CA2546388A1 - System and method for exchanging encryption keys between a mobile device and a peripheral device - Google Patents
System and method for exchanging encryption keys between a mobile device and a peripheral device Download PDFInfo
- Publication number
- CA2546388A1 CA2546388A1 CA002546388A CA2546388A CA2546388A1 CA 2546388 A1 CA2546388 A1 CA 2546388A1 CA 002546388 A CA002546388 A CA 002546388A CA 2546388 A CA2546388 A CA 2546388A CA 2546388 A1 CA2546388 A1 CA 2546388A1
- Authority
- CA
- Canada
- Prior art keywords
- encryption key
- computing device
- peripheral device
- generating
- data associated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Abstract
Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In exemplary embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.
Claims (19)
1. A method of exchanging an encryption key between a computing device and a peripheral device, the method comprising the steps of:
generating an encryption key at one of the computing device and the peripheral device;
outputting data associated with the encryption key to a user at the one device;
receiving the data associated with the encryption key input by the user at the other of the computing device and the peripheral device;
recovering the encryption key at the other device from the data associated with the encryption key input by the user; and transmitting data encrypted with the encryption key over a wireless connection between the computing device and the peripheral device, the wireless connection established in accordance with a wireless protocol;
wherein the data associated with the encryption key is non-derivable from the data transmitted between the computing device and the peripheral device at the transmitting step.
generating an encryption key at one of the computing device and the peripheral device;
outputting data associated with the encryption key to a user at the one device;
receiving the data associated with the encryption key input by the user at the other of the computing device and the peripheral device;
recovering the encryption key at the other device from the data associated with the encryption key input by the user; and transmitting data encrypted with the encryption key over a wireless connection between the computing device and the peripheral device, the wireless connection established in accordance with a wireless protocol;
wherein the data associated with the encryption key is non-derivable from the data transmitted between the computing device and the peripheral device at the transmitting step.
2. The method of claim 1, wherein the outputting step is performed after the generating step, and wherein the data associated with the encryption key comprises the encryption key.
3. The method of claim 1, further comprising the step of converting the encryption key generated at the generating step into new data, wherein the converting step is performed after the generating step and the outputting step is performed after the converting step, and wherein the data associated with the encryption key comprises the new data.
4. The method of claim 3, wherein the new data is a string.
5. The method of claim 1, further comprising the step of generating a string, said step preceding the step of generating the encryption key, wherein the encryption key is generated from the string at the step of generating the encryption key, and wherein the data associated with the encryption key that is output at the outputting step comprises the string.
6. The method of claim 1, wherein the peripheral device is a keyboard.
7. The method of claim 6, wherein the one of the computing device and the peripheral device is the computing device, and wherein the other of the computing device and the peripheral device is the keyboard.
8. The method of claim 7, further comprising the step of converting the encryption key generated at the computing device into a string, wherein the converting step is performed after the generating step and the outputting step is performed after the converting step, and wherein the data associated with the encryption key comprises the string.
9. The method of claim 1, wherein the peripheral device is a printer.
10. The method of claim 9, wherein the one of the computing device and the peripheral device is the printer, and wherein the other of the computing device and the peripheral device is the computing device.
11. The method of claim 10, further comprising the step of converting the encryption key generated at the printer into a string, wherein the converting step is performed after the generating step and the outputting step is performed after the converting step, and wherein the data associated with the encryption key comprises the string.
12. The method of any one of claims 1 to 11, further comprising the step of placing the computing device and the peripheral device into an additional security operational mode.
13. The method of any one of claims 1 to 12, further comprising the step of establishing the wireless connection in accordance with the wireless protocol.
14. The method of claim 13, wherein at least one of the generating, outputting, receiving and recovering steps is performed before the establishing step.
15. The method of any one of claims 1 to 14, wherein the wireless protocol is Bluetooth.
16. The method of any one of claims 1 to 15, wherein the computing device is a mobile device.
17. A system for exchanging an encryption key comprising a computing device and a peripheral device coupled thereto by a wireless connection established in accordance with a wireless protocol, wherein one of the computing device and the peripheral device is adapted to perform the generating and outputting steps of the method of any one of claims 1 to 16, and wherein the other of the computing device and the peripheral device is adapted to perform the receiving and recovering steps of the method of any one of claims 1 to 16.
18. A computer-readable medium on which a plurality of executable instructions is stored, the instructions for performing the generating and outputting steps of the method of any one of claims 1 to 16.
19. A computer-readable medium on which a plurality of executable instructions is stored, the instructions for performing the receiving and recovering steps of the method of any one of claims 1 to 16.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2546388A CA2546388C (en) | 2006-05-12 | 2006-05-12 | System and method for exchanging encryption keys between a mobile device and a peripheral device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2546388A CA2546388C (en) | 2006-05-12 | 2006-05-12 | System and method for exchanging encryption keys between a mobile device and a peripheral device |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2546388A1 true CA2546388A1 (en) | 2007-11-12 |
CA2546388C CA2546388C (en) | 2011-07-12 |
Family
ID=38686879
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2546388A Active CA2546388C (en) | 2006-05-12 | 2006-05-12 | System and method for exchanging encryption keys between a mobile device and a peripheral device |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2546388C (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8005223B2 (en) | 2006-05-12 | 2011-08-23 | Research In Motion Limited | System and method for exchanging encryption keys between a mobile device and a peripheral device |
US8670566B2 (en) | 2006-05-12 | 2014-03-11 | Blackberry Limited | System and method for exchanging encryption keys between a mobile device and a peripheral output device |
CN108629207A (en) * | 2017-03-22 | 2018-10-09 | 温科尼克斯多夫国际有限公司 | The system and method that information based on peripheral equipment generates encryption key |
-
2006
- 2006-05-12 CA CA2546388A patent/CA2546388C/en active Active
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8005223B2 (en) | 2006-05-12 | 2011-08-23 | Research In Motion Limited | System and method for exchanging encryption keys between a mobile device and a peripheral device |
US8670566B2 (en) | 2006-05-12 | 2014-03-11 | Blackberry Limited | System and method for exchanging encryption keys between a mobile device and a peripheral output device |
US8855310B2 (en) | 2006-05-12 | 2014-10-07 | Blackberry Limited | System and method for exchanging encryption keys between a mobile device and a peripheral device |
US9768955B2 (en) | 2006-05-12 | 2017-09-19 | Blackberry Limited | System and method for exchanging encryption keys between a mobile device and a peripheral device |
CN108629207A (en) * | 2017-03-22 | 2018-10-09 | 温科尼克斯多夫国际有限公司 | The system and method that information based on peripheral equipment generates encryption key |
CN108629207B (en) * | 2017-03-22 | 2024-02-20 | 温科尼克斯多夫国际有限公司 | System and method for generating encryption key based on information of peripheral device |
Also Published As
Publication number | Publication date |
---|---|
CA2546388C (en) | 2011-07-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009031140A3 (en) | Information protection device | |
US9055035B2 (en) | Medical device with secure data transmission | |
JP2018525891A5 (en) | ||
WO2008054375A3 (en) | Constrained cryptographic keys | |
US8855303B1 (en) | Cryptography using a symmetric frequency-based encryption algorithm | |
JP2007528172A5 (en) | ||
JP2003008565A5 (en) | ||
JP2004166270A5 (en) | ||
GB2528226A (en) | Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end | |
JP2009512069A5 (en) | ||
WO2007047195A3 (en) | System and method for providing secure data transmission | |
EP2154815A4 (en) | Image encrypting device, image decrypting device, method and program | |
EP1975841A3 (en) | Method and system for mutual authentication between mobile and host devices | |
WO2008086241B1 (en) | A method of two strings private key (symmetric) encryption and decryption algorithm | |
WO2009105525A3 (en) | Method and apparatus for secure communication in a digital two way radio protocol | |
JP2008035272A5 (en) | ||
CN101534503A (en) | Method of establishing virtual security keypad session from a mobile device using java virtual machine | |
WO2010010336A3 (en) | Mulitipad encryption | |
CN101707767A (en) | Data transmission method and devices | |
WO2007111713A3 (en) | Method for device authentication | |
WO2009085717A3 (en) | Method and device for transmitting groupcast data in a wireless mesh communication network | |
CN105407109A (en) | Data secure transmission method between Bluetooth devices | |
CA2587576A1 (en) | System and method for exchanging encryption keys between a mobile device and a peripheral output device | |
CN103561023A (en) | Method and device for sending and receiving communication information | |
Panagiotou et al. | Design and implementation of a privacy framework for the internet of things (IoT) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |