Method and apparatus for enhancing security in a wireless network using distance measurement techniques
First Claim
1. A method for establishing a secure wireless connection between a first wireless device and a second wireless device, said method comprising:
- measuring a radio-frequency communications delay between said second wireless device and at least one other wireless device;
computing an indication of physical location of said second wireless device with respect to said at least one other wireless device;
determining whether or not said indication of physical location indicates that connection between said first wireless device and said second wireless device is desirable; and
in response to determining that said connection is desirable, initiating said secure wireless connection between said first wireless device and said second wireless device.
11 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for enhancing security in a wireless network using distance measurement techniques provides an additional layer of security and privacy in wireless communications. A distance measurement or location-finding is performed between two devices by transmitting and receiving one or more signals and computing a distance between the two devices or a location of a connecting device. The resulting computed distance or location is used to determine whether or not to permit pairing, secure connection or secure transactions between the two devices. The computed distance or location can be further used in combination with a signal strength measurement to link to locate and measure nearby devices first, reducing the time required to initialize network communications. Management software may be enhanced to facilitate connecting to desired devices by providing an indication of computed distance or location of each device, and a list may be generated in order of proximity, further facilitating connection to the desired devices. Set-up of wireless networks may automated by using a short distance to facilitate connection between nodes.
214 Citations
37 Claims
-
1. A method for establishing a secure wireless connection between a first wireless device and a second wireless device, said method comprising:
-
measuring a radio-frequency communications delay between said second wireless device and at least one other wireless device;
computing an indication of physical location of said second wireless device with respect to said at least one other wireless device;
determining whether or not said indication of physical location indicates that connection between said first wireless device and said second wireless device is desirable; and
in response to determining that said connection is desirable, initiating said secure wireless connection between said first wireless device and said second wireless device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A wireless communications device, comprising:
-
an antenna;
a radio-frequency receiver coupled to said antenna;
a radio-frequency transmitter coupled to said antenna;
a measurement sub-system coupled to said receiver for measuring a radio-frequency delay between said wireless device and at least one other wireless device;
a processing sub-system for computing an indication of a distance of said at least one other wireless device in conformity with said measured delay; and
and a security sub-system for determining whether or not communications with said at least one other wireless device are desirable in conformity with said indication of distance. - View Dependent Claims (24, 25, 26)
-
-
27. A wireless network comprising:
-
a first wireless communications device;
at least one other wireless communications device, including a measurement sub-system for measuring a radio-frequency delay between said at least one other wireless device and a connecting wireless device; and
a processing sub-system for computing an indication of a physical location of said connecting wireless device in conformity with said measured delay; and
a security sub-system for determining whether or not a connection between said first wireless device and said connecting wireless device is desirable in conformity with said indication of physical location. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification