Authentication in device to device discovery
First Claim
Patent Images
1. A method for authentication in device to device discovery, the method being performed by a network node, comprising:
- receiving a discovery request message transmitted by a discoverer device, the discovery request message requesting a permission to announce an application identifier;
transmitting to the discoverer device a discovery response message comprising the application identifier;
receiving, from a discoveree device, a token generation request to generate a first token, the token generation request comprising the application identifier;
in response to receiving the token generation request transmitted by the discoveree device and comprising the application identifier, generating the first token using a security key and the application identifier;
transmitting the first token to the discoveree device;
receiving, from a discoverer device, a verification request to verify the first token;
in response to receiving the verification request, verifying the first token, wherein verifying the first token comprises generating a second token using information included in the verification request and comparing the second token to the first token; and
transmitting to the discoverer device a message indicating that the first token is authenticate.
3 Assignments
0 Petitions
Accused Products
Abstract
There is provided a method for authentication in device to device discovery. A method performed by a Discoverer device, comprises broadcasting a direct discovery request, receiving a direct discovery response from a Discoveree device, the direct discovery response comprising a first token, and obtaining a determination of whether the first token was generated for the Discoveree device or not.
16 Citations
5 Claims
-
1. A method for authentication in device to device discovery, the method being performed by a network node, comprising:
-
receiving a discovery request message transmitted by a discoverer device, the discovery request message requesting a permission to announce an application identifier; transmitting to the discoverer device a discovery response message comprising the application identifier; receiving, from a discoveree device, a token generation request to generate a first token, the token generation request comprising the application identifier; in response to receiving the token generation request transmitted by the discoveree device and comprising the application identifier, generating the first token using a security key and the application identifier; transmitting the first token to the discoveree device; receiving, from a discoverer device, a verification request to verify the first token; in response to receiving the verification request, verifying the first token, wherein verifying the first token comprises generating a second token using information included in the verification request and comparing the second token to the first token; and transmitting to the discoverer device a message indicating that the first token is authenticate. - View Dependent Claims (2, 3)
-
-
4. A network node for authentication in device to device discovery, the network node comprising a processing unit and a non-transitory computer readable storage medium, said non-transitory computer readable storage medium comprising instructions executable by said processing unit whereby said network node is operative to:
-
receive a discovery request message transmitted by a discoverer device, the discovery request message requesting a permission to announce an application identifier; transmit to the discoverer device a discovery response message comprising the application identifier; receive, from a discoveree device, a token generation request to generate a first token, the token generation request comprising the application identifier; in response to receiving the token generation request transmitted by the discoveree device and comprising the application identifier, generate the first token using a security key and the application identifier; transmit the first token to the discoveree device; receive, from the discoverer device, a verification request to verify the first token; in response to receiving the verification request, verify the first token, wherein the network node is configured to verify the first token by performing a process comprising generating a second token using information included in the verification request and comparing the second token to the first token; and transmit to the discoverer device a message indicating that the first token is authenticate.
-
-
5. A computer program product comprising a non-transitory computer readable medium storing a computer program for authentication in device to device discovery, the computer program comprising computer code which, when run on a network node, causes the network node to:
-
transmit to a discoverer device a discovery response message responding to a discovery request message transmitted by the discoverer device, the discovery request message requesting a permission to announce an application identifier, and the discovery response message comprising the application identifier; after receiving a token generation request transmitted by a discoveree device and comprising the application identifier, wherein the received token generation request comprises the application identifier, generate a first token using a security key and the application identifier; transmit the first token to the discoveree device; in response to receiving a verification request transmitted by the discoverer device, verify the first token, wherein the computer program is configured to verify the first token by performing a process comprising generating a second token using information included in the verification request and comparing the second token to the first token; and transmit to the discoverer device a message indicating that the first token is authenticate.
-
Specification