Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (WPAN)
First Claim
1. One or more non-transitory, machine-readable media comprising a plurality of instructions stored thereon that, when executed by a computing device, causes the computing device to:
- communicate, in a key exchange mode, with another computing device via an in-band transmission channel;
negotiate, via the in-band transmission channel, with the another computing device to determine which computing device will generate an encryption key;
generate the encryption key using audible background noise as a random seed to a random number generator in response to a determination that the computing device is to generate the encryption key;
generate a cryptographic picture based on the encryption key, wherein the cryptographic picture includes the encryption key embedded in the cryptographic picture;
transmit the encryption key to the another computing device, wherein to transmit the encryption key to the another computing device comprises to display the cryptographic picture on a display of the computing device such that the cryptographic picture is visible to the another computing device;
determine whether the encryption key has been successfully validated by the another computing device based on the cryptographic picture; and
enable the computing device to automatically accept communications from the another computing device over the in-band transmission channel in response to a determination that the encryption key has been successfully validated.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for exchanging strong encryption keys between devices using alternate input methods. At least two devices that want to communicate with one another are set in key exchange mode. The at least two devices are to communicate with one another using a short range radio or personal area network. The at least two devices negotiate with one another to determine which of the at least two devices will generate an encryption key, wherein device A represents the negotiated device and device B represents the non-negotiated device. Device A generates the encryption key and transmits the encryption key to device B using an out-of band transmission channel. The out-of-band transmission channel may be transmitting the encryption key via audio tones. A validation process determines whether the transmission of the encryption key via the out-of-band transmission channel was successful. If the encryption key has been successfully validated, the at least two devices are enabled to automatically accept communications between them over the short range radio or personal area network.
-
Citations
18 Claims
-
1. One or more non-transitory, machine-readable media comprising a plurality of instructions stored thereon that, when executed by a computing device, causes the computing device to:
-
communicate, in a key exchange mode, with another computing device via an in-band transmission channel; negotiate, via the in-band transmission channel, with the another computing device to determine which computing device will generate an encryption key; generate the encryption key using audible background noise as a random seed to a random number generator in response to a determination that the computing device is to generate the encryption key; generate a cryptographic picture based on the encryption key, wherein the cryptographic picture includes the encryption key embedded in the cryptographic picture; transmit the encryption key to the another computing device, wherein to transmit the encryption key to the another computing device comprises to display the cryptographic picture on a display of the computing device such that the cryptographic picture is visible to the another computing device; determine whether the encryption key has been successfully validated by the another computing device based on the cryptographic picture; and enable the computing device to automatically accept communications from the another computing device over the in-band transmission channel in response to a determination that the encryption key has been successfully validated. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computing device for secure communications, the computing device comprising:
-
a display; a processing circuitry; and a memory having stored therein a plurality of instructions that, when executed by a processor, cause the processing circuitry to; establish an in-band transmission channel with another computing device in a key exchange mode of the computing device; negotiate, via the in-band transmission channel, with the another computing device to determine which device will generate an encryption key; generate the encryption key using audible background noise as a random seed to a random number generator in response to a determination that the computing device is to generate the encryption key; generate a cryptographic picture based on the encryption key, wherein the cryptographic picture includes the encryption key embedded in the cryptographic picture; transmit the encryption key to the another computing device, wherein to transmit the encryption key to the another computing device comprises to display the cryptographic picture on the display such that the cryptographic picture is visible to the another computing device; determine whether the encryption key has been successfully validated by the another computing device based on the cryptographic picture; and enable the computing device to automatically accept communications from the another computing device over the in-band transmission channel in response to a determination that the encryption key has been successfully validated. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A method for secure communications between a first computing device and a second computing device, the method comprising:
-
communicating, by the first computing device while in a key exchange mode, with the second computing device via an in-band transmission channel; negotiating, by the first computing device and via the in-band transmission channel, with the second computing device to determine which computing device will generate an encryption key; generating, by the first computing device, the encryption key using audible background noise as a random seed to a random number generator in response to a determination that the first computing device is to generate the encryption key; generating, by the first computing device, a cryptographic picture based on the encryption key, wherein the cryptographic picture includes the encryption key embedded in the cryptographic picture; transmitting the encryption key to the second computing device, wherein transmitting the encryption key to the second computing device comprises displaying the cryptographic picture on a display of the first computing device such that the cryptographic picture is visible to the second computing device; determining, by the first computing device, whether the encryption key has been successfully validated by the second computing device based on the cryptographic picture; and automatically accepting, by the first computing device, communications from the second computing device over the in-band transmission channel in response to a determination that the encryption key has been successfully validated. - View Dependent Claims (15, 16, 17, 18)
-
Specification