DATA INTEGRITY FOR PROXIMITY-BASED COMMUNICATION
First Claim
1. A method for trusted communication among mobile devices, the method comprising:
- wirelessly transmitting information from a first mobile device to a second mobile device permitting the second mobile device to detect proximity of the first mobile device;
receiving, at the first mobile device, a message and a first authentication value wirelessly transmitted from the second mobile device directly to the first mobile device in response to the information;
accessing a shared secret value stored at the first mobile device and associated with the second mobile device;
generating a second authentication value at the first mobile device based on the message and the shared secret value; and
verifying integrity of the message based on comparing the first authentication value and the second authentication value.
8 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer programs for trusted communication among mobile devices are described. In some aspects, information is wirelessly transmitted from a first mobile device to a second mobile device. The information permits the second mobile device to detect proximity of the first mobile device. In some implementations, the information can be wirelessly transmitted by a proximity-activated wireless interface, such as, for example, a Near Field Communication (NFC) interface. In response to the information, the first mobile device receives a message and a first authentication value wirelessly transmitted from the second mobile device to the first mobile device. A second authentication value is generated at the first mobile device based on the message and the shared secret value. Integrity of the message is verified based on comparing the first authentication value and the second authentication value.
-
Citations
41 Claims
-
1. A method for trusted communication among mobile devices, the method comprising:
-
wirelessly transmitting information from a first mobile device to a second mobile device permitting the second mobile device to detect proximity of the first mobile device; receiving, at the first mobile device, a message and a first authentication value wirelessly transmitted from the second mobile device directly to the first mobile device in response to the information; accessing a shared secret value stored at the first mobile device and associated with the second mobile device; generating a second authentication value at the first mobile device based on the message and the shared secret value; and verifying integrity of the message based on comparing the first authentication value and the second authentication value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A mobile device comprising:
-
memory operable to store a shared secret value; a wireless communication interface; data processing apparatus operable to perform operations comprising; sending to a second mobile device information permitting the second mobile device to detect proximity of the wireless communication interface; receiving a message and a first authentication value wirelessly transmitted from the second mobile device directly to the wireless communication interface in response to the information; generating a second authentication value based on the message and the shared secret value; and verifying integrity of the message based on comparing the first authentication value and the second authentication value. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A non-transitory computer-readable medium storing instructions that are operable when executed by data processing apparatus to perform operations for trusted communication among mobile devices, the operations comprising:
-
wirelessly transmitting information from a first mobile device to a second mobile device permitting the second mobile device to detect proximity of the first mobile device; receiving, at the first mobile device, a message and a first authentication value wirelessly transmitted from the second mobile device directly to the first mobile device in response to the information; accessing a shared secret value stored at the first mobile device and associated with the second mobile device; generating a second authentication value at the first mobile device based on the message and the shared secret value; and verifying integrity of the message based on comparing the first authentication value and the second authentication value. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
Specification