Device authentication in ad-hoc networks
First Claim
1. A method to authenticate an invitee device, the method comprising:
- receiving, by an evaluator device from the invitee device, at a first receive time, a first message, wherein;
the invitee device is different from the evaluator device,a first communication link, of a first security level, is established between the invitee device and an inviter device prior to the receipt of the first message by the evaluator device,the inviter device is different from the evaluator device, andthe inviter device is different from the invitee device;
receiving, by the evaluator device from the inviter device, at a second receive time, a second message through a second communication link of a second security level, wherein the first security level is higher than the second security level;
determining, by the evaluator device, a receive time difference between the first receive time and the second receive time; and
authenticating, by the evaluator device, the invitee device based on the receive time difference, the first message, and the second message.
3 Assignments
0 Petitions
Accused Products
Abstract
Technologies are generally described for methods and systems effective to authenticate an invited device. In some examples, a method for authenticating an invited device may include receiving, by an evaluating device, a first message from the invited device. The evaluating device may receive the first message at a first receiving time. The method may also include receiving, by the evaluating device, a second message from the inviting device. The evaluating device may receive the second message at a second receiving time. A first sending time, of the first message, and a second sending time, of the second message, may be mutually synchronized. The method may also include determining a receiving time difference between the first receiving time and the second receiving time. The method may also include, by the evaluating device, authenticating the invited device based on the receiving time difference, the first message and the second message.
36 Citations
18 Claims
-
1. A method to authenticate an invitee device, the method comprising:
-
receiving, by an evaluator device from the invitee device, at a first receive time, a first message, wherein; the invitee device is different from the evaluator device, a first communication link, of a first security level, is established between the invitee device and an inviter device prior to the receipt of the first message by the evaluator device, the inviter device is different from the evaluator device, and the inviter device is different from the invitee device; receiving, by the evaluator device from the inviter device, at a second receive time, a second message through a second communication link of a second security level, wherein the first security level is higher than the second security level; determining, by the evaluator device, a receive time difference between the first receive time and the second receive time; and authenticating, by the evaluator device, the invitee device based on the receive time difference, the first message, and the second message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system configured to authenticate an invitee device, the system comprising:
-
an evaluator device different from the invitee device, wherein the evaluator device is configured to be in communication with an inviter device, wherein the inviter device is different from the evaluator device and different from the invitee device, wherein the inviter device is configured to be in communication with the invitee device through a first communication link of a first security level, and wherein the evaluator device is configured to; receive, at a first receive time, a first message from the invitee device; receive, at a second receive time, a second message from the inviter device through a second communication link of a second security level, wherein the first security level is higher than the second security level; determine a receive time difference between the first receive time and the second receive time; and authenticate the invitee device based on the receive time difference, the first message, and the second message. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method to authenticate an invitee device, the method comprising,
by an inviter device: -
establishing a first communication link of a first security level with the invitee device, wherein the inviter device is different from the invitee device; determining a start time; sending an indication of the start time to the invitee device through the first communication link; and sending a first message to an evaluator device at the start time, wherein the evaluator device is different from the inviter device, and wherein the evaluator device is different from the invitee device; by the invitee device; receiving the indication of the start time from the inviter device through the first communication link; and sending a second message to the evaluator device through a second communication link of a second security level at the start time, wherein the first security level is higher than the second security level; and by the evaluator device; receiving, at a first receive time, the first message from the invitee device; receiving, at a second receive time, the second message from the inviter device; determining a receive time difference between the first receive time and the second receive time; and authenticating the invitee device based on the receive time difference, the first message, and the second message. - View Dependent Claims (17, 18)
-
Specification