throbber

`
`
`
`(12) United States Patent
`
`
`
`US 7,136,999 B1
`
`(10) Patent No.:
`
`
`
`
`
`
`
`Grifliths
`(45) Date of Patent:
`Nov. 14, 2006
`
`
`
`US007136999B1
`
`
`
`METHOD AND SYSTEM FOR ELECTRONIC
`
`
`
`
`DEVICE AUTHENTICATION
`
`
`
`
`
`Inventor:
`
`
`
`Notice:
`
`
`
`
`
`Jonathan C. Grifliths, Fremont, CA
`
`
`
`(US)
`
`
`
`
`
`Assignee: Koninklijke Philips Electronics N.V.,
`Eindhoven (NL)
`
`
`
`
`
`
`
`
`Subject to any disclaimer, the term of this
`
`
`
`
`patent is extended or adjusted under 35
`
`
`
`
`U.S.C. 154(b) by 917 days.
`
`
`
`Appl. No.: 09/597,198
`Jun. 20, 2000
`
`
`
`Filed:
`
`
`
`(54)
`
`(75)
`
`(73)
`
`
`
`
`
`
`
`(*)
`
`
`
`(21)
`
`(22)
`
`(51)
`
`(52)
`(58)
`
`
`
`
`
`
`
`
`(56)
`
`
`
`EP
`
`
`
`................. 713/151
`
`
`
`
`
`
`8/2004 Hind et al.
`6,772,331 B1*
`
`
`
`
`
`FOREIGN PATENT DOCUMENTS
`
`
`0883318 A1
`12/1998
`
`
`
`OTHER PUBLICATIONS
`
`
`“Specification of Bluetooth SystemiCore” V. 1. CA, Jul. 26, 1999,
`
`
`
`
`
`
`
`pp. 18-19, 95, 149-154, 169-170, 194-200, 226, 319, 537, 1029 and
`
`
`
`
`
`
`
`
`
`
`1031.
`
`
`
`
`
`* cited by examiner
`
`
`
`
`Primary ExamineriKambiZ Zand
`
`
`
`
`(74) Attorney, Agent, or FirmiLarry Liberchuk
`
`
`
`(57)
`
`
`
`ABSTRACT
`
`
`
`
`
`
`
`
`
`
`Electronic devices are authenticated to each other initially
`
`
`
`
`
`
`
`
`over a short-range wireless link. In particular, a user first
`enters a given authentication information in each device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Later, when the devices are out-of-range of the wireless link,
`
`
`
`
`
`
`
`they may be authenticated to each other without subsequent
`user input when one of the devices invites the other to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`exchange authentication information over an alternative
`communications link. If the authentication is successful, the
`
`
`
`
`
`
`devices may then communicate over the alternative com-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`munications link as if they were within range of the original
`wireless link.
`
`
`
`17 Claims, 1 Drawing Sheet
`
`
`
`
`
`
`
`
`ELECTRONIC
`
`
`DEVICE
`
`
`Int. Cl.
`
`(2006.01)
`H04L 9/00
`
`
`
`(2006.01)
`H04K 1/00
`
`
`
`US. Cl.
`....................... 713/168; 713/169; 380/270
`
`
`
`
`
`
`Field of Classification Search ................ 713/ 168,
`
`
`
`
`
`713/169; 380/270
`
`
`
`
`
`
`
`
`
`See application file for complete search history.
`References Cited
`
`
`U.S. PATENT DOCUMENTS
`
`
`5,367,558 A *
`11/1994 Gillig et a1.
`
`
`
`6,600,902 B1*
`7/2003 Bell
`
`
`
`
`
`
`............. 455/4261
`
`
`........ 455/412
`
`
`
`
`
`
`
`
`ELECTRONIC
`
`
`
`
`DEVICE
`
`
`y
`
`
`
`102
`
`
`
`Page 1 of 5
`
`SAMSUNG EXHIBIT 1001
`
`SAMSUNG EXHIBIT 1001
`
`Page 1 of 5
`
`

`

`
`US. Patent
`
`
`
`
`
`Nov. 14, 2006
`
`
`
`
`
`US 7,136,999 B1
`
`115‘\
`107‘
`l— — — — — _' ————— 7
`
`113
`//
`'
`
`/
`|
`
`
`
`
`
`
`
`
`
`ELECTRONIC
`
`
`DEVICE
`
`
`
`
`
`| I | I
`
`115
`
`I_/+_ —] 192
`: O)
`
`
`
`
`
`I"
`|
`I
`I
`
`l
`\ L
`I
`I
`L _ _ _l \ \ L
`
`102
`
`
`
`
`
`
`
`ELECTRONIC
`
`Y DEVICE
`
`
`
`
`
`___________
`
`| l
`
`NON-VOLATILE
`
`
`(1—02 MEMORY
`
`
`
`
`
`
`
`
`
`
`AERIAL IN_UTDEVICE
`
`
`
` PROGRAMS
`
`
`
`
`
`FIG.2
`
`
`
`Page 2 of 5
`
`Page 2 of 5
`
`

`

`
`
`US 7,136,999 B1
`
`1
`
`METHOD AND SYSTEM FOR ELECTRONIC
`
`
`
`
`DEVICE AUTHENTICATION
`
`
`
`
`
`
`BACKGROUND OF THE INVENTION
`
`
`
`
`
`2
`
`BRIEF SUMMARY OF THE INVENTION
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`It is an object of the invention to authenticate a device first
`
`
`
`
`
`authenticated on a physically restrained network through
`another network.
`
`
`
`
`
`
`
`
`It is a further object of the invention to simplify authen-
`
`
`
`
`
`
`tication of a device in a network by re-using a given
`
`
`
`
`authentication process in another network.
`In accordance with the invention, a method of authenti-
`
`
`
`
`
`
`
`
`
`
`
`
`
`cating first and second electronic devices is provided, the
`
`
`method comprising:
`
`
`
`
`
`
`
`
`upon link set-up over a short-range wireless link, execut-
`
`
`
`
`
`ing an authentication protocol by exchanging authentication
`information between the first and second electronic devices
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`to initially authenticate communication between the first and
`second devices;
`
`
`later, when the first and second electronic devices are
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`beyond the short-range wireless link, executing the authen-
`
`
`
`
`
`
`tication protocol by exchanging the authentication informa-
`tion between the first and second electronic devices over an
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`alternate communications link, then only allowing commu-
`nication between the first and second devices if the first and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`second devices had initially been successfully authenticated.
`
`
`
`
`
`
`
`
`
`The invention is based upon the insight that once devices
`
`
`
`
`
`
`are authenticated on a restricted network, it is very simple to
`
`
`
`
`
`
`
`re-connect the devices through another, unrestricted net-
`
`
`
`
`
`
`
`work. In this respect, restriction can be determined by the
`
`
`
`
`
`
`way a system works, such as authentication in accordance
`
`
`
`
`
`
`
`with said Bluetooth Specification, or can be restricted physi-
`
`
`
`
`
`cal access to premises such as an office.
`
`
`
`
`
`
`
`
`In a preferred embodiment, the first and second electronic
`
`
`
`
`
`
`
`
`devices each have the capability of communicating with
`
`
`
`
`
`
`
`
`each other over at least a primary and a secondary commu-
`
`
`
`
`
`
`
`nications link. The primary communications link is a given
`
`
`
`
`
`
`
`short-range wireless link. Preferably, the short-range wire-
`
`
`
`
`
`
`
`less link conforms to a given protocol, namely, Bluetooth.
`
`
`
`
`
`
`
`The secondary communications link may be any alternative
`link such as a wide area network (WAN), a local area
`
`
`
`
`
`
`
`
`network (LAN), or the like. The devices are first authenti-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cated over the primary link, with the user entering the same,
`given PIN code in both devices. After the devices verify that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`they share the same PIN code, they exchange key informa-
`tion. Later, when the devices are no longer within range to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`authenticate over the primary communications link using
`
`
`
`
`
`
`
`Bluetooth, one of the devices invites the exchange of key
`
`
`
`
`
`
`information automatically using the secondary communica-
`tions link. If the other device can provide the key informa-
`
`
`
`
`
`
`
`
`
`
`
`tion requested, the devices are then authenticated to each
`
`
`
`
`
`
`
`
`other over the secondary communications link. In addition
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`thereto a user may be requested to enter login data, such as
`
`
`
`
`
`
`
`
`
`a user name or a password. The foregoing has outlined some
`
`
`
`
`
`
`
`
`
`
`of the more pertinent objects and features of the present
`invention. These objects and features should be construed to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`be merely illustrative of some of the more prominent fea-
`
`
`
`
`
`
`
`tures and applications of the invention. Many other benefi-
`cial results can be attained by applying the disclosed inven-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`tion in a different manner or by modifying the invention as
`
`
`
`
`
`will be described. Accordingly, a fuller understanding of the
`
`
`
`
`
`
`
`invention may be had by referring to the following Detailed
`
`
`
`Description of the Preferred Embodiment.
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`
`
`
`
`
`
`
`
`
`
`
`For a more complete understanding of the present inven-
`tion and the advantages thereof, reference should be made to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the following Detailed Description taken in connection with
`
`
`
`
`the accompanying drawings in which:
`
`
`
`10
`
`
`
`15
`
`
`
`1. Field of the Invention
`
`
`
`
`
`
`
`
`
`
`The present
`invention relates generally to electronic
`device authentication.
`
`
`
`
`
`
`2. Description of the Related Art
`
`
`
`
`
`
`In the Bluetooth Specification, “Specification of the Blue-
`
`
`
`
`
`
`
`
`
`
`tooth SystemiCore”, v.1.0A, Jul. 26th 1999, pp. 18719, 95,
`1497154, 1697170, 1947200, 226, 319, 537, 1029, and
`
`
`
`
`
`
`
`
`1031, the so-called Bluetooth short range radio link between
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Bluetooth enabled devices is described, particularly,
`the
`
`
`
`
`
`
`
`
`Bluetooth frequency bands, the concept of master and slave
`
`
`
`
`
`
`
`devices, and security using authentication of devices. Blue-
`
`
`
`
`
`
`
`
`tooth (BT) is a specification for small form factor, low-cost,
`
`
`
`
`
`
`
`
`short-range radio links between mobile PCs, mobile phones,
`and other such devices. Bluetooth radio arose out of an
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`initiative among leaders in the telecommunication and com-
`
`
`
`
`
`
`
`
`puter industries to make a global standard for wireless
`
`
`
`
`
`
`
`
`connectivity. The standard relies on a low power radio link
`
`
`
`
`
`operating at 2.4 Gigahertz. Bluetooth-provisioned devices
`
`
`
`
`
`
`
`
`normally must be physically close to each other (i.e., within
`100 meters) to communicate. Bluetooth includes a robust
`
`
`
`
`
`
`authentication mechanism that ensures that a Bluetooth
`
`
`
`
`
`
`device only communicates with other devices for which it is
`
`
`
`
`
`
`
`
`authenticated, and not with any random device that comes
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`into its range. Bluetooth radio uses a fast acknowledgement
`
`
`
`
`
`
`
`
`and frequency hopping scheme to make the link robust.
`
`
`
`
`
`
`
`Devices avoid interference from other signals by hopping to
`
`
`
`
`
`
`
`
`a new frequency after transmitting or receiving a packet.
`
`
`
`
`
`
`
`
`Compared with other systems operating in the same fre-
`
`
`
`
`
`
`
`
`
`quency band, the Bluetooth radio typically hops faster and
`uses shorter packets. This makes Bluetooth radio more
`
`
`
`
`
`
`
`
`
`
`
`
`robust than other systems.
`The Bluetooth authentication scheme works generally as
`
`
`
`
`
`
`follows. A user enters a numerical code (a personal identi-
`
`
`
`
`
`
`fication number or PIN) in the two devices to establish a
`
`
`
`
`
`
`
`Bluetooth link for the first time. The PIN can be any number,
`
`
`
`
`
`
`
`
`
`
`
`but it must be the same on both devices. Once this is done,
`
`
`
`
`
`
`
`
`
`the devices communicate with each other using Bluetooth
`
`
`
`
`
`
`
`
`transceivers to verify that the PIN numbers match. If so, one
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device generates unique key information based on a device
`
`
`
`
`
`
`
`
`
`address, which is unique for each device. This unique key
`
`
`
`
`
`
`(generated by one of the devices) is stored in both devices
`
`
`
`
`
`
`
`
`
`and used to authenticate the two devices for any subsequent
`
`
`
`
`
`
`
`
`Bluetooth link between them.
`In particular,
`the key
`
`
`
`
`
`
`
`exchanged upon link initialization identifies a unique link
`
`
`
`
`
`
`
`
`and can be used reliably for subsequent authentication when
`the link is re-established.
`
`
`
`
`
`
`
`
`
`
`The feature that ensures security in a Bluetooth system is
`
`
`
`
`
`
`
`
`
`the need for physical proximity to establish a link, i.e., the
`user must enter the numerical code on both devices when the
`
`
`
`
`
`
`
`
`
`devices are in close proximity. If the devices are more than
`
`
`
`
`
`
`
`
`
`100 meters apart, the initial Bluetooth link cannot be estab-
`
`
`
`
`
`
`
`
`
`lished.
`
`Wide area networks also use basic authentication to
`
`
`
`
`
`
`
`
`enable electronic devices to communicate with each other.
`
`
`
`
`
`
`
`The most common and popular wide area network is the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Internet. Internet service providers typically restrict access
`
`
`
`
`
`
`
`
`on their servers to given users. Normally, this is achieved by
`
`
`
`
`
`
`
`requiring a prospective user (e.g., a user of a client machine
`
`
`
`
`
`
`
`running a web browser) to enter a userid and password
`combination.
`
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 3 of 5
`
`Page 3 of 5
`
`

`

`
`
`US 7,136,999 B1
`
`
`3
`
`
`
`
`
`FIG. 1 is a block diagram illustrating an embodiment of
`the invention; and
`
`
`
`
`
`
`
`
`FIG. 2 is a block diagram of an electronic device accord-
`
`
`
`
`ing to the present invention.
`DETAILED DESCRIPTION OF THE
`
`
`PREFERRED EMBODIMENT
`
`
`
`
`
`
`
`
`10
`
`15
`
`20
`
`25
`
`30
`
`
`
`
`
`
`FIG. 1 is a block diagram illustrating an embodiment of
`the invention. As used herein, an “electronic device” should
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`be broadly construed to mean a computer (or a set of
`
`
`
`
`
`
`
`computers) of any type including, without
`limitation, a
`
`
`
`
`
`
`desktop computer, a workstation or server platform, a note-
`
`
`
`
`
`
`book computer, a diskless computer, a handheld computing
`
`
`
`
`
`
`
`device (e.g., personal digital assistant, business organizer, or
`
`
`
`
`
`
`
`the like), a communications device (e.g., cellular phone,
`
`
`
`
`
`
`smartphone, or the like) provisioned to include computing
`
`
`
`
`
`
`
`power, in-vehicle computing devices, or the like. Thus, as is
`well known, a given electronic device 102, as shown in more
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`detail
`in FIG. 2,
`typically includes a processor 104, a
`
`
`
`
`
`
`
`memory 106 (e.g., RAM and ROM) for storing programs
`
`
`
`
`
`
`
`
`
`110 executable by the processor 104, at least one input
`
`
`
`
`
`
`
`
`device 112 such as a keyboard or mouse, at least one output
`
`
`
`
`
`
`
`device 114 such as a monitor or display. Typically, each of
`the electronic devices includes hardware and software
`
`
`
`
`
`
`
`resources (not shown) to enable the devices to communicate
`
`
`
`
`
`
`
`with each other over a network 120 such as the Internet, an
`
`
`
`
`
`
`
`
`
`intranet, a local area network, a mobile radio network, or the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`like. The electronic device 102 can be a mobile phone, a
`
`
`
`
`
`
`
`personal digital assistent (PDA), a laptop computer, or any
`other suitable device. In FIG. 1, another electronic device
`
`
`
`
`
`
`
`
`111 is shown. The electronic device 111 can be a web-server,
`
`
`
`
`
`
`
`
`an e-mail server, or some other database-like device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`When the device 102, e.g., a laptop, connects to the
`network 120, e.g. the Internet, its intemet protocol address
`
`
`
`
`
`
`
`
`
`is determined and services such as a printer service and a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`calendar service are set up automatically. But before such
`services are set up the device 102 needs to be authenticated.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Upon device authentication, the user may login to a service
`
`
`
`
`
`
`
`
`
`by providing a user name and password, for instance. The
`invention is mainly concerned with device authentication
`
`
`
`
`
`
`
`
`
`
`
`whereby authentication information is exchanged between
`devices.
`
`According to the invention, each of the devices also
`
`
`
`
`
`
`
`
`45
`includes a transceiver 105 to enable the devices to commu-
`
`
`
`
`
`
`
`the
`nicate over a communications link 107. Preferably,
`
`
`
`
`
`
`
`communications link 107 is a short-range wireless link that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`conforms to a given radio protocol, e.g., Bluetooth. This is
`not a limitation of the present invention, however, as the
`
`
`
`
`
`
`
`
`alternative communications link 107 may be an infrared
`
`
`
`
`
`
`link, an acoustic link, or the like. In the preferred embodi-
`
`
`
`
`
`
`
`
`
`
`ment, the alternative communications link 107 is a “pri-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`mary” link in the sense that the devices initially authenticate
`to each other over the link 107 link and then, later, authen-
`
`
`
`
`
`
`
`
`
`
`
`
`ticate to each other over a secondary link 109 such as the
`
`
`
`
`
`
`
`
`
`Internet, an intranet, or some other link. Thus, according to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the preferred embodiment of the invention,
`the pair of
`electronic devices first authenticate using Bluetooth over a
`
`
`
`
`
`
`
`first link, the link 107 and then later authenticate (e. g., when
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the devices are out-of-range of the original wireless con-
`nection) over some alternative link, the link 109. In FIG. 1,
`
`
`
`
`
`
`
`
`
`such a successive device authentication at different locations
`
`
`
`
`
`
`is indicated by the electronic device 102 having been moved
`
`
`
`
`
`
`
`
`from a network 113 to which the device 102 has restrained
`
`
`
`
`
`
`
`
`
`access, to the unconstrained network 120. The network 113
`
`
`
`
`
`
`
`
`is a so-called Bluetooth network, for instance, to which a
`
`
`
`
`
`
`
`user 115 has constrained access. When accessing the net-
`
`
`
`
`
`
`
`
`
`
`35
`
`40
`
`50
`
`55
`
`60
`
`65
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 4 of 5
`
`
`
`
`
`
`
`
`
`
`work 113, with the device 102' within network boundary
`
`
`
`
`
`
`
`
`
`
`115, the user 115 needs to initially set-up the link 107 while
`the devices 102' and 111 are authenticated. Later, the device
`
`
`
`
`
`
`
`
`
`102' moves to another location outside the constrained
`
`
`
`
`
`
`network, indicated with the device 102 and a dashed arrow
`
`
`
`
`
`
`
`
`117. The device 102 may have an aerial 116 when the link
`
`
`
`
`
`
`
`
`
`107 is a radio link. Instead of an aerial, an infrared trans-
`
`
`
`
`
`
`
`mitter/receiver may be used, when the link 107 is an infrared
`
`
`
`
`
`
`link.
`
`In terms of Bluetooth, the devices 102'/102 and 111 may
`
`
`
`
`
`
`
`
`
`be so-called Bluetooth enabled devices, the device 102'/102
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`being a slave device and the device 111 being a master
`
`
`
`
`
`
`
`
`device. The concept of master and slave is defined on page
`
`
`
`
`
`
`95 of said Bluetooth Specification. Authentication of Blue-
`tooth enabled devices is described on pages 1497154 of said
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Bluetooth Specification. When the master and slave are
`
`
`
`
`
`
`
`
`
`out-of-range of the wireless or “primary” data link 107,
`
`
`
`
`
`
`
`
`
`however, they may still communicate with each other fol-
`
`
`
`
`
`
`lowing authentication according to the present invention. In
`
`
`
`
`
`
`
`
`particular, slave device 102 first establishes a link to the
`
`
`
`
`
`
`
`
`
`master device 111 over the alternate or “secondary” link 109,
`
`
`
`
`
`
`
`which, as noted above, may be any convenient communi-
`cations link such as the Intemet, an intranet, a local area
`
`
`
`
`
`
`
`
`
`network, or the like. To establish this connection, as noted
`
`
`
`
`
`
`
`
`above, each of the devices 102 and 111 must
`include
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`appropriate hardware and software resources
`(e.g.,
`a
`modem, a TCP/IP stack, and the like) that are used for this
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`purpose, as is well known. Once this connection is estab-
`lished, the master device 111 offers to use the authentication
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`protocol of the primary data link 107 to facilitate device
`
`
`
`
`
`
`
`authentication. The primary data link authentication proto-
`
`
`
`
`
`
`
`
`col may be one of several protocols offered during the
`attempt to establish a connection between the two devices
`
`
`
`
`
`
`
`102'/102 and 111. The offer issued from the master device
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`111 invites the exchange of key information according to the
`
`
`
`
`
`
`
`
`
`authentication protocol of the primary data link,
`in the
`
`
`
`
`
`
`
`example given a Bluetooth protocol. If upon exchange the
`keys match, the devices 102'/102 are authenticated to com-
`
`
`
`
`
`
`
`
`municate with each other.
`
`
`
`
`
`
`
`
`
`
`
`
`In summary, an initial Bluetooth link setup and authen-
`
`
`
`
`
`
`
`tication procedure is carried out between a pair of electronic
`devices. Thus, for example, the BT—devices can be a home/
`
`
`
`
`
`
`
`
`office Internet server and a mobile phone, or any other
`
`
`
`
`
`
`
`
`
`suitable pair of devices. When the user of the mobile phone,
`
`
`
`
`
`
`
`for example, later wants to make a remote connection to the
`
`
`
`
`
`
`
`
`other device of the BT—enabled link, e.g., through another
`
`
`
`
`
`
`
`
`network such as the Internet, the same BT authentication
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`protocol is used as with the initial BT—link setup so that
`communication by unauthenticated devices may be pre-
`
`
`
`
`
`
`vented. Thus, once the remote connection is secured by the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`initial BT—link setup procedure,
`i.e., devices other than
`legitimate authenticated devices can never use the mobile
`
`
`
`
`
`
`
`
`phone network to connect to the home server or network for
`
`
`
`
`
`
`
`
`remote re-connection of the BT—link if the user of the device
`
`
`
`
`
`
`had not first initiated the BT—link locally.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Security is enhanced with the invention by exchanging
`link key information because the link key information is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`established in a secure system. In the described example,
`
`
`
`
`
`
`
`
`security is assured by the requirement that the two devices
`
`
`
`
`
`
`
`
`be in physical proximity when establishing the link key.
`
`
`
`
`
`
`Userids or passwords need not be exchanged on subsequent
`
`
`
`
`
`
`
`
`security
`logins, depending on the level of additional
`
`
`
`
`
`
`
`
`required. An additional PIN may be used to access some
`
`
`
`
`services, possibly in a corporate environment.
`
`
`
`
`
`Although specific embodiments of the present invention
`are described herein, they are not to be construed as limiting
`
`
`
`
`
`
`
`the scope of the invention. Many embodiments of the
`
`
`
`
`
`
`
`
`
`4
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 4 of 5
`
`

`

`
`
`US 7,136,999 B1
`
`5
`
`
`
`
`
`
`
`
`
`invention will become apparent to those skilled in the art in
`
`
`
`
`
`
`
`
`
`light of the teachings of this specification. For example,
`
`
`
`
`
`
`
`although the described embodiments use a wireless link to
`
`
`
`
`
`
`
`
`establish the link key, other similarly secure connection
`means such as infrared links or closed networks may be
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`advantageously used. Also, although the described embodi-
`ments show authentication between two devices on two
`
`
`
`
`
`
`
`
`networks, authentication can be achieved on any number of
`
`
`
`
`
`
`networks between the two devices. The scope of the inven-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`tion is only limited by the claims appended hereto.
`
`
`
`
`
`
`
`
`The word “comprising” does not exclude the presence of
`other elements or steps than those listed in a claim.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Having thus described my invention, what I claim as new
`and desire to secure by Letters Patent is set forth in the
`
`
`
`
`
`
`
`
`
`
`
`following claims.
`What is claimed is:
`
`
`
`
`
`
`
`
`1. A method of authenticating first and second electronic
`
`
`devices, comprising:
`
`
`
`
`
`
`
`
`upon link set-up over a short-range wireless link, execut-
`
`
`
`
`
`ing an authentication protocol by exchanging authen-
`tication information between the first and second elec-
`
`
`
`
`
`
`
`
`
`
`
`
`
`tronic devices to initially authenticate communication
`between the first and second devices;
`
`
`
`
`
`
`later, when the first and second electronic devices are
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`beyond the short-range wireless link, executing the
`
`
`
`
`
`authentication protocol by exchanging the authentica-
`tion information between the first and second electronic
`
`
`
`
`
`
`
`
`devices over an alternate communications link, then
`
`
`
`
`
`
`
`
`
`
`
`
`
`only allowing communication between the first and
`second devices if the first and second devices had
`
`
`
`
`
`
`
`
`
`
`
`
`
`initially been successfully authenticated.
`2. The method of claim 1, wherein the authentication
`
`
`
`
`
`
`
`information is an authentication key.
`
`
`
`
`3. The method of claim 1, wherein the authentication
`
`
`
`
`
`
`
`
`information a password.
`4. The method of claim 1, wherein the first device is a
`
`
`
`
`
`
`
`
`master device and the second device is a slave device.
`
`
`
`
`
`
`
`
`5. The method of claim 1, wherein the short-range wire-
`
`
`
`
`
`
`
`less link is a radio link.
`
`
`
`
`6. The method of claim 1, wherein the short-range wire-
`
`
`
`
`
`
`
`less link is an infra-red link.
`
`
`
`
`
`7. The method of claim 1, wherein the link set-up occurs
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`when the first and second devices are in physical proximity.
`8. The method of claim 1, wherein the short-range wire-
`
`
`
`
`
`
`
`
`
`
`
`
`less link conforms to a given RF protocol.
`
`
`
`
`
`
`
`9. The method of claim 8, wherein the given RF protocol
`is Bluetooth.
`
`
`10. The method of claim 1 wherein the link set-up step
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`includes entry of a given personal identification number into
`each of the first and second electronic devices.
`
`
`
`
`
`
`
`11. The method of claim 1, wherein the alternate com-
`
`
`
`
`
`
`
`
`
`
`
`munications link is a computer network.
`12. The method of claim 1, wherein the first electronic
`
`
`
`
`
`
`
`
`device is a client and the second electronic device is a server.
`
`
`
`
`
`
`
`
`5
`
`
`
`10
`
`
`
`15
`
`
`
`20
`
`25
`
`
`
`30
`
`
`
`35
`
`
`
`40
`
`45
`
`
`
`
`
`50
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`6
`
`
`
`
`
`
`13. A method of authenticating first and second electronic
`
`
`devices, comprising:
`
`
`
`
`
`
`
`
`upon link set-up over a first link, executing an authenti-
`
`
`
`
`
`cation protocol by exchanging authentication informa-
`tion between the first and second electronic devices to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`initially authenticate communication between the first
`and second devices;
`
`
`
`later, when the first and second electronic devices are
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`connected using a second link, exchanging the authen-
`tication information between the first and second elec-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`tronic devices over the second link, then only allowing
`communication between the first and second devices if
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the first and second devices had initially been success-
`
`
`fully authenticated.
`
`
`
`14. An electronic device, comprising:
`a processor;
`
`
`and
`
`
`
`
`
`
`
`
`
`a memory loaded with a software routine executed by the
`
`
`
`
`
`
`processor (a) for generating authentication information
`
`
`
`
`
`
`useful in initially authenticating the electronic device to
`
`
`
`
`
`
`
`a another electronic device over a short-range wireless
`
`
`
`
`
`
`
`
`link, and (b) for later supplying the authentication
`information for later authentication of the electronic
`
`
`
`
`
`
`
`device to the other electronic device over an alternate
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`communications link when the devices are beyond the
`
`
`
`
`
`
`
`short-range wireless link, then only allowing commu-
`
`
`
`
`
`
`
`
`nication between the devices if the devices had initially
`
`
`
`been successfully authenticated.
`15. The electronic device of claim 14, wherein the link
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`set-up step includes entry of a given personal identification
`number into each of the first and second electronic devices.
`
`
`
`
`
`
`
`
`16. The electronic device of claim 14, wherein the elec-
`
`
`
`
`
`
`
`
`
`tronic device is a client and the second electronic device is
`
`
`
`
`
`
`
`
`a server.
`
`
`
`
`
`17. A communications system, comprising:
`a first electronic device;
`
`
`
`
`a second electronic device;
`
`
`
`
`a first communications link over which the first and
`
`
`
`
`
`
`
`
`second electronic devices authenticate each other using
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a given protocol that includes a link set-up and the
`
`
`
`
`exchange of authentication information following the
`link set-up, the authentication information being used
`
`
`
`
`
`
`to initially authenticate communication between the
`
`
`
`
`
`first and second electronic devices; and
`
`
`
`
`
`
`a second communications link over which the first and
`
`
`
`
`
`
`
`
`
`second electronic devices later authenticate each other
`
`
`
`
`
`
`
`
`
`
`
`
`
`using the exchange of the authentication information,
`
`
`
`
`
`
`
`then only allowing communication between the first
`and second devices if the first and second devices had
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`initially been successfully authenticated, wherein said
`first communications link and said second communi-
`
`
`
`
`
`
`
`cations link are different types of links.
`
`
`
`
`
`
`*
`*
`*
`*
`*
`
`
`
`
`
`
`
`
`
`
`
`Page 5 of 5
`
`Page 5 of 5
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket