1. Field of the Invention
The present invention relates to wireless scanning devices, and more particularly, to a system or method of provisioning a wireless link for a wireless scanner by automatically generating security data at the beginning of a session, providing security data to an output device, scanning the security data, and using the security data to establish a (preferably secure) wireless connection between the wireless scanner and a host.
2. Description of Related Art
Wireless technology is becoming more and more prevalent. One concern with wireless technology, however, is the security of the information that is being transmitted. This is because the information is being transmitted over radio frequency (RF) signals that are accessible to anyone with a proper reception device. In response to this concern, many wireless protocols (e.g., Bluetooth, ZigBee, WLAN, etc.) have implemented security procedures that can be activated on command.
Bluetooth, for example, uses a personal identification number (PIN) to authenticate a secondary device. Specifically, the PIN of a primary device is manually provided to the secondary device (e.g., by way of a keyboard). The primary device then transmits a “challenge” that is based (in part) on the PIN. The secondary device then transmits a “response” that is based (in part) on the “challenge” and the PIN. If the “response” is proper (or authenticated), the secondary device is authenticated, and a relatively secure wireless link is established. If additional security is required, the PIN can be used to generate an encryption key, which is used to encrypt (or encode) data that is transmitted over the link. Similar security procedures are found in other wireless protocols.
One drawback of these security procedures is that they are based on PINs (or codes), which like any other password, should be changed frequently in order to ensure a certain level of security. Thus, a procedure needs to be in place in which new PINs are identified on a routine basis.
Another drawback, which only exacerbates the first drawback, is that the new PINs need to be entered manually (e.g., by way of a keyboard). This is especially problematic in a manufacturing or shipping environment, where wireless devices (e.g., wireless scanners, etc.) are used in numbers and frequently (if not continuously). If the security procedures, which require individuals to frequently (i) identify a number of new PINs and (ii) manually entering the new PINs into a number of wireless devices, becomes too cumbersome, the procedures will either be disregarded or they will be followed haphazardly. For example, the PINs may end up being relatively simple (e.g., “0000,” “123456”), repetitive, identified and entered less frequently, or never changed.
Accordingly, it would be desirable to provide a system and method of provisioning a wireless link between a host and a wireless device, preferably a wireless scanner, that overcomes at least one of these drawbacks.
The present invention provides a system and method of provisioning a wireless link for a wireless scanner. Embodiments of the present invention operate in accordance a primary wireless device (e.g., a host) adapted to generate security data at the beginning of a session, an output device (e.g., a display, printer, etc.) electrically connected to the primary wireless device, and at least one secondary device (e.g., a scanner) adapted to communicate with the primary wireless device over a wireless link.
The term “session” is used herein to connote a (static or dynamic) period of time. The session may be user-defined, so that a new session begins, for example, every hour, every day, at the beginning of a shift, etc. The session may alternately (or also) be based on the reception of user-defined data, so that a new session begins, for example, when an employee logs (or clocks) in, when a new (or different) wireless scanner is identified, when a “provisioning” key or icon is selected, etc. The session may alternately (or also) be based on the occurrence of an event (e.g., power outage, security breach, etc.). The term “security data” is used herein to connote any number, code or data that is used to enhance (or establish a level of) security in a wireless link. For example, with respect to the Bluetooth protocol, a personal identification number (PIN) is used for authentication and encryption, and would therefore constitute security data. Similar (security) data is used in conjunction with other wireless protocols.
In a first embodiment of the present invention, a host includes a provisioning application connected to a first wireless device and adapted to (i) generate security data at the beginning of a session, (ii) provide the security data to the first wireless device, and (iii) display the security data on a display. In alternate embodiments of the present invention, the provisioning application is further adapted to (i) store the security data in a memory device, (ii) display instructional information on the display, and/or (iii) generate a barcode(s) that includes the security data, at least one provisioning command, and/or additional data.
In a second embodiment of the present invention, a scanner includes a scanning application connected to a second wireless device and adapted to (i) acquire encoded data (e.g., a barcode, etc.), (ii) extract the security data from the encoded data, (iii) identify the security data as being applicable to the second wireless device, and (iv) provide the security data to the second wireless device. In an alternate embodiment of the present invention, the scanning application is further adapted to store the security data in a memory device. If the barcode(s) includes a provisioning command(s), the scanning application may use the command(s) to identify the security data as being applicable to the second wireless device and/or the second wireless device may use the command(s) to identify the security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.).
In a third embodiment of the present invention, the scanning application is further adapted to acquire additional encoded data from a third device (e.g., printer, etc.) and provide the additional data to the host over a secure wireless link. In one embodiment of the present invention, the additional encoded data is used by the host to establish a connection with the third device.
A more complete understanding of a system and method of provisioning a wireless link for a wireless scanner will be afforded to those skilled in the art, as well as a realization of additional advantages and objects thereof, by a consideration of the following detailed description of the preferred embodiment. Reference will be made to the appended sheets of drawings which will first be described briefly.
The present invention provides a system and method of provisioning a wireless link for a wireless scanner. In the detailed description that follows, like element numerals are used to describe like elements illustrated in one or more figures. It should be appreciated that while embodiments of the present invention are described herein in term of a Bluetooth protocol, the present invention is not so limited, and is further applicable to all wireless protocols including, but not limited to, WiFi, WLAN, ZigBee, and all other wireless protocols generally known to those skilled in the art.
Embodiments of the present invention operate in accordance with an output device (e.g., display, printer, etc.), a primary wireless device (e.g., a host) connected to the output device, and at least one secondary wireless device (e.g., a scanner).
In accordance with a first embodiment of the present invention, the host 100 is adapted to generate security data at the beginning of a session. The term “session” is used herein to connote a (static or dynamic) period of time. The session may be user-defined, so that a new session begins, for example, every hour, every day, at the beginning of a shift, etc. The session may alternately (or also) be based on the reception of user-defined data, so that a new session begins, for example, when an employee logs (or clocks) in, when a new (or different) wireless scanner is identified, when a “provisioning” key or icon is selected, etc. The session may alternately (or also) be based on the occurrence of an event (e.g., power outage, security breach, etc.). The term “security data” is used herein to connote any number, code or data that is used to enhance (or establish a level of) security in a wireless link. For example, with respect to the Bluetooth protocol, a personal identification number (PIN) is used for authentication and encryption, and therefore constitute security data. Similar (security) data is used in conjunction with other wireless protocols.
The security data is then displayed on the display 110. In a preferred embodiment of the present invention, the security data is displayed in the form of at least one barcode. In other words, the host 100, in this embodiment, is adapted to (i) generate security data, (ii) generate at least one barcode that includes at least the security data, and (iii) display the at least one barcode on the display 110. In another embodiment of the present invention, the host 100 is further adapted to generate a barcode(s) that includes both the security data and at least one provisioning command. The provisioning command is used by the scanner 120 (or components included therein) to identify the security data as data that is applicable to a wireless device or can be used to provision a wireless link. In another embodiment of the present invention, the host 100 is further adapted to display instructional information on the display. Such an embodiment is exemplified in
The wireless device 120 is then used to scan an image of the barcode(s) on the display 110. The security data is then extracted from the barcode(s) and used to provision a wireless link between the scanner 120 and the host 100. For example, if the scanner 120 includes Bluetooth technology, the security data (e.g., a PIN) may be used to generate a “response” to a “challenge” transmitted by the host 100. It may also be used to facilitate encryption.
In accordance with another embodiment of the present invention, the scanner 120 includes a second wireless device 122, a scanning application 124 and a memory device 120. The scanning application 124 is adapted to (i) acquire barcode data, (ii) extract (e.g., decode) the security data from the barcode data, (iii) identify the security data as being applicable to the second wireless device, and (iii) provide the security data to the second wireless device. In an alternate embodiment of the present invention, the scanning application 124 is further adapted to store the security data in the memory device 126. If a provisioning command(s) is provided, the scanning application 124 may use the command(s) to identify the security data as being applicable to the second wireless device 122 and/or the second wireless device 122 may use the command(s) to identify the security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.).
In accordance with another embodiment of the present invention, as shown in
The scanner application 124, in accordance with this embodiment, is further adapted to (i) acquire the additional security data (e.g., by scanning a barcode that includes the additional security data, etc.) and (ii) provide the additional security data to the second wireless device 122. The second wireless device 122 is then adapted to provide the additional security data to the first wireless device 102 via the wireless link 200. The additional security data is then used to provision a wireless link 400 between the first wireless device 102 and the third wireless device 302. If a provisioning command(s) is provided, the scanning application 124 may use the command(s) to identify the additional security data as being applicable to the second wireless device 122, the second wireless device 122 may use the command(s) to identify the additional security data as being applicable to the first wireless device 102, and/or the first wireless device 102 may use the command(s) to identify the additional security data as being applicable to provisioning a wireless link (e.g., for authentication, encryption, etc.).
It should be appreciated that the wireless devices (e.g., 102, 122) depicted and discussed herein include, but are not limited to, Bluetooth transceivers and all other wireless reception and/or transmission devices generally known to those skilled in the art. It should also be appreciated that the memory devices (e.g., 106, 126) depicted and discussed herein include, but are not limited to, RAM, cache memory, flash memory, magnetic disks, optical disks, removable disks, SCSI disks, IDE hard drives, registers and all other data storage devices (and combinations thereof, such as RAID devices) generally known to those skilled in the art. It should further be appreciated that the number, locations and types of components depicted in
A method of provisioning a wireless link in accordance with one embodiment of the present invention is illustrated in
An image of the security data (or an encoded version thereof) is then scanned at step 408 and used to establish a wireless connection between the first wireless device and a second wireless device at step 410. For example, the second wireless device may use the security data to perform at least one security procedure (e.g., generate and transmit a “response” to the “challenge,” etc.). The wireless link can then be used to exchange data at step 412 until the session has expired or a new session has begun. At step 414, and at that time, security data (e.g., new security data) is automatically generated at step 402, and the process begins again.
A method of provisioning a wireless link in accordance with a second embodiment of the present invention is illustrated in
Having thus described several embodiments of a system and method of provisioning a secure wireless link for a wireless scanner, it should be apparent to those skilled in the art that certain advantages of the within described system and method have been achieved. It should also be appreciated that various modifications, adaptations, and alternative embodiments thereof may be made within the scope and spirit of the present invention. The invention is solely defined by the following claims.