DATA INTEGRITY FOR PROXIMITY-BASED COMMUNICATION
First Claim
1. A method for trusted communication among mobile devices, the method comprising:
- accessing a message at a first mobile device;
accessing a shared secret value stored at the first mobile device and associated with a second mobile device;
generating an authentication value at the first mobile device based on the message and the shared secret value;
detecting proximity of the second mobile device at the first mobile device; and
in response to detecting proximity of the second mobile device, wirelessly transmitting the message and the authentication value from the first mobile device directly to the second mobile device.
8 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer programs for trusted communication among mobile devices are described. In some aspects, an authentication value is generated at a first mobile device based on a message and a shared secret value stored on the first mobile device. In response to detecting proximity of a second mobile device, the message and the authentication value are wirelessly transmitted from the first mobile device to the second mobile device. In some implementations, the message and the authentication value can be wirelessly transmitted by a proximity-activated wireless interface, such as, for example, a Near Field Communication (NFC) interface.
26 Citations
34 Claims
-
1. A method for trusted communication among mobile devices, the method comprising:
-
accessing a message at a first mobile device; accessing a shared secret value stored at the first mobile device and associated with a second mobile device; generating an authentication value at the first mobile device based on the message and the shared secret value; detecting proximity of the second mobile device at the first mobile device; and in response to detecting proximity of the second mobile device, wirelessly transmitting the message and the authentication value from the first mobile device directly to the second mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A mobile device comprising:
-
memory operable to store a shared secret value; a wireless communication interface; data processing apparatus operable to perform operations comprising; detecting proximity of a second mobile device; generating an authentication value based on a message and the shared secret value; and in response to detecting proximity of the second mobile device, wirelessly transmitting, by the wireless communication interface, the message and the authentication value directly to the second mobile device. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A non-transitory computer-readable medium storing instructions that are operable when executed by data processing apparatus to perform operations for trusted communication among mobile devices, the operations comprising:
-
accessing a message at a first mobile device; accessing a shared secret value stored at the first mobile device and associated with a second mobile device; generating an authentication value at the first mobile device based on the message and the shared secret value; detecting proximity of the second mobile device at the first mobile device; and in response to detecting proximity of the second mobile device, wirelessly transmitting the message and the authentication value from the first mobile device directly to the second mobile device. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34)
-
Specification