SYSTEM AND METHOD FOR ELECTRONIC DATA SECURITY
First Claim
Patent Images
1. A method, comprising:
- detecting, by a base station, a mobile device docked with the base station;
in response to the detecting, generating at least one encryption key in the base station;
transmitting the encryption key to the mobile station by the base station while the mobile device is docked with the base station; and
communicating encrypted data with the mobile station, the encrypted data corresponding to the encryption key.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and related secure communications system. The method includes detecting, by a base station, a mobile device docked with the base station and in response to the detecting, generating at least one encryption key in the base station. The method also includes transmitting the encryption key to the mobile station by the base station while the mobile device is docked with the base station. The method also includes communicating encrypted data with the mobile station, the encrypted data corresponding to the encryption key.
-
Citations
20 Claims
-
1. A method, comprising:
-
detecting, by a base station, a mobile device docked with the base station; in response to the detecting, generating at least one encryption key in the base station; transmitting the encryption key to the mobile station by the base station while the mobile device is docked with the base station; and communicating encrypted data with the mobile station, the encrypted data corresponding to the encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A secure communications system comprising a base station and a mobile station, the base station configured to perform the steps of:
-
detecting a mobile device docked with the base station; in response to the detecting, generating at least one encryption key using a controller; transmitting the encryption key to the mobile station by the base station while the mobile device is docked with the base station; and communicating encrypted data with the mobile station, the encrypted data corresponding to the encryption key. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification