Transmit power control for wireless security
First Claim
1. An apparatus for wireless communication, the apparatus comprising:
- a memory; and
a processor coupled to the memory, wherein the processor is configured to;
detect a wireless device based, at least in part, on reception of a transmission from the wireless device, the transmission occurring at a normal-power level;
exchange, in response to at least the detection of the wireless device, one or more encryption keys with the wireless device at a low-power level;
initiate an encrypted session with the wireless device at the normal-power level using the one or more encryption keys exchanged at the low-power level; and
communicate with the wireless device in the encrypted session after the initiation is successful, wherein some transmissions in the encrypted session are transmitted at the low-power level and some other transmissions in the encrypted session are transmitted at the normal-power level, wherein power level of each transmission in the encrypted session is selected based on whether data to be transmitted is confidential information.
4 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method for establishing a secure channel between wireless devices. The method involves reducing the transmit power of the devices in conjunction with placing the devices in close proximity to one another. By reducing the transmit power, wireless communications between the devices cannot be detected by other devices beyond the short transmission range. The devices then generate and exchange encryption keys using the reduced-power transmissions in order to establish a secure, encrypted communications channel. Once the secure channel is established, the devices increase their transmit power back to normal operating levels, allowing them to be moved further apart while maintaining secure wireless communications.
-
Citations
16 Claims
-
1. An apparatus for wireless communication, the apparatus comprising:
-
a memory; and a processor coupled to the memory, wherein the processor is configured to; detect a wireless device based, at least in part, on reception of a transmission from the wireless device, the transmission occurring at a normal-power level; exchange, in response to at least the detection of the wireless device, one or more encryption keys with the wireless device at a low-power level; initiate an encrypted session with the wireless device at the normal-power level using the one or more encryption keys exchanged at the low-power level; and communicate with the wireless device in the encrypted session after the initiation is successful, wherein some transmissions in the encrypted session are transmitted at the low-power level and some other transmissions in the encrypted session are transmitted at the normal-power level, wherein power level of each transmission in the encrypted session is selected based on whether data to be transmitted is confidential information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, implemented in an apparatus, for wireless communication, the method comprising:
-
detecting a wireless device based, at least in part, on reception of a transmission from the wireless device, the transmission occurring at a normal-power level; exchanging, in response to at least the detection of the wireless device, one or more encryption keys with the wireless device at a low-power level; initiating an encrypted session with the wireless device at the normal-power level using the one or more encryption keys exchanged at the low-power level; and communicate with the wireless device in the encrypted session after the initiation is successful, wherein some transmissions in the encrypted session are transmitted at the low-power level and some other transmissions in the encrypted session are transmitted at the normal-power level, wherein power level of each transmission in the encrypted session is selected based on whether data to be transmitted is confidential information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A cellular telephone, the cellular telephone comprising:
-
a memory; an antenna; and a processor coupled to the memory and the antenna, wherein the processor is configured to; detect a wireless device based, at least in part, on the reception, via the antenna, of a transmission from the wireless device, the transmission occurring at a normal-power level; exchange, via the antenna and in response to at least the detection of the wireless device, one or more encryption keys with the wireless device at a low-power level; initiate, via the antenna, an encrypted session with the wireless device at the normal-power level using the one or more encryption keys exchanged at the low-power level; and communicate with the wireless device in the encrypted session after the initiation is successful, wherein some transmissions in the encrypted session are transmitted at the low-power level and some other transmissions in the encrypted session are transmitted at the normal-power level, wherein power level of each transmission in the encrypted session is selected based on whether data to be transmitted is confidential information.
-
-
16. A non-transitory computer-readable medium having stored thereon, computer executable instructions that, when executed by an apparatus, cause the apparatus to perform a method comprising:
-
detecting a wireless device based, at least in part, on reception of a transmission from the wireless device, the transmission occurring at a normal-power level; exchanging, in response to at least the detection of the wireless device one or more encryption keys with the wireless device at a low-power level; initiating an encrypted session with the wireless device at the normal-power level using the one or more encryption keys exchanged at the low-power level; and communicating with the wireless device in the encrypted session after the initiation is successful, wherein some transmissions in the encrypted session are transmitted at the low-power level and some other transmissions in the encrypted session are transmitted at the normal-power level, wherein power level of each transmission in the encrypted session is selected based on whether data to be transmitted is confidential information.
-
Specification