Method and apparatus for increasing the security of wireless data services
First Claim
1. A method of securing wireless communications between two devices across a wireless communications link, comprising:
- detecting the physical proximity of said devices;
performing authentication between said devices in response to said detected proximity; and
engaging said devices in secure wireless communication following said authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
The security of wireless communications between two or more devices is enhanced by requiring detection of the physical proximity of the devices. One or more of the devices operates in a non-secure mode, wherein the authentication process required to enter into secure communications is disabled. Upon detection of the physical proximity of another device, the device enters a secure mode, wherein authentication is enabled. The entry of a security code required by the authentication process may comprise the transmission of a device address or other data, either across the proximity detection interface or via the wireless communications interface. In addition to the detection of physical proximity, a hardware handshake protocol between the two devices may be defined. For additional security, the device must enter a handshake mode before the hardware handshake will complete. The handshake mode may require entry of a password or screening by a biometric sensor.
-
Citations
20 Claims
-
1. A method of securing wireless communications between two devices across a wireless communications link, comprising:
-
detecting the physical proximity of said devices;
performing authentication between said devices in response to said detected proximity; and
engaging said devices in secure wireless communication following said authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15, 16, 17, 18, 19)
-
-
13. A method of selectively allowing authentication between a first and second device, each said device capable of wireless communications, said first device having a first mode wherein said authentication is inhibited and a second mode wherein said authentication is allowed, comprising:
-
operating said first device in said first mode;
entering said second mode in response to detecting the physical proximity of said second device by said first device; and
performing said authentication in said second mode.
-
-
20. A first device capable of wireless communications, adapted to detect the physical proximity of said first device to a second device capable of wireless communications, and further adapted to allow authentication with said second device thereby enabling secure wireless communications therebetween, in response to said detection of physical proximity of said first and second devices.
Specification