Secure key exchange algorithm for wireless protocols
First Claim
Patent Images
1. A method for secure wireless communication, comprising:
- generating key information and transmission key information;
dividing the key information and the transmission key information into subparts;
generating pattern information based on encrypting each subpart of the key information using the transmission key information;
combining at least one subpart of the pattern information with one or more subparts of the encrypted transmission key information to form address information; and
exposing, as a result of sequentially timed events, the address information via wireless communication.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for establishing encryption keys in a manner suitable for linking low complexity and/or power constrained wireless devices. The present invention uses a combination of encryption algorithms and events, possibly including user manual intervention, to create a randomized encryption key that is substantially more difficult for a third party device to decipher than present automated algorithms currently in use. A user may randomly trigger, through a key press, information to be sent from a sending device to a receiving device which is used to establish an encryption key.
-
Citations
36 Claims
-
1. A method for secure wireless communication, comprising:
-
generating key information and transmission key information; dividing the key information and the transmission key information into subparts; generating pattern information based on encrypting each subpart of the key information using the transmission key information; combining at least one subpart of the pattern information with one or more subparts of the encrypted transmission key information to form address information; and exposing, as a result of sequentially timed events, the address information via wireless communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product comprising a computer usable medium having computer readable program code embodied in said medium for secure wireless communication, comprising:
-
a computer readable program code for generating key information and transmission key information; a computer readable program code for dividing the key information and the transmission key information into subparts; a computer readable program code for generating pattern information based on encrypting each subpart of the key information using the transmission key information; a computer readable program code for combining at least one subpart of the pattern information with one or more subparts of the encrypted transmission key information to form address information; and a computer readable program code for exposing, as a result of sequentially timed events, the address information via wireless communication. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A wireless communication device, comprising:
at least one processor enabled to perform method steps including; generating key information and transmission key information; dividing the key information and the transmission key information into subparts; generating pattern information based on encrypting each subpart of the key information using the transmission key information; combining at least one subpart of the pattern information with one or more subparts of the encrypted transmission key information to form address information; and exposing, as a result of sequentially timed events, the address information via wireless communication. - View Dependent Claims (18, 19)
-
20. A method for secure wireless communication, comprising:
-
receiving, as a result of sequentially timed events, address information from other devices via wireless communication; decrypting the received address information using received pattern information in order to determine which addresses include key subparts; and combining the subparts of key information in order to form a key. - View Dependent Claims (21, 22)
-
-
23. A computer program product comprising a computer usable medium having computer readable program code embodied in said medium for secure wireless communication, comprising:
-
a computer readable program code for receiving, as a result of sequentially timed events, address information from other devices via wireless communication; a computer readable program code for decrypting the received address information using received pattern information in order to determine which addresses include key subparts; and a computer readable program code for combining the subparts of key information in order to form a key. - View Dependent Claims (24, 25)
-
-
26. A wireless communication device, comprising:
at least one processor enabled to perform method steps including; receiving, as a result of sequentially timed events, address information from other devices via wireless communication; decrypting the received address information using received pattern information in order to determine which addresses include key subparts; and combining the subparts of key information in order to form a key. - View Dependent Claims (27, 28)
-
29. A chipset, comprising:
a processing unit enabled to perform method steps including; generating key information and transmission key information; dividing the key information and the transmission key information into subparts; generating pattern information based on encrypting each subpart of the key information using the transmission key information; combining at least one subpart of the pattern information with one or more subparts of the encrypted transmission key information to form address information; and exposing, as a result of sequentially timed events, the address information via wireless communication. - View Dependent Claims (30)
-
31. A chipset, comprising:
a processing unit enabled to perform method steps including; receiving, as a result of sequentially timed events, address information from other devices via wireless communication; decrypting the received address information using received pattern information in order to determine which addresses include key subparts; and combining the subparts of key information in order to form a key. - View Dependent Claims (32)
-
33. A transmitter, comprising:
a processing unit enabled to perform the method steps including; generating key information and transmission key information; dividing the key information and the transmission key information into subparts; generating pattern information based on encrypting each subpart of the key information using the transmission key information; combining at least one subpart of the pattern information with one or more subparts of the encrypted transmission key information to form address information; and exposing, as a result of sequentially timed events, the address information via wireless communication.
-
34. A receiver, comprising:
a processing unit enabled to perform the method steps including; receiving, as a result of sequentially timed events, address information from other devices via wireless communication; decrypting the received address information using received pattern information in order to determine which addresses include key subparts; and combining the subparts of key information in order to form a key.
-
35. A wireless communication device, comprising:
-
means for generating key information and transmission key information; means for dividing the key information and the transmission key information into subparts; means for generating pattern information based on encrypting each subpart of the key information using the transmission key information; means for combining at least one subpart of the pattern information with one or more subparts of the encrypted transmission key information to form address information; and means for exposing, as a result of sequentially timed events, the address information via wireless communication.
-
-
36. A wireless communication device, comprising:
-
means for receiving, as a result of sequentially timed events, address information from other devices via wireless communication; means for decrypting the received address information using received pattern information in order to determine which addresses include key subparts; and means for combining the subparts of key information in order to form a key.
-
Specification