Device authentication

a device and authentication technology, applied in the field of securely authenticating a device, can solve the problems of increasing the power consumption of the device, increasing the cost of the device, and affecting the security of the device,

Inactive Publication Date: 2015-08-27
QUALCOMM TECH INT
View PDF4 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such complex routing requires processing power which tends to increase power consumption of the devices.
This may be undesirable because it increases the cost of devices that might be installed in a multitude locations and / or attached to a multitude of different devices.
The mesh network may be especially vulnerable to attacks when new devices added to the network.
However, the key exchange mechanism may not prevent a man-in-the middle attack.
Device M can then calculate two sets of secret keys SMC=SCM and SMB=SBM that would be used for communication between devices C and B through device M. Thus the security of the network may still be compromised using known key exchange mechanisms.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device authentication
  • Device authentication
  • Device authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052]The following description is presented to enable any person skilled in the art to make and use the invention, and is provided in the context of a particular application. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art.

[0053]The general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present invention. Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.

[0054]To protect against man-in-the-middle (MITM) attacks, the identity of a new device must be verified before a configuring device in the network can trust the new device. Given that a new, unverified device may not be accessible or have any form of user interface, and may possibly be a long distance from the configuring device as it may be in a mesh network, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for authenticating a first device capable of operating according to a wireless communications protocol, the method comprising: at a second device, receiving a first message comprising an identifier for the first device and an authorisation code associated with the first device, the first message not being received from the first device in accordance with the wireless communications protocol; at the second device, receiving a second message comprising a value, the second message being sent from the first device in accordance with the wireless communications protocol; and authenticating the first device if the authorisation code received via the first message relates, according to a predetermined algorithm, to the received value.

Description

TECHNICAL FIELD[0001]This invention relates to a method for securely authenticating a device.BACKGROUND OF THE INVENTION[0002]There is an increasing need for a variety of objects to be equipped with the ability to send and receive messages. In the case of a home, for example, it may be desirable that the objects in a room be capable of communicating with each other, and also potentially to be able to communicate with the internet or cloud. For example, the room may have a light, light switch, window and door. It may be desired that each of these objects be able to communicate with the others so that the home can be automated.[0003]To enable objects to communicate, they may be equipped with a communication device that can communicate with similar communication devices attached to other objects. For this architecture to be of greatest use, a large number of objects need to be able to communicate with each other. The result can be a network of many communication devices, each associate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04W12/06H04L29/06H04W12/04H04L45/02H04W4/029H04W4/38H04W4/70H04W4/80H04W76/11H04W76/14
CPCH04W12/06H04W12/04H04L63/061H04L63/0853H04L63/08H04L43/065H04L43/10H04W4/029H04W4/80H04W76/14H04W76/11G06Q10/0833H04W4/06H04W52/0251Y02A10/40Y02D30/70H04W12/77H04W12/50H04L41/12H04L43/0817H04W40/24H04W84/18H04W4/38H04W52/028H04W4/70H04L41/082H04L41/0853H04W8/245H04L63/1475H04L63/1491H04W52/0209H04W52/0225H04W92/02H04L41/0846H04W8/24H04W88/04H04W64/003G06F21/44G06F21/73G06F21/76H04L9/0877H04L63/18H04W72/20H04L41/14H04L45/02H04L9/0861H04B7/14H04L43/0852H04L43/0882H04L47/115H04L47/16H04L49/1584H04L67/30H04L5/0055H04L69/22H04W16/18H04W52/38H04W24/06H04H20/71H04W72/12H04W88/06
Inventor HEYDON, ROBIN
Owner QUALCOMM TECH INT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products