S102) a second data representation from the first data representation, from which second data representation the shared secret can be derived. Moreover, the method comprises providing (S103), using a second means of communication, the second communications device (30) with the second data representation, the first means of communication being different from the second means of communication.

Description

ESTABLISHING A SECRET SHARED BETWEEN A FIRST COMMUNICATIONS DEVICE AND AT LEAST ONE SECOND COMMUNICATIONS DEVICE
TECHNICAL FIELD
The invention relates to methods of establishing a secret shared between a first communications device and at least one second communications device, and corresponding computing devices. The invention further relates to computer programs for causing computing devices to perform the methods according to the invention, and corresponding computer program products.
BACKGROUND
As regards electronic devices, from a client point-of-view, a user usually needs one desktop for work or leisure. When it cornes to other electronic devices, a user may hâve a few devices, one for each particular application, such as gaming consoles, set-top boxes, smartphones and watches, tablets, network music players, etc.
Further, since the advent of Internet of Things (loT), a user may hâve a great number of electronic devices in her home, commonly referred to as Machineto-Machine (M2M) devices in the form of, e.g., température sensors, smart clothes, thermostat controllers, etc.
For instance, a user may wear a smart watch for health monitoring and a head-mounted device (HMD) for entertainment, and at the same time hâve a smartphone for communicating with the smart watch and the HMD.
As the number of electronic devices increases in daily life, device association, or pairing, will play an important rôle for data sharing among two or more devices. In many situations, a few electronic devices are required to be connected temporally to exchange information, such as sharing a bill in a restaurant, or sharing a PowerPoint file among the audience for a présentation.
Many different approaches exist for device association or pairing. For instance, a tablet lacking a subscriber identity module (SIM) card may, after 5 having completed an authentication process, set up a local WiFi connection with a smartphone to use to the smartphone as a HotSpot for accessing the Internet.
As another example, the so called “Bump” application initiâtes pairing of two devices upon a user bumping the two devices together. Then, sensor data from motion and/or accélération sensors is processed for associating the two devices. Further examples exist where visual tags, such as for instance Quick Response (QR) codes are used for associating many devices; a first device generates and displays a visual tag on its screen, and other devices may then scan the visual tag by using their caméras to join in a group communication.
In a further example, US 7,907,901 discloses shaking of two devices, wherein if the two device are shaken in the same way they will generate identical motion data on the basis of which they subsequently can be paired.
A problem with the approaches utilized in these examples is that the same type of sensors and means of communication must be used among the 20 devices; in the first example, the devices engage in radio communication, in the second and fourth example, orientation sensors are employed, while in the third example, the devices interact by means of visual communication.
SUMMARY
An object of the invention is to solve, or at least mitigate, this problem in the 25 art, and to provide an improved method for facilitating establishment of a secret which is shared between communications devices.
This object is attained in a first aspect of the invention by a method performed by a computing device of establishing a secret shared between a first communications device and at least one second communications device. The method comprises acquiring, using a first means of communication with the first communications device, a first data représentation from which the shared secret can be derived. The method further comprises generating a second data représentation from the first data représentation, from which second data représentation the shared secret can be derived. Moreover, the method comprises providing, using a second means of communication, the second communications device with the second data représentation, the first means of communication being different from the second means of communication.
This object is attained in a second aspect of the invention by a computing device configured to establish a secret shared between a first communications device and at least one second communications device, which computing device comprises a processing unit and a memory, said memory containing instructions exécutable by said processing unit, whereby said computing device is operative to acquire, using a first means of communication with the first communications device, a first data représentation from which the shared secret can be derived. The computing device is further operative to generate a second data représentation from the first data représentation, from which second data représentation the shared secret can be derived. Moreover, the computing device is operative to provide, using a second means of communication, the second communications device with the second data représentation, the first means of communication being different from the second means of communication.
This object is attained in a third aspect of the invention by a method performed by a computing device of establishing a secret shared between a first communications device and at least one second communications device.
The method comprises acquiring sensor data from which the shared secret can be derived, the sensor data representing motion which both the computing device and the first communications device are subjected to. The method further comprises generating a second data représentation from the sensor data, from which second représentation the shared secret can be derived. Moreover, the method comprises providing the second communications device with the second data représentation.
This object is attained in a fourth aspect of the invention by a computing device configured to establish a secret shared between a first communications device and at least one second communications device, which computing device comprises a processing unit and a memory, said memory containing instructions exécutable by said processing unit, and further a motion sensor, whereby said computing device is operative to acquire sensor data of the motion sensor from which the shared secret can be derived. The sensor data represents motion which both the computing device and the first communications device are subjected to. The computing device is further operative to generate a second data représentation from the sensor data, from which second représentation the shared secret can be derived. Moreover, the computing device is operative to provide the second communications device with the second data représentation.
This object is attained in a fifth aspect of the invention by a computer program comprising computer-executable instructions for causing a device to perform steps according to an embodiment of the first and/or third aspect of the invention when the computer-executable instructions are executed on a processing unit included in the device.
This object is attained in a sixth aspect of the invention by a computer program product comprising a computer readable medium, the computer readable medium having the computer program according to the fifth aspect embodied thereon.
Advantageously, with a computing device acting as a relay or proxy for associating a group of devices with each, association of heterogeneous devices, i.e., devices utilizing different means of communication, is made possible.
For instance, in the first aspect of the invention, assuming that a first device in the form of a projector is to be paired/associated with a second device embodied by a conférence phone; the projector is equipped with a light source for projecting visual objects, while the conférence phone is equipped with a microphone via which it is capable of receiving audio signais.
A user may thus hâve the projector display a visual tag, such as a Quick Response (QR) code or the like. This may be effected for instance by instructing the projector accordingly by pressing a dedicated button of a remote control associated with the projector, or by having the projector display the QR code upon power-on.
The user thus sets up communication between the projector and the relay device ofthe invention, being, e.g., a smartphone, using a first means of communication, in this exemplifying embodiment by having the smartphone read the QR code displayed by the projector onto a wall or projection screen, using the smartphone’s caméra. The read QR code constitutes a first data représentation from which a secret shared by the projector and the smartphone can be derived, for instance in the form of a particular binary sequence.
Now, the user subsequently sets up communication between the conférence phone and her smartphone via a second means of communication, in this example by transmitting an audio signal which is picked-up by a microphone of the conférence phone, in order to provide the shared secret to the conférence phone.
Prior to submitting the audio signal, the smartphone generates a second data représentation from the acquired first data représentation, from which second data représentation the shared secret can be derived by the conférence phone. Hence, in order to provide the conférence phone with data from which the shared secret can be derived, the first data représentation is coded into the audio signal which is transmitted to the conférence phone. Thereby, the second data représentation is generated from which the shared secret (in the form of the above mentioned binary sequence) can be derived by the conférence phone.
Advantageously, the smartphone has enabled secure communication between the projector and the conférence phone; when the two devices subsequently establish communication via for example Bluetooth, WiFi, or the Internet, etc, they both hâve access to the shared secret, i.e., the binary sequence used as an example hereinabove, and secure communication can be undertaken.
In the second aspect of the invention, assuming that a first device in the form of a tablet is to be paired/associated with a second device, again embodied by a conférence phone; the tablet is equipped with a motion sensor such as an accelerometer, while the conférence phone is equipped with a microphone via which it is capable of receiving audio signais.
The user initiâtes the pairing, e.g., by bumping her smartphone relay device against the tablet, or alternatively by shaking the smartphone together with the tablet. Either way, the motion sensor of the smartphone will produce sensor data from which the shared secret can be derived, the sensor data representing motion which both the smartphone and the tablet are subjected to. The shared secret may be represented by a particular binary sequence.
Similar to the exemplifying embodiment given for the first aspect of the invention, a second data représentation from which the shared secret e.an be derived is generated by the smartphone and provided to the conférence phone.
However, in the second aspect, the smartphone generates the second data représentation from the acquired sensor data, from which second data représentation the shared secret can be derived by the conférence phone. Hence, in order to provide the conférence phone with data from which the shared secret can be derived, at least a part of the sensor data is coded into the audio signal which is transmitted to the conférence phone. Thereby, the second data représentation is generated from which the shared secret (in the form of the above mentioned binary sequence) can be derived by the conférence phone.
Advantageously, the smartphone has enabled secure communication between of the tablet and the conférence phone; when the two devices subsequently establish communication via for example Bluetooth, WiFi, or the Internet, etc, they both hâve access to the shared secret, i.e. the binary sequence that was created upon bumping or shaking the tablet and the smartphone together, and secure communication can be undertaken.
In an embodiment of the invention, the motion sensor data represents physical contact with the first communications device. Hence, the computing device and the first communications device may advantageously be bumped together to initiate establishment of a shared secret.
In another embodiment of the invention, the motion sensor data represents a movement pattern common with the first communications device. Hence, the computing device and the first communications device may advantageously be shaken together to initiate establishment of a shared secret.
In a further embodiment of the invention, a secret shared between a first communications device and a group of second communications devices is established, in which case the group of second communications device is provided with the second data représentation.
In still a further embedment of the invention, at least two of the second communication devices comprised in the group are provided with the second data représentation via different means of communication. For instance, one of the second communications devices is provided with the second data représentation visually while the other is provided with the second data représentation audibly.
In still another embodiment of the invention, the computing device dérivés the shared secret from the first data représentation or the motion sensor data, whichever is applicable, and establishes secure communication with the first communications device and/or the at least one second communications device using the derived shared secret.
In an embodiment, the acquiring of a first data représentation from which the shared secret can be derived comprises one of: visually acquiring the first data représentation, audibly acquiring the first data représentation, and acquiring the first data représentation over a wireless radio communication channel.
In another embodiment, the providing of a second data représentation from which the shared secret can be derived comprises one of: visually providing the second data représentation, audibly providing the second data représentation, and providing the second data représentation over a wireless radio communication channel.
Generally, ail terms used in the claims are to be interpreted according to their ordinaiy meaning in the technical field, unless explicitly defined otherwise herein. Ail references to a/an/the element, apparatus, component, means, step, etc. are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not hâve to be performed in the exact order disclosed, unless explicitly stated.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention is now described, by way of example, with reference to the accompanying drawings, in which:
Figure 1 illustrâtes a computing device according to an embodiment of the invention, configured to establish a secret shared between a first communications device and at least one second communications device;
Figure 2 illustrâtes a flowchart of an embodiment of a method performed by the computing device of Figure 1, of establishing a secret shared between the first communications device and the second communications device;
Figure 3 illustrâtes a computing device according to another embodiment of the invention, configured to establish a secret shared between a first communications device and at least one second communications device;
Figure 4 illustrâtes a flowchart of an embodiment of a method performed by the computing device of Figure 3, of establishing a secret shared between the first communications device and the second communications device;
Figure 5 illustrâtes a computing device according to an embodiment of the invention;
Figure 6 illustrâtes a computing device according to another embodiment of the invention;
Figure 7 illustrâtes a computing device according to a further embodiment of the invention, configured to establish a secret shared between a first communications devices and a group of second communications devices;
Figure 8 illustrâtes a computing device according to an embodiment of the invention; and
Figure 9 illustrâtes a computing device according to another embodiment of the invention.
DETAILED DESCRIPTION
The invention will now be described more fiilly hereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth lo herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complété, and will fiilly convey the scope of the invention to those skilled in the art. Like numbers refer to like éléments throughout the description.
Figure 1 illustrâtes a computing device 10 according to an embodiment of the 15 invention, configured to establish a secret shared between a first communications device 20 and at least one second communications device 30.
Figure 2 illustrâtes a flowchart of an embodiment of a method performed by the computing device 10 of Figure 1 of establishing a secret shared between 20 the first communications device 20 and the second communications device 30.
The computing device 10 is embodied in the form of a smartphone in
Figure 1, while the first communications device 20 is embodied in the form of a projector and the second communications device 30 in the form of a conférence phone.
In order to establish a shared secret between the projector 20 and the conférence phone 30 for enabling subséquent secure communication between the two devices, a user may hâve the projector display a visual tag, in this particular example a QR code 40.
The user will hâve the smartphone 10 read the QR code 40 by means of a caméra in order to acquire a first data représentation from which a shared secret can be derived. In the illustration of Figure 1, the first data représentation comprises a binary sequence “...010010100100...” from which the shared secret may be derived. In this particular example, the shared secret is embodied by the 4-bit sequence “1010” interspersed into the first data représentation.
In step S102, the mobile phone 10 generates a second data représentation from the first data représentation, from which second data représentation the shared secret can be derived.
In this example, the second data représentation is provided to the conférence phone 30 from the smartphone 10 via an audio signal 50 picked-up by a microphone of the conférence phone 30. Hence, in order to provide the conférence phone with data from which the shared secret can be derived, the first data représentation is coded into the audio signal 50 which is transmitted to the conférence phone 30 in step S103. Thereby, the second data représentation is generated from which the shared secret (in the form of 20 the above mentioned 4-bit sequence) can be derived by the conférence phone.
Advantageously, the smartphone 10 has enabled secure communication between the projector 20 and the conférence phone 30, each communicating with the smartphone 10 by different means of communication. When the two devices subsequently establish communication via for example a local WiFi network 60, they both hâve access to the shared secret, i.e. the 4-bit sequence “1010”, and secure communication can be undertaken.
It should be noted that the shared secret and the first and second data représentation may hâve a different structure than that illustrated with reference to Figure 1. It should further be noted that establishment of secure communication between the projector 20 and the conférence phone 30 may be effected via a device such as a server (not shown) before a secure communication channel can be setup between the two. Moreover, the first and second data représentations are îllustrated to comprise the 4-bit shared secret interspersed in a longer code. However, it can also be envisaged that the first and second data représentation indeed comprises the shared secret only.
Figure 3 illustrâtes a computing device 10 according to a further embodiment of the invention configured to establish a secret shared between a first communications device 20 and at least one second communications device 30.
Figure 4 illustrâtes a flowchart of an embodiment of a method performed by the computing device 10 of Figure 3 of establishing a secret shared between the first communications device 20 and the second communications device 30.
Again, the computing device 10 is embodied in the form of a smartphone and the second communications device 30 in the form of a conférence phone, while the first communications device 20 in this particular embodiment is embodied by a tablet.
In this embodiment, in order to establish a shared secret between the tablet 20 and the conférence phone 30 for enabling subséquent secure communication between the two devices, a user bumps her smartphone 10 against the tablet. A respective inertia measurement unit (IMU) in the smartphone 10 and the tablet 20 will register the motion that the two devices are subjected to. The IMU may be an accelerometer, a gyroscope, a magnetometers or a combination of two or more of these types of motion sensors.
From the motion that the smartphone 10 and the tablet 20 are subjected to, it is possible to conclude whether these exact two devices were bumped together, and a shared secret may thus be established. As previously was mentioned, the motion may be embodied by movement of the smartphone 10 and the tablet according to a common pattern, such as the user holding the two devices in the same hand and shaking them back and forth.
By shaking the two devices, the motion (i.e., accélérations) which the two devices are subjected to are used to generate a secret, such as a key, which key subsequently is used to establish the secure connection. Since the two devices are moved together, they hâve performed an identical motion, and thus captured substantially identical motion data. From the identical motion data, identical copies of the shared secret may be established.
The smartphone 10 hence acquires sensor data in step S201 from its IMU, from which data the shared secret can be derived. The acquired sensor data represents the bumping motion that the smartphone 10 and the tablet 20 was subjected to. In the illustration of Figure 3, the sensor data comprises a binary sequence “...010010100100...” from which the shared secret may be derived. In this particular example, the shared secret is embodied by the 4-bit sequence “1010” interspersed into the sensor data.
As in the embodiment previously described with reference to Figure 1, the smartphone 10 needs to generate a second data représentation in a format that can be transmitted to, and interpreted by, the conférence phone 30.
In step S202, the mobile phone 10 thus generates a second data représentation from the sensor data, from which second data représentation the shared secret can be derived.
Again, the second data représentation is provided to the conférence phone 30 from the smartphone 10 via an audio signal 50 picked-up by a microphone of the conférence phone 30. Hence, in order to provide the conférence phone with data from which the shared secret can be derived, the sensor data is coded into the audio signal 50 which is transmitted to the conférence phone 30 in step S203. Thereby, the second data représentation is generated from which the shared secret (in the form of the above mentioned 4-bit sequence) can be derived by the conférence phone 30.
Advantageously, the smartphone 10 has enabled secure communication between the tablet 20 and the conférence phone 30. When the tablet 20 and the conférence phone 30 subsequently establish communication via the WiFÎ network 60, they both hâve access to the shared secret, i.e. the 4-bit sequence 10 “1010”, and secure communication can be undertaken.
With reference to Figures 5 and 6, the steps of the method performed by the computing device 10 according to embodiments of the invention are in practice performed by a processing unit 11 embodied in the form of one or more microprocessors arranged to execute a computer program 12 15 downloaded to a suitable storage medium 13 associated with the microprocessor, such as a Random Access Memory (RAM), a Flash memory or a hard disk drive. The processing unit 11 is arranged to cause the computing device 10 to carry out the method according to embodiments of the présent invention when the appropriate computer program 12 comprising 20 computer-executable instructions is downloaded to the storage medium 13 and executed by the processing unit 11. The storage medium 13 may also be a computer program product comprising the computer program 12. Alternatively, the computer program 12 may be transferred to the storage medium 13 by means of a suitable computer program product, such as a 25 Digital Versatile Disc (DVD) or a memory stick. As a further alternative, the computer program 12 may be downloaded to the storage medium 13 over a network. The processing unit 11 may alternatively be embodied in the form of a digital signal processor (DSP), an application spécifie integrated circuit (ASIC), a field-programmable gâte array (FPGA), a complex programmable logic device (CPLD), etc.
With reference to Figure 6, in case motion sensor data is acquired from which the shared secret can be derived, the computing device 10 is equipped with an 5 IMU14 as previously described. Advantageously, the computing device 10 is embodied by a smartphone, as a smartphone typically is provided with an IMU 14.
Figure 7 illustrâtes a computing device 10 according to a further embodiment of the invention, configured to establish a secret shared between tablet 20 10 and a group of second communications devices, in this exemplifying embodiment the conférence phone 30 and a network music player 70 communicating via for instance infrared (IR) signais.
In order to establish a shared secret between the tablet 20 and the conférence phone 30 and network music player 70 for enabling subséquent secure communication between the three devices, a user bumps the smartphone 10 against the tablet 20. A respective IMU in the smartphone 10 and the tablet 20 will register the motion that the two devices are subjected to, as was described with reference to Figure 3.
The smartphone 10 hence acquires sensor data in step S201 from its IMU, 20 from which data the shared secret can be derived. The acquired sensor data represents the bumping motion that the smartphone 10 and the table 20 was subjected to. In the illustration of Figure 7, the sensor data comprises a binaiy sequence “...010010100100...” from which the shared secret may be derived. Again, the shared secret is embodied by the 4-bit sequence “1010” 25 interspersed into the sensor data.
In step S202, the mobile phone 10 generates a second data représentation from the sensor data, from which second data représentation the shared secret can be derived. In case the group of second communications devices had been communicating with the smartphone 10 via the same means of communication, the group of devices could hâve used the same second data représentation.
However, in this exemplifying embodiment, the smartphone 10 needs to generate a second data représentation in a format that can be transmitted to, and interpreted by, the conférence phone 30 as well as by the network music player 70.
As previously has been described, the second data représentation is provided to the conférence phone 30 from the smartphone 10 via an audio signal 50 10 picked-up by a microphone of the conférence phone 30. Hence, in order to provide the conférence phone with data from which the shared secret can be derived, the sensor data is coded into the audio signal 50 which is transmitted to the conférence phone 30 in step S203. Thereby, the second data représentation is generated from which the shared secret (in the form of 15 the above mentioned 4-bit sequence) can be derived by the conférence phone 30.
Further, the second data représentation is provided to the network music player 70 from the smartphone 10 via an IR signal 80 picked-up by an IR sensor of the music player 70. Hence, in order to provide the network music 20 player with data from which the shared secret can be derived, the sensor data is coded into the IR signal 80 which is transmitted to the network music player 70 in step S203, using a suitable protocol. Thereby, the second data représentation is generated from which the 4-bit shared secret can be derived by the network music player 70.
In this particular embodiment, the network music player 70 is provided with the second data représentation via a third means of communication - in this case IR signais - different from the second means of communication (and the first means of communication), in this case being audio signais. It should be noted that it is envisaged that the means of communication used for supplying the second data représentation to the conférence phone 30 and the network music player 70 may be the same.
Advantageously, the smartphone 10 has enabled secure communication between the tablet 20 and the conférence phone 30 and the music player 70. When the tablet 20 subsequently establishes communication via the WiFi network 60 with the conférence phone 30 and the network music player 70, they ail hâve access to the shared secret, i.e. the 4-bit sequence “1010”, and secure communication can be undertaken.
It should be noted that the first data representation/sensor data, and subsequently the second data représentation, may include information such as identification number of a secure communication session to be established, the allowed duration of the session, géographie location, timestamp, maximum number of devices engaged in the communication, etc.
In a further embodiment of the invention, secure communication channel (s) may be set up between the computing device and the first communications device 20, and possibly with any one or more of the second communications device(s) 30, 70, and the computing device 10 may thus take part in establishing a communication session; the computing device 10 readily has access to the first data representation/sensor data from which the shared secret can be derived.
Figure 8 illustrâtes a computing device 10 according to a further embodiment of the invention, configured to establishing a secret shared between a first communications device and at least one second communications device. The computing device 10 comprises acquiring means 101 adapted to acquire, using a first means of communication with the first communications device, a first data représentation from which the shared secret can be derived, generating means 102 adapted to generate a second data représentation from the first data représentation, from which second data représentation the shared secret can be derived, and providing means 103 adapted to provide, using a second means of communication, the second communications device with the second data représentation, the first means of communication being different from the second means of communication.
The means 101-103 may comprise a communications interface for receiving and providing information, and further a local storage for storing data, and may (in analogy with the description given in connection to Figure 5) be implemented by a processor embodied in the form of one or more microprocessors arranged to execute a computer program downloaded to a suitable storage medium associated with the microprocessor, such as a RAM, a Flash memory or a hard disk drive.
Figure 9 illustrâtes a computing device 10 according to a further embodiment of the invention, configured to establishing a secret shared between a first communications device and at least one second communications device. The computing device 10 comprises acquiring means 201 adapted to acquire sensor data from which the shared secret can be derived, the sensor data representing motion which both the computing device and the first communications device are subjectedto, generating means 202 adapted to generate a second data représentation from the sensor data, from which second représentation the shared secret can be derived, and providing means 203 adapted to provide the second communications device with the second data représentation.
The means 201-203 may comprise a communications interface for receiving and providing information, and further a local storage for storing data, and may (in analogy with the description given in connection to Figure 6) be implemented by a processor embodied in the form of one or more microprocessors arranged to execute a computer program downloaded to a suitable storage medium associated with the microprocessor, such as a RAM, a Flash memory or a hard disk drive,
The disclosure has mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the 5 art, other embodiments than the ones disclosed above are equally possible within the scope of the disclosure, as defined by the appended patent daims.

Claims (17)

1. A method performed by a computing device of establishing a secret shared between a first communications device and at least one second communications device, the method comprising:
acquiring sensor data from which the shared secret can be derived, the sensor data representing motion which both the computing device and the first communications device are subjected to;
generating a second data représentation from the sensor data, from which second représentation the shared secret can be derived; and providing the second communications device with the second data représentation.
2. The method according to claim 1, wherein the sensor data represents physical contact with the first communications device.
3. The method according to claim i, wherein the sensor data represents a movement pattern common with the first communications device.
4. The method according to any one of daims 1-3, wherein a secret shared between a first communications device and a group of second communications devices is established, further comprising:
providing the group of second communications device with the second data représentation.
5. The method according to claim 4, wherein at least one of the second communication devices compris ed in said group are provided with the second data représentation via a third means of communication being different from the second means of communication.
6. The method according to any one of daims 1-5, further comprising: deriving the shared secret from the first data représentation or the sensor data; and establishing communication with the first communications device and/or the at least one second communications device using the derived shared secret.
7. The method according to any one of claims 1-6, wherein the providing of a second data représentation from which the shared secret can be derived comprises one of: visually providing the second data représentation, audibly providing the second data représentation, and providing the second data représentation over a wireless radio communication channel.
8. A computer program comprising computer-executable instructions for causing a device to perform steps recited in any one of claims 1-7 when the computer-executable instructions are executed on a processing unit inciuded in the device.
9. A computer program product comprising a computer readable medium, the computer readable medium having the computer program according to claim 8 embodied thereon.
10. A computing device configured to establish a secret shared between a first communications device and at least one second communications device, which computing device comprises a processing unit and a memory, said memory containing instructions exécutable by said processing unit, and a motion sensor, whereby said computing device is operative to:
acquire sensor data of the motion sensor from which the shared secret can be derived, the sensor data representing motion which both the computing device and the first communications device are subjected to;
generate a second data représentation from the sensor data, from which second représentation the shared secret can be derived; and provide the second communications device with the second data représentation.
11. The computing device according to claim 10, wherein the sensor data represents physical contact with the first communications device.
12. The computing device according to claim 10, wherein the sensor data represents a movement pattern common with the first communications device.
13. The computing device according to any one of daims 10-12, wherein a secret shared between a first communications device and a group of second communications devices is established, the computing device further being operative to:
provide the group of second communications device with the second data représentation.
14. The computing device according to claim 13, wherein at least two of the second communication devices comprised in said group are provided with the second data représentation via different means of communication.
15. The computing device according to any one of daims 10-14, further being operative to:
dérivé the shared secret; and perform pairing with the first communications device and/or the at least one second communications device using the derived shared secret.
16. The computing device according to any one of daims 10-15, wherein the providing of a second data représentation from which the shared secret can be derived comprises one of: visually providing the second data représentation, audibly providing the second data représentation, and providing the second data représentation over a wireless radio communication channel.
17. The computing device according to claim 16, further comprising one or more of a conférence phone, a display, an optical transmitter, and a radio frequency transmitter, in order to provide said second data représentation.
OA1201800151 2015-10-30 Establishing a secret shared between a first communications device and at least one second communications device OA18703A (en)

Publications (1)

Publication Number Publication Date
OA18703A true OA18703A (en) 2019-05-17

Family

ID=

Similar Documents

Publication Publication Date Title
EP3513525B1 (en) Trusted execution environment secure element communication
JP6081440B2 (en) Method and apparatus for prompting based on smart glasses
US8948390B2 (en) Securely joining a secure wireless communications network
US9509515B2 (en) Method and apparatus for registering devices capable of device-to-device communication in server
US10349270B2 (en) Method of establishing communications
EP3483718A1 (en) Techniques to selectively capture visual media using a single interface element
US20230370441A1 (en) Establishing a secret shared between a first communications device and at least one second communications device
US20220294540A1 (en) Device communication through haptic vibrations
CN104125067A (en) Account and token secret key binding method and device
JP2015012512A (en) Information processing apparatus and information processing method
EP3100484A1 (en) Device to device user service sharing using shared trusted id
WO2013145520A1 (en) Information processing device, information processing method, and program
US11212190B2 (en) Communication apparatus and control method for the same
JP6568007B2 (en) Wearable terminal, communication method and program thereof
OA18703A (en) Establishing a secret shared between a first communications device and at least one second communications device
US20130101104A1 (en) Method and a system for establishing a communication channel between a predetermined number of selected devices and a device and a server arranged for use in the system
CN104519057A (en) Qualification awarding method, qualification acquiring device and qualification acquiring device
AU2014200676B2 (en) Method for establishing stateless communication between two or more devices
JP2015169993A (en) Apparatus setting provision server, portable terminal, apparatus setting provision method, program for apparatus setting provision server
US20150105026A1 (en) Method for showing an instant notice on a display of computer according to an incoming event of a mobile device
JP2020013176A (en) Device registration apparatus, device registration method and device registration program
WO2017134836A1 (en) Display system, display device, and program
KR20130097617A (en) Method and apparatus for synchronizing the home cloud storage and the mobile device via near field communication