SYSTEM AND METHOD FOR EXCHANGING ENCRYPTION KEYS BETWEEN A MOBILE DEVICE AND A PERIPHERAL DEVICE
First Claim
1. A method of providing additional security over an established wireless connection between a computing device and a peripheral device, the method comprising:
- determining that a pairing process between the computing device and the peripheral device is complete;
automatically, in response to completion of the pairing process, generating an encryption key at the computing device in a binary form;
at the computing device, converting the encryption key in the binary form into a number comprising fewer alphanumeric digits;
at the computing device, displaying the number comprising fewer alphanumeric digits on a display of the computing device, for entry at the peripheral device; and
at the computing device, at least one of encrypting data transmitted to or decrypting data received from the peripheral device over the wireless connection, using the encryption key and in accordance with an encryption algorithm.
4 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In exemplary embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.
-
Citations
20 Claims
-
1. A method of providing additional security over an established wireless connection between a computing device and a peripheral device, the method comprising:
-
determining that a pairing process between the computing device and the peripheral device is complete; automatically, in response to completion of the pairing process, generating an encryption key at the computing device in a binary form; at the computing device, converting the encryption key in the binary form into a number comprising fewer alphanumeric digits; at the computing device, displaying the number comprising fewer alphanumeric digits on a display of the computing device, for entry at the peripheral device; and at the computing device, at least one of encrypting data transmitted to or decrypting data received from the peripheral device over the wireless connection, using the encryption key and in accordance with an encryption algorithm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computing device configured to provide additional security over an established wireless connection between the computing device and a peripheral device, the computing device comprising a processor configured to:
-
determine that a pairing process between the computing device and the peripheral device is complete; automatically, in response to completion of the pairing process, generate an encryption key at the computing device in a binary form; convert the encryption key in the binary form into a number comprising fewer alphanumeric digits; display the number comprising fewer alphanumeric digits on a display of the computing device, for entry at the peripheral device; and at least one of encrypt data transmitted to or decrypt data received from the peripheral device over the wireless connection, using the encryption key and in accordance with an encryption algorithm.
-
-
11. A method of providing additional security over an established wireless connection between a computing device and a peripheral device, the method comprising:
-
determining that a pairing process between the computing device and the peripheral device is complete; after determining that the pairing process is complete, receiving input via the peripheral device, wherein the input is a number comprising alphanumeric digits; at the peripheral device, converting the number into an encryption key in binary form having a greater number of alphanumeric digits; and at the peripheral device, at least one of encrypting data transmitted to or decrypting data received from the computing device over the wireless connection, using the encryption key and in accordance with an encryption algorithm. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A peripheral device configured to provide additional security over an established wireless connection between a computing device and the peripheral device, the peripheral device comprising a processor configured to:
-
determine that a pairing process between the computing device and the peripheral device is complete; after determining that the pairing process is complete, receive input via the peripheral device, wherein the input is a number comprising alphanumeric digits; convert the number into an encryption key in binary form having a greater number of alphanumeric digits; and at least one of encrypt data transmitted to or decrypt data received from the computing device over the wireless connection, using the encryption key and in accordance with an encryption algorithm.
-
Specification