Secure wireless transmission
First Claim
Patent Images
1. A method comprising:
- generating at a host a public key and a private key that corresponds to the public key in response to a request for the public key from a local node;
sending the public key from the host to the local node;
receiving at the host an encrypted session key from the local node;
decrypting the encrypted session key at the host using the private key; and
sending the decrypted session key from the host to the local node that enables the local node to have encrypted wireless communication with a remote node, wherein the remote node comprises a wireless keyboard.
5 Assignments
0 Petitions
Accused Products
Abstract
A method in accordance with one embodiment of the invention can include receiving a request for a public key from a local node. Furthermore, the public key and a private key that corresponds to the public key can be generated. The public key can be sent to the local node. An encrypted session key can be received from the local node. The encrypted session key can be decrypted using the private key. Additionally, the decrypted session key can be sent to the local node that enables the local node to have secure wireless communication with a remote node. The remote node can generate the encrypted session key using the public key.
57 Citations
18 Claims
-
1. A method comprising:
-
generating at a host a public key and a private key that corresponds to the public key in response to a request for the public key from a local node; sending the public key from the host to the local node; receiving at the host an encrypted session key from the local node; decrypting the encrypted session key at the host using the private key; and sending the decrypted session key from the host to the local node that enables the local node to have encrypted wireless communication with a remote node, wherein the remote node comprises a wireless keyboard. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a host configured to generate a public key and a corresponding private key; a local node coupled to the host and configured to wirelessly transmit the public key; and a remote node configured to encrypt a session key using the public key and to wirelessly transmit the encrypted session key; wherein; the host generates the public key and the corresponding private key, in response to a request for the public key from the local node, the host sends the public key to the local node, after generating the public key and corresponding private key, the local node sends the encrypted session key to the host, the host decrypts the encrypted session key with the corresponding private key after receiving the encrypted session key from the local node and sends the decrypted session key to the local node, and the local node utilizes the decrypted session key for encrypted wireless communication with the remote node, wherein the remote node comprises a wireless keyboard. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
a host configured to generate a public key and a private key corresponding to the public key; a local node coupled to the host, the local node further configured to wirelessly transmit the public key; and a peripheral configured to wirelessly receive the public key from the local node and to encrypt a session key using the public key, the peripheral configured to wirelessly transmit the encrypted session key to the local node; wherein; the host generates the public key and the private key, the host sends the public key to the local node, the local node sends the encrypted session key to the host, the host decrypts the encrypted session key and sends the decrypted session key to the local node, and the local node utilizes the decrypted session key for encrypted wireless communication with the peripheral, wherein the peripheral comprises a wireless keyboard. - View Dependent Claims (15, 16, 17, 18)
-
Specification