DEVICE AUTHENTICATION IN AD-HOC NETWORKS
First Claim
1. A method to authenticate an invited device, the method comprising, by an evaluating device:
- receiving, at a first receiving time, a first message from the invited device;
receiving, at a second receiving time, a second message from an inviting device;
determining a receiving time difference between the first receiving time and the second receiving time; and
authenticating the invited device based on the receiving time difference, the first message and the second message.
3 Assignments
0 Petitions
Accused Products
Abstract
Technologies are generally described for methods and systems effective to authenticate an invited device. In some examples, a method for authenticating an invited device may include receiving, by an evaluating device, a first message from the invited device. The evaluating device may receive the first message at a first receiving time. The method may also include receiving, by the evaluating device, a second message from the inviting device. The evaluating device may receive the second message at a second receiving time. A first sending time, of the first message, and a second sending time, of the second message, may be mutually synchronized. The method may also include determining a receiving time difference between the first receiving time and the second receiving time. The method may also include, by the evaluating device, authenticating the invited device based on the receiving time difference, the first message and the second message.
26 Citations
20 Claims
-
1. A method to authenticate an invited device, the method comprising, by an evaluating device:
-
receiving, at a first receiving time, a first message from the invited device; receiving, at a second receiving time, a second message from an inviting device; determining a receiving time difference between the first receiving time and the second receiving time; and authenticating the invited device based on the receiving time difference, the first message and the second message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system configured to authenticate an invited device, the system comprising:
-
an evaluating device; and an inviting device configured to be in communication with the evaluating device; the evaluating device being configured to; receive, at a first receiving time, a first message from the invited device; receive, at a second receiving time, a second message from an inviting device; determine a receiving time difference between the first receiving time and the second receiving time; and authenticate the invited device based on the receiving time difference, the first message, and the second message. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method for authenticating an invited device, the method comprising,
by an inviting device: -
establishing a first communication link with the invited device; determining a start time; sending an indication of the start time to the invited device through the first communication link; and sending a first message to an evaluating device at the start time; by the invited device; receiving the indication of the start time from the inviting device through the first communication link; and sending a second message to the evaluating device through a second communication link at the start time; by the evaluating device; receiving, at a first receiving time, the first message from the invited device; receiving, at a second receiving time, the second message from the inviting device; determining a receiving time difference between the first receiving time and the second receiving time; and authenticating the invited device based on the receiving time difference, the first message and the second message. - View Dependent Claims (18, 19, 20)
-
Specification