Method to detect man-in-the-middle (MITM) or relay attacks
First Claim
Patent Images
1. A method for detecting a communication relay attack comprising the steps of:
- establishing a communication link between a data transmitting device and a data receiving device;
transmitting a clock signal from said data receiving device to said data transmitting device for synchronizing data communication between said data transmitting device and said data receiving device;
transmitting data from said data transmitting device to said data receiving device, said data having a first predefined element and a second predefined element;
counting a number of clock cycles occurring in said clock signal between transmission of said first predetermined element of said data and transmission of said second predefined element of said data with said data transmission device;
counting a number of clock cycles occurring in said clock signal between receipt of said first predefined element of said data and receipt of said second predefined element of said data with said data receiving device; and
comparing said number of clock cycles counted by said data transmission device with said number of clock cycles counted by said data receiving device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for detecting a communication relay attack involves the steps of counting a number of clock cycles occurring in a clock signal between transmission of two predetermined elements of data with a data transmission device, counting a number of clock cycles occurring in the clock signal between receipt of the two predefined elements of data and comparing the number of clock cycles counted by the data transmission device with the number of clock cycles counted by the data receiving device.
-
Citations
20 Claims
-
1. A method for detecting a communication relay attack comprising the steps of:
-
establishing a communication link between a data transmitting device and a data receiving device; transmitting a clock signal from said data receiving device to said data transmitting device for synchronizing data communication between said data transmitting device and said data receiving device; transmitting data from said data transmitting device to said data receiving device, said data having a first predefined element and a second predefined element; counting a number of clock cycles occurring in said clock signal between transmission of said first predetermined element of said data and transmission of said second predefined element of said data with said data transmission device; counting a number of clock cycles occurring in said clock signal between receipt of said first predefined element of said data and receipt of said second predefined element of said data with said data receiving device; and comparing said number of clock cycles counted by said data transmission device with said number of clock cycles counted by said data receiving device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for detecting a communication relay attack comprising:
-
a data transmitting device for transmitting data having a first predefined element and a second predefined element, said data transmitting device including a clock counter for counting a number of clock cycles occurring in a clock signal between transmission of said first predefined element of said data and said second predefined element of said data; and a data receiving device for receiving said data from said data transmitting device and including a clock for transmitting a clock signal to said data transmitting device and a clock counter for counting a number of clock cycles occurring in said clock signal between receipt of said first predefined element of said data and receipt of said second predefined element of said data, wherein at least one of said data transmitting device and said data receiving device further includes a comparator for comparing a number of clock cycles counted by said data transmitting device with a number of clock cycles counted by said data receiving device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification