Method and system for providing secure communications between a first and a second peer device
First Claim
1. A method for providing secure communications between first and second peer devices, comprising:
- generating a wireless link from the first peer device;
creating a zone of privacy with the first peer device that is defined by restricting a range of the wireless link to a predetermined communication range that is less than a second communication range used for transferring data to the second peer device on the wireless link after the first and second peer devices verify an authenticity of each other,wherein restricting a range of the wireless link comprises operating a power source, wherein the power source is associated with the wireless link, at a sufficiently low power whereby the range of the wireless link is limited to the predetermined communication range;
allowing the first and second peer devices to verify the authenticity of each other only while the second peer device is within the zone of privacy, and activating a cue, wherein the cue is an indicator on the first peer device that provides an indication to a user, and the cue is activated only when the second peer device enters the zone of privacy; and
allowing encrypted data to transfer between the first and second peer devices only after the authenticity of each peer device has been verified, wherein the encrypted data transfer includes the first peer device transmitting at least some of the encrypted data to the second peer device on the wireless link in the second communication range greater than the predetermined communication range.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for providing secure communications between a first and second peer device is disclosed. The invention includes allowing the first and second peer devices to verify the authenticity of each other only while each peer device is within an established zone of privacy wherein the established zone of privacy is an area close (for example, almost touching) to the peer device. Because the authenticity of the other device is verified only while each peer device is within the established zone of privacy, users can visually confirm that there are no potential interlopers within the zone. As a result, the two peer devices can discover each other in a more secure fashion The method and system include creating a zone of privacy with the first peer device, allowing the first and second peer devices to verify the authenticity of each other only while the second peer device is within the zone of privacy, and allowing encrypted data to transfer between the first and second peer device once the authenticity of each peer device has been verified.
31 Citations
28 Claims
-
1. A method for providing secure communications between first and second peer devices, comprising:
-
generating a wireless link from the first peer device; creating a zone of privacy with the first peer device that is defined by restricting a range of the wireless link to a predetermined communication range that is less than a second communication range used for transferring data to the second peer device on the wireless link after the first and second peer devices verify an authenticity of each other, wherein restricting a range of the wireless link comprises operating a power source, wherein the power source is associated with the wireless link, at a sufficiently low power whereby the range of the wireless link is limited to the predetermined communication range; allowing the first and second peer devices to verify the authenticity of each other only while the second peer device is within the zone of privacy, and activating a cue, wherein the cue is an indicator on the first peer device that provides an indication to a user, and the cue is activated only when the second peer device enters the zone of privacy; and allowing encrypted data to transfer between the first and second peer devices only after the authenticity of each peer device has been verified, wherein the encrypted data transfer includes the first peer device transmitting at least some of the encrypted data to the second peer device on the wireless link in the second communication range greater than the predetermined communication range. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A peer device comprising:
-
a processor; and a memory storing machine readable instructions, which when executed by the processor, cause the peer device to perform a method comprising; generating a wireless link from the peer device; creating a zone of privacy that is defined by restricting a range of the wireless link to a predetermined communication range and allowing the peer device to verify the authenticity of another peer device only while the another peer device is within the zone of privacy, wherein restricting a range of the wireless link comprises operating a power source, wherein the power source is associated with the wireless link, at a sufficiently low power whereby the range of the wireless link is limited to the predetermined communication range; activating a cue, wherein the cue is an indicator on the peer device that provides an indication to a user, wherein the cue is activated only when the another peer device enters the zone of privacy; and transferring encrypted data to the another peer device only after the authenticity of the another peer device has been verified. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for providing secure communications between two peer devices, the system comprising:
- first and second peer devices wherein the first and second peer devices each comprise;
a processor; and a memory storing machine readable instructions, which when executed by the processor, cause the peer device to perform a method comprising; generating a wireless link; creating a zone of privacy that is defined by restricting a range of the wireless link to a predetermined communication range and allow the peer device to verify the authenticity of another peer device only while the another peer device is within the zone of privacy, wherein restricting a range of the wireless link comprises operating a power source, wherein the power source is associated with the wireless link, at a sufficiently low power whereby the range of the wireless link is limited to the predetermined communication range; activating a cue, wherein the cue is an indicator on the peer device that provides an indication to a user, wherein the cue is activated only when the another peer device enters the zone of privacy; and transferring encrypted data to the another peer device only after the authenticity of the another peer device has been verified. - View Dependent Claims (16, 17, 18, 19, 20, 21)
- first and second peer devices wherein the first and second peer devices each comprise;
-
22. A non-transitory computer program product for providing secure communications between first and second peer devices, the computer program product comprising:
- a computer readable program stored on a computer readable storage device for causing a computer to perform the steps of;
generating a wireless link from the first peer device; creating a zone of privacy with the first peer device that is defined by restricting a range of the wireless link to a predetermined communication range, wherein restricting a range of the wireless link comprises operating a power source, wherein the power source is associated with the wireless link, at a sufficiently low power whereby the range of the wireless link is limited to the predetermined communication range; allowing the first and second peer devices to verify the authenticity of each other only while the second peer device is within the zone of privacy; activating a cue, wherein the cue is an indicator on the first peer device that provides an indication to a user, wherein the cue is activated only when the second peer device enters the zone of privacy; and allowing encrypted data to transfer between the first and second peer devices only after the authenticity of each peer device has been verified. - View Dependent Claims (23, 24, 25)
- a computer readable program stored on a computer readable storage device for causing a computer to perform the steps of;
-
26. A method for conducting a secure business transaction between a first and a second peer device comprising:
-
generating a wireless link from the first peer device; creating a zone of privacy with the first peer device that is defined by restricting a range of the wireless link to a predetermined communication range, wherein restricting a range of the wireless link comprises operating a power source, wherein the power source is associated with the wireless link, at a sufficiently low power whereby the range of the wireless link is limited to the predetermined communication range;
allowing the first and second peer devices to verify the authenticity of each other only while the second peer device is within the zone of privacy;activating a cue, wherein the cue is an indicator on the first peer device that provides an indication to a user, wherein the cue is activated only when the second peer device enters the zone of privacy; and allowing encrypted data to transfer between the first and second peer devices only after the authenticity of each peer device has been verified. - View Dependent Claims (27, 28)
-
Specification