Securing pairing verification of devices with minimal user interfaces
First Claim
1. A method for verifying a secure pairing between two communication devices, comprising:
- calculating on each of the two communication devices a verification value based upon security information exchanged between the two communication devices;
performing on each of the two communication devices a table look up process using at least a portion of the verification value to select a verification pattern from a table of verification patterns;
presenting on each of the two communication devices the verification pattern for perception by a user as one of a flashing light pattern and a sound pattern; and
receiving a user input indicating that the verification patterns on each of the two communication devices are the same.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system and devices for enabling secure pairing between two communication devices equipped with a minimal user interface includes determining a verification pattern based upon security information exchanged between the two communication devices and presenting the verification pattern in a manner that can be perceived by a user who can determine whether the verification patterns are the same. The verification patterns may be presented as flashing light displays, such as flashing sequences of a light emitting diode, or as sounds, such as tones or click patterns emitted by a speaker. If a user perceives that the verification patterns emitted by both communication devices are the same, the user may so indicate by pressing a button on each of the devices. Obtaining such user confirmation of the verification patterns enables establishing a secure pairing between the two communication devices that is protected from active and passive eavesdropping.
-
Citations
37 Claims
-
1. A method for verifying a secure pairing between two communication devices, comprising:
-
calculating on each of the two communication devices a verification value based upon security information exchanged between the two communication devices; performing on each of the two communication devices a table look up process using at least a portion of the verification value to select a verification pattern from a table of verification patterns; presenting on each of the two communication devices the verification pattern for perception by a user as one of a flashing light pattern and a sound pattern; and receiving a user input indicating that the verification patterns on each of the two communication devices are the same. - View Dependent Claims (2, 3, 4)
-
-
5. A communication system, comprising:
-
a first communication device; and a second communication device, wherein each of the first and second communication devices comprise; a processor; a transceiver coupled to the processor; a button coupled to the processor; and a simple signaling mechanism coupled to the processor, wherein the processor of each of the first and second communication devices is configured with processor-executable instructions to perform operations comprising; calculating a verification value based upon security information exchanged between the first and second communication devices; performing a table look up process using at least a portion of the verification value to select a verification pattern from a table of verification patterns; presenting on the simple signaling mechanism of each of the first and second communication devices the verification pattern for perception by a user; and completing a secure pairing between the first and second communication devices if a button press is received on both first and second communication devices. - View Dependent Claims (6, 7, 8)
-
-
9. A first communication device, comprising:
-
a processor; a transceiver coupled to the processor; a button coupled to the processor; and a simple signaling mechanism coupled to the processor, wherein the processor is configured with processor-executable instructions to perform operations comprising; exchanging security information with a second communication device; calculating a verification value based upon the exchanged security information; performing a table look up process using at least a portion of the verification value to select a verification pattern from a table of verification patterns; activating the simple signaling mechanisms according to the selected verification pattern; and completing a secure pairing with the second communication device if the button is pressed after the simple signaling mechanism is activated. - View Dependent Claims (10, 11, 12)
-
-
13. A first communication device, comprising:
-
means for exchanging security information with a second communication device; means for calculating a verification value based upon the exchanged security information; means for performing a table look up process using at least a portion of the verification value to select a verification pattern from a table of verification patterns; means for signaling the verification pattern; and means for completing a secure pairing between with the second communication device if a button is pressed after the means for signaling the verification pattern is activated. - View Dependent Claims (14, 15, 16)
-
-
17. A non-transitory processor-readable medium having stored thereon processor-executable instructions configured to cause a processor of a first communication device to perform operations comprising:
-
exchanging security information with a second communication device; calculating a verification value based upon the exchanged security information; performing a table look up process using at least a portion of the verification value to select a verification pattern from a table of verification patterns; activating a simple signaling mechanism according to the verification pattern; and completing a secure pairing with the second communication device if a button on the first communication device is pressed after the simple signaling mechanism is activated. - View Dependent Claims (18, 19, 20)
-
-
21. A method for verifying a secure pairing between two communication devices, comprising:
-
calculating on each of the two devices a verification value based upon security information exchanged between the two communication devices; using on each of the two devices at least a portion of the verification value as an input to an algorithm to generate a verification pattern; presenting on each of the two communication devices the verification pattern for perception by a user as one of a flashing light pattern and a sound pattern; and receiving a user input indicating that the verification patterns on each of the two communication devices are the same. - View Dependent Claims (22, 23)
-
-
24. A communication system, comprising:
-
a first communication device; and a second communication device, wherein each of the first and second communication devices comprise; a processor; a transceiver coupled to the processor; a button coupled to the processor; and a simple signaling mechanism coupled to the processor, wherein the processor of each of the first and second communication devices is configured with processor-executable instructions to perform operations comprising; calculating a verification value based upon security information exchanged between the first and second communication devices; using at least a portion of the verification value as an input to an algorithm to generate a verification pattern; presenting on the simple signaling mechanism of each of the first and second communication devices the verification pattern for perception by a user; and completing a secure pairing between the first and second communication devices if a button press is received on both first and second communication devices. - View Dependent Claims (25, 26, 27)
-
-
28. A first communication device, comprising:
-
a processor; a transceiver coupled to the processor; a button coupled to the processor; and a simple signaling mechanism coupled to the processor, wherein the processor is configured with processor-executable instructions to perform operations comprising; exchanging security information with a second communication device; calculating a verification value based upon the exchanged security information; using at least a portion of the verification value as an input to an algorithm to generate a verification pattern; activating the simple signaling mechanisms according to the verification pattern; and completing a secure pairing between with the second communication device if the button is pressed after the simple signaling mechanism is activated. - View Dependent Claims (29, 30, 31)
-
-
32. A first communication device, comprising:
-
means for exchanging security information with a second communication device; means for calculating a verification value based upon the exchanged security information; means for performing a table look up process using at least a portion of the verification value to select a verification pattern from a table of verification patterns; means for signaling the verification pattern; and means for completing a secure pairing between with the second communication device if a button is pressed after the means for signaling the verification pattern is activated. - View Dependent Claims (33, 34)
-
-
35. A non-transitory processor-readable medium having stored thereon processor-executable instructions configured to cause a processor of a first communication device to perform operations comprising:
-
exchanging security information with a second communication device; calculating a verification value based upon the exchanged security information; using at least a portion of the verification value as an input to an algorithm to generate a verification pattern; activating a simple signaling mechanism according to the verification pattern; and completing a secure pairing with the second communication device if a button on the first communication device is pressed after the simple signaling mechanism is activated. - View Dependent Claims (36, 37)
-
Specification