System and method for exchanging encryption keys between a mobile device and a peripheral output device
First Claim
1. A method of exchanging an encryption key between a computing device and a peripheral device, the method comprising the steps of:
- generating an encryption key at the peripheral device;
outputting data associated with the encryption key to a user at the peripheral device;
receiving the data associated with the encryption key input by the user at the computing device;
recovering the encryption key at the computing device from the data associated with the encryption key input by the user; and
transmitting data encrypted with the encryption key over a wireless connection between the computing device and the peripheral device, the wireless connection established in accordance with a wireless protocol.
4 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral output device (e.g. a printer, a headset). In exemplary embodiments, the encryption key is generated at the peripheral output device. Data associated with the encryption key is output at the peripheral output device, which can be input by the user at the computing device. The encryption key is then recovered at the computing device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.
113 Citations
17 Claims
-
1. A method of exchanging an encryption key between a computing device and a peripheral device, the method comprising the steps of:
-
generating an encryption key at the peripheral device;
outputting data associated with the encryption key to a user at the peripheral device;
receiving the data associated with the encryption key input by the user at the computing device;
recovering the encryption key at the computing device from the data associated with the encryption key input by the user; and
transmitting data encrypted with the encryption key over a wireless connection between the computing device and the peripheral device, the wireless connection established in accordance with a wireless protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
Specification