×

Systems, methods, and devices for secure device-to-device discovery and communication

  • US 9,893,894 B2
  • Filed: 09/23/2015
  • Issued: 02/13/2018
  • Est. Priority Date: 03/13/2015
  • Status: Active Grant
First Claim
Patent Images

1. User equipment (UE), comprising:

  • a memory device to store instructions; and

    a baseband processor to execute the instructions to;

    process a discovery response message from a peer UE to determine whether or not the discovery response message includes a payload comprising first a shared secret value (SSV);

    generate a direct communication request to the peer UE, wherein the direct communication request comprises a first signature authenticating an identity of a user of the UE;

    if the discovery response message includes the payload comprising the first SSV, use the first SSV provided in the payload of the discovery response message to encrypt the direct communication request;

    if the discovery response message does not include the payload comprising the first SSV, generate a second SSV to share with the peer UE and encode the second SSV into a payload of the direct communication request;

    decrypt, using the first SSV if included in the discovery response message, or using the second SSV if the first SSV is not included in the discovery response message, a direct communication response from the peer UE to authenticate an identity of the peer UE, wherein the direct communication response comprises a second signature authenticating the identity of a user of the peer UE; and

    in response to the direct communication response from the peer UE to authenticate the identity of the peer UE, engage in direct communication with the peer UE using the first SSV if included in the discovery response message, or using the second SSV if the first SSV is not included in the discovery response message,wherein common key material, for communication between the UE and the peer UE, is generated and communicated between the UE and the peer UE based on a Sakai-Kasahara Key Encryption (SAKKE) scheme.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×