Distributed protocol for authorisation

A technology for authorizing data and authorization requests, applied in the field of authorized recursive distributed protocols, can solve problems such as not meeting the needs of ad hoc networks

Inactive Publication Date: 2010-08-25
ITI SCOTLAND
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the protocol requires a single trusted central server and therefore does not meet the needs of the ad hoc network described above

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed protocol for authorisation
  • Distributed protocol for authorisation
  • Distributed protocol for authorisation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be described in relation to UWB wireless networks. However, it should be appreciated that the invention is equally applicable to any wireless network that performs distributed authorization.

[0029] FIG. 3 shows a wireless network 10 with a plurality of wireless devices 30 . For purposes of illustration, wireless devices 30 are identified by their usernames in this example. For example, wireless network 10 in FIG. 3 has wireless devices 30 labeled Alice, Carol, Bob, Dave, Eve, Dan, Dick, and Doug. As described below, the protocol for performing distributed authorization includes multiple stages, some of which in turn have multiple steps.

[0030] In the example of Figure 3, the method for performing distributed authorization comprises five main steps, with steps 2 and 3 having multiple messages.

[0031] In step 1, an unauthorized user, eg Alice, requests access to a network, device or service controlled by a service providing device (eg C...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A decentralised, distributed approach to performing authorisation involves receiving an authorisation request at a service providing device, for example ''Carol'', and then retrieving trust information from other peer devices in the network. The gathered information is used by the device ''Carol'' to make a well-informed authorisation decision.

Description

technical field [0001] The present invention relates to distributed protocols for authorization, and more particularly to recursive distributed protocols for peer-to-peer authorization in wireless communication networks, such as ultra-wideband communication networks. Background technique [0002] Ultra-wideband is a radio technology that transmits digital data over a very wide frequency range (3.1 to 10.6GHz). By spreading the RF energy over a large bandwidth, the transmitted signal is virtually undetectable by conventional frequency selective RF techniques. However, the low transmission power limits the communication distance to typically less than 10 to 15 meters. [0003] There are two approaches for UWB: a time-domain approach, which constructs a signal from a pulse waveform with UWB capabilities; and a frequency-domain modulation approach, which uses conventional FFT-based Orthogonal Frequency Division Multiplexing (OFDM) over multiple (frequency) bands , called MB-OF...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04L29/06
CPCH04W12/08H04L63/102H04W84/12H04W12/06
Inventor 詹姆斯·欧文阿利斯代尔·迈克蒂安米德
Owner ITI SCOTLAND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products