Network-based key distribution system, method, and apparatus
Abstract:
A method includes executing a mobile threat detection function to determine whether an electronic device is corrupt. The method also includes when determining that the electronic device is not corrupt, identifying whether an encrypted user key (UKc-Enc) is stored in the electronic device. The method further includes when the UKc-Enc is not stored in the electronic device, decrypting an application key (AKc) and transmitting the AKc and a unique universal identifier (UUID) that is associated with the application to a gateway for establishing a secure application specific communication channel between the electronic device and the gateway. In addition, the method includes when the UKc-Enc is stored in the electronic device, decrypting the UKc-Enc to form a user key (UKc), extracting a UUID from the UKc, and transmitting the UUID from the UKc to the gateway for establishing the secure application specific communication channel between the electronic device and the gateway.
Public/Granted literature
Information query
Patent Agency Ranking
0/0