CA2546388A1 - System and method for exchanging encryption keys between a mobile device and a peripheral device - Google Patents

System and method for exchanging encryption keys between a mobile device and a peripheral device Download PDF

Info

Publication number
CA2546388A1
CA2546388A1 CA002546388A CA2546388A CA2546388A1 CA 2546388 A1 CA2546388 A1 CA 2546388A1 CA 002546388 A CA002546388 A CA 002546388A CA 2546388 A CA2546388 A CA 2546388A CA 2546388 A1 CA2546388 A1 CA 2546388A1
Authority
CA
Canada
Prior art keywords
encryption key
computing device
peripheral device
generating
data associated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002546388A
Other languages
French (fr)
Other versions
CA2546388C (en
Inventor
Michael G. Kirkup
Michael K. Brown
Michael S. Brown
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BlackBerry Ltd
Original Assignee
Research in Motion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research in Motion Ltd filed Critical Research in Motion Ltd
Priority to CA2546388A priority Critical patent/CA2546388C/en
Publication of CA2546388A1 publication Critical patent/CA2546388A1/en
Application granted granted Critical
Publication of CA2546388C publication Critical patent/CA2546388C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Abstract

Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In exemplary embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.

Claims (19)

1. A method of exchanging an encryption key between a computing device and a peripheral device, the method comprising the steps of:
generating an encryption key at one of the computing device and the peripheral device;
outputting data associated with the encryption key to a user at the one device;
receiving the data associated with the encryption key input by the user at the other of the computing device and the peripheral device;
recovering the encryption key at the other device from the data associated with the encryption key input by the user; and transmitting data encrypted with the encryption key over a wireless connection between the computing device and the peripheral device, the wireless connection established in accordance with a wireless protocol;
wherein the data associated with the encryption key is non-derivable from the data transmitted between the computing device and the peripheral device at the transmitting step.
2. The method of claim 1, wherein the outputting step is performed after the generating step, and wherein the data associated with the encryption key comprises the encryption key.
3. The method of claim 1, further comprising the step of converting the encryption key generated at the generating step into new data, wherein the converting step is performed after the generating step and the outputting step is performed after the converting step, and wherein the data associated with the encryption key comprises the new data.
4. The method of claim 3, wherein the new data is a string.
5. The method of claim 1, further comprising the step of generating a string, said step preceding the step of generating the encryption key, wherein the encryption key is generated from the string at the step of generating the encryption key, and wherein the data associated with the encryption key that is output at the outputting step comprises the string.
6. The method of claim 1, wherein the peripheral device is a keyboard.
7. The method of claim 6, wherein the one of the computing device and the peripheral device is the computing device, and wherein the other of the computing device and the peripheral device is the keyboard.
8. The method of claim 7, further comprising the step of converting the encryption key generated at the computing device into a string, wherein the converting step is performed after the generating step and the outputting step is performed after the converting step, and wherein the data associated with the encryption key comprises the string.
9. The method of claim 1, wherein the peripheral device is a printer.
10. The method of claim 9, wherein the one of the computing device and the peripheral device is the printer, and wherein the other of the computing device and the peripheral device is the computing device.
11. The method of claim 10, further comprising the step of converting the encryption key generated at the printer into a string, wherein the converting step is performed after the generating step and the outputting step is performed after the converting step, and wherein the data associated with the encryption key comprises the string.
12. The method of any one of claims 1 to 11, further comprising the step of placing the computing device and the peripheral device into an additional security operational mode.
13. The method of any one of claims 1 to 12, further comprising the step of establishing the wireless connection in accordance with the wireless protocol.
14. The method of claim 13, wherein at least one of the generating, outputting, receiving and recovering steps is performed before the establishing step.
15. The method of any one of claims 1 to 14, wherein the wireless protocol is Bluetooth.
16. The method of any one of claims 1 to 15, wherein the computing device is a mobile device.
17. A system for exchanging an encryption key comprising a computing device and a peripheral device coupled thereto by a wireless connection established in accordance with a wireless protocol, wherein one of the computing device and the peripheral device is adapted to perform the generating and outputting steps of the method of any one of claims 1 to 16, and wherein the other of the computing device and the peripheral device is adapted to perform the receiving and recovering steps of the method of any one of claims 1 to 16.
18. A computer-readable medium on which a plurality of executable instructions is stored, the instructions for performing the generating and outputting steps of the method of any one of claims 1 to 16.
19. A computer-readable medium on which a plurality of executable instructions is stored, the instructions for performing the receiving and recovering steps of the method of any one of claims 1 to 16.
CA2546388A 2006-05-12 2006-05-12 System and method for exchanging encryption keys between a mobile device and a peripheral device Active CA2546388C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA2546388A CA2546388C (en) 2006-05-12 2006-05-12 System and method for exchanging encryption keys between a mobile device and a peripheral device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA2546388A CA2546388C (en) 2006-05-12 2006-05-12 System and method for exchanging encryption keys between a mobile device and a peripheral device

Publications (2)

Publication Number Publication Date
CA2546388A1 true CA2546388A1 (en) 2007-11-12
CA2546388C CA2546388C (en) 2011-07-12

Family

ID=38686879

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2546388A Active CA2546388C (en) 2006-05-12 2006-05-12 System and method for exchanging encryption keys between a mobile device and a peripheral device

Country Status (1)

Country Link
CA (1) CA2546388C (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8005223B2 (en) 2006-05-12 2011-08-23 Research In Motion Limited System and method for exchanging encryption keys between a mobile device and a peripheral device
US8670566B2 (en) 2006-05-12 2014-03-11 Blackberry Limited System and method for exchanging encryption keys between a mobile device and a peripheral output device
CN108629207A (en) * 2017-03-22 2018-10-09 温科尼克斯多夫国际有限公司 The system and method that information based on peripheral equipment generates encryption key

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8005223B2 (en) 2006-05-12 2011-08-23 Research In Motion Limited System and method for exchanging encryption keys between a mobile device and a peripheral device
US8670566B2 (en) 2006-05-12 2014-03-11 Blackberry Limited System and method for exchanging encryption keys between a mobile device and a peripheral output device
US8855310B2 (en) 2006-05-12 2014-10-07 Blackberry Limited System and method for exchanging encryption keys between a mobile device and a peripheral device
US9768955B2 (en) 2006-05-12 2017-09-19 Blackberry Limited System and method for exchanging encryption keys between a mobile device and a peripheral device
CN108629207A (en) * 2017-03-22 2018-10-09 温科尼克斯多夫国际有限公司 The system and method that information based on peripheral equipment generates encryption key
CN108629207B (en) * 2017-03-22 2024-02-20 温科尼克斯多夫国际有限公司 System and method for generating encryption key based on information of peripheral device

Also Published As

Publication number Publication date
CA2546388C (en) 2011-07-12

Similar Documents

Publication Publication Date Title
WO2009031140A3 (en) Information protection device
US9055035B2 (en) Medical device with secure data transmission
JP2018525891A5 (en)
WO2008054375A3 (en) Constrained cryptographic keys
US8855303B1 (en) Cryptography using a symmetric frequency-based encryption algorithm
JP2007528172A5 (en)
JP2003008565A5 (en)
JP2004166270A5 (en)
GB2528226A (en) Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end
JP2009512069A5 (en)
WO2007047195A3 (en) System and method for providing secure data transmission
EP2154815A4 (en) Image encrypting device, image decrypting device, method and program
EP1975841A3 (en) Method and system for mutual authentication between mobile and host devices
WO2008086241B1 (en) A method of two strings private key (symmetric) encryption and decryption algorithm
WO2009105525A3 (en) Method and apparatus for secure communication in a digital two way radio protocol
JP2008035272A5 (en)
CN101534503A (en) Method of establishing virtual security keypad session from a mobile device using java virtual machine
WO2010010336A3 (en) Mulitipad encryption
CN101707767A (en) Data transmission method and devices
WO2007111713A3 (en) Method for device authentication
WO2009085717A3 (en) Method and device for transmitting groupcast data in a wireless mesh communication network
CN105407109A (en) Data secure transmission method between Bluetooth devices
CA2587576A1 (en) System and method for exchanging encryption keys between a mobile device and a peripheral output device
CN103561023A (en) Method and device for sending and receiving communication information
Panagiotou et al. Design and implementation of a privacy framework for the internet of things (IoT)

Legal Events

Date Code Title Description
EEER Examination request