Image-based man-in-the-middle protection in numeric comparison association models

An image-in-image technology, applied in the field of image-based man-in-the-middle defense in digital comparison association models, can solve problems such as low efficiency and troublesome comparison of two digital confirmation values

Inactive Publication Date: 2011-02-02
QUALCOMM INC
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] One limitation of using PINs, numeric confirmation values, and/or other forms of numeric and/or alphanumeric sequences is that the numbers zero (0) through nine (9) do not provide much information per character
While the number comparison protocol used in some technologies has simplified the authentication process for users, some users may st

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image-based man-in-the-middle protection in numeric comparison association models
  • Image-based man-in-the-middle protection in numeric comparison association models
  • Image-based man-in-the-middle protection in numeric comparison association models

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In the following description, specific details are given in order to provide a thorough understanding of various features. However, it will be understood by those skilled in the art that these features may be practiced without these specific details. For example, circuit details may not be shown in the block diagrams in order not to obscure the examples or configurations illustrated in the block diagrams.

[0036] Also, note that examples may be described as procedures that are depicted as block diagrams, flowcharts, block diagrams, or block diagrams. Although a block diagram may depict operations as a sequential process, many of the described operations may be performed in parallel or simultaneously. Also, the order of the operations may be rearranged. A process terminates when its operations are complete. A procedure may correspond to a method, function, procedure, subroutine, subroutine, or the like. When a procedure corresponds to a function, termination of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An authentication scheme is provided for securely establishing an association with a second device over a wireless communication link. A cryptographic key exchange is performed between a first device and a second device, wherein cryptographic information for the first and second device is obtained. The first and second devices may independently generate a confirmation value based on the cryptographic information. Each device may obtain a confirmation image based on their respective confirmation values. A confirmation image is uniquely associated with a confirmation value so that no two confirmation values can be associated with the same confirmation image. The images for both the first and second devices are provided to an operator for authentication. If the confirmation images are identical, an association between the first and second devices may be confirmed by the operator. Comparing confirmation images may increase the reliability of operator authentication and is more efficient than comparing values.

Description

technical field [0001] At least one feature relates to the pairing and authentication of network devices communicating in a wireless network, and more specifically to the use of images, icons and / or (optionally) sounds in a comparative association model that starts with A defense scheme against man-in-the-middle attacks is implemented for wireless device authentication. Background technique [0002] In wireless communication systems, secure communication between participating communication units may be achieved through pairing and authentication procedures. Many wireless technologies implement cryptographic key exchange mechanisms that provide participating communication units with exchanged and shared secret information that confirms that the correct device is connected. [0003] One problem that may commonly arise with such key exchange mechanisms is that they may be vulnerable to man-in-the-middle (MITM) attacks, a security breach in which a malicious user may intercept ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W88/02H04W12/06G06F21/00H04L29/06H04W12/12H04L9/08
CPCH04L63/1475H04L63/1466G06F21/31G06F2221/2129H04W88/02H04W12/12H04W12/06H04W12/65H04W12/50H04W12/77H04W12/63H04W12/122H04L9/08
Inventor 乔尔·林斯利
Owner QUALCOMM INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products