System and method for exchanging encryption keys between a mobile device and a peripheral device
First Claim
1. A method of providing additional security over an established wireless connection between a computing device and a peripheral device, the method comprising:
- determining that a pairing process between the computing device and the peripheral device is complete;
automatically, in response to completion of the pairing process, generating an encryption key at the computing device in a binary form;
at the computing device, applying a conversion algorithm to the encryption key in the binary form to generate a number comprising fewer alphanumeric digits than the encryption key in the binary form, the conversion algorithm being associated with a recovery algorithm, wherein applying of the recovery algorithm to the number generates the encryption key in the binary form;
at the computing device, displaying the number comprising fewer alphanumeric digits on a display of the computing device, for entry at the peripheral device; and
at the computing device, encrypting data transmitted to or decrypting data received from the peripheral device over the wireless connection, using the encryption key and in accordance with an encryption algorithm.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In some embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.
-
Citations
38 Claims
-
1. A method of providing additional security over an established wireless connection between a computing device and a peripheral device, the method comprising:
-
determining that a pairing process between the computing device and the peripheral device is complete; automatically, in response to completion of the pairing process, generating an encryption key at the computing device in a binary form; at the computing device, applying a conversion algorithm to the encryption key in the binary form to generate a number comprising fewer alphanumeric digits than the encryption key in the binary form, the conversion algorithm being associated with a recovery algorithm, wherein applying of the recovery algorithm to the number generates the encryption key in the binary form; at the computing device, displaying the number comprising fewer alphanumeric digits on a display of the computing device, for entry at the peripheral device; and at the computing device, encrypting data transmitted to or decrypting data received from the peripheral device over the wireless connection, using the encryption key and in accordance with an encryption algorithm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computing device configured to provide additional security over an established wireless connection between the computing device and a peripheral device, the computing device comprising:
a processor and a memory, the processor being configured to; determine that a pairing process between the computing device and the peripheral device is complete; automatically, in response to completion of the pairing process, generate an encryption key at the computing device in a binary form; apply a conversion algorithm to the encryption key in the binary form to generate a number comprising fewer alphanumeric digits than the encryption key in the binary form, the conversion algorithm being associated with a recovery algorithm, wherein applying of the recovery algorithm to the number generates the encryption key in the binary form; display the number comprising fewer alphanumeric digits on a display of the computing device, for entry at the peripheral device; and encrypt data transmitted to or decrypt data received from the peripheral device over the wireless connection, using the encryption key and in accordance with an encryption algorithm.
-
11. A method of providing additional security over an established wireless connection between a computing device and a peripheral device, the method comprising:
-
determining that a pairing process between the computing device and the peripheral device is complete; after determining that the pairing process is complete, receiving input via the peripheral device, wherein the input is a number comprising alphanumeric digits; at the peripheral device, applying a recovery algorithm to the number to generate an encryption key in binary form having more digits than the number, the recovery algorithm being associated with a conversion algorithm, wherein applying of the conversion algorithm to the encryption key in binary form generates the number; and at the peripheral device, encrypting data transmitted to or decrypting data received from the computing device over the wireless connection, using the encryption key and in accordance with an encryption algorithm. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A peripheral device configured to provide additional security over an established wireless connection between a computing device and the peripheral device, the peripheral device comprising:
a processor and a memory, the processor being configured to; determine that a pairing process between the computing device and the peripheral device is complete; after determining that the pairing process is complete, receive input via the peripheral device, wherein the input is a number comprising alphanumeric digits; apply a recovery algorithm to the number to generate an encryption key in binary form having more digits than the number, the recovery algorithm being associated with a conversion algorithm, wherein applying the conversion algorithm to the encryption key in binary form generates the number; and encrypt data transmitted to or decrypt data received from the computing device over the wireless connection, using the encryption key and in accordance with an encryption algorithm.
-
21. A non-transitory computer-readable medium comprising computer-executable instructions which, when executed by a processor of a computing device to provide additional security over an established wireless connection between the computer device and a peripheral device, cause the computing device to:
-
determine that a pairing process between the computing device and the peripheral device is complete; automatically, in response to completion of the pairing process, generate an encryption key at the computing device in a binary form; apply a conversion algorithm to the encryption key in the binary form to generate a number comprising fewer alphanumeric digits than the encryption key in the binary form, the conversion algorithm being associated with a recovery algorithm, wherein applying the recovery algorithm to the number generates the encryption key in the binary form; display the number comprising fewer alphanumeric digits on a display of the computing device, for entry at the peripheral device; and encrypt data transmitted to or decrypt data received from the peripheral device over the wireless connection, using the encryption key and in accordance with an encryption algorithm. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A non-transitory computer-readable medium comprising computer-executable instructions which, when executed by a processor of a peripheral device to provide additional security over an established wireless connection between a computing device and the peripheral device, cause the peripheral device to:
-
determine that a pairing process between the computing device and the peripheral device is complete; after determining that the pairing process is complete, receive input via the peripheral device, wherein the input is a number comprising alphanumeric digits; apply a recovery algorithm to the number to generate an encryption key in binary form having more digits than the number, the recovery algorithm being associated with a conversion algorithm, wherein applying the conversion algorithm to the encryption key in binary form generates the number; and encrypt data transmitted to or decrypt data received from the computing device over the wireless connection, using the encryption key and in accordance with an encryption algorithm. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38)
-
Specification