Wireless secure device
First Claim
Patent Images
1. A computer implemented method of securely connecting a wireless peripheral device to a host system comprising:
- generating an encryption key and a transmission sequence, where the transmission sequence includes a first portion that represents the encryption key and a second portion that is a confirmation sequence;
receiving an input from the wireless peripheral device, wherein the input includes an encrypted input portion encrypted by the wireless peripheral device using an encryption key the wireless peripheral device generated from the first portion of the transmission sequence;
decrypting the encrypted input portion using the encryption key; and
determining if the decrypted input portion matches the second portion of the transmission sequence that is a confirmation sequence.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for securely connecting one or more wireless peripheral devices such as keyboards, mice, gamepads, remote controllers, joysticks and one or more host systems such as personal computers or workstations, the secure connection reducing the vulnerability of wireless communications between a wireless peripheral device and a host system to accidental or malicious interference or eavesdropping.
221 Citations
24 Claims
-
1. A computer implemented method of securely connecting a wireless peripheral device to a host system comprising:
-
generating an encryption key and a transmission sequence, where the transmission sequence includes a first portion that represents the encryption key and a second portion that is a confirmation sequence;
receiving an input from the wireless peripheral device, wherein the input includes an encrypted input portion encrypted by the wireless peripheral device using an encryption key the wireless peripheral device generated from the first portion of the transmission sequence;
decrypting the encrypted input portion using the encryption key; and
determining if the decrypted input portion matches the second portion of the transmission sequence that is a confirmation sequence. - View Dependent Claims (2, 3, 4, 5, 18)
-
-
6. A computer implemented method of securely connecting a wireless peripheral device to a host system comprising:
-
receiving an input including a first input portion and a second input portion;
generating an encryption key from the first input portion;
encrypting the second input portion with the encryption key; and
transmitting the encrypted second input portion to the host system. - View Dependent Claims (7, 8, 9, 10, 11, 12, 14, 15, 16, 17, 20, 21)
-
-
13. A computer implemented system for securely connecting a wireless peripheral device to a host system comprising:
-
the wireless peripheral device including;
a signal generator for generating an input, wherein the input matches a transmission sequence, and the input includes a first input portion matching a first portion of the transmission sequence, and a second input portion matching a second portion of the transmission sequence;
an encryption module for generating an encryption key from the first input portion, and for encrypting the second input portion with the encryption key; and
a transmitter for transmitting the encrypted second input portion to the host system; and
the host system having;
a receiver for receiving data from the wireless peripheral device;
a signal generator for generating the encryption key and the transmission sequence, wherein the transmission sequence includes a first portion representing the encryption key and a second portion; and
a decryption module for decrypting the encrypted second sequence, and for determining if the decrypted second input portion matches the second portion of the transmission sequence.
-
-
19. A computer implemented system for securely connecting a wireless peripheral device to a host system comprising:
-
means for generating an encryption key and a transmission sequence, where the transmission sequence includes a first portion that represents an encryption key and a second portion;
means for transmitting an input, wherein the input includes an encrypted input portion encrypted by the wireless peripheral device using an encryption key the wireless peripheral device generated from the first portion of the transmission sequence;
means for decrypting the encrypted input portion using the encryption key; and
means for determining if the decrypted input portion matches the second portion of the transmission sequence.
-
-
22. A computer-readable medium having computer-executable instructions for a method of securely connecting a wireless peripheral device to a host system, the method comprising:
-
generating an encryption key and a transmission sequence, where the transmission sequence includes a first portion that represents an encryption key and a second portion;
receiving an input from the wireless peripheral device, wherein the input includes an encrypted input portion encrypted by the wireless peripheral device using an encryption key the wireless peripheral device generated from the first portion of the transmission sequence;
decrypting the encrypted input portion using the encryption key; and
determining if the decrypted input portion matches the second portion of the transmission sequence. - View Dependent Claims (23, 24)
-
Specification