Wireless secure device
First Claim
Patent Images
1. A computer implemented method performed by a host system of securely connecting a wireless user input device to the host system, the method comprising:
- generating an encryption key and a transmission sequence, where the transmission sequence includes a first portion that represents the encryption key and a second portion that is a confirmation sequence and wherein the transmission sequence is generated in accordance with a check mechanism for verification of the transmission sequence by the wireless user input device;
transmitting the transmission sequence to the wireless user input device;
receiving an input from the wireless user input device, wherein the input includes an encrypted input portion encrypted by the wireless user input device using an encryption key the wireless user input device generated from the first portion of the transmission sequence;
decrypting the encrypted input portion using the encryption key; and
determining if the decrypted input portion matches the second portion of the transmission sequence that is the confirmation sequence.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for securely connecting one or more wireless peripheral devices such as keyboards, mice, gamepads, remote controllers, joysticks and one or more host systems such as personal computers or workstations, the secure connection reducing the vulnerability of wireless communications between a wireless peripheral device and a host system to accidental or malicious interference or eavesdropping.
-
Citations
25 Claims
-
1. A computer implemented method performed by a host system of securely connecting a wireless user input device to the host system, the method comprising:
-
generating an encryption key and a transmission sequence, where the transmission sequence includes a first portion that represents the encryption key and a second portion that is a confirmation sequence and wherein the transmission sequence is generated in accordance with a check mechanism for verification of the transmission sequence by the wireless user input device; transmitting the transmission sequence to the wireless user input device; receiving an input from the wireless user input device, wherein the input includes an encrypted input portion encrypted by the wireless user input device using an encryption key the wireless user input device generated from the first portion of the transmission sequence; decrypting the encrypted input portion using the encryption key; and determining if the decrypted input portion matches the second portion of the transmission sequence that is the confirmation sequence. - View Dependent Claims (2, 3, 5, 6)
-
-
4. The method of 1, wherein the step of generating an encryption key and a transmission sequence is performed responsive to a request to establish a host connection, the request performed responsive to a user activating a connection mechanism located on the wireless user input device.
-
7. A computer implemented method of attempting to establish a secure connection between a wireless user input device and a host system performed by a wireless user input device, the method comprising:
-
receiving an input at the wireless user input device, the input including a first input portion and a second input portion; verifying the validity of the input by performing a check on the input at the wireless user input device; responsive to a verification of the validity of the input, generating an encryption key from the first input portion and encrypting the second input portion with the encryption key; and transmitting from the wireless user input device the encrypted second input portion for verification. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer implemented system for securely connecting a wireless user input device to a host system, the computer system comprising:
-
the wireless user input device including; a signal generator for generating an input, wherein the input matches a transmission sequence, and the input includes a first input portion matching a first portion of the transmission sequence, and a second input portion matching a second portion of the transmission sequence, an encryption module for generating an encryption key from the first input portion, and for encrypting the second input portion with the encryption key, and a transmitter for transmitting the encrypted second input portion to the host system wherein the wireless user input device is configured to verify the consistency of a transmission sequence in accordance with a check mechanism; and the host system having; a receiver for receiving data from the wireless user input device, a signal generator for generating the encryption key and the transmission sequence, wherein the transmission sequence includes a first portion representing the encryption key and a second portion, and a decryption module for decrypting the encrypted second sequence, and for determining if the decrypted second input portion matches the second portion of the transmission sequence. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification