1
Gitzinger Thomas E: Method and apparatus for secure pairing. Motorola, Gitzinger Thomas E, NOSKOWICZ David S, July 6, 2006: WO/2006/071364 (59 worldwide citation)

A method and apparatus for securely pairing wireless devices is disclosed. The method comprises sending (304) from a first device (102) secure information, such as a Bluetooth code, a pin or combination thereof, over a wired link (260). Then receiving (306) from a second device (104) a confirmation ...


2
Fan Bai, Nader M Rabadi, David P Pop, John J Correia: Method and apparatus for secure pairing of mobile devices with vehicles using telematics system. GM Global Technology Operations, John A Miller, Miller IP Group, September 9, 2014: US08831224 (5 worldwide citation)

A method for establishing secure wireless communications between a mobile device and a vehicle, where a user is not required to enter a password, but instead the telematics system is used to bootstrap the trust between the mobile device and the vehicle. The user initiates the process by pressing a b ...


3
Yong suk Park, Tae joon Park: Method and apparatus for secure pairing in wireless communication. Samsung Electronics, INDUSTRY UNIVERSITY COOPERATION FOUNDATION KOREA AEROSPACE UNIVERSITY, Sughrue Mion PLLC, January 5, 2016: US09232553

Provided is a wireless connection device including a selection information generating unit which generates selection information with respect to each external device of a plurality of external devices that transmitted signals for wireless connection; a selecting unit which compares the selection inf ...


4
Gitzinger Thomas E: Method and apparatus for secure pairing. Motorola, September 19, 2007: EP1834450-A1

A method and apparatus for securely pairing wireless devices is disclosed. The method comprises sending ( 304 ) from a first device ( 102 ) secure information, such as a Bluetooth code, a pin or combination thereof, over a wired link ( 260 ). Then receiving ( 306 ) from a second device ( 104 ) a con ...


5
Raffaele G Amendola: Method and Apparatus for Secure Pairing of Bluetooth Devices. General Instrument Corporation, Motorola, Law Department, October 30, 2008: US20080268776-A1

Embodiments of the invention generally provide a method and apparatus for secure pairing of Bluetooth devices that supports the detection of man-in-the-middle attacks. One embodiment of a method for pairing a first Bluetooth device and a second Bluetooth device includes sending, by the first Bluetoo ...


6
Thomas E Gitzinger: Method and apparatus for secure pairing. Motorola, June 29, 2006: US20060143455-A1

A method and apparatus for securely pairing wireless devices is disclosed. The method comprises sending (304) from a first device (102) secure information, such as a Bluetooth code, a pin or combination thereof, over a wired link (260). Then receiving (306) from a second device (104) a confirmation ...


7
Yong suk PARK, Tae joon PARK: Method and apparatus for secure pairing in wireless communication. Industry University Cooperation Foundation Korea Aerospace University, Samsung Electronics, April 5, 2012: US20120083298-A1

Provided is a wireless connection device including a selection information generating unit which generates selection information with respect to each external device of a plurality of external devices that transmitted signals for wireless connection; a selecting unit which compares the selection inf ...


8

9
METHOD AND APPARATUS FOR SECURE PAIRING OF MOBILE DEVICES WITH VEHICLES USING TELEMATICS SYSTEM. GM GLOBAL TECHNOLOGY OPERATIONS, March 20, 2014: US20140079217-A1

A method for establishing secure wireless communications between a mobile device and a vehicle, where a user is not required to enter a password, but instead the telematics system is used to bootstrap the trust between the mobile device and the vehicle. The user initiates the process by pressing a b ...


10
METHOD AND APPARATUS FOR SECURE PAIRING. December 22, 2016: US20160368454-A1

A system includes a processor configured to receive a request from a mobile device to utilize a vehicle resource. The processor is also configured to determine that a first key has been used to start a vehicle a first time. The processor is further configured to determine that a second key has been ...