Method and devices for secure measurements of time-based distance between two devices
A device, time technology, applied in security. areas, able to resolve issues such as unpleasantness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] Figure 2 illustrates a flow chart of a preferred embodiment of the method according to the invention. The method has three general phases:
[0030] 1. A precomputation phase, in which the method is started and a first cryptographic computation is performed.
[0031] 2. A time-based length-of-measurement phase between two devices, exchanging the results of the pre-computation phase under commands like "ping".
[0032] 3. Cryptographic verification phase, where additional verification data is calculated and exchanged (cryptically linked to the result exchanged in the "ping" message), and the verification is verified. In other words, the sender to verify the response to the "ping" command is the sender of the authentication data, and further verifies the identity of the responding device.
[0033] In the description that follows, it is assumed that device A 212 needs to securely measure the RTT to device B 216 . In other words, device A initiates the protocol and device...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com