[go: up one dir, main page]

WO2002056536A1 - Method and system for bonding two bluetooth devices - Google Patents

Method and system for bonding two bluetooth devices Download PDF

Info

Publication number
WO2002056536A1
WO2002056536A1 PCT/NL2001/000008 NL0100008W WO02056536A1 WO 2002056536 A1 WO2002056536 A1 WO 2002056536A1 NL 0100008 W NL0100008 W NL 0100008W WO 02056536 A1 WO02056536 A1 WO 02056536A1
Authority
WO
WIPO (PCT)
Prior art keywords
passkey
devices
bluetooth
user
bonding
Prior art date
Application number
PCT/NL2001/000008
Other languages
French (fr)
Inventor
Erwin Weinans
Original Assignee
Telefonaktiebolaget Lm Ericsson
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson filed Critical Telefonaktiebolaget Lm Ericsson
Priority to PCT/NL2001/000008 priority Critical patent/WO2002056536A1/en
Publication of WO2002056536A1 publication Critical patent/WO2002056536A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/18Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the invention relates to a method for bonding two Bluetooth devices as described in the preamble of claim 1.
  • the invention also relates to a system which is suitable for applying the method as described in the preamble of claim 6.
  • the Bluetooth technology provides for a short range connection between devices based on 2.4 GHz radio technology.
  • the range is about 10 meters and the devices do not have to be in line of sight to communicate.
  • the maximum bandwidth for data traffic is 1 Mb per second.
  • Bluetooth is operating in the free ISM band, which is also used by many other devices. Bluetooth prevents disturbance by other devices by hopping over 79 frequencies every 1/1600 second.
  • the Bluetooth technology has built-in functionality for authentication and encryption. Authentication is used to prevent unwanted access to data and to prevent falsifying of message originator. Encryption is used to prevent eavesdropping.
  • LMP link set-up between Bluetooth devices .
  • the link-level security mode is based on the concept of link keys. These keys are secret 128 bit random numbers stored individually for each pair of devices in a Bluetooth connection. Each time two Bluetooth devices communicate the link key is used for authentication and encryption. Both devices contain the same link key which is generated locally in each device based on a passkey which is common for both devices or common information derived from such passkey. The link key is kept secret in each device.
  • the user puts the devices in a bonding mode upon which the devices ask the user to enter a passkey, which may be selected arbitrarily by the user.
  • a passkey which may be selected arbitrarily by the user.
  • the device Upon entering the passkey in a device the device will generate a piece of information based on the passkey. The piece of information will be identical for both devices. From then on the two devices are bonded and there is no need to keep the passkey by the user or the devices any longer.
  • the passkey based piece of information is used by each device to generate and store a common link key. From that moment on the two devices are paired.
  • the Bluetooth devices which are to be bonded are both equipped with display means and manual input means, in particular a keyboard, there will be no difficulty to enter the passkey by a user of the devices for the bonding procedure.
  • the device If one device is not equipped with such an input device the device presently needs to contain a factory programmed passkey.
  • the passkeys may be default identical for all manufactured devices of a specific type.
  • the passkeys may be unique per device.
  • a drawback of the first solution of handling a factory programmed passkey is that the Bluetooth security is weakened. Since the value of the passkey is essential for creating the link key and the passkey being identical for all devices of the same type a Bluetooth connection between them cannot be considered secure.
  • a drawback of the second solution is that " the manufacturer must maintain a logistic system for handling the many different passkeys, each unique passkey must be communicated to its ultimate user individually, e.g. printed on a box containing a specific Bluetooth device in which the passkey is stored, and the manufacturer must provide a way to restore devices for which the passkey is lost. There must be a support organisation for handling lost passkey requests. Such a logistic and supporting system will be very complex and expensive to maintain. It is an object of the invention to solve the above mentioned drawbacks .
  • the device For entering a passkey in a Bluetooth device, the device needs not to be equipped with a keyboard or such type of physical interface, but any other non-radio communication interface can be used.
  • non-radio communication interface is part of the device in the first place for normal use of the device.
  • the device may present the randomly generated passkey in several ways, such as by transmission of sound or light.
  • the manufacturer may make all Bluetooth devices generic. Still, the devices are able to support Bluetooth encryption in a secure way. There are no logistical costs attached to the method. Since the passkey is uniquely generated every time the device needs to be bonded with another device and on demand by a user of the devices, loosing a passkey is not longer an issue and therefore does not impose costs for retrieving same. The above mentioned drawbacks are solved also by a system as described in claim 6.
  • fig. 1 shows schematically a system in which a prior art method is applied for entering a passkey into two Bluetooth devices by a user thereof
  • figs. 2, 3, 4 and 5 show first to fourth examples respectively of a system according to the invention in which the method according to the invention for entering a passkey into two Bluetooth devices is applied.
  • the prior art method shown schematically in fig. 1 is suitably for manually entering a passkey into two Bluetooth devices 1 by a user 2.
  • the devices 1 may comprise a display means 3 and an input means 4, such as a keypad.
  • the arrows shown in fig. 1-5 indicate the entering or transmission of a passkey.
  • Bluetooth devices Although indicated as Bluetooth devices, the devices 1 and those to mention may in fact be larger or complexer pieces of equipment containing a pure Bluetooth device integrated therewith.
  • the devices as a whole are called Bluetooth device.
  • the user 2 may choose any suitable passkey arbitrarily.
  • the user 2 may enter the passkey into both devices 1 by using their input means 4.
  • each device 1 will use the passkey to generate a link key which will be identical for both devices 1.
  • the devices 1 will check the identity of their link keys by transmitting data which is encrypted by the link key and by analysing a similar received transmission for its validity or identity with the locally stored link key.
  • the method exemplified by fig. 2 may be applied for providing a common passkey to two Bluetooth devices, such as devices 1, 5, of which one device 5 does not comprise the input means 4 and possibly not the display means 3 of the device 1. Instead, device 5 is provided with some kind of transmission means 6.
  • the transmission means 6 may be an acoustic or optical transducer for transmitting a sound signal or light signal respectively which is discernible by the user 2.
  • the light signal may be of any type, such as light flashes or the display of readable characters.
  • Bluetooth device 5 contains a random number generator (not shown) for generating a random passkey upon putting the device 5 in bonding mode by user 2.
  • Device 5 will transmit the randomly generated passkey, such that the user 2 can hear, read or otherwise discern the passkey. Then, user 2 may enter the passkey discerned from device 5 into the other device 1 in the same way as with the prior art method shown in fig. 1.
  • the transmission means 6 of device 5 consist of means which are incorporated in device 5 anyway for normal use of device 5, that is apart from said bonding.
  • the method exemplified by fig. 3 differs from the method shown by fig. 2 in that Bluetooth device 5 is replaced by Bluetooth device 8 having transmission means 9, and comprising in addition a reader unit 10.
  • Reader unit 10 comprises a sensor 11 which is suitable for sensing a signal transmitted by the transmission means 9 of device 8.
  • reader unit 10 comprises transmission means 12 which are suitable for transmitting a signal which is discernible by the user 2, such as a signal transmitted by transmission means 6 of device 5 of fig. 2.
  • the transmission means 9 of device 8 of fig. 3 may be of a type which transmits a signal which is undiscernible by user 2. Reader unit 10 may be used to convert a signal transmitted by transmission means 9 into a transmission signal which is discernible by user 2. Yet, the example of fig. 3 is also applicable for a case in which a signal transmitted by transmission means 9 is discernible by user 2, but which is possibly difficult to discern.
  • the signal transmitted by transmission means 9 may consist of a series of light flashes with short intervals, while transmission means 12 may provide a converted presentation of a passkey carried by the light flashes, such as a spoken or readable message.
  • the method exemplified by fig. 4 differs from the method shown by fig.
  • Bluetooth device 1 is replaced by a Bluetooth device 15, which comprises a sensor means 16 instead of the input means 4 of device 1, and reader unit 10 is replaced by a reader unit 18 having sensor means 19 and transmission means 20.
  • Reader unit 18 differs from reader unit 10 of fig. 3 basically in that a signal carrying a passkey transmitted by transmission means 20 need not to be discernible by user 2 but must be suitable to be sensed by sensor means 16 of device 15.
  • sensor means 16 consist of means which are already present for normal operation of device 15.
  • the method exemplified by fig. 5 differs from the method shown by fig. 4 in that Bluetooth device 15 is replaced by Bluetooth device 22 having sensor means 23 which are suitable for sensing a signal carrying a passkey transmitted by transmission means 9 of device 8 directly.
  • the user 2 only needs to bring devices 8 and 22 in proper proximity of each other.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Method and system for bonding a first Bluetooth device (5, 8) to a second Bluetooth device (1, 15, 22), with both devices placed in a bonding mode, by having the first devcie to generate a random passkey and transmitting it in a manner which is descernible by a user (2) of the devices, or by sensor means (11, 19) of a reader unit (10, 18), or by sensor means (23) of the other device (22). The reader unit (10) may convert a received signal carrying a passkey which is undiscernible by the user (2) into a presentation which is discernible by user (2). Upon discerning the password the user (2) may enter the password in the other device (1) in the usual way. Said other Bluetooth device (15, 22) may have sensor means (16, 23) for sensing a signal carrying a password transmitted by a reader unit (18) or by the Bluetooth device (8).

Description

Title: Method for bonding two Bluetooth devices and system suitable for applying the method.
The invention relates to a method for bonding two Bluetooth devices as described in the preamble of claim 1. The invention also relates to a system which is suitable for applying the method as described in the preamble of claim 6.
The Bluetooth technology provides for a short range connection between devices based on 2.4 GHz radio technology. The range is about 10 meters and the devices do not have to be in line of sight to communicate. The maximum bandwidth for data traffic is 1 Mb per second. Bluetooth is operating in the free ISM band, which is also used by many other devices. Bluetooth prevents disturbance by other devices by hopping over 79 frequencies every 1/1600 second. When a communication cable between two devices is replaced by the use of radio signals for communication there will be a need to prevent eavesdropping and falsifying transmitted messages. Therefore the Bluetooth technology has built-in functionality for authentication and encryption. Authentication is used to prevent unwanted access to data and to prevent falsifying of message originator. Encryption is used to prevent eavesdropping. These two techniques combined with the frequency hopping technique and the limited transmission range for a Bluetooth unit give the technology higher protection against eavesdropping. Dependent on the application which is to be executed the Bluetooth concept provides three levels of security:
1. non-secure; this mode bypasses functionality for authentication and encryption.
2. service-level security; security procedures on this level have not been fully established yet.
3. link-level security; security procedures are initiated before the link set-up upon completion of a Link Manager Protocol
(LMP) which is responsible for link set-up between Bluetooth devices . The link-level security mode is based on the concept of link keys. These keys are secret 128 bit random numbers stored individually for each pair of devices in a Bluetooth connection. Each time two Bluetooth devices communicate the link key is used for authentication and encryption. Both devices contain the same link key which is generated locally in each device based on a passkey which is common for both devices or common information derived from such passkey. The link key is kept secret in each device.
If one wants to use two Bluetooth devices with secure communication between the devices it is necessary to firstly create a trusted relationship between the devices by the user. To that end the user puts the devices in a bonding mode upon which the devices ask the user to enter a passkey, which may be selected arbitrarily by the user. Upon entering the passkey in a device the device will generate a piece of information based on the passkey. The piece of information will be identical for both devices. From then on the two devices are bonded and there is no need to keep the passkey by the user or the devices any longer. In a second stage the passkey based piece of information is used by each device to generate and store a common link key. From that moment on the two devices are paired. The next time the devices get connected the stored link key on both sides will be checked. If the link keys match no request for entering a passkey will be generated. If the link keys do not match the above bonding and pairing procedures must be carried out again. If the Bluetooth devices which are to be bonded are both equipped with display means and manual input means, in particular a keyboard, there will be no difficulty to enter the passkey by a user of the devices for the bonding procedure.
If one device is not equipped with such an input device the device presently needs to contain a factory programmed passkey.
There are two common ways of handling stored passkeys. Firstly the passkeys may be default identical for all manufactured devices of a specific type. Secondly the passkeys may be unique per device. A drawback of the first solution of handling a factory programmed passkey is that the Bluetooth security is weakened. Since the value of the passkey is essential for creating the link key and the passkey being identical for all devices of the same type a Bluetooth connection between them cannot be considered secure. A drawback of the second solution is that "the manufacturer must maintain a logistic system for handling the many different passkeys, each unique passkey must be communicated to its ultimate user individually, e.g. printed on a box containing a specific Bluetooth device in which the passkey is stored, and the manufacturer must provide a way to restore devices for which the passkey is lost. There must be a support organisation for handling lost passkey requests. Such a logistic and supporting system will be very complex and expensive to maintain. It is an object of the invention to solve the above mentioned drawbacks .
Therefore the invention provides a method as described in claim 1.
With the method according to claim 1, for entering a passkey in a Bluetooth device, the device needs not to be equipped with a keyboard or such type of physical interface, but any other non-radio communication interface can be used. In particular such non-radio communication interface is part of the device in the first place for normal use of the device. The device may present the randomly generated passkey in several ways, such as by transmission of sound or light.
When applying the method according to the invention the manufacturer may make all Bluetooth devices generic. Still, the devices are able to support Bluetooth encryption in a secure way. There are no logistical costs attached to the method. Since the passkey is uniquely generated every time the device needs to be bonded with another device and on demand by a user of the devices, loosing a passkey is not longer an issue and therefore does not impose costs for retrieving same. The above mentioned drawbacks are solved also by a system as described in claim 6.
The invention will be described in further detail with reference to the accompanied drawings in which: fig. 1 shows schematically a system in which a prior art method is applied for entering a passkey into two Bluetooth devices by a user thereof; figs. 2, 3, 4 and 5 show first to fourth examples respectively of a system according to the invention in which the method according to the invention for entering a passkey into two Bluetooth devices is applied.
The prior art method shown schematically in fig. 1 is suitably for manually entering a passkey into two Bluetooth devices 1 by a user 2. The devices 1 may comprise a display means 3 and an input means 4, such as a keypad.
The arrows shown in fig. 1-5 indicate the entering or transmission of a passkey.
Although indicated as Bluetooth devices, the devices 1 and those to mention may in fact be larger or complexer pieces of equipment containing a pure Bluetooth device integrated therewith.
For simplicity the devices as a whole are called Bluetooth device. The user 2 may choose any suitable passkey arbitrarily. Upon putting the devices 1 in a bonding mode the user 2 may enter the passkey into both devices 1 by using their input means 4. Upon completion thereof each device 1 will use the passkey to generate a link key which will be identical for both devices 1. With every communication session between the devices 1 the devices 1 will check the identity of their link keys by transmitting data which is encrypted by the link key and by analysing a similar received transmission for its validity or identity with the locally stored link key.
The method exemplified by fig. 2 may be applied for providing a common passkey to two Bluetooth devices, such as devices 1, 5, of which one device 5 does not comprise the input means 4 and possibly not the display means 3 of the device 1. Instead, device 5 is provided with some kind of transmission means 6. The transmission means 6 may be an acoustic or optical transducer for transmitting a sound signal or light signal respectively which is discernible by the user 2. The light signal may be of any type, such as light flashes or the display of readable characters.
Bluetooth device 5 contains a random number generator (not shown) for generating a random passkey upon putting the device 5 in bonding mode by user 2. Device 5 will transmit the randomly generated passkey, such that the user 2 can hear, read or otherwise discern the passkey. Then, user 2 may enter the passkey discerned from device 5 into the other device 1 in the same way as with the prior art method shown in fig. 1. Preferably the transmission means 6 of device 5 consist of means which are incorporated in device 5 anyway for normal use of device 5, that is apart from said bonding.
The method exemplified by fig. 3 differs from the method shown by fig. 2 in that Bluetooth device 5 is replaced by Bluetooth device 8 having transmission means 9, and comprising in addition a reader unit 10. Reader unit 10 comprises a sensor 11 which is suitable for sensing a signal transmitted by the transmission means 9 of device 8. In addition reader unit 10 comprises transmission means 12 which are suitable for transmitting a signal which is discernible by the user 2, such as a signal transmitted by transmission means 6 of device 5 of fig. 2.
The transmission means 9 of device 8 of fig. 3 may be of a type which transmits a signal which is undiscernible by user 2. Reader unit 10 may be used to convert a signal transmitted by transmission means 9 into a transmission signal which is discernible by user 2. Yet, the example of fig. 3 is also applicable for a case in which a signal transmitted by transmission means 9 is discernible by user 2, but which is possibly difficult to discern. For example, the signal transmitted by transmission means 9 may consist of a series of light flashes with short intervals, while transmission means 12 may provide a converted presentation of a passkey carried by the light flashes, such as a spoken or readable message. The method exemplified by fig. 4 differs from the method shown by fig. 3 in that Bluetooth device 1 is replaced by a Bluetooth device 15, which comprises a sensor means 16 instead of the input means 4 of device 1, and reader unit 10 is replaced by a reader unit 18 having sensor means 19 and transmission means 20. Reader unit 18 differs from reader unit 10 of fig. 3 basically in that a signal carrying a passkey transmitted by transmission means 20 need not to be discernible by user 2 but must be suitable to be sensed by sensor means 16 of device 15.
Preferably, sensor means 16 consist of means which are already present for normal operation of device 15.
The method exemplified by fig. 5 differs from the method shown by fig. 4 in that Bluetooth device 15 is replaced by Bluetooth device 22 having sensor means 23 which are suitable for sensing a signal carrying a passkey transmitted by transmission means 9 of device 8 directly. The user 2 only needs to bring devices 8 and 22 in proper proximity of each other.
As described herein before the method and system according to the invention and as exemplified with reference to figs. 2-5 make it possible for a manufacturer to only manufacture identical Bluetooth devices not containing passkeys and not having passkeys allocated thereto, while preserving the possibility of secure communications between two Bluetooth devices offered by Bluetooth technology, against very reduced costs.

Claims

C L A I M S
1. Method for bonding a first Bluetooth device (5, 8) to a second Bluetooth device (1, 15, 22) comprising: a) placing the devices in a bonding mode; b) providing a passkey which is identical for both devices; c) storing the passkey in each device; d) generating identical passkey based information in both devices; e) leaving the bonding mode while further ignoring the password; characterized in that: the step of providing a passkey includes: bl) generating a random passkey by the first device; b2) presenting the random passkey by the first device to its outside by non-radio transmission; b3) sensing the random passkey from the outside of the first device; b4) providing the sensed passkey to the second device.
2. Method for bonding two Bluetooth devices (1, 5) according to claim 1, characterized in that the sensing of the passkey and providing the sensed passkey to the second device (1) are carried out by a user (2) of the devices (1, 5) only.
3. Method for bonding two Bluetooth devices (1, 8) according to claim 1, characterized in that the sensing of the passkey is carried out by a reader unit (10) which is separate from the first device (8) , the reader unit presents the sensed passkey to its outside by non-radio transmission and discernable to a user of the devices, and the passkey discerned from the reader unit by the user (2) is entered by the user into the second device (1) .
4. Method for bonding two Bluetooth devices (8, 15) according to claim 1, characterized in that the sensing of the passkey is carried out by a reader unit (18) which is separate from the first device (8) and the reader unit presents the sensed passkey to its outside by non-radio transmission and discernable to a sensor (16) of the second device (15) to thereby provide the second device with the passkey.
5. Method for bonding two Bluetooth devices (8, 22) according to claim 1, characterized in that the sensing of the passkey is carried out by a sensor (23) of the second device (22) to provide the second device with the passkey.
6. System of a first Bluetooth device (5, 8) and a second Bluetooth device (1, 15, 22), the devices comprising: a) mode selection means for placing the devices in a bonding mode; b) means for providing a passkey to the devices, the passkey being identical for both devices; c) storage means for storing the respective passkey in each device; d) generator means for generating identical passkey based information; e) reset means for leaving the bonding mode and for clearing the passkey; characterized in that: the means for providing the passkey includes: bl) generator means of the first device for generating a random passkey; b2) output means (6, 9) of the first device for outputting the random passkey by non-radio transmission.
7. System according to claim 8, characterized in that the output means (6) of the first device (5) outputs the passkey in a manner which makes it discernible by a user (2) of the devices (1, 5) .
8. System according to claim 8, characterized by a reader unit (10) having sensor means (11) for sensing the passkey outputted by the output means (9) of the first device (8) and having output means (12) for outputting the sensed passkey by non-radio transmission and discernable to a user (2) of the devices (1, 8) .
9. System according to claim 8, characterized by a reader unit (18) having sensor means (19) for sensing the passkey outputted by the output means (9) of the first device (8) and having output means (20) for outputting the sensed passkey by non-radio transmission and discernable to sensor means (16) of the second device (15) to thereby provide the second device with the passkey.
10. System according to claim 8, characterized in that the output means (9) of the first device (8) outputs the passkey in a manner which makes it discernable to sensor means (23) of the second device (22) to thereby provide the second device with the passkey.
PCT/NL2001/000008 2001-01-09 2001-01-09 Method and system for bonding two bluetooth devices WO2002056536A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/NL2001/000008 WO2002056536A1 (en) 2001-01-09 2001-01-09 Method and system for bonding two bluetooth devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/NL2001/000008 WO2002056536A1 (en) 2001-01-09 2001-01-09 Method and system for bonding two bluetooth devices

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/729,840 Continuation US20100176125A1 (en) 2003-01-13 2010-03-23 Package

Publications (1)

Publication Number Publication Date
WO2002056536A1 true WO2002056536A1 (en) 2002-07-18

Family

ID=19760732

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NL2001/000008 WO2002056536A1 (en) 2001-01-09 2001-01-09 Method and system for bonding two bluetooth devices

Country Status (1)

Country Link
WO (1) WO2002056536A1 (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005036487A3 (en) * 2003-10-09 2005-06-16 Gina Parmar Personal security system
CN100384223C (en) * 2005-01-19 2008-04-23 英华达(上海)电子有限公司 The method of digital camera anti-theft using bluetooth technology
JP2008178092A (en) * 2006-12-27 2008-07-31 Intel Corp Method for exchanging strong encryption key between devices using alternative input method in wireless personal area network (wpan)
US7711861B2 (en) 2006-08-30 2010-05-04 Microsoft Corporation Synchronized indicator light for secure connections
US7783879B2 (en) 2003-11-20 2010-08-24 Nokia Corporation Method and device relating to security in a radio communication network
EP2509276A1 (en) * 2011-04-05 2012-10-10 F. Hoffmann-La Roche AG Method for secure transmission of electronic data over a data communication connection between one device and another
EP2523417A1 (en) * 2011-05-09 2012-11-14 Kamstrup A/S Paring of devices using an encryption key
JP2013214257A (en) * 2012-04-04 2013-10-17 Hitachi Ltd Terminal linking system and method therefor
US8720780B2 (en) 2009-04-08 2014-05-13 Blackberry Limited Systems, devices, and methods for displaying a barcode at a computing device
EP2306692B1 (en) * 2009-10-02 2014-05-21 BlackBerry Limited Methods and devices for facilitating bluetooth pairing using a camera as a barcode scanner
EP2767226A1 (en) * 2013-02-18 2014-08-20 ARKRAY, Inc. Medical measurement device and measurement system
US8879994B2 (en) 2009-10-02 2014-11-04 Blackberry Limited Methods and devices for facilitating Bluetooth pairing using a camera as a barcode scanner
US9105023B2 (en) 2010-02-26 2015-08-11 Blackberry Limited Methods and devices for transmitting and receiving data used to activate a device to operate with a server
US9137659B2 (en) 2013-04-25 2015-09-15 FusionPipe Software Solutions Inc. Method and system for decoupling user authentication and data encryption on mobile devices
EP3012696A1 (en) 2014-10-24 2016-04-27 Krohne Messtechnik GmbH Method for connecting a field device with an operating unit, and field device
EP2422170B1 (en) 2009-04-21 2016-05-11 Withings Weighing device and method
GB2532192A (en) * 2014-10-29 2016-05-18 Ibm Secure pairing of personal device with host device
EP2139274B1 (en) * 2008-06-27 2016-06-01 BlackBerry Limited System and method for associating an electronic device with a remote device having a voice interface
DE102015201117A1 (en) * 2015-01-23 2016-07-28 Robert Bosch Gmbh Device and method for assigning a first technical device to a second technical device
US9433023B1 (en) 2006-05-31 2016-08-30 Qurio Holdings, Inc. System and method for bypassing an access point in a local area network for P2P data transfers
US9485804B1 (en) 2006-06-27 2016-11-01 Qurio Holdings, Inc. High-speed WAN to wireless LAN gateway
EP3070603A4 (en) * 2013-11-15 2017-08-16 Kuang-Chi Intelligent Photonic Technology Ltd. Method and device for transmitting and receiving instruction information
US9877652B2 (en) 2013-02-18 2018-01-30 Arkray, Inc. Medical measurement device and measurement system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997036422A1 (en) * 1996-03-28 1997-10-02 Intel Corporation Controlling vcr by using personal computer
EP1024626A1 (en) * 1999-01-27 2000-08-02 International Business Machines Corporation Method, apparatus, and communication system for exchange of information in pervasive environments
DE19924232A1 (en) * 1999-05-27 2000-12-07 Giesecke & Devrient Gmbh Method and device for storing and retrieving PIN codes

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997036422A1 (en) * 1996-03-28 1997-10-02 Intel Corporation Controlling vcr by using personal computer
EP1024626A1 (en) * 1999-01-27 2000-08-02 International Business Machines Corporation Method, apparatus, and communication system for exchange of information in pervasive environments
DE19924232A1 (en) * 1999-05-27 2000-12-07 Giesecke & Devrient Gmbh Method and device for storing and retrieving PIN codes

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
THE BLUETOOTH FORUM: "Generic Access Profile", BLUETOOTH SPECIFICATION VERSION 1.1, 22 February 2001 (2001-02-22), XP002175814, Retrieved from the Internet <URL:http://www.bluetooth.com/developer/specification/BLUETOOTH_11_Profiles_Book.pdf> [retrieved on 20010824] *

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005036487A3 (en) * 2003-10-09 2005-06-16 Gina Parmar Personal security system
US7783879B2 (en) 2003-11-20 2010-08-24 Nokia Corporation Method and device relating to security in a radio communication network
CN100384223C (en) * 2005-01-19 2008-04-23 英华达(上海)电子有限公司 The method of digital camera anti-theft using bluetooth technology
US9433023B1 (en) 2006-05-31 2016-08-30 Qurio Holdings, Inc. System and method for bypassing an access point in a local area network for P2P data transfers
US9485804B1 (en) 2006-06-27 2016-11-01 Qurio Holdings, Inc. High-speed WAN to wireless LAN gateway
US7711861B2 (en) 2006-08-30 2010-05-04 Microsoft Corporation Synchronized indicator light for secure connections
US9401902B2 (en) 2006-12-27 2016-07-26 Intel Corporation Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (WPAN)
EP1940115A3 (en) * 2006-12-27 2009-09-02 Intel Corporation A method for exchanging strong encryption keys between devices using alternative input methods in wireless personal area networks (WPAN)
US8688986B2 (en) 2006-12-27 2014-04-01 Intel Corporation Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (WPAN)
JP2008178092A (en) * 2006-12-27 2008-07-31 Intel Corp Method for exchanging strong encryption key between devices using alternative input method in wireless personal area network (wpan)
EP2139274B1 (en) * 2008-06-27 2016-06-01 BlackBerry Limited System and method for associating an electronic device with a remote device having a voice interface
US8720780B2 (en) 2009-04-08 2014-05-13 Blackberry Limited Systems, devices, and methods for displaying a barcode at a computing device
US9349088B2 (en) 2009-04-08 2016-05-24 Blackberry Limited Systems, devices, and methods for displaying a barcode at a computing device
EP2422170B1 (en) 2009-04-21 2016-05-11 Withings Weighing device and method
US9185735B2 (en) 2009-10-02 2015-11-10 Blackberry Limited Methods and devices for facilitating bluetooth pairing using a camera as a barcode scanner
EP2306692B1 (en) * 2009-10-02 2014-05-21 BlackBerry Limited Methods and devices for facilitating bluetooth pairing using a camera as a barcode scanner
US8879994B2 (en) 2009-10-02 2014-11-04 Blackberry Limited Methods and devices for facilitating Bluetooth pairing using a camera as a barcode scanner
US9105023B2 (en) 2010-02-26 2015-08-11 Blackberry Limited Methods and devices for transmitting and receiving data used to activate a device to operate with a server
US9055035B2 (en) 2011-04-05 2015-06-09 Roche Diabetes Care, Inc. Medical device with secure data transmission
EP2509276A1 (en) * 2011-04-05 2012-10-10 F. Hoffmann-La Roche AG Method for secure transmission of electronic data over a data communication connection between one device and another
EP2523417A1 (en) * 2011-05-09 2012-11-14 Kamstrup A/S Paring of devices using an encryption key
JP2013214257A (en) * 2012-04-04 2013-10-17 Hitachi Ltd Terminal linking system and method therefor
CN103989456A (en) * 2013-02-18 2014-08-20 爱科来株式会社 Medical measurement device and measurement system
EP2767226A1 (en) * 2013-02-18 2014-08-20 ARKRAY, Inc. Medical measurement device and measurement system
US9877652B2 (en) 2013-02-18 2018-01-30 Arkray, Inc. Medical measurement device and measurement system
US9137659B2 (en) 2013-04-25 2015-09-15 FusionPipe Software Solutions Inc. Method and system for decoupling user authentication and data encryption on mobile devices
EP3070603A4 (en) * 2013-11-15 2017-08-16 Kuang-Chi Intelligent Photonic Technology Ltd. Method and device for transmitting and receiving instruction information
CN105549549A (en) * 2014-10-24 2016-05-04 克洛纳测量技术有限公司 Method for connecting a field device to an operating unit, and field device
CN105549549B (en) * 2014-10-24 2020-03-10 克洛纳测量技术有限公司 Method for connecting a field device to an operating unit, and field device
EP3012696A1 (en) 2014-10-24 2016-04-27 Krohne Messtechnik GmbH Method for connecting a field device with an operating unit, and field device
US9992613B2 (en) 2014-10-24 2018-06-05 Krohne Messtechnik Gmbh Method for connecting a field device to an operating unit and a field device
GB2532192A (en) * 2014-10-29 2016-05-18 Ibm Secure pairing of personal device with host device
US9955518B2 (en) 2014-10-29 2018-04-24 International Business Machines Corporation Secure pairing of personal device with host device
US9603178B2 (en) 2014-10-29 2017-03-21 International Business Machines Corporation Secure pairing of personal device with host device
DE102015201117A1 (en) * 2015-01-23 2016-07-28 Robert Bosch Gmbh Device and method for assigning a first technical device to a second technical device

Similar Documents

Publication Publication Date Title
WO2002056536A1 (en) Method and system for bonding two bluetooth devices
EP0696397B1 (en) Digital radio transceiver with encrypted key storage
EP1815471B1 (en) Apparatus and method for sharing contents via headphone set
US7995760B2 (en) Method for ensuring data transmission security, communication system and communication device
EP2474125B1 (en) Securing pairing verification of devices with minimal user interfaces
CN100452700C (en) Secret session establishment based on radi oapplied protocol
ES2633457T3 (en) Ultrasonic Wave Communications System
US20100227549A1 (en) Apparatus and Method for Pairing Bluetooth Devices by Acoustic Pin Transfer
CA2488837A1 (en) Method for secure data exchange between two devices
JP2006042087A (en) Client terminal, access point apparatus and radio communication system
KR970056185A (en) Communication method and device
US20090017755A1 (en) Information communication device
US6018583A (en) Secure computer network
KR20040065466A (en) Security communication system and method for mobile communication terminal equipment having local communication module
MY123202A (en) Management of authentication and encryption user information in digital user terminals
US8032753B2 (en) Server and system for transmitting certificate stored in fixed terminal to mobile terminal and method using the same
WO1996008756A9 (en) Secure computer network
JP2018207300A (en) Wireless communication system, beacon device, information processing terminal, and method for authenticating beacon device
KR101677249B1 (en) Security Apparatus and Method for Controlling Internet of Things Device Using User Token
US20130236013A1 (en) Method and apparatus for performing security communication
EP3163831A1 (en) Challenge-response-test image to phone for secure pairing
KR19980087504A (en) Wireless data transmitter
JP4820143B2 (en) Control system and portable terminal
KR20050048936A (en) Method for protecting local wireless communication in wireless communication terminal
GB2408181A (en) Configuring a wireless connection using a physical token containing two sets of configuration information

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WA Withdrawal of international application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642