摘要:
A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link.
摘要:
Different target transmit powers are determined for different wireless transmissions from a wireless device. The target transmit power of a wireless transmission may depend upon whether any transmitters other than the device to which the wireless transmission is to be sent are within range of the sending wireless device. The target transmit power of a wireless transmission may be based, at least in part, on a current location of a device to which one or more frames carried by the wireless transmission are addressed. The target transmit power of a wireless transmission may be based, at least in part, on confidentiality of data carried by the wireless transmission.
摘要:
Different target transmit powers are determined for different wireless transmissions from a wireless device. The target transmit power of a wireless transmission may depend upon whether any transmitters other than the device to which the wireless transmission is to be sent are within range of the sending wireless device. The target transmit power of a wireless transmission may be based, at least in part, on a current location of a device to which one or more frames carried by the wireless transmission are addressed. The target transmit power of a wireless transmission may be based, at least in part, on confidentiality of data carried by the wireless transmission.
摘要:
A first device has a display that is able to show information. The information is to be exchanged with a second device. The information is cleared from the display following receipt of an indication from the second device that the information has been successfully inputted at the second device.
摘要:
A first device has a display that is able to show information. The information is to be exchanged with a second device. The information is cleared from the display following receipt of an indication from the second device that the information has been successfully inputted at the second device.
摘要:
Different target transmit powers are determined for different wireless transmissions from a wireless device, the different transmissions having different security requirements. For example, the security requirements of a particular transmission may include a security ranking of a device to which one or more frames carried by the particular transmission are addressed. In another example, the security requirements of a particular transmission may include the confidentiality of data carried by the particular transmission.
摘要:
A cryptographic key is used to secure a communication link between a first device and a second device. Generating the cryptographic key is accomplished by a) generating a first cryptographic key, b) generating a second cryptographic key, c) applying a hash function to packets transmitted over the communication link to create a hash result, and d) applying the hash function to the first cryptographic key, the second cryptographic key and the hash result.
摘要:
A device coupled to a smart card reader may request random data from a smart card inserted into the smart card reader, and the smart card reader may incorporate the random data into its randomness pool. A device having a source of random data may have a driver installed thereon for another device and the driver may extract random data from the source and transmit it securely over a wireless communication link to the other device. The other device, which may be a smart card reader, may incorporate the extracted random data into its randomness pool. A smart card reader may incorporate traffic received from a smart card inserted therein into its randomness pool.
摘要:
A device coupled to a smart card reader may request random data from a smart card inserted into the smart card reader, and the smart card reader may incorporate the random data into its randomness pool. A device having a source of random data may have a driver installed thereon for the smart card reader. The device may generate a random session key to encrypt traffic between the device and the smart card reader. The device may send an encrypted version of the random session key to the smart card reader. The smart card reader may decrypt the encrypted version and incorporate the random session key into its randomness pool. A smart card reader may incorporate random data received from a smart card inserted therein into its randomness pool.
摘要:
A system includes a wireless-enabled smart card reader able to be connected concurrently to at least two devices and a mobile device able to be connected wireles sly to the smart card reader and to control connections of the smart card reader.