Personal assistance safety systems and methods
First Claim
Patent Images
1. A method for one-way authentication of a first communication device with a second communication device comprising:
- a. receiving at the first communication device a real-time time based value from a device remote from the first and second communication devices;
b. combining into a composite message the time based value and message content;
c. applying a cryptographic algorithm to the composite message to produce a message signature of the message content and the time based value;
d. transmitting the message content, the time based value, and the message signature with the first communication device;
wherein the time based value indicates an approximate time the first communication device transmits the message content such that the message signature is unique for separate transmissions of the same message content;
wherein the cryptographic algorithm is a hash function; and
wherein the time based value is to be used by the second communication device for determining whether the time-based value precedes a current time of the second communication device more than a predetermined increment of time and wherein the second communication device is intended to discard the received message if the first communication device transmitted the message more than the predetermined increment of time before the current time of the second communication device.
5 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are methods and systems related to a Personal Assistance Safety System. In one aspect, disclosed are methods and systems for vehicle communications comprising an antenna selecting unit configured to select an antenna according to an antenna selection strategy and a first antenna switch coupled to the antenna selecting unit configured to direct communications through the selected antenna.
29 Citations
19 Claims
-
1. A method for one-way authentication of a first communication device with a second communication device comprising:
-
a. receiving at the first communication device a real-time time based value from a device remote from the first and second communication devices; b. combining into a composite message the time based value and message content; c. applying a cryptographic algorithm to the composite message to produce a message signature of the message content and the time based value; d. transmitting the message content, the time based value, and the message signature with the first communication device; wherein the time based value indicates an approximate time the first communication device transmits the message content such that the message signature is unique for separate transmissions of the same message content; wherein the cryptographic algorithm is a hash function; and wherein the time based value is to be used by the second communication device for determining whether the time-based value precedes a current time of the second communication device more than a predetermined increment of time and wherein the second communication device is intended to discard the received message if the first communication device transmitted the message more than the predetermined increment of time before the current time of the second communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 18)
-
-
8. An apparatus for communication authentication comprising:
-
a clock source; a memory; a processor, coupled to the clock source, configured for; a. generating a real-time time based value from the clock source, b. combining into a composite message the time based value and message content; c. applying a cryptographic algorithm to the composite message to produce a message signature of the message content and the time based value; d. transmitting the message content, the time based value, and the message signature with the apparatus; wherein the time based value indicates an approximate time the first apparatus transmits the message content such that the message signature is unique for separate transmissions of the same message content; a wireless transceiver, coupled to the processor, configured for transmitting a message that includes the message content, message signature, and the time based value; wherein the cryptographic algorithm is a hash function; and wherein the time based value is to be used by the second communication device for determining whether the time-based value precedes a current time of the second communication device more than a predetermined increment of time and wherein the second communication device is intended to discard the received message if the first communication device transmitted the message more than the predetermined increment of time before the current time of the second communication device. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for one-way authentication of a first communication device with a second communication device comprising:
-
receiving a message with a second communication device, wherein a first communication device; a. generated a real-time time based value from a signal generated by a device remote from the first and second communication devices; b. combined into a composite message the time based value and message content; c. applied a cryptographic algorithm to the composite message to produce a message signature of the message content and the time based value; d. transmitted the message content, message signature, and the time-based value in the message; and wherein the time based value indicates an approximate time the first communication device transmitted the message content and also ensures that the message signature is unique for separate transmissions of the same message content comparing, with the second communication device, the time-based value from the message with a current time of the second communication device; determining, with the second communication device, whether the time-based value extracted from the message precedes the current time of the second communication device more than a predetermined increment of time; and discarding, with the second communication device, the message if the first communication device transmitted the message more than the predetermined increment of time before the current time of the second communication device; applying the cryptographic algorithm to the composite message; comparing a result of applying the cryptographic algorithm to the composite message with the message signature, discarding the message if the result of the cryptographic algorithm does not match the message signature; and wherein the cryptographic algorithm is a hash function. - View Dependent Claims (17, 19)
-
Specification