SICHERER DATENTRANSFER
A method of providing secure data transfer from a first radio communication device of a first party to a second radio communication device, the data transfer to be overseen by a transfer device of a second party, the method comprising the steps of:- generating randomly a first symmetric key at the f...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A method of providing secure data transfer from a first radio communication device of a first party to a second radio communication device, the data transfer to be overseen by a transfer device of a second party, the method comprising the steps of:- generating randomly a first symmetric key at the first radio communication device, encrypting user data of the first radio communication device with the generated first symmetric key at the first radio communication device, characterized in that the method further comprises the steps of:- encrypting at the first radio communication device the generated first symmetric key with a public key of a third party,- sending the encrypted first symmetric key from the first radio communication device to the second radio communication device via the transfer device,- decrypting at the second radio communication device the received encrypted first symmetric key by utilizing a secret key associated with the public key and comprised in a security device of the third party, the security device connected to the second radio communication device, sending the encrypted user data from the first radio communication device to the second radio communication device via the transfer device, and- decrypting at the second radio communication device the received encrypted user data with the decrypted first symmetric key.
The invention concerns secure data transfer from a first radio communication device of a first party to a second radio communication device. A random first symmetric key is generated at the first terminal device. User data of the first terminal device is encrypted with the first symmetric key. The first symmetric key is encrypted with a public key of a third party. The encrypted first symmetric key is sent from the first terminal device to the second terminal device via a transfer device. The encrypted first symmetric key is decrypted at the second terminal device by utilizing a secret key associated with the public key and comprised in a security device of the third party. The encrypted user data is sent from the first terminal device to the second terminal device via the transfer device. The encrypted user data is decrypted at the second terminal device with the first symmetric key. |
---|