A method for secure communication. The method includes receiving a request at a first device to communicate with a second device. The method also includes determining if an encryption key exists between the first device and the second device. Creation of the encryption key is initiated in response to a determination that that encryption key does not exist. The initiation of the creation of the encryption key occurs without user input. The method further includes communicating with the second device using the encryption key and performing user authentication of the communication.

 
Web www.patentalert.com

< Cryptographic communication apparatus

> Facilitating secure data communications that use key-based encryption

> Method and apparatus for establishing a key agreement protocol

~ 00572