Device to-device (D2D) discovery without authenticating through cloud
First Claim
1. A method performed by a wireless device for establishing a device-to-device wireless connection, comprising:
- sending, from the wireless device via an unencrypted wireless medium, a device-to-device discovery request;
receiving, at the wireless device via the unencrypted wireless medium in response to the device-to-device discovery request, image authentication data from a second wireless device, the image authentication data being unique to a human user of the second wireless device, and the image authentication data including image data of a first digital picture representing the human user;
verifying the image authentication data at the wireless device by comparing the image authentication data to pre-stored authentication data on the wireless device, the pre-stored authentication data including image data of a second digital picture representing the human user of the second wireless device; and
in response to successful verification of the image authentication data, establishing a device-to-device connection of the wireless device with the second wireless device.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of device-to-device (D2D) discovery, authentication, and connection techniques are generally described herein. In an example, a device-to-device connection establishment technique may be performed directly between peer-to-peer wireless communication devices without obtaining authentication information from a cloud network or an external service. The device-to-device connection establishment technique may include a transmission of a discovery request to available devices, a transmission of a response from available devices including authentication data, and a verification of the authentication data. The authentication data may include previously stored image data associated with a device or human user associated with a device. In further examples, image processing and image recognition techniques may be used to verify a particular device or human user associated with a device.
87 Citations
25 Claims
-
1. A method performed by a wireless device for establishing a device-to-device wireless connection, comprising:
-
sending, from the wireless device via an unencrypted wireless medium, a device-to-device discovery request; receiving, at the wireless device via the unencrypted wireless medium in response to the device-to-device discovery request, image authentication data from a second wireless device, the image authentication data being unique to a human user of the second wireless device, and the image authentication data including image data of a first digital picture representing the human user; verifying the image authentication data at the wireless device by comparing the image authentication data to pre-stored authentication data on the wireless device, the pre-stored authentication data including image data of a second digital picture representing the human user of the second wireless device; and in response to successful verification of the image authentication data, establishing a device-to-device connection of the wireless device with the second wireless device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A user equipment (UE), comprising processing circuitry arranged to communicate with an evolved NodeB (eNB) of a Long Term Evolution or Long Term Evolution-Advanced (LTE/LTE-A) network and to establish a device-to-device wireless connection for direct device-to-device communications with a second wireless communications device using a wireless network independent of the LTE/LTE-A network, by performing operations to:
-
broadcast a device-to-device communication discovery request to the wireless network, the broadcast including information to identify the UE; extract image authentication data in a communication response received from the second wireless communications device over the wireless network, the communication response received in response to the broadcast of the device-to-device communication discovery request, wherein the image authentication data includes a digital image from the second wireless communication device; compare the image authentication data received from the second wireless communications device to pre-stored image authentication data maintained for a plurality of recognized wireless communication devices; and in response to a match of the image authentication data in the pre-stored image authentication data, establish a device-to-device connection with the second wireless communications device. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method performed by a receiving wireless device for establishing a device-to-device wireless connection with a requesting wireless device, comprising:
-
receiving, from a requesting wireless device at the receiving wireless device, a device-to-device discovery request broadcast via a wireless transmission medium; determining, at the receiving wireless device, image authentication data for a response to the discovery request, the image authentication data including digital image data representing a human user of the receiving wireless device; and sending, from the receiving wireless device to the requesting wireless device, the image authentication data, wherein the digital image data representing the human user is verified at the requesting wireless device for establishment of a subsequent device-to-device wireless connection. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A user equipment (UE), comprising:
-
a camera configured to capture an image data representation of a human user; and a transceiver comprising circuitry including physical layer circuitry and media-access control layer circuitry, the circuitry arranged to attempt authentication for establishing device to device communications with a requesting device, by performing operations to; process a device-to-device discovery request received via a wireless transmission medium; generate a response to the discovery request, the response including authentication data including the image data representation of the human user captured by the camera; send, to the requesting device, the response to the discovery request for verification of an identity associated with the user equipment; and exchange device-to-device communications in response to verification of the identity by the requesting device. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification