摘要 |
Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless output peripheral device (e.g. a printer, a headset). In exemplary embodiments, the encryption key is generated at the peripheral output device (336b). Data associated with the encryption key is output at the peripheral output device (340b), which can be input by the user at the computing device (342b). The encryption key is then recovered at the computing device from the input, thereby completing the key exchange (344b). The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security (346b). |