Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and devices for secure measurements of time-based distance between two devices

A device, time technology, applied in security. areas, able to resolve issues such as unpleasantness

Inactive Publication Date: 2008-06-18
INTERDIGITAL CE PATENT HLDG
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, doing so usually means that high-resource devices outside the local vicinity will be considered in, which is often unpleasant

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and devices for secure measurements of time-based distance between two devices
  • Method and devices for secure measurements of time-based distance between two devices
  • Method and devices for secure measurements of time-based distance between two devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Figure 2 illustrates a flow chart of a preferred embodiment of the method according to the invention. The method has three general phases:

[0030] 1. A precomputation phase, in which the method is started and a first cryptographic computation is performed.

[0031] 2. A time-based length-of-measurement phase between two devices, exchanging the results of the pre-computation phase under commands like "ping".

[0032] 3. Cryptographic verification phase, where additional verification data is calculated and exchanged (cryptically linked to the result exchanged in the "ping" message), and the verification is verified. In other words, the sender to verify the response to the "ping" command is the sender of the authentication data, and further verifies the identity of the responding device.

[0033] In the description that follows, it is assumed that device A 212 needs to securely measure the RTT to device B 216 . In other words, device A initiates the protocol and device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In order to provide a secure measurement of Round Trip Time (RTT), the calculation of RTT and the authentication data are separated. A device A (212) sends a message (222) to device B (216) to start the method. Both devices generate (224; 226) a random number (Random_A, Random_B) and device A waits (228) for device B to finish. Device A sends (242) its random number to B, which answers (246) with its own random number, and device A calculates (250) the RTT. If the RTT is below a certain limit, device A then requires (252) authentication data, which is calculated (262) by device B and sent (264) to device A that verifies (266) the authentication data. The RTT can thus be securely calculated regardless of the calculating resources of device B. Alternate embodiments, a system and devices are also provided.

Description

technical field [0001] The present invention relates generally to communication networks, and more particularly to security in such networks. Background technique [0002] Time-based distance is commonly used in the networking field and is measured as the duration of a packet transmission between two devices. A standard Internet protocol, the Internet Control Message Protocol (RFC 792; http: / / www.ietf.org / rfc / rfc792.txt), exists and allows calculating the length between two hosts in milliseconds. The related command is called "ping" and the time-based length is called "round trip time (RTT). This time-based length is used, for example, to decide whether two devices are in local proximity. [0003] FIG. 1 illustrates the concept of local proximity in a network 100 . Network 100 includes two local area networks (LANs), LAN L1 110 and LAN L2 120 interconnected by the Internet 130 . LAN L1110 includes device A 112 and device C 114, both of which are within a circle 116 illust...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L9/32
CPCH04L9/3263H04L63/126H04L29/06095H04L9/3271H04L63/0869H04L69/16
Inventor 奥利维尔·考泰穆罕麦德·卡鲁米阿兰·杜兰德
Owner INTERDIGITAL CE PATENT HLDG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products