Restricting and preventing pairing attempts from virus attack and malicious software
First Claim
1. A method of restricting access to a first wireless communication device from an unknown wireless communications device, comprising:
- a) receiving at the first wireless communication device at least one pairing attempt from the unknown wireless communications device using a communication protocol for pairing;
b) determining a pairing attempt number rejected for pairing with the unknown wireless communication device by a user at the first wireless communication device; and
c) deciding to reject the pairing attempt by the unknown communications device depending on the pairing attempt number.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, device and system restrict and prevent virus attack and malicious software to a wireless communication device from a pairing attempt by another wireless communications device. A switch is included in a transmission path coupling a first device to a second device, wherein the second device is attempting to pair with first wireless communications device. A detector coupled to the transmission path, detects an address of the second wireless communications device in a pairing communication protocol between the first and second devices. A counter coupled to the detector counts the pairing attempts of the second device. A compare circuit compares the pairing attempts to a selected number N. The compare circuit signals the switch to open when the number of attempts equals or exceeds the number N, breaking the connection, thereby preventing the first device from receiving virus attacks and malicious software.
56 Citations
32 Claims
-
1. A method of restricting access to a first wireless communication device from an unknown wireless communications device, comprising:
-
a) receiving at the first wireless communication device at least one pairing attempt from the unknown wireless communications device using a communication protocol for pairing; b) determining a pairing attempt number rejected for pairing with the unknown wireless communication device by a user at the first wireless communication device; and c) deciding to reject the pairing attempt by the unknown communications device depending on the pairing attempt number. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A device for restricting and preventing virus attack and malicious software to a wireless communication device from a pairing attempt by another wireless communications device, comprising:
-
a) a first wireless communications device; b) a second and unknown wireless communications device activating a wireless communications protocol for pairing the second wireless communications device with the first wireless communications device; c) a processor included in the first wireless communications device, the processor including at least a memory;
a pairing control circuit and software configured for;i) determining a pairing attempt number rejected for pairing with the unknown wireless communication device by a user at the first wireless communication device; and ii) deciding to reject the pairing attempt by the unknown communications device depending on the pairing attempt number. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A system restricting and preventing virus attack and malicious software to a wireless communication device from a pairing attempt by another wireless communications device, comprising:
-
a) a first wireless communications device and a second wireless communications device coupled together via a transmission path, the second wireless communications device attempting to pair with the first wireless communications device, wherein the second wireless communications device is unknown to the first wireless communications device; b) a switching device included in the transmission path; c) a detector coupled to the transmission path and detecting an address of the second wireless communications device in a pairing communication protocol between the second and first wireless communications devices; d) a counter coupled to the detector and counting the pairing attempts of the second wireless communications at the address identified by the detector; and e) a compare circuit coupled to the counter, the compare circuit comparing attempts counted by the counter for the second wireless communications device at the identified address to a selected number N, the compare circuit signaling the switching device to open, breaking the coupling between the first and second wireless communications device when the attempts equal or exceed the number N, thereby preventing the first wireless communications device from receiving virus attacks and malicious software. - View Dependent Claims (31, 32)
-
Specification