SHARING OF SECRET INFORMATION FOR ACCESSING A WIRELESS COMPUTING NETWORK
A solution is proposed for sharing secret information for accessing a wireless computing network. A corresponding method for distributing the secret information by a source (computing) device comprises receiving a public key of the a target (computing) device, transmitting a verification token to th...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A solution is proposed for sharing secret information for accessing a wireless computing network. A corresponding method for distributing the secret information by a source (computing) device comprises receiving a public key of the a target (computing) device, transmitting a verification token to the target device, receiving an utterance of the verification token and transmitting the secret information encrypted with the public key in response to the utterance of the verification token. A corresponding method for obtaining the secret information by a target (computing) device comprises transmitting a public key of the target device, receiving a verification token, outputting the verification token and receiving the secret information encrypted with the public key in response to an utterance of the verification token. Corresponding computer programs and computer program products are also proposed. Moreover, a source computing device and a target computing device for implementing the methods are proposed. |
---|