System and method for exchanging encryption keys between a mobile device and a peripheral device
First Claim
1. A method by a computing device of providing additional security over an established wireless connection between the computing device and a peripheral device, the method comprising:
- determining that a pairing process between the computing device and the peripheral device is complete;
the computing device entering into an additional security operational mode;
the computing device triggering transmission of a command to the peripheral device over the wireless connection to cause the peripheral device to enter the additional security operational mode, or the computing device receiving a command transmitted from the peripheral device over the wireless connection before the computing device enters into the additional security operational mode;
after the pairing process is complete;
automatically generating an encryption key at the computing device in a binary form;
at the computing device, converting the encryption key in the binary form into a number comprising fewer alphanumeric digits than the encryption key in the binary form;
at the computing device, displaying the number comprising fewer alphanumeric digits on a display of the computing device, for entry at the peripheral device; and
at the computing device, encrypting data transmitted to the peripheral device or decrypting data received from the peripheral device over the wireless connection, using the encryption key and in accordance with an encryption algorithm.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In some embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.
78 Citations
20 Claims
-
1. A method by a computing device of providing additional security over an established wireless connection between the computing device and a peripheral device, the method comprising:
-
determining that a pairing process between the computing device and the peripheral device is complete; the computing device entering into an additional security operational mode; the computing device triggering transmission of a command to the peripheral device over the wireless connection to cause the peripheral device to enter the additional security operational mode, or the computing device receiving a command transmitted from the peripheral device over the wireless connection before the computing device enters into the additional security operational mode; after the pairing process is complete; automatically generating an encryption key at the computing device in a binary form; at the computing device, converting the encryption key in the binary form into a number comprising fewer alphanumeric digits than the encryption key in the binary form; at the computing device, displaying the number comprising fewer alphanumeric digits on a display of the computing device, for entry at the peripheral device; and at the computing device, encrypting data transmitted to the peripheral device or decrypting data received from the peripheral device over the wireless connection, using the encryption key and in accordance with an encryption algorithm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computing device configured to provide additional security over an established wireless connection between the computing device and a peripheral device, the computing device comprising:
-
a processor and a memory, wherein the processor of the computing device is configured to; determine that a pairing process between the computing device and the peripheral device is complete; place the computing device into an additional security operational mode; trigger transmission of a command to the peripheral device over the wireless connection to cause the peripheral device to enter the additional security operational mode, or receive a command transmitted from the peripheral device over the wireless connection before placing the computing device into the additional security operational mode; after the pairing process is complete; automatically generate an encryption key at the computing device in a binary form; convert the encryption key in the binary form into a number comprising fewer alphanumeric digits than the encryption key in the binary form; display the number comprising fewer alphanumeric digits on a display of the computing device, for entry at the peripheral device; and encrypt data transmitted to the peripheral device or decrypt data received from the peripheral device over the wireless connection, using the encryption key and in accordance with an encryption algorithm.
-
-
11. A method by a peripheral device of providing additional security over an established wireless connection between a computing device and the peripheral device, the method comprising:
-
determining that a pairing process between the computing device and the peripheral device is complete; the peripheral device entering into an additional security operational mode; the peripheral device triggering transmission of a command to the computing device over the wireless connection to cause the computing device to enter the additional security operational mode, or the peripheral device receiving a command transmitted from the computing device over the wireless connection before the peripheral device enters into the additional security operational mode; after the pairing process is complete; receiving input via the peripheral device, wherein the input is a number comprising alphanumeric digits; at the peripheral device, converting the number into an encryption key in binary form having more digits than the number; and at the peripheral device, encrypting data transmitted to computing device or decrypting data received from the computing device over the wireless connection, using the encryption key and in accordance with an encryption algorithm. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A peripheral device configured to provide additional security over an established wireless connection between a computing device and the peripheral device, the peripheral device comprising:
-
a processor and a memory, wherein the processor of the peripheral device is configured to; determine that a pairing process between the computing device and the peripheral device is complete; place the peripheral device into an additional security operational mode; trigger transmission of a command to the computing device over the wireless connection to cause the computing device to enter the additional security operational mode, or receive a command transmitted from the computing device over the wireless connection before placing the peripheral device into the additional security operational mode; after the pairing process is complete; receive input via the peripheral device, wherein the input is a number comprising alphanumeric digits; convert the number into an encryption key in binary form having more digits than the number; and encrypt data transmitted to computing device or decrypt data received from the computing device over the wireless connection, using the encryption key and in accordance with an encryption algorithm.
-
Specification