System and method for securely pairing a wireless peripheral to a host
First Claim
1. A peripheral device, comprising:
- a storage medium for maintaining a private encryption key;
a first antenna for transmitting the private encryption key from the peripheral device to a host device across a first channel, wherein the first channel comprises a near field transmission path having a range less than 20 centimeters in ambient air; and
a second antenna, distinct from the first antenna, for subsequently transmitting encrypted information configured to be decrypted by the private encryption key from the peripheral device to the host device across a second channel, distinct from the first channel, wherein the second channel comprises a relatively far field transmission path having a range greater than 20 centimeters in ambient air, and wherein the second channel is configured to transmit the encrypted information according to a wireless communication technology selected from a group consisting of Bluetooth, WiFi, WiMax and Ultra Wide Band (UWB).
11 Assignments
0 Petitions
Accused Products
Abstract
A device, system, and method are provided for simply and securely pairing a wireless peripheral device with a host device or system. The device, claim, and method and other peripheral devices provide for improved simplification and security of the pairing process involved with establishing a secure wireless connection between a peripheral device and a host. Simplification is improved because actions required by the user to complete the pairing process are minimized, and security is improved because of a greatly increased ability on the part of the user to ensure that pairing process is conducted in a secure environment. The pairing may be applicable to any number of host devices and peripheral devices. The host device may be a desktop computer, notebook computer, tablet computer, or similar device, and the peripheral device may be a keyboard, mouse, game controller, or personal digital assistant (PDA).
-
Citations
16 Claims
-
1. A peripheral device, comprising:
-
a storage medium for maintaining a private encryption key; a first antenna for transmitting the private encryption key from the peripheral device to a host device across a first channel, wherein the first channel comprises a near field transmission path having a range less than 20 centimeters in ambient air; and a second antenna, distinct from the first antenna, for subsequently transmitting encrypted information configured to be decrypted by the private encryption key from the peripheral device to the host device across a second channel, distinct from the first channel, wherein the second channel comprises a relatively far field transmission path having a range greater than 20 centimeters in ambient air, and wherein the second channel is configured to transmit the encrypted information according to a wireless communication technology selected from a group consisting of Bluetooth, WiFi, WiMax and Ultra Wide Band (UWB). - View Dependent Claims (2, 3, 4, 5)
-
-
6. A communication system, comprising:
-
a peripheral device comprising; a storage medium for maintaining a private encryption key; and an antenna for transmitting the private encryption key across a short communication channel having a range less than 20 centimeters in ambient air; a host device comprising; a storage medium for maintaining one or more trusted keys; a reader configured for (i) receiving the private encryption key sent from the peripheral device across the short communication channel, and (ii) subsequently receiving encrypted information sent from the peripheral device across a long communication channel, which is distinct from the short communication channel wherein a range of the long communication channel is greater than 20 centimeters in ambient air; and
wherein the long communication channel is selected from a group consisting of Bluetooth, WiFi, WiMax and Ultra Wide Band (UWB) and optical wireless communication technologies; anda decryption engine configured to decrypt the encrypted information via the private encryption key if the private encryption key transmitted across the short communication channel matches one of the one or more trusted keys. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for establishing a secure channel of wireless communication, comprising:
-
maintaining a list of one or more trusted keys; receiving a private encryption key transmitted from a peripheral device across a near field wireless communication channel; comparing the private encryption key transmitted across the near field wireless communication channel to the list of trusted keys, wherein if the private encryption key matches one of the trusted keys the method further comprises; subsequently receiving encrypted information transmitted from the peripheral device across a far field wireless communication channel, which is separate and apart from the near field wireless communication channel and selected from a group consisting of Bluetooth, WiFi, WiMax and Ultra Wide Band (UWB), infrared and optical wireless communication technologies; decrypting the encrypted information using the private encryption key; and executing upon the decrypted information.
-
Specification