A method for secure communication. The method includes receiving a request
at a first device to communicate with a second device. The method also
includes determining if an encryption key exists between the first device
and the second device. Creation of the encryption key is initiated in
response to a determination that that encryption key does not exist. The
initiation of the creation of the encryption key occurs without user
input. The method further includes communicating with the second device
using the encryption key and performing user authentication of the
communication.