1. Field of the Invention
The present invention relates to data transmissions among electronic devices and more particularly to securing a wireless communications connection between multiple electronic devices.
2. Description of Related Art
Various wireless communications protocols such as Bluetooth provide standards for wireless communication links between electronic devices such as cellular telephones, portable digital assistants, and mobile computers. The number and types of electronic devices with wireless communications capabilities are dramatically growing. Focusing specifically on the recent proliferation in number and types of Bluetooth-enabled devices, Bluetooth wireless communications capabilities can be found in devices as diverse as automobiles and medical devices as well as the more expected complement of cellular telephones, portable digital assistants and the like. In many instances, users of electronic devices desire a secure wireless communications connection so that information wirelessly transmitted from one electronic device to another is protected against eavesdropping. Such an encrypted connection is highly desired when transferring sensitive meeting notes, medical records, or a user's personal data from a PDA to a mobile computer or sharing sensitive files among a group of wirelessly communicating electronic devices.
Under the prior art methods, securing a Bluetooth connection with encryption generally required registration of a specific Personal Identification Number (PIN) on all devices wishing to make use of the secure connection. The PIN registration process has typically been implemented as a manual process requiring entry of the PIN on each of the devices between which secure communication is desired. The prior art manual PIN entry process has significant drawbacks: it is cumbersome, time consuming, and prone to data entry error. Further, manual PIN entry is nearly impossible on Bluetooth-enabled devices that do not provide a User Interface (UI) for PIN entry.
An alternative to manual PIN entry for PIN registration among electronic devices is to employ an existing (non-secure) wireless connection to transmit a PIN between the electronic devices for which a secure connection is desired. This PIN transmission alternative alleviates the cumbersome nature of manual PIN entry and its accompanying potential for PIN entry error. But, transmitting a PIN over a non-secure wireless communications connection creates substantial security concerns that undermine the benefits of encrypted communication. Notably, the transmission of a PIN over a non-secure wireless connection may be intercepted by a third party who can then use the intercepted PIN. This interceptor can then eavesdrop on any subsequent communications on what is perceived to be a secure communication connection.
Therefore, based on the shortcomings of the prior art discussed above, there is a need in the art for an apparatus and method to create a secure wireless communications link that allows sharing of PINs without requiring manual entry of the PINs, that allows sharing PINs even for devices that do not have a UI, and that limits access of spying third parties to the shared PINs.
The present invention addresses the shortcomings of the prior art and provides an apparatus and method for establishing a secure wireless communications link between two wireless communications-enabled devices. In the apparatus and method of the present invention, one wireless communication-enabled device will transmit or push an encrypted communication of a generated PIN value to another electronic device across a previously existing (non-secure) wireless communications connection. Subsequent communications between the electronic devices are secure, as each device enters a secure communications mode using the shared PIN. Using the apparatus or method of the present invention, no cumbersome, error-prone manual PIN entry is required. Further, the present invention may be used to push a PIN to an electronic device that does not have a UI for entering PINs, thereby facilitating secure communications with these electronic devices. Additionally, since the PIN is encrypted for its transmission over a wireless communications connection, the risk of a third party being able to use the PIN to spy on subsequent secure communications is greatly reduced as compared with the prior art PIN transmission method.
A more complete understanding of the secure wireless communication apparatus and method will be afforded to those skilled in the art, as well as a realization of additional advantages and objects thereof, by a consideration of the following detailed description of a preferred embodiment of the invention. Reference will be made to the appended sheets of drawings, which will be first described briefly.
The present invention provides an apparatus and method for achieving a secure wireless communications connection between electronic devices that overcomes the limitations of the prior art. In the detailed description that follows, like element numerals are used to indicate like elements that appear in one or more of the drawings.
The memory 14 of the first electronic device 10 is configured to store an encryption key and a personal identification number. The stored encryption key and personal identification number would then be used by the security module 18 when initiating a secure communications connection. The encryption key is generated by the second electronic device 30 and wirelessly transmitted to the transceiver 16 of the first electronic device 10. The second electronic device 30 also generates a corresponding decryption key which is retained in a memory of the second electronic device 30. Preferably, the encryption key comprises a public key and the corresponding decryption key comprises a private key, each generated by the second electronic device 30 according to a public key encryption technique.
The transceiver 16 of the first electronic device 10 is operatively connected to the processor 12 and is configured to communicate wirelessly with a second electronic device 30 over a wireless communications connection 40. Preferably, the transceiver 16 is configured to communicate wirelessly using the Bluetooth communications protocol.
The security module 18 of the first electronic device 10 is executable by the processor 12, and is configured to initiate a secure communications connection with the second electronic device 30. The security module 18 initiates the secure communications connection with the second electronic device by using the transceiver 16 to transmit a personal identification number encrypted according to the encryption key stored in the memory 14 of the first electronic device 10. Advantageously, since only an electronic device possessing the corresponding decryption key will be able to easily decode the personal identification number, it would be difficult for an eavesdropping device to obtain the personal identification number and subsequently join the secure communications connection. The security module 18 may initiate the secure communications connection with the second electronic device 30 by initially using the transceiver 16 to send a command to the second electronic device 30 requesting an encrypted connection. This command requesting an encrypted connection may be triggered by a trigger event such as a request to send a certain type of data or a file of a certain type. Or, the command requesting an encrypted connection may be sent upon the initiation of a non-secure communications channel between the first electronic device 10 and the second electronic device 30.
In the apparatus of the present invention, neither the first electronic device 10 nor the second electronic device 30 requires a user interface for the security module 18 to to initiate a secure communications connection. Therefore, the apparatus of the present invention facilitates secure wireless communications using shared personal identification numbers even among electronic devices that do not have keypads or other convenient data entry devices. Additionally, since no user interface is required for the security module 18 to initiate a secure communication connection, the apparatus of the present invention advantageously avoids the cumbersome and error-prone nature of manual PIN entry.
The present invention also comprises a method for two wirelessly-communicating electronic devices to establish a secure communications link by securely sharing a personal identification number.
The non-secure wireless communications connection in step 110 is preferably a communications connection employing the Bluetooth wireless communications protocol between Bluetooth-enabled devices. The method of the present invention is not limited to a type or types of Bluetooth-enabled device. Rather, the method may be performed by substantially all currently-existing Bluetooth-enabled electronic devices. Alternately, the method of the present invention may be performed by electronic devices communicatively connected using another wireless communications protocol.
The sending of a command to request an encrypted connection by the first electronic device in step 120 may be triggered by the occurrence of a certain event such as a request to transfer a predetermined type of sensitive data or a predetermined file type between electronic devices. Alternately, the sending of this command in step 120 may be triggered by user input on the first or the second electronic device. Still another possibility to trigger the sending of the command in step 120 is that the command is automatically sent whenever the first and second electronic devices establish a non-secure wireless communications connection (i.e. attempting to achieve a secure communications connection is a default communications mode).
Once the second electronic device receives the command requesting an encrypted connection, the second electronic device generates an encryption/decryption key set in step 130. Preferably, the encryption key comprises a public key and the decryption key comprises a private key generated according to a public key encryption technique. Various methods for public key encryption known in the art may be employed to generate this key set in step 130. In step 140, the public key is sent from the second electronic device to the first electronic device. The second electronic device retains the private key so that the first electronic device may then transmit messages encrypted using the public key that can be decrypted and read by the second electronic device with the private key.
The generation of personal identification numbers by the first electronic device, depicted as step 150, may be conducted by any of a variety of techniques known in the art. For example, personal identification numbers may be randomly generated according to a pseudo random number generation technique known in the art. Random generation of personal identification numbers would limit spying on securely transmitted data by an eavesdropping electronic device as it would be highly unlikely that the eavesdropping electronic device would be able to correctly predict a randomly generated PIN. Alternately, personal identification numbers may be generated according to an automated personal identification number rotation system.
In step 160, the first electronic device employs the public key sent in step 140 to encrypt the personal identification number generated in step 150. In step 170, the first electronic device transmits the encrypted personal identification number to the second electronic device over the non-secure wireless communications connection. Unlike the prior art nonencrypted PIN transmissions, the PIN transmission of the present invention can only be decrypted and read by an electronic device having the private key corresponding to the public key used to encrypt the PIN. Thus, advantageously, it is unlikely that an eavesdropping electronic device would be able to intercept and use the encrypted PIN transmission of the present invention.
In step 180, the second electronic device decrypts the encrypted personal identification number using the private key. In step 190, the first and second electronic devices use the personal identification number to establish a secure wireless communications connection according to a technique known in the art. For example, the Bluetooth communication protocol sets forth a series of authorization communications to establish a secure wireless communications connection when a common PIN has been registered on two communicating electronic devices.
Advantageously, the method of the present invention may be performed without requiring user input on either of the electronic devices. The method of the present invention could be completely software or firmware implemented such that once a command requesting an encrypted communication has been sent in step 120, the other steps of the method proceed substantially automatically. Where the present invention is implemented as a substantially automatic method, the present invention facilitates the establishment of a secure wireless connection where one or both of the electronic devices do not have a user interface allowing manual PIN entry. Alternately, the method of the present invention could require user input for an electronic device to perform one or more of the steps of the method. In this alternate embodiment, one or both of the electric devices could prompt the user for input before performing one or more of the steps of the method. For example, user input could be requested by the second electronic device after receiving the command requesting an encrypted communications connection sent in step 120. In response to such a prompt, the user of the second electronic device could elect not to proceed with establishing a secure connection.
Having thus described several embodiments of the wireless communications method, it should be apparent to those skilled in the art that certain advantages of the system have been achieved. It should also be appreciated that various modifications, adaptations, and alternative embodiments thereof may be made within the scope and spirit of the present invention.