17948467. INFORMATION HANDLING SYSTEM WIRELESS NON-DISPLAY PERIPHERAL HAVING LEVEL FOUR SECURITY simplified abstract (Dell Products L.P.)
Contents
- 1 INFORMATION HANDLING SYSTEM WIRELESS NON-DISPLAY PERIPHERAL HAVING LEVEL FOUR SECURITY
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 INFORMATION HANDLING SYSTEM WIRELESS NON-DISPLAY PERIPHERAL HAVING LEVEL FOUR SECURITY - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
INFORMATION HANDLING SYSTEM WIRELESS NON-DISPLAY PERIPHERAL HAVING LEVEL FOUR SECURITY
Organization Name
Inventor(s)
Kai Leong Wong of Singapore (SG)
Manish K. Desai of Singapore (SG)
Karthikeyan Krishnakumar of Austin TX (US)
INFORMATION HANDLING SYSTEM WIRELESS NON-DISPLAY PERIPHERAL HAVING LEVEL FOUR SECURITY - A simplified explanation of the abstract
This abstract first appeared for US patent application 17948467 titled 'INFORMATION HANDLING SYSTEM WIRELESS NON-DISPLAY PERIPHERAL HAVING LEVEL FOUR SECURITY
Simplified Explanation
The patent application describes a system and method for establishing level four security between an information handling system and a peripheral mouse using a preloaded security identification packet to securely identify both devices for pairing.
- The peripheral mouse advertises with both a BLE protocol packet supporting level 3 security pairing and a secure identification packet supporting level four security pairing.
- When the secure identification packet advertisement is selected by a host, the BLE profile can be populated without pairing, allowing for subsequent pairing without the risk of a malicious device imitating the BLE interface.
Potential Applications
This technology could be applied in various industries where secure pairing between devices is essential, such as healthcare, finance, and government sectors.
Problems Solved
This technology solves the problem of man-in-the-middle attacks during the pairing process between devices, ensuring a secure and reliable connection.
Benefits
The benefits of this technology include enhanced security, ease of pairing between devices, and protection against malicious attacks.
Potential Commercial Applications
Potential commercial applications of this technology include secure wireless peripherals for computers, secure IoT devices, and secure communication between mobile devices and accessories.
Possible Prior Art
One possible prior art for this technology could be the use of secure identification packets in Bluetooth devices to enhance security during pairing processes.
What are the specific technical details of the level four security pairing process described in the patent application?
The specific technical details of the level four security pairing process involve the use of a preloaded security identification packet to securely identify both the information handling system and the peripheral mouse. This packet allows for the exchange of pairing information in a secure manner, avoiding man-in-the-middle attacks.
How does the system ensure that the BLE profile can be populated without performing pairing when the secure identification packet advertisement is selected by a host?
The system ensures that the BLE profile can be populated without performing pairing by utilizing the secure identification packet to establish a secure connection between the devices. This allows for the profile to be populated with the necessary information for subsequent pairing without the risk of a malicious device imitating the BLE interface.
Original Abstract Submitted
An information handling system and peripheral mouse establish level four security when a preloaded security identification packet is available to securely identify both devices for the exchange of pairing information in a manner that avoids man-in-the-middle attacks. The peripheral advertises with both a BLE protocol packet that supports a conventional level 3 security pairing and a secure identification packet that supports a level four security pairing. When the secure identification packet advertisement is selected by a host, the BLE profile may be populated without performing pairing so that the profile can be used to subsequently pair without risk of a malicious device imitating the BLE interface.