System and method for exchanging encryption keys between a mobile device and a peripheral output device
First Claim
1. A method of securely transmitting data between a computing device and a peripheral device using a recovered encryption key, the method comprising:
- pairing the computing device and the peripheral device over a wireless connection;
placing a first of two devices into an additional security operational mode, the two devices comprising the computing device and the peripheral device;
triggering transmission of a command from the first of the two devices to a second of the two devices over the wireless connection to cause the second of the two devices to enter the additional security operational mode, or receiving a command transmitted from the second of the two devices over the wireless connection at the first of the two devices before placing the first of the two devices into the additional security operational mode;
generating an encryption key at the peripheral device;
at the peripheral device, converting the encryption key into a shorter alphanumeric string from which the encryption key is recoverable and outputting the shorter alphanumeric string, wherein the shorter alphanumeric string into which the encryption key was converted is printed to paper by the same peripheral device that generated the encryption key, provided in audio format, or presented on a Braille pad;
the computing device receiving, from a user interface provided by the computing device, the shorter alphanumeric string;
recovering the encryption key at the computing device from the shorter alphanumeric string received from the user interface provided by the computing device; and
transmitting data encrypted with the encryption key over the wireless connection between the computing device and the same peripheral device that generated the encryption key, the wireless connection established in accordance with a wireless protocol.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral output device (e.g. a printer, a headset). In some embodiments, the encryption key is generated at the peripheral output device. Data associated with the encryption key is output at the peripheral output device, which can be input by the user at the computing device. The encryption key is then recovered at the computing device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.
-
Citations
16 Claims
-
1. A method of securely transmitting data between a computing device and a peripheral device using a recovered encryption key, the method comprising:
-
pairing the computing device and the peripheral device over a wireless connection; placing a first of two devices into an additional security operational mode, the two devices comprising the computing device and the peripheral device; triggering transmission of a command from the first of the two devices to a second of the two devices over the wireless connection to cause the second of the two devices to enter the additional security operational mode, or receiving a command transmitted from the second of the two devices over the wireless connection at the first of the two devices before placing the first of the two devices into the additional security operational mode; generating an encryption key at the peripheral device; at the peripheral device, converting the encryption key into a shorter alphanumeric string from which the encryption key is recoverable and outputting the shorter alphanumeric string, wherein the shorter alphanumeric string into which the encryption key was converted is printed to paper by the same peripheral device that generated the encryption key, provided in audio format, or presented on a Braille pad; the computing device receiving, from a user interface provided by the computing device, the shorter alphanumeric string; recovering the encryption key at the computing device from the shorter alphanumeric string received from the user interface provided by the computing device; and transmitting data encrypted with the encryption key over the wireless connection between the computing device and the same peripheral device that generated the encryption key, the wireless connection established in accordance with a wireless protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A peripheral device configured to perform a method of securely transmitting data to a computing device using a recovered encryption key, the peripheral device comprising a processor and a memory, wherein the processor is configured to:
-
pair the peripheral device with the computing device over a wireless connection; place the peripheral device into an additional security operational mode; trigger transmission of a command to the computing device over the wireless connection to cause the computing device to enter the additional security operational mode, or receive a command transmitted from the computing device over the wireless connection before placing the peripheral device into the additional security operational mode; generate an encryption key at the peripheral device; at the peripheral device, convert the encryption key into a shorter alphanumeric string from which the encryption key is recoverable and outputting the shorter alphanumeric string, wherein the shorter alphanumeric string into which the encryption key was converted is printed to paper by the same peripheral device that generated the encryption key, provided in audio format, or presented on a Braille pad; and transmit, to the computing device, data encrypted with the encryption key over the wireless connection, and receive, from the computing device, data encrypted with the encryption key over the wireless connection, the wireless connection established in accordance with a wireless protocol; wherein the computing device is configured to receive, from a user interface provided by the computing device, the shorter alphanumeric string, and recover the encryption key from the shorter alphanumeric string received from the user interface provided by the computing device. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computing device configured to perform a method of securely transmitting data to a peripheral device using a recovered encryption key, the computing device comprising a processor and a memory, wherein the processor is configured to:
-
pair the computing device with the peripheral device over a wireless connection; place the computing device into an additional security operational mode; trigger transmission of a command to the peripheral device over the wireless connection to cause the peripheral device to enter the additional security operational mode, or receive a command transmitted from the computing device over the wireless connection before placing the computing device into the additional security mode; receive, from a user interface provided by the computing device, a shorter alphanumeric string from which the encryption key is recoverable; recover the encryption key at the computing device from the shorter alphanumeric string received from the user interface provided by the computing device; and transmit, to the peripheral device, data encrypted with the encryption key over the wireless connection, and receive, from the peripheral device, data encrypted with the encryption key over the wireless connection, the wireless connection established in accordance with a wireless protocol; wherein the peripheral device is configured to generate the encryption key, convert the encryption key into a shorter alphanumeric string, and output the shorter alphanumeric string, wherein the shorter alphanumeric string into which the encryption key was converted is printed to paper by the same peripheral device with which the wireless connection is established, provided in audio format, or presented on a Braille pad. - View Dependent Claims (14, 15, 16)
-
Specification