METHODS FOR AUTHENTICATING DEVICE-TO-DEVICE COMMUNICATION
First Claim
1. An electronic system for wirelessly and securely authenticating during a first time pairing between proximate devices comprising:
- one or more first devices wherein each of the one or more first devices has a first device memory and a first device secure communications component that uses a first unique electromagnetic communication identifier corresponding to the first device in connection with establishing a secure communication channel from the first device; and
one or more second devices wherein each of the one or more second devices has a second device memory and a second device secure communications component that uses a second unique electromagnetic communication identifier corresponding to the second device in connection with establishing a secure communication channel with the first device,wherein the first device and the second device are wirelessly and securely authenticated during the first time pairing when the first device is positioned within a wireless communication distance to the second device and further wherein the first device and the second device are wirelessly and securely authenticated automatically when the first device and the second device are within a wireless communication distance.
1 Assignment
0 Petitions
Accused Products
Abstract
Devices and methods are described to enable devices to be paired in a convenient and secure way based on proximity with the use of a single radio transmission protocol. Using devices configurable to perform the processes described, users are able to pair Bluetooth enabled devices or other radio communication protocols simply by putting the devices briefly in contact, or within close proximity, usually few centimeters. When the two devices touch or are in close proximity, the encryption key is shared across the two devices without further interaction required by the user. The encryption key is not made visible, so one potential source of security breach is eliminated. After first setup, proximity is not required and the device can communicate securely based on the previously exchanged security tokens (and encryption keys) without the requirement of proximity. This method is hence superior to all other authentication methods in use as it combines the benefit of an easy setup/configuration with the use of secure communications and cheaper design and manufacturing.
-
Citations
20 Claims
-
1. An electronic system for wirelessly and securely authenticating during a first time pairing between proximate devices comprising:
-
one or more first devices wherein each of the one or more first devices has a first device memory and a first device secure communications component that uses a first unique electromagnetic communication identifier corresponding to the first device in connection with establishing a secure communication channel from the first device; and one or more second devices wherein each of the one or more second devices has a second device memory and a second device secure communications component that uses a second unique electromagnetic communication identifier corresponding to the second device in connection with establishing a secure communication channel with the first device, wherein the first device and the second device are wirelessly and securely authenticated during the first time pairing when the first device is positioned within a wireless communication distance to the second device and further wherein the first device and the second device are wirelessly and securely authenticated automatically when the first device and the second device are within a wireless communication distance. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for facilitating electronic communication among wireless devices comprising:
-
receiving from one or more of a first device wherein each of the one or more first devices have a first device memory and a first device secure communications component that uses a first unique electromagnetic communication identifier corresponding to the first device in connection with establishing a secure communication channel for transmitting data from the first device; and sending information from the one or more first devices to one or more second devices. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A machine readable medium containing instructions that, when executed by a computing device, cause the computing device to perform a method, the method comprising:
-
receiving from a first device having a first device memory and a first device secure communications component that uses a unique short range electromagnetic communication identifier corresponding to the first device in connection with establishing a secure communication channel for transmitting data from the first device; and sending information from the first device to a second device. - View Dependent Claims (20)
-
Specification