Method and system for secure pairing of wireless devices
First Claim
1. A method for secure pairing of wireless devices, wherein a master device (A) is deployed in a network environment (2), said method comprising the steps of:
- placing, within an operational area, a new device (B) to be securely integrated into said network environment (2), the master device (A) and the new device (B) having executed an unauthenticated key exchange with said master device (A),monitoring the operational area with a camera system, wherein said master device (A) has a security association (3) with the camera system (1) that monitors the operational area where said new wireless device (B) is placed,based on the exchanged key of the unauthenticated key exchange, said master device (A) and said new device (B) each computing a key confirmation code, wherein said camera system (1) learns said key confirmation code from said master device (A),said camera system (1) i) watching for devices transmitting said key confirmation code via a visual out-of-band channel (7) and ii) providing an image to said master device (A) of each said device identified by the camera system as having transmitted said key confirmation code, andfor each image of each said device identified by the camera system as having transmitted said key confirmation code, i) making an analysis of the image to determine whether the image is of the new device (B) that performed the unauthenticated exchanged key with the master device (A), and ii) based on said analysis and determination, making an authorization decision with respect to accepting each said device as the new device (B) of said network environment (2).
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for securely pairing wireless devices, includes deploying a master device in a network environment, and a new device to be securely integrated into the network environment executes an unauthenticated key exchange with the master device. The master device has a security association with a camera system that monitors an operational area where the new device is placed, based on the exchanged key, the master device and the new device each compute a key confirmation code. The camera system learns the key confirmation code from the master device. The camera system watches for devices transmitting the key confirmation code and provides images of such identified devices to the master device, based on an analysis of an image of a device identified by the camera system, an authorization decision is made with respect to accepting the identified device as new device of the network environment.
2 Citations
20 Claims
-
1. A method for secure pairing of wireless devices, wherein a master device (A) is deployed in a network environment (2), said method comprising the steps of:
-
placing, within an operational area, a new device (B) to be securely integrated into said network environment (2), the master device (A) and the new device (B) having executed an unauthenticated key exchange with said master device (A), monitoring the operational area with a camera system, wherein said master device (A) has a security association (3) with the camera system (1) that monitors the operational area where said new wireless device (B) is placed, based on the exchanged key of the unauthenticated key exchange, said master device (A) and said new device (B) each computing a key confirmation code, wherein said camera system (1) learns said key confirmation code from said master device (A), said camera system (1) i) watching for devices transmitting said key confirmation code via a visual out-of-band channel (7) and ii) providing an image to said master device (A) of each said device identified by the camera system as having transmitted said key confirmation code, and for each image of each said device identified by the camera system as having transmitted said key confirmation code, i) making an analysis of the image to determine whether the image is of the new device (B) that performed the unauthenticated exchanged key with the master device (A), and ii) based on said analysis and determination, making an authorization decision with respect to accepting each said device as the new device (B) of said network environment (2). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for secure pairing of wireless devices, said system comprising:
-
a master device (A) that is deployed in a network environment (2), a new device (B) to be securely integrated into said network environment (2) and configured to execute an unauthenticated key exchange with said master device (A), a camera system (1) having a security association (3) with said master device (A), wherein the camera system (1) i) monitors an operational area where said new wireless device (B) is placed, and ii) learns a key confirmation code computed by said master device (A) and said new device (B) based on said master device (A) and said new device (B) performing the unauthenticated exchanged key, and said new device comprising a visual out-of-band channel (7) employed to transmit said key confirmation code, wherein said camera system (1) is configured to watch for a device transmitting said key confirmation code and to provide an image to said master device (A) of the device identified by the camera system as having transmitted said key confirmation code, and wherein i) an analysis of the image of said device, identified by the camera system as having transmitted said key confirmation code, is made to determine whether the image is an image of the new device (B) that performed the unauthenticated exchanged key with the master device (A), and ii) based on said determination, an authorization decision is made with respect to accepting said identified device as the new device (B) of said network environment (2). - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification