-
公开(公告)号:US20180309580A1
公开(公告)日:2018-10-25
申请号:US15848262
申请日:2017-12-20
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: Sang-Hoon JEON , Hyungsup KIM , Wonjae LEE
CPC classification number: H04L9/3242 , H04L9/0643 , H04L9/14
Abstract: An electronic device includes: a processor configured to obtain a first authentication key based on first data and a first authentication message, verify the first authentication message based on the first authentication key, obtain a second authentication key based on second data and a second authentication message, and verify the second authentication message based on the second authentication key; and a memory configured to store the first data, the first authentication message, the first authentication key, the second data, the second authentication message, and the second authentication key, wherein the second authentication message and the second authentication key are different from the first authentication message and the first authentication key, respectively, and the first authentication key and the second authentication key are associated with a first end device and a second end device, respectively.
-
公开(公告)号:US20180183772A1
公开(公告)日:2018-06-28
申请号:US15673657
申请日:2017-08-10
Applicant: Samsung Electronics Co., Ltd.
Inventor: Sang-Hoon JEON , Kun-Yong KIM , Hyung-Sup KIM
IPC: H04L29/06
CPC classification number: H04L63/061 , H04L9/0838 , H04L63/0428 , H04L63/12 , H04L67/141
Abstract: In a method of performing secure communication between at least two devices, a first security session is formed between a first device and a second device while the first device operates in a secure mode. The first security session is formed by performing a handshake operation between the first device and the second device. Session information and a master key are stored into a secure element included in the first device. The session information and the master key are generated by forming the first security session. A second security session is formed between the first device and the second device while the first device operates in a normal mode. The second security session is formed without the handshake operation and by loading the session information stored in the secure element. Encoded data is exchanged by the first device and the second device through the second security session based on the master key stored in the secure element.
-