WO2007045937A1 - Security in wireless environments using out-of-band channel communication - Google Patents

Security in wireless environments using out-of-band channel communication Download PDF

Info

Publication number
WO2007045937A1
WO2007045937A1 PCT/IB2005/003107 IB2005003107W WO2007045937A1 WO 2007045937 A1 WO2007045937 A1 WO 2007045937A1 IB 2005003107 W IB2005003107 W IB 2005003107W WO 2007045937 A1 WO2007045937 A1 WO 2007045937A1
Authority
WO
WIPO (PCT)
Prior art keywords
sequence
visual
information
light sensor
light
Prior art date
Application number
PCT/IB2005/003107
Other languages
French (fr)
Inventor
Kari Kostiainen
Jan-Erik Ekberg
Nitesh Saxena
Original Assignee
Nokia Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Corporation filed Critical Nokia Corporation
Priority to US12/083,708 priority Critical patent/US20100005294A1/en
Priority to PCT/IB2005/003107 priority patent/WO2007045937A1/en
Publication of WO2007045937A1 publication Critical patent/WO2007045937A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/11Arrangements specific to free-space transmission, i.e. transmission through air or vacuum
    • H04B10/114Indoor or close-range type systems
    • H04B10/1143Bidirectional transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Definitions

  • the present invention relates to wireless data communication.
  • the present invention relates to security aspects in wireless data communication environments using out- of-band channel communication.
  • Low-power radio frequency communications are becoming increasingly popular especially in the field of portable consumer electronic (CE) devices comprising for instance personal digital assistants (PDAs), electronic organizers, cellular (telephone) terminals, so-called smart phones / communicators, notebooks, personal computers, digital cameras, etc for primarily connecting to peripheral or accessory devices comprising for instance printers, head sets, network access points, GPS (Global Position System) receivers, etc.
  • PDAs personal digital assistants
  • smart phones / communicators notebooks, personal computers, digital cameras, etc for primarily connecting to peripheral or accessory devices comprising for instance printers, head sets, network access points, GPS (Global Position System) receivers, etc.
  • GPS Global Position System
  • Bluetooth and WLAN wireless local area network
  • SIG Bluetooth Special Interest Group
  • IEEE Institute of Electrical and Electronics Engineers
  • UWB Ultra- Wide Band
  • this initialization procedure is known as device pairing procedure.
  • the two Bluetooth enabled devices one being the master device and the other one being the slave device
  • the common secret which is a PIN (Personal Identification Number), which is a 1-16 bytes long sequence (8-128 bit sequence).
  • a 128 bit random number generated typically by the master device and one of the 48 bit BD_ADDRs (Bluetooth Device Addresses) of the master device and slave device an initialization key Kj nit is created using the E 22 algorithm.
  • the Bluetooth enabled devices exchange two new created 128 bit random sequences LK_RAND A and LA_RAND B , one of which created by the master device and the slave device, respectively.
  • each of the both Bluetooth enabled devices knows the two random sequences LK_RAND A and LA_RAND B and create the link key K ab using the E 21 algorithm.
  • the link key K ab once created is conventionally used for any future mutual authentication between the now paired Bluetooth enabled devices and for optionally creating encryption keys to secure the data communication therebetween.
  • the method of entering the PIN is regarded as the weakest point in achieving security of the Bluetooth connection.
  • users tend to use simple and short PINs (usually 4 digits) that are not secure enough to prevent an attacker to crack the PIN.
  • peripheral / accessory devices enabled for Bluetooth communication are available without any user interface and/or input means for entering a PESf; for instance the highly popular Bluetooth headsets.
  • Such devices have pre-installed PESI and moreover the PEST should be fixed and cannot be changed by the user. Still worse, the pre-installed PEST is just trivial and equal for a huge number of identical devices, for instance "0000".
  • the typical user tends to maintain a pre-installed PESf even if it is recommended to replace the pre-installed PESf with an individual PESf.
  • the user of the master device to which the slave devices connect, has to enter a number of N-I PESf s for initializing the communication connections to each other slave device, where N is the number of the total devices in the ad-hoc network. This circumstance can be very bothering for the user of the master device.
  • the basic object to be overcome by the present invention is to provide an improved methodology applicable in a wireless data communication, which requires initialization on the basis of a shared secret between two wireless devices.
  • the inventive methodology is efficient and user-acceptable.
  • one object of the present invention is to establish a secure methodology for sharing the common secret between the two wireless devices and another object of the present invention is to ensure usability.
  • a protocol for sharing the common secret should be designed to guarantee protection against a potential man-in-the- middle attack that tries to impersonate as a trusted communication counterpart.
  • the users of the wireless devices should be involved in the initialization at a minimum.
  • a method, and a system for using an out-of-band channel for secure information transmission between two devices capable for LPRF communication.
  • the out-of-band channel may be a unidirectional out-of-band channel and operable in a visual frequency band.
  • Information, which is intended for secure transmission from one of the devices to the other device is encoded into a time dependent visual sequence.
  • the visual sequence may comprise one or more visual signals, in particular lighted-up and dark states.
  • the visual sequence is emitted in a time- dependent signal by a light emitter of the one device and the visual sequence is detected by a light sensor of the other device on the basis of the detected signal.
  • the time-dependent signal especially timely varies in the light intensity.
  • the light sensor generates a (time-dependent) sequence of detection signals. These detection signals, i.e. the sequence of detection signals, are decoded to reconstruct the information intended for secure transmission.
  • the out-of-band channel transmission of the information being separate from the LPRP communication enables to transmit a shared secret.
  • the shared secret is required for secure authentication of the devices during initialization of the LPRP communication.
  • a device of using an out-of-band channel for secure information transmission is provided.
  • the device is capable for LPRF communication with a counterpart device.
  • Information intended for secure transmission is encoded into a visual sequence, which is emitted in a time-dependent signal by a light emitter of the device.
  • the visual sequence is provided for detection by a light sensor of the counterpart device.
  • a sequence of detection signals is obtainable from the light sensor in the counterpart device.
  • the sequence of detection signals is decodable to reconstruct the information intended for secure transmission.
  • the out-of-band channel transmission of the information separate from the LPRP communication enables to transmit a shared secret, which is required for secure authentication of the devices during initialization of the LPRF communication.
  • a device of using an out-of-band channel for secure information receipt is provided.
  • the device is capable for LPRF communication with a counterpart device.
  • Information intended for secure transmission is preferably encoded into a visual sequence by the counterpart device and the visual sequence is emitted in a time-dependent signal by a light emitter of the counterpart devices.
  • a light sensor of the device detects the visual sequence.
  • a sequence of detection signals is obtained from the light sensor on the basis of the detected signal / visual sequence.
  • the sequence of detection signals is decoded to reconstruct the information intended for secure transmission.
  • the out-of-band channel transmission of the information separate from the
  • the LPRF communication enables to transmit a shared secret, which is required for secure authentication of the devices during initialization of the LPRF communication.
  • the light emitter is a light emitting diode.
  • the light sensor is a light diode, an ambient light sensor, or an image capturing module (a digital camera).
  • the information is encoded bitwise and each bit value of the information is converted in a predefined visual symbol.
  • the at least two visual symbols, one of which representing the bits 0 and the other one representing the bit 1 comprises in turn one or more visual signals.
  • each bit value is converted into one or more lighted-up and dark states of the light emitter.
  • the lighted-up state and dark state of the light emitter represent corresponding visual signals, respectively.
  • the lighted-up and/or the dark states are persistent for one or more pre-defined periods of time.
  • frequency modulation is used for encoding the information into the visual sequence.
  • the sampling frequency of the light sensor exceeds the minimum sampling frequency required for correctly detecting the visual sequence emitted in the time-dependent signal.
  • the light sensor is an image capturing module, which captures a sequence of images during emission of the visual sequence. Each captured image is integrated to obtain a detection value. Integration may be an integration in space, an integration over an area, and/or an integration in time. Preferably, the integration is performed numerically. Then, a current detection value is compared to one or more previous detection values such that based on the determined difference the information is decoded and reconstructed from the captured images.
  • the captured images are converted into monochrome images.
  • each captured image is analyzed to identify an image area including the emitted time-depended signal of the light emitter.
  • the resulting area is integrated to obtain a detection value from each captured image. The remaining image outside of the resulting area is neglected.
  • Fig. 1 illustrates a schematic block diagram of components of a processing terminal embodied on the basis of a portable electronic terminal according to an embodiment of the present invention
  • Fig. 2a illustrates a schematic block diagram of a system during uni-direction out-of-band channel transmission according to an embodiment of the present invention
  • Fig. 2b illustrates a schematic illustration of a capturing result according to an embodiment of the present invention.
  • Fig. 2c illustrates a schematic block diagram of a system according to an embodiment of the present invention.
  • Bluetooth technology and/or any specific Bluetooth standard. Similar or analog initialization and pairing procedures are commonly used in the field of wireless communication technology including especially WLAN and UWB. Those skilled in the art will appreciate on the basis of the following description that the inventive concept is applicable with any wireless communication technology which requires the sharing of a common secret between at least two devices enabled for wireless communication for initializing the data communication therebetween.
  • Fig. 1 shows a schematic block illustration of components of a portable electronic terminal 100 in an exemplar form of a mobile / cellular telephone terminal.
  • the portable electronic terminal 100 exemplarily represents any kind of processing terminal or device employable with the present invention. It should be understood that the present invention is neither limited to the illustrated portable electronic terminal 100 nor to any other specific kind of processing terminal or device.
  • the illustrated portable electronic terminal 100 is exemplarily carried out as cellular communication enabled portable user terminal.
  • the portable electronic terminal 100 is embodied as a processor-based or micro-controller based system comprising a central processing unit (CPU) and a mobile processing unit (MPU) 110, respectively, a data and application storage 120, cellular communication means including cellular radio frequency interface (IfF) 180 with radio frequency antenna (outlined) and subscriber identification- module (SIM) 185, user interface input/output means including typically audio input/output (I/O) means 140 (conventionally a microphone and a loudspeaker), keys, keypad and/or keyboard with key input controller (Ctrl) 130 and a display with display controller (Ctrl) 150, a (local) wireless data interface (IfF) 160, and a general data interface (IfF) 170.
  • CPU central processing unit
  • MPU mobile processing unit
  • SIM subscriber identification- module
  • I/O typically audio input/output
  • keys keypad and/or keyboard with key
  • the operation of the portable electronic terminal 100 is controlled by the central processing unit (CPU) / mobile processing unit (MPU) 110 typically on the basis of an operating system or basic controlling application, which controls the functions, features and functionality of the portable electronic terminal 100 by offering their usage to the user thereof.
  • the display and display controller (Ctrl) 150 are typically controlled by the processing unit (CPU/MPU) 110 and provide information for the user including especially a (graphical) user interface (UI) allowing the user to make use of the functions, features and functionality of the portable electronic terminal 100.
  • the keypad and keypad controller (Ctrl) 130 are provided to enable the user inputting information.
  • the information input via the keypad is conventionally supplied by the keypad controller (Ctrl) to the processing unit (CPU/MPU) 110, which may be instructed and/or controlled in accordance with the input information.
  • the audio input/output (I/O) means 140 includes at least a speaker for reproducing an audio signal and a microphone for recording an audio signal.
  • the processing unit (CPU/MPU) 110 can control conversion of audio data to audio output signals and the conversion of audio input signals into audio data, where for instance the audio data have a suitable format for transmission and storing.
  • the audio signal conversion of digital audio to audio signals and vice versa is conventionally supported by digital-to-analog and analog-to-digital circuitry e.g. implemented on the basis of a digital signal processor (DSP, not shown).
  • DSP digital signal processor
  • the keypad operable by the user for input comprises for instance alphanumeric keys and telephony specific keys such as known from ITU-T keypads, one or more soft keys having context specific input functionalities, a scroll-key (up/down and/or right/left and/or any combination thereof for moving a cursor in the display or browsing through the user interface (UI), a four-way button, an eight- way button, a joystick or/and a like controller.
  • alphanumeric keys and telephony specific keys such as known from ITU-T keypads, one or more soft keys having context specific input functionalities, a scroll-key (up/down and/or right/left and/or any combination thereof for moving a cursor in the display or browsing through the user interface (UI), a four-way button, an eight- way button, a joystick or/and a like controller.
  • the portable electronic terminal 100 includes the cellular interface (I/F) 180 coupled to the radio frequency antenna (outlined) and operable with the subscriber identification module (SIM) 185.
  • the cellular interface (I/F) 180 is arranged as a cellular transceiver to receive signals from the cellular antenna, decodes the signals, demodulates them and also reduces them to the base band frequency.
  • the cellular interface (I/F) 180 provides for an over-the-air interface, which serves in conjunction with the subscriber identification module (SIM) 185 for cellular communications with a corresponding base station (BS) of a radio access network (RAN) of a public land mobile network (PLMN).
  • BS base station
  • RAN radio access network
  • PLMN public land mobile network
  • the output of the cellular interface (I/F) 180 thus consists of a stream of data that may require further processing by the processing unit (CPU/MPU) 110.
  • the cellular interface (I/F) 180 arranged as a cellular transceiver is also adapted to receive data from the processing unit (CPU/MPU) 110, which is to be transmitted via the over-the-air interface to the base station (BS) of the radio access network (RAN). Therefore, the cellular interface (I/F) 180 encodes, modulates and up-converts the data embodying signals to the radio frequency, which is to be used for over-the-air transmissions.
  • the antenna (outlined) of the portable electronic terminal 100 then transmits the resulting radio frequency signals to the corresponding base station (BS) of the radio access network (RAN) of the public land mobile network (PLMN).
  • the cellular interface (I/F) 180 preferably supports a 2 nd generation digital cellular network such as GSM (Global System for Mobile Communications) which may be enabled for GPRS (General Packet Radio Service) and/or EDGE (Enhanced Data for GSM Evolution), a 3 rd generation digital cellular network such as UMTS (Universal Mobile Telecommunications System), and/or any similar or related standards for cellular telephony.
  • GSM Global System for Mobile Communications
  • GPRS General Packet Radio Service
  • EDGE Enhanced Data for GSM Evolution
  • UMTS Universal Mobile Telecommunications System
  • the wireless data interface (I/F) 160 is depicted exemplarily and should be understood as representing one or more wireless network interfaces, which may be provided in addition to or as an alternative of the above described cellular interface (I/F) 180 implemented in the exemplary portable electronic terminal 100.
  • a large number of wireless network communication standards are available today.
  • the portable electronic terminal 100 may include one or more wireless network interfaces operating in accordance with any IEEE 802.XX standard, Wi-Fi standard, any Bluetooth standard (1.0, 1.1, 1.2, 2.0 + EDR, LE), ZigBee (for wireless personal area networks (WPANs)), Infra-Red Data Access (IRDA), Wireless USB (Universal Serial Bus), RFID (radio frequency identification) communication, especially NFC (Near Field Communication) and/or any other currently available standards and/or any future wireless data communication standards such as UWB (Ultra-Wideband).
  • any IEEE 802.XX standard Wi-Fi standard
  • any Bluetooth standard 1.0, 1.1, 1.2, 2.0 + EDR, LE
  • ZigBee for wireless personal area networks (WPANs)
  • IRDA Infra-Red Data Access
  • IRDA Infra-Red Data Access
  • Wireless USB Universal Serial Bus
  • RFID radio frequency identification
  • NFC Near Field Communication
  • the general data interface (I/F) 170 is depicted exemplarily and should be understood as representing one or more data interfaces including in particular network interfaces implemented in the exemplary portable electronic terminal 100.
  • a network interface may support wire-based networks such as Ethernet LAN (Local Area Network), PSTN (Public Switched Telephone Network), DSL (Digital Subscriber Line), and/or other current available and future standards.
  • the general data interface (I/F) 170 may also represent any data interface including any proprietary serial/parallel interface, a universal serial bus (USB) interface, a Firewire interface (according to any IEEE 1394/1394a/1394b etc. standard), a memory bus interface including ATAPI (Advanced Technology Attachment Packet Interface) conform bus, a MMC (MultiMediaCard) interface, a SD (SecureData) card interface, Flash card interface and the like.
  • ATAPI Advanced Technology Attachment Packet Interface
  • MMC MultiMediaCard
  • SD Secure Digital
  • the portable electronic terminal 100 comprises an image capturing module 190 which is applicable for taking still images and/or video sequences.
  • imaging modules 190 also designated digital camera or camera module are typically implemented or detachably connectable to a large number of portable consumer electronic (CE) devices including especially cellular telephone terminals, personal digital assistants (PDAs), electronic organizer / communicators, notebooks, and the like.
  • CE portable consumer electronic
  • portable CE devices develop to more or less multimedia multi-purpose terminals.
  • one or more imaging and/or video applications are provided to be run on the portable electronic terminal 100. The imaging and/or video applications enable to store, handle, and/or manipulate still images and/or video sequences captured by the means of the image capturing module 190.
  • the electronic device 100 may optionally comprise a hardware and/or software implemented video encoder module (not shown), which is capable for encoding/compressing video input signals to obtain compressed digital video sequences (and e.g. also digital pictures) in accordance with one or more video codecs and especially operable with an image capturing module 190 providing video input signals, and a video decoder module 210 enabled for encoding compressed digital video sequences (and e.g. also digital pictures) in accordance with one or more video codecs.
  • a hardware and/or software implemented video encoder module (not shown), which is capable for encoding/compressing video input signals to obtain compressed digital video sequences (and e.g. also digital pictures) in accordance with one or more video codecs and especially operable with an image capturing module 190 providing video input signals
  • a video decoder module 210 enabled for encoding compressed digital video sequences (and e.g. also digital pictures) in accordance with one or more video codecs.
  • the image capturing module 190 is preferably a sensor for capturing one or more images.
  • an image capturing module 190 consisting of an integrated circuit (IC) containing an array of linked, or coupled, capacitors. Under the control of an external circuit, each capacitor can transfer its electric charge to one or other of its neighbors.
  • IC integrated circuit
  • CCD charge-coupled device
  • Other image capturing technologies may be also used.
  • the components and modules illustrated in Fig. 1 may be integrated in the portable electronic terminal 100 as separate, individual modules, or in any combination thereof.
  • one or more components and modules of the portable electronic terminal 100 may be integrated with the processing unit (CPU/MPU) forming a system on a chip (SoC).
  • SoC system on a chip
  • SoC integrates preferably all components of a computer system into a single chip.
  • a SoC may contain digital, analog, mixed-signal, and also often radio-frequency functions.
  • a typical application is in the area of embedded systems and portable systems, which are constricted especially to size and power consumption constraints.
  • Such a typical SoC consists of a number of integrated circuits that perform different tasks.
  • microprocessor CPU/MPU
  • memory RAM: random access memory
  • ROM read-only memory
  • UARTs universal asynchronous receiver- transmitter
  • serial/parallel/network ports DMA (direct memory access) controller chips
  • GPU graphics processing unit
  • DSP digital signal processor
  • Typical applications operable with the portable electronic terminal 100 comprise beneath the basic applications enabling the data and/or voice communication functionality a contact managing application, a calendar application, a multimedia player application, a WEBAVAP browsing application, and/or a messaging application supporting for instance Short Message Services (SMS), Multimedia Message Services (MMS), and/or email services.
  • SMS Short Message Services
  • MMS Multimedia Message Services
  • Modern portable electronic terminals are programmable; i.e. such terminals implement programming interfaces and execution layers, which enable any user or programmer to create and install applications operable with the portable electronic terminal 100.
  • a today's well established device-independent programming language is JAVA, which is available in a specific version adapted to the functionalities and requirements of mobile device designate as JAVA Micro Edition (ME).
  • the portable electronic terminal 100 For enabling execution of application programs created on the basis of JAVA ME the portable electronic terminal 100 implements a JAVA MIDP (Mobile Information Device Profile), which defines an interface between a JAVA ME application program, also known as a JAVA MIDlet, and the portable electronic terminal 100.
  • the JAVA MIDP Mobile Information Device Profile
  • the JAVA MIDP provides an execution environment with a virtual JAVA engine arranged to execute the JAVA MIDlets.
  • the present invention is not limited to JAVA ME programming language and JAVA MIDlets; other programming languages especially proprietary programming languages are applicable with the present invention.
  • the authentication procedure is performed between two Bluetooth enabled devices, which intend to communicate with each other.
  • the authentication procedure is operated to ensure that a communication link is established between these two Bluetooth enabled devices.
  • a LPRF communication link 20 between two Bluetooth enabled devices is exemplary outlined in Fig. 1.
  • a headset 200 is depicted for the sake of illustration, which implements a Bluetooth transceiver / interface (I/F) 210 adapted to communication with a corresponding Bluetooth transceiver of the portable electronic device 100 via the communication link 20.
  • I/F Bluetooth transceiver / interface
  • different Bluetooth communication profiles are defined. The profiles consider the different requirements and device functions of specific Bluetooth enabled peripheral / accessory devices and/or
  • the Bluetooth enabled headset 200 represents any LPRF communication enabled counterpart device communicating with the portable electronic terminal 100 capable for LPRF communication.
  • One main part of the initialization procedure is the authentication procedure, which is based on a challenge-response scheme.
  • Authentication uses a challenge-response scheme in which a claimant's knowledge of a secret key is checked through a 2-move protocol using symmetric secret keys. The latter implies that a correct claimant/verifier pair shares the same secret key, for example K.
  • the verifier challenges the claimant to authenticate a random input (the challenge), denoted by AU_RAND A , with an authentication code, denoted by E 1 , and return the result SRES to the verifier.
  • the input to E 1 consists of the tuple including AU_RAND A and the Bluetooth device address (BD_ADDR) of the claimant.
  • the verifier sends a random number (the challenge) to the claimant, which calculates a response that is a function of this challenge, the claimant's Bluetooth Address (BD_ADDR), and a secret key.
  • BD_ADDR Bluetooth Address
  • This response is sent back to the verifier, which checks whether the received response matches with an expected response or not.
  • a successful calculation of the authentication response requires that the two Bluetooth enabled devices, i.e. the verifier and the claimant, share a common secret key. The use of this address prevents a simple reflection attack.
  • the secret K shared by Bluetooth enabled devices A and B is a current link key K AB .
  • the verifier is not required to be the master.
  • the application indicates which device has to be authenticated. Some applications only require a one-way authentication. However, some peer-to-peer communications should use a mutual authentication, in which each device is subsequently the challenger (verifier) in two authentication procedures.
  • the Link Manager (LM) being part of the Bluetooth implementation processes authentication preferences from the application to determine in which direction(s) the authentication(s) takes place.
  • Bluetooth enabled device B For mutual authentication with the Bluetooth enabled devices, after Bluetooth enabled device A has successfully authenticated Bluetooth enabled device B 3 Bluetooth enabled device B authenticates Bluetooth enabled device A by sending an AU_RAND B (different from the AU_RAND A that Bluetooth enabled device A issued) to Bluetooth enabled device A, and deriving the SRES and SRES' from the new AU_RAND B , the address of Bluetooth enabled device A, and the link key K AB .
  • AU_RAND B different from the AU_RAND A that Bluetooth enabled device A issued
  • This secret link key K is created during the pairing procedure of two Bluetooth enabled devices.
  • the secret key K used for authentication is derived through a procedure E 1 having two modes denoted E 11 and E 21 , respectively.
  • E 11 produces a 128-bit kink key, using a 128-bit RAND value and a 48-bit address (BD_ADDR). This mode is utilized when creating unit keys and combination keys.
  • E 21 produces a 128-bit link key, using a 128-bit RAND value and an octet user PIN (Personal Identification Number).
  • the second mode is used to create the initialization key, and also when a master key is to be generated.
  • the PESf is augmented with the 48-bit address (BD-ADDR).
  • the augmentation always starts with the least significant octet of the address immediately following the most significant octet of the PEST. Since the maximum length of the PESf used in the algorithm cannot exceed 16 octets, it is possible that not all octets of BD ADDR will be used.
  • An initialization key K init is used temporarily during initialization.
  • This initialization key K imt is derived by an algorithm E 22 from a BD ADDR, a PESf code, the length of the PESf (in octets), and a random number ESf_RAND.
  • the 128-bit output from E 22 is used for key exchange during the generation of a link key.
  • the initialization key K init will be discarded.
  • the PESf is augmented with the BD_ADDR. If one device has a fixed PESf the BD_ADDR of the other device shall be used. If both devices have a variable PESf the BD_ADDR of the device that received ESMRAND shall be used. If both devices have a fixed PESf they cannot be paired. Since the maximum length of the PESf used in the algorithm cannot exceed 16 octets, it is possible that not all octets of BD ADDR will be used. This procedure ensures that the initialization key Kj nit depends on the identity of the device with a variable PESf.
  • a fraudulent device may try to test a large number of PESfs by claiming another BD_ADDR each time. It is the application's responsibility to take countermeasures against this threat. If the device address is kept fixed, the waiting interval before the next try may be increased exponentially.
  • the combination key is the combination of two numbers generated in Bluetooth enabled device A and B, respectively.
  • each device shall generate a random number, LK_RAND A and LK_RAND B .
  • BD_ADDRs the two random numbers
  • LK_K A E 21 (LK_RAND A , BD_ADDR A ), EQ 1 ;
  • each device When the random numbers LK_RAND A and LK_RAND B have been mutually exchanged, each device recalculates the other device's contribution to the combination key. This is possible since each device knows the Bluetooth device address of the other device. Thus, Bluetooth enabled device A calculates EQ 2 and Bluetooth enabled device B calculates EQ 1. After this, both Bluetooth enabled devices combine the two numbers to generate the 128-bit link key. The combining operation is a simple bitwise modulo-2 addition (i.e. XOR). The result shall be stored in device A as the link key K AB and in device B as the link key K BA . When both devices have derived the new combination key, a mutual authentication procedure is initiated to confirm the success of the transaction. An old link key will be discarded after a successful exchange of a new combination key.
  • the PESF which represent the initial shared secret
  • An initial shared secret which has to be shared between at least two LPRF communication enabled devices, is the basis of the authentication.
  • the initial shared secret may be a PEST, a pass phrase, or any other secret numeric, character and/or alphanumeric sequence.
  • the aforementioned Bluetooth initialization procedure can be considered as a representative authentication concept of a large number of initialization procedures used in different LPRF communication technologies and standards.
  • the methodology of user-entered initial secrets is regarded as the weakest point in achieving security.
  • users tend to use simple and short initial secrets that are not secure enough to prevent an attacker to crack the secret.
  • peripheral / accessory devices enabled for LPRF communication are available without any user interface and/or input means for user input.
  • Such devices have pre-installed secrets, which may additionally be fixed and cannot be changed even if the user wishes. Or still worse, the pre-installed secret is just trivial and equal for a huge number of identical devices.
  • the typical user tends to maintain a pre-installed PIN even if it is recommended to define a user specific one at first putting into operation to replace the pre- installed secret.
  • the present invention is conceptually based on a new method for initializing security in wireless environments, especially in wireless ad hoc environments.
  • the shared secret which may be a PIN, a pass phrase, any alphanumeric sequence, a hash value of a public key, or whatever information is needed for initializing security in the particular application at hand, is encoded into a visual sequence, shown on one LPRF communication enabled device, recorded with the other LPRF communication device, and finally decoded on the other LPRF communication device.
  • a time varying optical signal should be understood including especially a sequence of LED blinks, a sequence of different or varying images or two- dimensional bar codes.
  • the secret information is coded as a visual sequence, which is transmitted in a channel completely separated from the LPRF communication channel used for communication between the devices.
  • the channel utilized for transmitting the visual sequence is an out-of-band channel separated from the LPRF communication channel actually used for communication between the participating devices.
  • the inventive concept falls back on components which are typically implemented in such LPRF communication enabled devices and is especially applicable with display-limited and display-less devices.
  • Figs. 2a to 2c the inventive concept according to an embodiment of the invention will be described on the basis of the portable electronic terminal 100 and the headset 200, which are described above with reference to Fig. 1. It should be assumed that an authenticated LPRF communication, especially Bluetooth communication, should be established between the portable electronic terminal 100 and the headset 200. For sharing the common secret (e.g. the PIN) enabling the authentication, the aforementioned concept of a visual sequence via an out-of-band channel is utilized.
  • the common secret e.g. the PIN
  • the chosen encoding/decoding scheme and the type of the visual sequence depend on the characteristics of the transmitting and receiving modules provided by the headset 200 and the portable electronic terminal 100, respectively.
  • a The transmitting module is a light emitter such as an emitting diode (LED) or a display or keypad illumination light emitter, or a small (a few pixels and/or low resolution) display and the receiving module is a light sensitive sensor, e.g. an ambient light sensor or a light diode;
  • the transmitting module is one or several light emitter (e.g. LEDs), for instance arranged in an array, one or several display or keypad illumination light emitters, or a small (a few pixels and/or low resolution) display and the receiving module is an image capturing module, for instance a digital camera; and
  • the transmitting module is a more complex (large number of pixels and/or high resolution) display and the receiving module is an image capturing module, e.g. a digital camera.
  • the transmitting module is capable to at least produce a sequence in time of visual signals.
  • the time sequence in time of the visual signals include a sequence in time of (one-dimensional) light/dark contrasts produced by a light emitting diode or a display, a sequence in time of two-dimensional images, where at least subsequent images produced by a display differ, or any other sequence in time of visual signals.
  • the receiving module is adapted to detect the visual signals and is further arranged to resolve the sequence in time of the visual signals. This means, the receiving module generates at least the same number of detection values as the number of visual signals comprised by the sequence in time.
  • the sampling frequency of the receiving module has to be at least two times the frequency of the sequence in time of the visual signals.
  • a light emitter e.g. a LED, a display or keypad illumination light emitter, or a small display
  • a corresponding light sensitive sensor e.g. a light diode, an ambient light sensor
  • Typical terminal devices such as the aforementioned terminal 100 comprises light emitter, typically one or more light emitting diodes, to illuminate keys, keypads, keyboards and/or the keys thereof to enable user inputs therewith in gloomy or dark environments.
  • Light emitter typically one or more light emitting diodes
  • Today's displays technology uses, beneath light back scattering mechanisms, back lights to illuminate displayed content on the display to enable visual impression of the displayed content in
  • LEDs light emitters
  • Such light emitters are sufficient for generating a visual sequence of visual symbols, which in turn comprises one or more visual signals according to an embodiment of the present invention.
  • the implementation of a control logic which is adapted to encode an information or data into corresponding driving signals of the light emitters and to control the operation of the one or more light emitters in accordance with the driving signals, is obtainable with relative small effort.
  • small display i.e. display having only few pixels and/or a low resolution can be also utilized as a light emitter.
  • Such display can be switched lighted up to emit light and can be switched dark such that the display does not emit any light.
  • the display can be completely switched or the display can be partly switched. In the latter case, the display may be partitioned into one or more sections to simulate one or more separate light emitters.
  • a light sensitive sensor Even embedded devices, peripheral devices, accessory devices, and the like can be provided with a light sensitive sensor.
  • a large number of portable devices with displays implement ambient light sensors for adjusting the brightness of the displays.
  • Such an ambient light sensor may be used according to an embodiment of the present invention.
  • the implementation of a detection logic, which is adapted to detect the visual sequence, to decode the original information or data embedded in the visual sequence and to reconstruct the original information or data from the detected signals, is also obtainable with relative small effort.
  • image capturing modules are already implemented in or detachably connected to a large number of portable electronic terminals such as the terminal 100 described above in detail.
  • Such image capturing modules are typically embodied as digital cameras which are at least capable to capture series of still images at a given frequency.
  • Improved digital cameras are capable to take video sequences at a given frame rate. Basically, the video sequences are composed of a sequence of still images at the frame rate.
  • an image capturing module can be used as a light sensitive sensor.
  • a detection logic operable with the image capturing module can be done on the basis of a software application, which is adapted to analyze each image of the captured sequence of images or video frames in order to detect the visual sequence within the images/frames and to decode and reconstruct the original information or data from the detected signals of the images/frames.
  • the transmitting device has a really small display, or only few LEDs
  • the information can be encoded into very simple bar codes, e.g. a device with four LEDs can show a sequence of bar codes containing four bits of information per frame (including the error correction bits).
  • the transmitting device has only a single LED or the receiving device has a very primitive sensor instead of a proper camera. In this case the information can be encoded into a sequence of blinks of a single LED.
  • the synchronization information, the preambles, and/or the postambles might be pre-defined; i.e. the pre-defined synchronization information, the preambles, and/or the postambles are known on transmitting as well as receiving side.
  • an exemplary coding for the alternative B is presented, where the transmitting device is a single LED:
  • the LED on emits light with a pre-defined characteristic which should be designated as a first visual signal, whereas the LED off does not emit any light, which should be designated as a second visual signal.
  • a pre-defined characteristic which should be designated as a first visual signal
  • the LED off does not emit any light, which should be designated as a second visual signal.
  • one or more visual symbols can be formed.
  • a bit encoding may have following form:
  • HZ designates a (pre-defined) period of time.
  • the visual symbol representing the bit "1" comprises four visual signals each having a pre-defined duration in time
  • the visual symbol representing the bit "0” comprises two visual signals each having a pre-defined duration in time different from the duration of the visual signals used for representing the bit "1".
  • the period of time depends preferably on the capability of the employed light emitter and on the expected detecting (frame) rate of the light sensitive sensor, i.e. the ambient light sensor, the light diode or the image capturing sensor (digital camera), for instance.
  • the sampling theorem should be considered.
  • the aforementioned example represents an exemplary frequency modulation encoding of a bit sequence.
  • the visual encoded bit sequence should preferably include one or more preambles, postambles, and/or (simple) checksums.
  • a preamble may be used to indicate the start of transmission of a visual sequence encoding a bit sequence
  • a postamble may be used to indicate the end of the transmission of the visual sequence encoding the bit sequence.
  • the preamble may be a (pre-defined) synchronization signal which enables the receiving device to determine information enabling the decoding including for instance the basic signal frequency used for encoding the visual sequence.
  • the transmitting module should additionally send the visual encoded bit sequence repeatedly one or several times.
  • the repetition of the sequence should improve the detectability whether the visual sequence has been completely detected and/or the detection was successful, i.e. free of any errors.
  • the aforementioned encoding into a visual sequence is applicable to any bit sequence representing any data and/or information.
  • the aforementioned encoding on the basis of visual symbols according to an embodiment of the invention should not limit the present invention.
  • Alternative visual symbols could be defined.
  • the decoding of the visual sequence encoded on the basis of the visual symbol definition described above is obtainable by a receiving algorithm, which is preferably informed about the visual symbols employed, the basic visual signal frequency, and/or the start/end of the visual sequence encoding the bit sequence.
  • the checksum may be any hash value obtained by any hash algorithm (such as Message Digest Hash Algorithm (e.g. MD-2 to MD-5), Secure Hash Algorithm (e.g. SHA-O to SHA- 256), Cyclic Redundancy Check (CRC); the present invention should not be understood as limited thereto) computed from the data/information to be visual encoded.
  • the checksum may be appended to the data/information to be visual encoded and the obtained composed bit sequence is then visual encoded to a visual sequence for being transmitted over the out-of-band (OOB) channel. Further composition techniques may be employed for combining the bit sequence and the checksum.
  • the receiving algorithm on the side of the receiving module being an image capturing module 190 can be implemented as follows:
  • the pixels received from the image capturing module are treated as monochrome
  • the current detection value is compared to one or more previous detection values (i.e. from images/frames captured previous in time) and based on the difference(s) it can be deduced whether there is a signal transition from "0" (lighted up) to "1” (dark) or vice versa.
  • the detection of a signal transition can be improved by comparing differences in successive detection values against a floating average thereof, for instance a floating average of the 10- 15 last detection values. In this case, variations in background lighting can be effectively eliminated.
  • the bit sequence may be reconstructed on the basis of the visual symbol definition.
  • the algorithm described above can be transferred into an algorithm applicable with a light sensitive sensor, which supplies light intensity values in response to the incident light intensity.
  • the captured intensity values of the light sensitive sensor represent directly integral light intensity.
  • the current detection value herein the light intensity value
  • the frequency characteristics thereof should be adapted to the emission characteristics of the light emitter employed.
  • the capturing at a sample rate extending the minimum sample rate is advantageously.
  • the capturing of two or more images/frames for each single visual signal of the sequence enables reducing the error probability of the visual signal detecting, especially when the visual signal covers only a small area of the entire image/frame, one or more images/frames are blurred, one or more images/frames are out-of-focus, etc.
  • the two or more images/frames for each single visual signal can be combined (using for instance one or more image enhancing algorithms) to obtain a quality improved image/frame to be analyzed or read out.
  • digital cameras of cellular telephone terminals such as terminal 100 operate typically at a frame rate of 10-20 Hz. In future, improved frame rates can be expected.
  • the inventive concept according to an embodiment of the invention is based on a uni-directional (out-of-band channel) communication in the visual frequency band.
  • the communication is preferably operated in an asynchronous manner. Consequently, the captured light intensity values detected by the means of the light sensitive sensor, or the pixel values obtained from the captured images/frames, are not necessarily synchronous with the timely sequence of the visual signals. This means, the intensity values, or image/frames, may be captured at a moment in time where the light emitter is actually switched from lighted up to dark or vice versa.
  • the receiving module is a cumulative light intensity sensor (both the light sensitive sensor as well as the image capturing module); i.e. cumulative in the period of time over which the detection value is actually sampled/captured.
  • capturing at a sample rate extending the minimum sample rate is applicable to detect reliable detection values determined from more than one captured value per visual signal.
  • the sample rate should be selected to enable detecting each signal transition.
  • colored light emitters may be used on transmitting side.
  • color sensitive light sensitive sensors or a color image capturing module is required for capturing decodable detection values.
  • Light diodes having correspondingly adapted frequency characteristics can be employed or color filters can be used.
  • Today's image capturing modules such as digital cameras are color sensitive.
  • the filtering of the colors can be obtained by performing digital color filtering during evaluation of the captured images/frames.
  • the number of visual signals is improved and consequently, the visual symbol definition may take advantage of the increased number of visual signals applicable for transmission. Note that two colors allow up to four visual signals, three colors allow up to six visual signals and n colors allow up to 2*n visual signals.
  • a complex display i.e. a display with a large number of pixels and/or a high resolution can also be operated as light emitter.
  • the display can be switched lighted up and dark.
  • a complex display as transmitting module can be likewise used to display a sequence in time of visual structures, which can be captured by the image capturing module as the receiving module.
  • bar codes i.e. one-dimensional or two-dimensional bar codes, can be employed as visual structures to be displayed.
  • the maximum amount of information of a bar code is approximately 70 bits, the displaying of a sequence in time of visual bar codes enables to encode any amount of information.
  • transmission of the visual sequence is repeated until pairing has succeeded, until the process is stopped by the user, or until a time-out occurs.
  • additional tolerances against faulty operation could be that the user does not position the light emitting device (light emitter) in time in a position relative to the detecting device that allows reliable detection.
  • a (visual) start and a stop symbol have been defined in order to mark the start and the end of the transmitted visual sequence.
  • the start and/or a stop symbol may comprise a predefined visual start signal and/or a predefined visual stop signal. Such a start/stop signal may be designated by a specific pre-defined period of time the signal is driven.
  • the start and/or a stop symbol may comprise one or more sequence of predefined visual signals or visual signal transitions, which indicate the start and the end, respectively. Moreover, the start and/or a stop symbol may comprise any other visual start and stop symbol definition, respectively.
  • the start and/or a stop symbol are preferably known to the transmitting module as well as the receiving module.
  • One advantage of the present invention is the fact that this scheme can be applied to devices with only very limited out-of-band channel capabilities such as a device with only one LED.
  • An example use case would be Bluetooth pairing between a cellular telephone terminal such as terminal 100 and a Bluetooth headset such as headset 200.
  • headsets do not have any displays. Instead, most of existing headsets already have a LED 220 (or one could be added to headsets with very little extra cost).
  • the headset can encode the hash value of its public key as a sequence of LED flashes and emits 10 the sequences of LED flashes to the cellular telephone terminal 100, which records this with its digital camera such as illustrated in Figs. 2a and 2b. Note that Fig.
  • FIG. 2b illustrates the visual sequence coding the bit value 1 according to an embodiment of the present invention.
  • the images illustrated in Fig. 2b are captured at half of the minimum sampling rate.
  • an authenticated initialization 20 of the Bluetooth interfaces (I/F) of the terminal 100 (wireless interface (I/F) 160) and the headset 200 (Bluetooth transceiver 210) is operable.
  • the secure transmission of the hash value ensures that the authentication is reliable.
  • Another advantage of the inventive scheme according to an embodiment of the present invention is the fact that the amount of information/data that can be transmitted by the means of the visual sequence is not limited. In some applications (e.g., where a permanent public key is used for authentication) there would be the desire to transmit a full-length hash of 160 bits.
  • the present invention enables to transmit full-length hashes of public keys as a single visual sequence.
  • the concept of the present invention offers better usability compared with known approaches, as the user does not have to manually focus and adjust its device to locate the screen on other device and thus the effort is minimized during the protocol.
  • a device could encode its friendly name or MAC address as a visual sequence and broadcast it to other devices. The other devices could then connect this device over the primary channel using the received name or address. This would be certainly easier for the user than entering the address of the device manually or selecting the friendly name from a long list of (similar or meaningless) names.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A methodology of using an (preferably uni-directional) out-of-band channel for secure information transmission between two devices capable for LPRF communication is provided. Information, which is intended for secure transmission from one of the devices to the other device, is encoded into a time dependent visual sequence. The visual sequence may comprise one or more visual signals, in particular lighted-up and dark states. The visual sequence is emitted in a time-dependent visual signal by a light emitter of the one device and the emitted signal is detected by a light sensor of the other device on the basis of the detected signal. The time-dependent signal especially timely varies in the light intensity. The light sensor generates a (time-dependent) sequence of detection signals. These detection signals are decoded to reconstruct the information intended for secure transmission. The out-of-band channel transmission of the information being separate from the LPRF communication enables to transmit a shared secret. The shared secret is required for secure authentication of the devices during initialization of the LPRF communication.

Description

Security in Wireless Environments Using Out-of-Baisd Channel Communication
The present invention relates to wireless data communication. In particular, the present invention relates to security aspects in wireless data communication environments using out- of-band channel communication.
Low-power radio frequency communications are becoming increasingly popular especially in the field of portable consumer electronic (CE) devices comprising for instance personal digital assistants (PDAs), electronic organizers, cellular (telephone) terminals, so-called smart phones / communicators, notebooks, personal computers, digital cameras, etc for primarily connecting to peripheral or accessory devices comprising for instance printers, head sets, network access points, GPS (Global Position System) receivers, etc. Originally the development of low-power radio frequency communication technologies or proximity radio technologies was primarily driven on the one side by the desire for substituting bothering wired connections to peripheral or accessory devices and on the other side for flexibility in network interconnection. In accordance with those two basic approaches, the development in low-power radio frequency communication technologies has resulted in two technology standards known as Bluetooth and WLAN (wireless local area network), which are widely accepted and implemented in a huge number of portable and stationary CE devices. These two radio frequency communication technologies are standardized under the authority of the Bluetooth Special Interest Group (SIG) and the Institute of Electrical and Electronics Engineers (IEEE), respectively. Of course, the development in the field of low-power radio frequency communication technology is increasingly continued in particular in view of data rates, power consumption, interference sensitivity, range of coverage, etc. Today, the launch of promising future low-power radio frequency communication technologies such as UWB (Ultra- Wide Band) is imminent.
Beneath the original purpose of the low-power radio frequency communication technology for connecting to peripheral or accessory devices and/or for connecting to networks, the wide-spread use of (portable) devices capable for low-power radio frequency communications promotes the desire for ad-hoc networking, i.e. to establish an ad-hoc network among devices of several users. In the near future, this kind of networking will become much more usual. Each device capable for networking will become a network node taking advantage of services offered by other devices capable for networking. Such ad-hoc networks have been for instance developed on the basis of Bluetooth technology known as Piconets. Bluetooth technology protocols allow one master device to interconnect with up to seven active slave devices. Many other slave devices can be inactive, or parked, and the master device can bring parked devices back into active status at any time.
Due to the nature of radio frequency data communication technology and especially in the field of ad-hoc networking, security aspects have to be considered. In principle, communications over radio frequency interconnections can be easily tapped within the range of coverage of the radio frequency signals. Moreover, especially referring to ad-hoc networks, it should be of special interest to ensure that the communication counterpart is trustworthy. These security aspects, which are imminent for any radio frequency communication technology, can be summarized under the terms authenticity, confidentiality, integrity, and availability.
Conventionally, authenticity and confidentiality is ensured on the basis of a common secret about which two devices capable for LPRF (low-power radio frequency) communication are informed at an initialization procedure. With reference to the Bluetooth standard, this initialization procedure is known as device pairing procedure. Before the actual pairing procedure starts, the two Bluetooth enabled devices (one being the master device and the other one being the slave device) participating in the initialization procedure have to be informed about the common secret, which is a PIN (Personal Identification Number), which is a 1-16 bytes long sequence (8-128 bit sequence). On the basis of this PIN, a 128 bit random number generated typically by the master device and one of the 48 bit BD_ADDRs (Bluetooth Device Addresses) of the master device and slave device an initialization key Kjnit is created using the E22 algorithm. By the means of the initialization key Kjnit the Bluetooth enabled devices exchange two new created 128 bit random sequences LK_RANDA and LA_RANDB, one of which created by the master device and the slave device, respectively. Now, each of the both Bluetooth enabled devices knows the two random sequences LK_RANDA and LA_RANDB and create the link key Kab using the E21 algorithm. The link key Kab once created is conventionally used for any future mutual authentication between the now paired Bluetooth enabled devices and for optionally creating encryption keys to secure the data communication therebetween.
The method of entering the PIN is regarded as the weakest point in achieving security of the Bluetooth connection. Typically, users tend to use simple and short PINs (usually 4 digits) that are not secure enough to prevent an attacker to crack the PIN. Moreover, peripheral / accessory devices enabled for Bluetooth communication are available without any user interface and/or input means for entering a PESf; for instance the highly popular Bluetooth headsets. Such devices have pre-installed PESI and moreover the PEST should be fixed and cannot be changed by the user. Still worse, the pre-installed PEST is just trivial and equal for a huge number of identical devices, for instance "0000". Furthermore, it should be mentioned that the typical user tends to maintain a pre-installed PESf even if it is recommended to replace the pre-installed PESf with an individual PESf.
In addition when referring to the aforementioned ad-hoc networks, the user of the master device, to which the slave devices connect, has to enter a number of N-I PESf s for initializing the communication connections to each other slave device, where N is the number of the total devices in the ad-hoc network. This circumstance can be very bothering for the user of the master device.
Note that analog or similar initialization procedures are used for joining of a WLAN enabled device in a WLAN.
The basic object to be overcome by the present invention is to provide an improved methodology applicable in a wireless data communication, which requires initialization on the basis of a shared secret between two wireless devices. The inventive methodology is efficient and user-acceptable.
In particular, one object of the present invention is to establish a secure methodology for sharing the common secret between the two wireless devices and another object of the present invention is to ensure usability. In view of the security, a protocol for sharing the common secret should be designed to guarantee protection against a potential man-in-the- middle attack that tries to impersonate as a trusted communication counterpart. In view of the usability, the users of the wireless devices should be involved in the initialization at a minimum.
The objects of the present invention are solved by features of the accompanying claims.
According to an aspect of the present invention, a method, and a system, is provided, for using an out-of-band channel for secure information transmission between two devices capable for LPRF communication. Preferably, the out-of-band channel may be a unidirectional out-of-band channel and operable in a visual frequency band. Information, which is intended for secure transmission from one of the devices to the other device, is encoded into a time dependent visual sequence. The visual sequence may comprise one or more visual signals, in particular lighted-up and dark states. The visual sequence is emitted in a time- dependent signal by a light emitter of the one device and the visual sequence is detected by a light sensor of the other device on the basis of the detected signal. The time-dependent signal especially timely varies in the light intensity. The light sensor generates a (time-dependent) sequence of detection signals. These detection signals, i.e. the sequence of detection signals, are decoded to reconstruct the information intended for secure transmission. The out-of-band channel transmission of the information being separate from the LPRP communication enables to transmit a shared secret. The shared secret is required for secure authentication of the devices during initialization of the LPRP communication.
According to another aspect of the present invention, a device of using an out-of-band channel for secure information transmission is provided. The device is capable for LPRF communication with a counterpart device. Information intended for secure transmission is encoded into a visual sequence, which is emitted in a time-dependent signal by a light emitter of the device. The visual sequence is provided for detection by a light sensor of the counterpart device. A sequence of detection signals is obtainable from the light sensor in the counterpart device. The sequence of detection signals is decodable to reconstruct the information intended for secure transmission. The out-of-band channel transmission of the information separate from the LPRP communication enables to transmit a shared secret, which is required for secure authentication of the devices during initialization of the LPRF communication.
According to another aspect of the present invention, a device of using an out-of-band channel for secure information receipt is provided. The device is capable for LPRF communication with a counterpart device. Information intended for secure transmission is preferably encoded into a visual sequence by the counterpart device and the visual sequence is emitted in a time-dependent signal by a light emitter of the counterpart devices. Then, a light sensor of the device detects the visual sequence. A sequence of detection signals is obtained from the light sensor on the basis of the detected signal / visual sequence. The sequence of detection signals is decoded to reconstruct the information intended for secure transmission. The out-of-band channel transmission of the information separate from the
LPRF communication enables to transmit a shared secret, which is required for secure authentication of the devices during initialization of the LPRF communication. According to an embodiment of the present invention, the light emitter is a light emitting diode. The light sensor is a light diode, an ambient light sensor, or an image capturing module (a digital camera).
According to an embodiment of the present invention, the information is encoded bitwise and each bit value of the information is converted in a predefined visual symbol. The at least two visual symbols, one of which representing the bits 0 and the other one representing the bit 1 , comprises in turn one or more visual signals.
According to an embodiment of the present invention, each bit value is converted into one or more lighted-up and dark states of the light emitter. The lighted-up state and dark state of the light emitter represent corresponding visual signals, respectively. The lighted-up and/or the dark states are persistent for one or more pre-defined periods of time. One or more transitions between the states, which are persistent for one or more pre-defined periods of time, form a visual symbol.
According to an embodiment of the present invention, frequency modulation is used for encoding the information into the visual sequence.
According to an embodiment of the present invention, the sampling frequency of the light sensor exceeds the minimum sampling frequency required for correctly detecting the visual sequence emitted in the time-dependent signal.
According to an embodiment of the present invention, the light sensor is an image capturing module, which captures a sequence of images during emission of the visual sequence. Each captured image is integrated to obtain a detection value. Integration may be an integration in space, an integration over an area, and/or an integration in time. Preferably, the integration is performed numerically. Then, a current detection value is compared to one or more previous detection values such that based on the determined difference the information is decoded and reconstructed from the captured images.
According to an embodiment of the present invention, the captured images are converted into monochrome images.
According to an embodiment of the present invention, each captured image is analyzed to identify an image area including the emitted time-depended signal of the light emitter. The resulting area is integrated to obtain a detection value from each captured image. The remaining image outside of the resulting area is neglected.
For a better understanding of the present invention and to understand how the same may be brought into effect reference will now be made, by way of illustration only, to the accompanying drawings, in which:
Fig. 1 illustrates a schematic block diagram of components of a processing terminal embodied on the basis of a portable electronic terminal according to an embodiment of the present invention;
Fig. 2a illustrates a schematic block diagram of a system during uni-direction out-of-band channel transmission according to an embodiment of the present invention;
Fig. 2b illustrates a schematic illustration of a capturing result according to an embodiment of the present invention; and
Fig. 2c illustrates a schematic block diagram of a system according to an embodiment of the present invention.
Throughout the description below, same and/or equal components will be referred by the same reference numerals.
Reference will be given to the initialization and pairing procedure in accordance with the Bluetooth standard. However, it should be noted that the present invention is not limited to
Bluetooth technology and/or any specific Bluetooth standard. Similar or analog initialization and pairing procedures are commonly used in the field of wireless communication technology including especially WLAN and UWB. Those skilled in the art will appreciate on the basis of the following description that the inventive concept is applicable with any wireless communication technology which requires the sharing of a common secret between at least two devices enabled for wireless communication for initializing the data communication therebetween.
Fig. 1 shows a schematic block illustration of components of a portable electronic terminal 100 in an exemplar form of a mobile / cellular telephone terminal. The portable electronic terminal 100 exemplarily represents any kind of processing terminal or device employable with the present invention. It should be understood that the present invention is neither limited to the illustrated portable electronic terminal 100 nor to any other specific kind of processing terminal or device.
As aforementioned, the illustrated portable electronic terminal 100 is exemplarily carried out as cellular communication enabled portable user terminal. In particular, the portable electronic terminal 100 is embodied as a processor-based or micro-controller based system comprising a central processing unit (CPU) and a mobile processing unit (MPU) 110, respectively, a data and application storage 120, cellular communication means including cellular radio frequency interface (IfF) 180 with radio frequency antenna (outlined) and subscriber identification- module (SIM) 185, user interface input/output means including typically audio input/output (I/O) means 140 (conventionally a microphone and a loudspeaker), keys, keypad and/or keyboard with key input controller (Ctrl) 130 and a display with display controller (Ctrl) 150, a (local) wireless data interface (IfF) 160, and a general data interface (IfF) 170.
The operation of the portable electronic terminal 100 is controlled by the central processing unit (CPU) / mobile processing unit (MPU) 110 typically on the basis of an operating system or basic controlling application, which controls the functions, features and functionality of the portable electronic terminal 100 by offering their usage to the user thereof. The display and display controller (Ctrl) 150 are typically controlled by the processing unit (CPU/MPU) 110 and provide information for the user including especially a (graphical) user interface (UI) allowing the user to make use of the functions, features and functionality of the portable electronic terminal 100. The keypad and keypad controller (Ctrl) 130 are provided to enable the user inputting information. The information input via the keypad is conventionally supplied by the keypad controller (Ctrl) to the processing unit (CPU/MPU) 110, which may be instructed and/or controlled in accordance with the input information. The audio input/output (I/O) means 140 includes at least a speaker for reproducing an audio signal and a microphone for recording an audio signal. The processing unit (CPU/MPU) 110 can control conversion of audio data to audio output signals and the conversion of audio input signals into audio data, where for instance the audio data have a suitable format for transmission and storing. The audio signal conversion of digital audio to audio signals and vice versa is conventionally supported by digital-to-analog and analog-to-digital circuitry e.g. implemented on the basis of a digital signal processor (DSP, not shown).
The keypad operable by the user for input comprises for instance alphanumeric keys and telephony specific keys such as known from ITU-T keypads, one or more soft keys having context specific input functionalities, a scroll-key (up/down and/or right/left and/or any combination thereof for moving a cursor in the display or browsing through the user interface (UI), a four-way button, an eight- way button, a joystick or/and a like controller.
The portable electronic terminal 100 according to a specific embodiment illustrated in Fig. 1 includes the cellular interface (I/F) 180 coupled to the radio frequency antenna (outlined) and operable with the subscriber identification module (SIM) 185. The cellular interface (I/F) 180 is arranged as a cellular transceiver to receive signals from the cellular antenna, decodes the signals, demodulates them and also reduces them to the base band frequency. The cellular interface (I/F) 180 provides for an over-the-air interface, which serves in conjunction with the subscriber identification module (SIM) 185 for cellular communications with a corresponding base station (BS) of a radio access network (RAN) of a public land mobile network (PLMN). The output of the cellular interface (I/F) 180 thus consists of a stream of data that may require further processing by the processing unit (CPU/MPU) 110. The cellular interface (I/F) 180 arranged as a cellular transceiver is also adapted to receive data from the processing unit (CPU/MPU) 110, which is to be transmitted via the over-the-air interface to the base station (BS) of the radio access network (RAN). Therefore, the cellular interface (I/F) 180 encodes, modulates and up-converts the data embodying signals to the radio frequency, which is to be used for over-the-air transmissions. The antenna (outlined) of the portable electronic terminal 100 then transmits the resulting radio frequency signals to the corresponding base station (BS) of the radio access network (RAN) of the public land mobile network (PLMN). The cellular interface (I/F) 180 preferably supports a 2nd generation digital cellular network such as GSM (Global System for Mobile Communications) which may be enabled for GPRS (General Packet Radio Service) and/or EDGE (Enhanced Data for GSM Evolution), a 3rd generation digital cellular network such as UMTS (Universal Mobile Telecommunications System), and/or any similar or related standards for cellular telephony.
The wireless data interface (I/F) 160 is depicted exemplarily and should be understood as representing one or more wireless network interfaces, which may be provided in addition to or as an alternative of the above described cellular interface (I/F) 180 implemented in the exemplary portable electronic terminal 100. A large number of wireless network communication standards are available today. For instance, the portable electronic terminal 100 may include one or more wireless network interfaces operating in accordance with any IEEE 802.XX standard, Wi-Fi standard, any Bluetooth standard (1.0, 1.1, 1.2, 2.0 + EDR, LE), ZigBee (for wireless personal area networks (WPANs)), Infra-Red Data Access (IRDA), Wireless USB (Universal Serial Bus), RFID (radio frequency identification) communication, especially NFC (Near Field Communication) and/or any other currently available standards and/or any future wireless data communication standards such as UWB (Ultra-Wideband).
Moreover, the general data interface (I/F) 170 is depicted exemplarily and should be understood as representing one or more data interfaces including in particular network interfaces implemented in the exemplary portable electronic terminal 100. Such a network interface may support wire-based networks such as Ethernet LAN (Local Area Network), PSTN (Public Switched Telephone Network), DSL (Digital Subscriber Line), and/or other current available and future standards. The general data interface (I/F) 170 may also represent any data interface including any proprietary serial/parallel interface, a universal serial bus (USB) interface, a Firewire interface (according to any IEEE 1394/1394a/1394b etc. standard), a memory bus interface including ATAPI (Advanced Technology Attachment Packet Interface) conform bus, a MMC (MultiMediaCard) interface, a SD (SecureData) card interface, Flash card interface and the like.
The portable electronic terminal 100 according to an embodiment of the present invention comprises an image capturing module 190 which is applicable for taking still images and/or video sequences. Such imaging modules 190 also designated digital camera or camera module are typically implemented or detachably connectable to a large number of portable consumer electronic (CE) devices including especially cellular telephone terminals, personal digital assistants (PDAs), electronic organizer / communicators, notebooks, and the like. In accordance with the desire of the market, portable CE devices develop to more or less multimedia multi-purpose terminals. Conventionally, one or more imaging and/or video applications are provided to be run on the portable electronic terminal 100. The imaging and/or video applications enable to store, handle, and/or manipulate still images and/or video sequences captured by the means of the image capturing module 190. For instance, the electronic device 100 may optionally comprise a hardware and/or software implemented video encoder module (not shown), which is capable for encoding/compressing video input signals to obtain compressed digital video sequences (and e.g. also digital pictures) in accordance with one or more video codecs and especially operable with an image capturing module 190 providing video input signals, and a video decoder module 210 enabled for encoding compressed digital video sequences (and e.g. also digital pictures) in accordance with one or more video codecs.
The image capturing module 190 is preferably a sensor for capturing one or more images. Typically such an image capturing module 190 consisting of an integrated circuit (IC) containing an array of linked, or coupled, capacitors. Under the control of an external circuit, each capacitor can transfer its electric charge to one or other of its neighbors. Such integrated circuit containing an array of linked, or coupled, capacitors is well known by those skilled in the art as charge-coupled device (CCD). Other image capturing technologies may be also used.
The components and modules illustrated in Fig. 1 may be integrated in the portable electronic terminal 100 as separate, individual modules, or in any combination thereof. Preferably, one or more components and modules of the portable electronic terminal 100 may be integrated with the processing unit (CPU/MPU) forming a system on a chip (SoC). Such system on a chip (SoC) integrates preferably all components of a computer system into a single chip. A SoC may contain digital, analog, mixed-signal, and also often radio-frequency functions. A typical application is in the area of embedded systems and portable systems, which are constricted especially to size and power consumption constraints. Such a typical SoC consists of a number of integrated circuits that perform different tasks. These may include one or more components comprising microprocessor (CPU/MPU), memory (RAM: random access memory, ROM: read-only memory), one or more UARTs (universal asynchronous receiver- transmitter), one or more serial/parallel/network ports, DMA (direct memory access) controller chips, GPU (graphic processing unit), DSP (digital signal processor) etc. The recent improvements in semiconductor technology have allowed VLSI (Very-Large-Scale Integration) integrated circuits to grow in complexity, making it possible to integrate all components of a system in a single chip.
Typical applications operable with the portable electronic terminal 100 comprise beneath the basic applications enabling the data and/or voice communication functionality a contact managing application, a calendar application, a multimedia player application, a WEBAVAP browsing application, and/or a messaging application supporting for instance Short Message Services (SMS), Multimedia Message Services (MMS), and/or email services. Modern portable electronic terminals are programmable; i.e. such terminals implement programming interfaces and execution layers, which enable any user or programmer to create and install applications operable with the portable electronic terminal 100. A today's well established device-independent programming language is JAVA, which is available in a specific version adapted to the functionalities and requirements of mobile device designate as JAVA Micro Edition (ME). For enabling execution of application programs created on the basis of JAVA ME the portable electronic terminal 100 implements a JAVA MIDP (Mobile Information Device Profile), which defines an interface between a JAVA ME application program, also known as a JAVA MIDlet, and the portable electronic terminal 100. The JAVA MIDP (Mobile Information Device Profile) provides an execution environment with a virtual JAVA engine arranged to execute the JAVA MIDlets. However, it should be understood that the present invention is not limited to JAVA ME programming language and JAVA MIDlets; other programming languages especially proprietary programming languages are applicable with the present invention.
In order to illustrate the basic concept of the present invention which overcomes the problems and disadvantages of conventional authentication approaches used in LPRF communication today, a short introduction will be given to the Bluetooth standard and the authentication procedure used. The authentication procedure is performed between two Bluetooth enabled devices, which intend to communicate with each other. The authentication procedure is operated to ensure that a communication link is established between these two Bluetooth enabled devices.
A LPRF communication link 20 between two Bluetooth enabled devices is exemplary outlined in Fig. 1. Herein, a headset 200 is depicted for the sake of illustration, which implements a Bluetooth transceiver / interface (I/F) 210 adapted to communication with a corresponding Bluetooth transceiver of the portable electronic device 100 via the communication link 20. With reference to the Bluetooth standard, different Bluetooth communication profiles are defined. The profiles consider the different requirements and device functions of specific Bluetooth enabled peripheral / accessory devices and/or
Bluetooth enabled counterpart devices.
It should be noted that the Bluetooth enabled headset 200 represents any LPRF communication enabled counterpart device communicating with the portable electronic terminal 100 capable for LPRF communication.
In the following, the initialization procedure of the Bluetooth standard will be briefly described for the sake of illustration. It should be noted that the Bluetooth standard and initialization procedure are out of the scope of the present invention, respectively. Details thereof can be found in the respective standard description.
One main part of the initialization procedure is the authentication procedure, which is based on a challenge-response scheme.
One of the Bluetooth enabled devices will be designated in the following as verifier whereas the other one will be designated as claimant. Authentication uses a challenge-response scheme in which a claimant's knowledge of a secret key is checked through a 2-move protocol using symmetric secret keys. The latter implies that a correct claimant/verifier pair shares the same secret key, for example K. In the challenge-response scheme the verifier challenges the claimant to authenticate a random input (the challenge), denoted by AU_RANDA, with an authentication code, denoted by E1, and return the result SRES to the verifier. The input to E1 consists of the tuple including AU_RANDA and the Bluetooth device address (BD_ADDR) of the claimant. This means, the verifier sends a random number (the challenge) to the claimant, which calculates a response that is a function of this challenge, the claimant's Bluetooth Address (BD_ADDR), and a secret key. This response is sent back to the verifier, which checks whether the received response matches with an expected response or not. A successful calculation of the authentication response requires that the two Bluetooth enabled devices, i.e. the verifier and the claimant, share a common secret key. The use of this address prevents a simple reflection attack. The secret K shared by Bluetooth enabled devices A and B is a current link key KAB.
The verifier is not required to be the master. The application indicates which device has to be authenticated. Some applications only require a one-way authentication. However, some peer-to-peer communications should use a mutual authentication, in which each device is subsequently the challenger (verifier) in two authentication procedures. The Link Manager (LM) being part of the Bluetooth implementation processes authentication preferences from the application to determine in which direction(s) the authentication(s) takes place. For mutual authentication with the Bluetooth enabled devices, after Bluetooth enabled device A has successfully authenticated Bluetooth enabled device B3 Bluetooth enabled device B authenticates Bluetooth enabled device A by sending an AU_RANDB (different from the AU_RANDA that Bluetooth enabled device A issued) to Bluetooth enabled device A, and deriving the SRES and SRES' from the new AU_RANDB, the address of Bluetooth enabled device A, and the link key KAB.
This secret link key K is created during the pairing procedure of two Bluetooth enabled devices.
The secret key K used for authentication is derived through a procedure E1 having two modes denoted E11 and E21, respectively. In the first mode, E11 produces a 128-bit kink key, using a 128-bit RAND value and a 48-bit address (BD_ADDR). This mode is utilized when creating unit keys and combination keys. In the second mode, E21 produces a 128-bit link key, using a 128-bit RAND value and an octet user PIN (Personal Identification Number). The second mode is used to create the initialization key, and also when a master key is to be generated. When the initialization key Kinit is generated, the PESf is augmented with the 48-bit address (BD-ADDR). The augmentation always starts with the least significant octet of the address immediately following the most significant octet of the PEST. Since the maximum length of the PESf used in the algorithm cannot exceed 16 octets, it is possible that not all octets of BD ADDR will be used.
An initialization key Kinit is used temporarily during initialization. This initialization key Kimt is derived by an algorithm E22 from a BD ADDR, a PESf code, the length of the PESf (in octets), and a random number ESf_RAND. The 128-bit output from E22 is used for key exchange during the generation of a link key. When the Bluetooth enabled devices have performed the link key exchange, the initialization key Kinit will be discarded.
When the initialization key Kinit is generated, the PESf is augmented with the BD_ADDR. If one device has a fixed PESf the BD_ADDR of the other device shall be used. If both devices have a variable PESf the BD_ADDR of the device that received ESMRAND shall be used. If both devices have a fixed PESf they cannot be paired. Since the maximum length of the PESf used in the algorithm cannot exceed 16 octets, it is possible that not all octets of BD ADDR will be used. This procedure ensures that the initialization key Kjnit depends on the identity of the device with a variable PESf. A fraudulent device may try to test a large number of PESfs by claiming another BD_ADDR each time. It is the application's responsibility to take countermeasures against this threat. If the device address is kept fixed, the waiting interval before the next try may be increased exponentially.
To use a combination key and especially a link key KAB / KBA, it is first generated during the initialization procedure. The combination key is the combination of two numbers generated in Bluetooth enabled device A and B, respectively. First, each device shall generate a random number, LK_RANDA and LK_RANDB. Then, utilizing with the random number and their own BD_ADDRs, the two random numbers
LK_KA = E21(LK_RANDA, BD_ADDRA), EQ 1 ;
and
LK_KB = E21(LK_RANDB, BD_ADDRB), EQ 2. are created in Bluetooth enabled device A and device B5 respectively. These numbers constitute the devices' contribution to the combination key that is to be created. Then, the two random numbers LK_RANDA and LK_RANDB shall be exchanged securely by XORing with the current link key, K. Thus, device A shall send K θ LK_RANDA to device B, while device B shall send K ® LK_RANDB to device A. If this is done during the initialization phase the link key K = Kjnit.
When the random numbers LK_RANDA and LK_RANDB have been mutually exchanged, each device recalculates the other device's contribution to the combination key. This is possible since each device knows the Bluetooth device address of the other device. Thus, Bluetooth enabled device A calculates EQ 2 and Bluetooth enabled device B calculates EQ 1. After this, both Bluetooth enabled devices combine the two numbers to generate the 128-bit link key. The combining operation is a simple bitwise modulo-2 addition (i.e. XOR). The result shall be stored in device A as the link key KAB and in device B as the link key KBA. When both devices have derived the new combination key, a mutual authentication procedure is initiated to confirm the success of the transaction. An old link key will be discarded after a successful exchange of a new combination key.
From the above introduction to Bluetooth initialization procedure, those skilled in the art will appreciate that the PESF, which represent the initial shared secret, is of crucial interest. Although, the description refers to the Bluetooth standard, other LPRF communication standards implement similar, analog, or equal initialization procedures to handle the authentication of devices participating in the LPRF communication. An initial shared secret, which has to be shared between at least two LPRF communication enabled devices, is the basis of the authentication. The initial shared secret may be a PEST, a pass phrase, or any other secret numeric, character and/or alphanumeric sequence. Hence, the aforementioned Bluetooth initialization procedure can be considered as a representative authentication concept of a large number of initialization procedures used in different LPRF communication technologies and standards.
The methodology of user-entered initial secrets is regarded as the weakest point in achieving security. Typically, users tend to use simple and short initial secrets that are not secure enough to prevent an attacker to crack the secret. Moreover, peripheral / accessory devices enabled for LPRF communication are available without any user interface and/or input means for user input. Such devices have pre-installed secrets, which may additionally be fixed and cannot be changed even if the user wishes. Or still worse, the pre-installed secret is just trivial and equal for a huge number of identical devices. Furthermore, it should be mentioned that the typical user tends to maintain a pre-installed PIN even if it is recommended to define a user specific one at first putting into operation to replace the pre- installed secret.
In order to deal with the aforementioned problems and disadvantages, the present invention is conceptually based on a new method for initializing security in wireless environments, especially in wireless ad hoc environments. In this inventive method the shared secret, which may be a PIN, a pass phrase, any alphanumeric sequence, a hash value of a public key, or whatever information is needed for initializing security in the particular application at hand, is encoded into a visual sequence, shown on one LPRF communication enabled device, recorded with the other LPRF communication device, and finally decoded on the other LPRF communication device.
By the term visual sequence a time varying optical signal should be understood including especially a sequence of LED blinks, a sequence of different or varying images or two- dimensional bar codes. This means that the secret information is coded as a visual sequence, which is transmitted in a channel completely separated from the LPRF communication channel used for communication between the devices. Those skilled in the art will appreciate on the basis of the following description that the channel utilized for transmitting the visual sequence is an out-of-band channel separated from the LPRF communication channel actually used for communication between the participating devices. The inventive concept falls back on components which are typically implemented in such LPRF communication enabled devices and is especially applicable with display-limited and display-less devices.
With reference to Figs. 2a to 2c, the inventive concept according to an embodiment of the invention will be described on the basis of the portable electronic terminal 100 and the headset 200, which are described above with reference to Fig. 1. It should be assumed that an authenticated LPRF communication, especially Bluetooth communication, should be established between the portable electronic terminal 100 and the headset 200. For sharing the common secret (e.g. the PIN) enabling the authentication, the aforementioned concept of a visual sequence via an out-of-band channel is utilized.
The chosen encoding/decoding scheme and the type of the visual sequence depend on the characteristics of the transmitting and receiving modules provided by the headset 200 and the portable electronic terminal 100, respectively. Several alternatives exist, including in particular: A The transmitting module is a light emitter such as an emitting diode (LED) or a display or keypad illumination light emitter, or a small (a few pixels and/or low resolution) display and the receiving module is a light sensitive sensor, e.g. an ambient light sensor or a light diode;
B The transmitting module is one or several light emitter (e.g. LEDs), for instance arranged in an array, one or several display or keypad illumination light emitters, or a small (a few pixels and/or low resolution) display and the receiving module is an image capturing module, for instance a digital camera; and
C The transmitting module is a more complex (large number of pixels and/or high resolution) display and the receiving module is an image capturing module, e.g. a digital camera.
In common to all alternatives, the transmitting module is capable to at least produce a sequence in time of visual signals. In accordance with the transmitting modules of the alternatives according to embodiments of the present invention, the time sequence in time of the visual signals include a sequence in time of (one-dimensional) light/dark contrasts produced by a light emitting diode or a display, a sequence in time of two-dimensional images, where at least subsequent images produced by a display differ, or any other sequence in time of visual signals. The receiving module is adapted to detect the visual signals and is further arranged to resolve the sequence in time of the visual signals. This means, the receiving module generates at least the same number of detection values as the number of visual signals comprised by the sequence in time. In accordance with the sampling theorem, the sampling frequency of the receiving module has to be at least two times the frequency of the sequence in time of the visual signals.
With reference to the alternative A, the implementation of a light emitter (e.g. a LED, a display or keypad illumination light emitter, or a small display) as well as a corresponding light sensitive sensor (e.g. a light diode, an ambient light sensor) is economically favorable.
Typical terminal devices such as the aforementioned terminal 100 comprises light emitter, typically one or more light emitting diodes, to illuminate keys, keypads, keyboards and/or the keys thereof to enable user inputs therewith in gloomy or dark environments. Today's displays technology uses, beneath light back scattering mechanisms, back lights to illuminate displayed content on the display to enable visual impression of the displayed content in
(sunny, day-) light, gloomy and/or dark environment. Moreover, even embedded devices, peripheral devices, accessory devices and the like can be provided with a light emitter or the devices have already implemented one or more light emitters (LEDs) for instance to indicate operational states (power on/off) or battery/accumulator capacity. Such light emitters are sufficient for generating a visual sequence of visual symbols, which in turn comprises one or more visual signals according to an embodiment of the present invention. The implementation of a control logic, which is adapted to encode an information or data into corresponding driving signals of the light emitters and to control the operation of the one or more light emitters in accordance with the driving signals, is obtainable with relative small effort.
Furthermore, small display, i.e. display having only few pixels and/or a low resolution can be also utilized as a light emitter. Such display can be switched lighted up to emit light and can be switched dark such that the display does not emit any light. The display can be completely switched or the display can be partly switched. In the latter case, the display may be partitioned into one or more sections to simulate one or more separate light emitters.
The same applies to the implementation of a light sensitive sensor. Even embedded devices, peripheral devices, accessory devices, and the like can be provided with a light sensitive sensor. Moreover, a large number of portable devices with displays implement ambient light sensors for adjusting the brightness of the displays. Such an ambient light sensor may be used according to an embodiment of the present invention. The implementation of a detection logic, which is adapted to detect the visual sequence, to decode the original information or data embedded in the visual sequence and to reconstruct the original information or data from the detected signals, is also obtainable with relative small effort.
With reference to the alternatives B, image capturing modules are already implemented in or detachably connected to a large number of portable electronic terminals such as the terminal 100 described above in detail. Such image capturing modules are typically embodied as digital cameras which are at least capable to capture series of still images at a given frequency. Improved digital cameras are capable to take video sequences at a given frame rate. Basically, the video sequences are composed of a sequence of still images at the frame rate. Those skilled in the art will appreciate, that such an image capturing module can be used as a light sensitive sensor. The implementation of a detection logic operable with the image capturing module can be done on the basis of a software application, which is adapted to analyze each image of the captured sequence of images or video frames in order to detect the visual sequence within the images/frames and to decode and reconstruct the original information or data from the detected signals of the images/frames. If the transmitting device has a really small display, or only few LEDs, the information can be encoded into very simple bar codes, e.g. a device with four LEDs can show a sequence of bar codes containing four bits of information per frame (including the error correction bits). In the most limited case, the transmitting device has only a single LED or the receiving device has a very primitive sensor instead of a proper camera. In this case the information can be encoded into a sequence of blinks of a single LED.
Due to the fact that a feedback channel is not available, all synchronization information should be included in the transmitted signal, as well as necessary preambles and postambles.
The synchronization information, the preambles, and/or the postambles might be pre-defined; i.e. the pre-defined synchronization information, the preambles, and/or the postambles are known on transmitting as well as receiving side. According to an embodiment of the present invention, an exemplary coding for the alternative B is presented, where the transmitting device is a single LED:
0(period of time) = LED (or light emitter, generally) off; and
1 (period of time) = LED (or light emitter, generally) on.
The LED on emits light with a pre-defined characteristic which should be designated as a first visual signal, whereas the LED off does not emit any light, which should be designated as a second visual signal. On the basis of these two visual signals, one or more visual symbols can be formed.
A bit encoding may have following form:
Bit 1: 0(HZ) l(HZ) O(HZ) l(HZ); and
Bit O: 0(2*HZ) 1(2*HZ),
where HZ designates a (pre-defined) period of time. This means, the visual symbol representing the bit "1" comprises four visual signals each having a pre-defined duration in time, whereas the visual symbol representing the bit "0" comprises two visual signals each having a pre-defined duration in time different from the duration of the visual signals used for representing the bit "1". The period of time depends preferably on the capability of the employed light emitter and on the expected detecting (frame) rate of the light sensitive sensor, i.e. the ambient light sensor, the light diode or the image capturing sensor (digital camera), for instance. The sampling theorem should be considered. Those skilled in the art will appreciate that the aforementioned example represents an exemplary frequency modulation encoding of a bit sequence.
The visual encoded bit sequence should preferably include one or more preambles, postambles, and/or (simple) checksums. A preamble may be used to indicate the start of transmission of a visual sequence encoding a bit sequence, whereas a postamble may be used to indicate the end of the transmission of the visual sequence encoding the bit sequence. The preamble may be a (pre-defined) synchronization signal which enables the receiving device to determine information enabling the decoding including for instance the basic signal frequency used for encoding the visual sequence.
The transmitting module should additionally send the visual encoded bit sequence repeatedly one or several times. The repetition of the sequence should improve the detectability whether the visual sequence has been completely detected and/or the detection was successful, i.e. free of any errors.
It should be understood that the aforementioned encoding into a visual sequence is applicable to any bit sequence representing any data and/or information. Moreover, the aforementioned encoding on the basis of visual symbols according to an embodiment of the invention should not limit the present invention. Alternative visual symbols could be defined. Furthermore, the decoding of the visual sequence encoded on the basis of the visual symbol definition described above is obtainable by a receiving algorithm, which is preferably informed about the visual symbols employed, the basic visual signal frequency, and/or the start/end of the visual sequence encoding the bit sequence.
The checksum may be any hash value obtained by any hash algorithm (such as Message Digest Hash Algorithm (e.g. MD-2 to MD-5), Secure Hash Algorithm (e.g. SHA-O to SHA- 256), Cyclic Redundancy Check (CRC); the present invention should not be understood as limited thereto) computed from the data/information to be visual encoded. For the sake of simplicity, the checksum may be appended to the data/information to be visual encoded and the obtained composed bit sequence is then visual encoded to a visual sequence for being transmitted over the out-of-band (OOB) channel. Further composition techniques may be employed for combining the bit sequence and the checksum. The receiving algorithm on the side of the receiving module being an image capturing module 190 can be implemented as follows:
- For each image/frame, the pixels received from the image capturing module are treated as monochrome;
- For each image/frame, the pixel values over the entire image/frame are added together to obtain a single detection value from the image/frame; and
- For each image/frame, the current detection value is compared to one or more previous detection values (i.e. from images/frames captured previous in time) and based on the difference(s) it can be deduced whether there is a signal transition from "0" (lighted up) to "1" (dark) or vice versa.
The detection of a signal transition can be improved by comparing differences in successive detection values against a floating average thereof, for instance a floating average of the 10- 15 last detection values. In this case, variations in background lighting can be effectively eliminated. Once the signal transitions are determined, the bit sequence may be reconstructed on the basis of the visual symbol definition.
Those skilled in the art will appreciate that the algorithm described above can be transferred into an algorithm applicable with a light sensitive sensor, which supplies light intensity values in response to the incident light intensity. In this case, the captured intensity values of the light sensitive sensor represent directly integral light intensity. This means, the current detection value, herein the light intensity value, is compared to one or more previous detection values (i.e. the light intensity values captured previously in time by the light sensitive sensor) and based on the difference(s) it can be deduced whether there is a signal transition from "0" to "1" or vice versa. In order to improve the sensibility of the light sensitive sensor, the frequency characteristics thereof should be adapted to the emission characteristics of the light emitter employed.
For more complex recognition algorithms according to an embodiment of the invention, the basic algorithm itself breaks down into several parts:
- For each image/frame, finding an area within the each captured image/frame that contains the visual signal generated by the light emitter; - For each image/frame, compensating against movements of the image capturing module (the digital camera), background fluctuations, etc; - Reading out the information from each captured image/frame in accordance with the corresponding determined areas comprising the visual signal; and
- Applying error correction for instance on the basis of a checksum included.
Additionally, the capturing at a sample rate extending the minimum sample rate is advantageously. The capturing of two or more images/frames for each single visual signal of the sequence enables reducing the error probability of the visual signal detecting, especially when the visual signal covers only a small area of the entire image/frame, one or more images/frames are blurred, one or more images/frames are out-of-focus, etc. The two or more images/frames for each single visual signal can be combined (using for instance one or more image enhancing algorithms) to obtain a quality improved image/frame to be analyzed or read out. It should be noted that digital cameras of cellular telephone terminals such as terminal 100 operate typically at a frame rate of 10-20 Hz. In future, improved frame rates can be expected.
Moreover, it should be noted that the inventive concept according to an embodiment of the invention is based on a uni-directional (out-of-band channel) communication in the visual frequency band. The communication is preferably operated in an asynchronous manner. Consequently, the captured light intensity values detected by the means of the light sensitive sensor, or the pixel values obtained from the captured images/frames, are not necessarily synchronous with the timely sequence of the visual signals. This means, the intensity values, or image/frames, may be captured at a moment in time where the light emitter is actually switched from lighted up to dark or vice versa.
Referring back to the exemplary frequency modulation encoding of the visual sequence to encode a bit sequence, those skilled in the art will appreciate that the determination of how long the light emitter is lighted up is not exact. The receiving module as proposed herein is a cumulative light intensity sensor (both the light sensitive sensor as well as the image capturing module); i.e. cumulative in the period of time over which the detection value is actually sampled/captured. In this case, capturing at a sample rate extending the minimum sample rate is applicable to detect reliable detection values determined from more than one captured value per visual signal. In particular, the sample rate should be selected to enable detecting each signal transition. Once the detection of each signal transition is enabled and periods of time between the signal transitions are obtained, the reconstructing of the bit sequence in accordance with the visual symbol definition is operable. In a further embodiment according to the present invention, colored light emitters may be used on transmitting side. On receiving side, color sensitive light sensitive sensors or a color image capturing module is required for capturing decodable detection values. Light diodes having correspondingly adapted frequency characteristics can be employed or color filters can be used. Today's image capturing modules such as digital cameras are color sensitive. The filtering of the colors can be obtained by performing digital color filtering during evaluation of the captured images/frames. Correspondingly, the number of visual signals is improved and consequently, the visual symbol definition may take advantage of the increased number of visual signals applicable for transmission. Note that two colors allow up to four visual signals, three colors allow up to six visual signals and n colors allow up to 2*n visual signals.
With reference to alternative C, a complex display, i.e. a display with a large number of pixels and/or a high resolution can also be operated as light emitter. The display can be switched lighted up and dark. Note that the description given with respect to alternative B having a small display also applies to this alternative C with a complex display. However, a complex display as transmitting module can be likewise used to display a sequence in time of visual structures, which can be captured by the image capturing module as the receiving module. In particular bar codes, i.e. one-dimensional or two-dimensional bar codes, can be employed as visual structures to be displayed. Whereas, the maximum amount of information of a bar code is approximately 70 bits, the displaying of a sequence in time of visual bar codes enables to encode any amount of information. Those skilled in the art will appreciate that the aforementioned algorithms can be adapted straightforward to the recognition and decoding of a sequence of bar codes.
Due to the fact that it is possible to capture multiple images/frames of each bar code of a sequence of bar codes and the location of bar codes can be detected using these frames, the user effort in manually locating the display displaying the sequence of bar codes is minimized. Blurred and/or out-of-focus images can be compensated using image enhancement algorithms.
In another embodiment, transmission of the visual sequence is repeated until pairing has succeeded, until the process is stopped by the user, or until a time-out occurs. In this way, additional tolerances against faulty operation can be achieved. One example of such faulty operation could be that the user does not position the light emitting device (light emitter) in time in a position relative to the detecting device that allows reliable detection. In this embodiment, a (visual) start and a stop symbol have been defined in order to mark the start and the end of the transmitted visual sequence. The start and/or a stop symbol may comprise a predefined visual start signal and/or a predefined visual stop signal. Such a start/stop signal may be designated by a specific pre-defined period of time the signal is driven. The start and/or a stop symbol may comprise one or more sequence of predefined visual signals or visual signal transitions, which indicate the start and the end, respectively. Moreover, the start and/or a stop symbol may comprise any other visual start and stop symbol definition, respectively. The start and/or a stop symbol are preferably known to the transmitting module as well as the receiving module.
One advantage of the present invention is the fact that this scheme can be applied to devices with only very limited out-of-band channel capabilities such as a device with only one LED. An example use case would be Bluetooth pairing between a cellular telephone terminal such as terminal 100 and a Bluetooth headset such as headset 200. Typically, headsets do not have any displays. Instead, most of existing headsets already have a LED 220 (or one could be added to headsets with very little extra cost). This way, the headset can encode the hash value of its public key as a sequence of LED flashes and emits 10 the sequences of LED flashes to the cellular telephone terminal 100, which records this with its digital camera such as illustrated in Figs. 2a and 2b. Note that Fig. 2b illustrates the visual sequence coding the bit value 1 according to an embodiment of the present invention. The images illustrated in Fig. 2b are captured at half of the minimum sampling rate. After detection of the visual sequence and decoding the hash value thereof, an authenticated initialization 20 of the Bluetooth interfaces (I/F) of the terminal 100 (wireless interface (I/F) 160) and the headset 200 (Bluetooth transceiver 210) is operable. The secure transmission of the hash value ensures that the authentication is reliable.
Another advantage of the inventive scheme according to an embodiment of the present invention is the fact that the amount of information/data that can be transmitted by the means of the visual sequence is not limited. In some applications (e.g., where a permanent public key is used for authentication) there would be the desire to transmit a full-length hash of 160 bits. The present invention enables to transmit full-length hashes of public keys as a single visual sequence.
The concept of the present invention offers better usability compared with known approaches, as the user does not have to manually focus and adjust its device to locate the screen on other device and thus the effort is minimized during the protocol. In addition to security initialization, there are also additional use cases for encoding information into sequences of visual signals. To name one, a device could encode its friendly name or MAC address as a visual sequence and broadcast it to other devices. The other devices could then connect this device over the primary channel using the received name or address. This would be certainly easier for the user than entering the address of the device manually or selecting the friendly name from a long list of (similar or meaningless) names.
Even though the invention is described above with reference to embodiments according to the accompanying drawings, it is clear that the invention is not restricted thereto, but it can be modified in several ways within the scope pf the invention defined by the claims appended.

Claims

Claims
1. Method of using an out-of-band channel for secure information transmission between two devices capable for LPRF communication, wherein information intended for secure transmission is encoded into a visual sequence, which visual sequence is emitted in a time-dependent signal by a light emitter of one of the devices, and the visual sequence is detected by a light sensor of the other device, wherein a sequence of detection signals is obtained from the light sensor, which sequence is decoded to reconstruct the information intended for secure transmission, wherein the out-of-band channel transmission of the information separate from the LPRF communication enables to transmit a shared secret, which is required for secure authentication of the devices during initialization of the LPRF communication.
2. Method according to claim 1, wherein the light emitter is a light emitting diode and the light sensor is one of a light diode, an ambient light sensor, and an image capturing module.
3. Method according to claim 1 or claim 2, wherein the information is bit encoded and each bit value is converted in a predefined visual symbol.
4. Method according to anyone of the preceding claims, wherein the each bit value is converted into one or more lighted-up and dark states of the light emitter, wherein the lighted-up and/or the dark states are persistent for one or more pre-defined periods of time and form a visual symbol.
5. Method according to anyone of the preceding claims, wherein frequency modulation is used for encoding the information in the visual sequence.
6. Method according to anyone of the preceding claims, wherein the sampling frequency of the light sensor exceeds the minimum sampling frequency required for correctly detecting the visual sequence emitted in the time-dependent signal.
7. Method according to anyone of the preceding claims, wherein the light sensor is an image capturing module, which captures a sequence of images during emission of the visual sequence, wherein each captured image is integrated to obtain a detection value and a current detection value is compared to one or more previous detection values such that based on the determined difference the information is decoded from the captured images.
8. Method according to claim 7, wherein the captured images are converted into monochrome images.
9. Method according to claim 7 or claim 8, wherein each captured image is analyzed to identify an image area including the emitted time-depended signal of the light emitter, wherein the area is integrated to obtain a detection value from each captured image.
10. System of using an out-of-band channel for secure information transmission, wherein the system comprises two devices capable for LPRF communication, wherein information intended for secure transmission is encoded into a visual sequence, which visual sequence is emitted in a time-dependent signal by a light emitter of one of the devices, and the visual sequence is detected by a light sensor of the other device, wherein a sequence of detection signals is obtained from the light sensor, which sequence is decoded to reconstruct the information intended for secure transmission, wherein the out-of-band channel transmission of the information separate from the LPRF communication enables to transmit a shared secret, which is required for secure authentication of the devices during initialization of the LPRF communication.
11. System according to claim 10, wherein the light emitter is a light emitting diode and the light sensor is one of a light diode, an ambient light sensor, and an image capturing module.
12. System according to claim 10 or claim 11, wherein the information is bit encoded and each bit value is converted in a predefined visual symbol.
13. System according to anyone of the claims 10 to 12, wherein the each bit value is converted into one or more lighted-up and dark states of the light emitter, wherein the lighted-up and/or the dark states are persistent for one or more pre-defined periods of time and form a visual symbol.
14. System according to anyone of the claims 10 to 13, wherein frequency modulation is used for encoding the information in the visual sequence.
15. System according to anyone of the claims 10 to 14, wherein the sampling frequency of the light sensor exceeds the minimum sampling frequency required for correctly detecting the visual sequence emitted in the time-dependent signal.
16. System according to anyone of the claims 10 to 15, wherein the light sensor is an image capturing module, which captures a sequence of images during emission of the visual sequence, wherein each captured image is integrated to obtain a detection value and a current detection value is compared to one or more previous detection values such that based on the determined difference the information is decoded from the captured images .
17. System according to claim 16, wherein the captured images are converted into monochrome images.
18. System according to claim 16 or claim 17, wherein each captured image is analyzed to identify an image area including the emitted time-depended signal of the light emitter, wherein the area is integrated to obtain a detection value from each captured image.
19. Device of using an out-of-band channel for secure information transmission, wherein the device is capable for LPRF communication with a counterpart device, wherein information intended for secure transmission is encoded into a visual sequence, which visual sequence is emitted in a time-dependent signal by a light emitter of the device, and the visual sequence is provided for detection by a light sensor of the counterpart device, , wherein the out-of-band channel transmission of the information separate from the LPRF communication enables to transmit a shared secret, which is required for secure authentication of the devices during initialization of the LPRF communication.
20. Device of using an out-of-band channel for secure information receipt, wherein the device is capable for LPRF communication with a counterpart device, wherein information intended for secure transmission is encoded into a visual sequence, which visual sequence is detected by a light sensor of the device, wherein a sequence of detection signals is obtained from the light sensor on the basis of the detected signal, which sequence is decoded to reconstruct the information intended for secure transmission, wherein the out-of-band channel transmission of the information separate from the LPRF communication enables to transmit a shared secret, which is required for secure authentication of the devices during initialization of the LPRF communication.
21. Device according to claim 19, wherein the light emitter is at least one light emitting diode.
22. Device according to claim 20, wherein the light sensor is one of a light diode, an ambient light sensor, and an image capturing module.
PCT/IB2005/003107 2005-10-18 2005-10-18 Security in wireless environments using out-of-band channel communication WO2007045937A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/083,708 US20100005294A1 (en) 2005-10-18 2005-10-18 Security in Wireless Environments Using Out-Of-Band Channel Communication
PCT/IB2005/003107 WO2007045937A1 (en) 2005-10-18 2005-10-18 Security in wireless environments using out-of-band channel communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2005/003107 WO2007045937A1 (en) 2005-10-18 2005-10-18 Security in wireless environments using out-of-band channel communication

Publications (1)

Publication Number Publication Date
WO2007045937A1 true WO2007045937A1 (en) 2007-04-26

Family

ID=37962224

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2005/003107 WO2007045937A1 (en) 2005-10-18 2005-10-18 Security in wireless environments using out-of-band channel communication

Country Status (2)

Country Link
US (1) US20100005294A1 (en)
WO (1) WO2007045937A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2455059A (en) * 2007-10-09 2009-06-03 Symbian Software Ltd Transmitting device pairing information over multiple available out of band channels/interfaces
EP2224669A1 (en) * 2009-02-27 2010-09-01 Research In Motion Limited Secure data transfer on a handheld communications device
EP2381645A1 (en) * 2010-04-26 2011-10-26 Kapsch TrafficCom AG Method and device for radio-based programming of wireless terminals
EP2495891A1 (en) * 2011-02-28 2012-09-05 Research In Motion Limited Device to transmit data by displaying a coded image generated according to a selectable encoding scheme and associated methods
US20120294441A1 (en) * 2009-02-27 2012-11-22 Research In Motion Limited Secure data transfer on a handheld communications device
WO2012167200A1 (en) * 2011-06-01 2012-12-06 Qualcomm Incorporated Selective admission into a network sharing session
WO2013109934A1 (en) * 2012-01-20 2013-07-25 Digimarc Corporation Shared secret arrangements and optical data transfer
WO2014116526A1 (en) * 2013-01-22 2014-07-31 Qualcomm Incorporated Method, security server and device utilizing an optical signal to access an access point
US8873618B2 (en) 2011-02-28 2014-10-28 Blackberry Limited Device to transmit data by displaying a coded image generated according to a selectable encoding scheme and associated methods
US9008315B2 (en) 2012-01-20 2015-04-14 Digimarc Corporation Shared secret arrangements and optical data transfer
CN104618018A (en) * 2014-12-30 2015-05-13 北京智谷睿拓技术服务有限公司 Data transmission method and device based on visible light communication
WO2016186539A1 (en) * 2015-05-19 2016-11-24 Telefonaktiebolaget Lm Ericsson (Publ) A communications system, a station, a controller of a light source, and methods therein for authenticating the station to access a network.
GB2558097B (en) * 2014-04-17 2019-03-06 Z Integrated Digital Tech Inc Electronic test device data communication
US10893879B2 (en) 2006-06-09 2021-01-19 Biomet Manufacturing, Llc Patient-specific knee alignment guide and associated method

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7738569B2 (en) * 2006-04-13 2010-06-15 Dell Products L.P. Ultra-wideband (UWB) secure wireless device pairing and associated systems
DE102006027462B4 (en) * 2006-06-12 2009-06-18 Nec Europe Ltd. Method for operating a wireless sensor network
US20080113618A1 (en) * 2006-11-09 2008-05-15 Sony Ericsson Mobile Communications Ab Pairing system and method for mobile devices
JP2010512677A (en) * 2006-12-11 2010-04-22 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Visual display system with changing lighting
US20090286479A1 (en) * 2008-05-16 2009-11-19 Sony Ericsson Mobile Communications Ab Method and system for sensory pairing for a portable communication device
KR20110043160A (en) * 2009-10-21 2011-04-27 삼성전자주식회사 Mobile communication device supporting pairing
EP2343916B1 (en) * 2010-01-12 2018-05-09 Koninklijke KPN N.V. Secure coupling of hardware components
TWI410908B (en) * 2010-01-18 2013-10-01 Chin Chen Chang A (2,2) circular sharing method for two color secret images
US8850196B2 (en) 2010-03-29 2014-09-30 Motorola Solutions, Inc. Methods for authentication using near-field
US20120218287A1 (en) * 2011-02-25 2012-08-30 Mcwilliams Thomas J Apparatus, system and method for electronic book reading with audio output capability
EP2727410A4 (en) * 2011-07-01 2015-03-25 Nokia Corp Method and apparatus for providing network access to a connecting apparatus
US9524499B2 (en) 2011-09-28 2016-12-20 Paypal, Inc. Systems, methods, and computer program products providing electronic communication during transactions
US9827401B2 (en) * 2012-06-01 2017-11-28 Surmodics, Inc. Apparatus and methods for coating medical devices
US9332431B2 (en) 2012-12-27 2016-05-03 Motorola Solutions, Inc. Method of and system for authenticating and operating personal communication devices over public safety networks
US8782766B1 (en) 2012-12-27 2014-07-15 Motorola Solutions, Inc. Method and apparatus for single sign-on collaboration among mobile devices
US8955081B2 (en) 2012-12-27 2015-02-10 Motorola Solutions, Inc. Method and apparatus for single sign-on collaboraton among mobile devices
US8806205B2 (en) 2012-12-27 2014-08-12 Motorola Solutions, Inc. Apparatus for and method of multi-factor authentication among collaborating communication devices
KR102097987B1 (en) * 2013-01-31 2020-04-07 삼성전자주식회사 Apparatus and method for processing data of bluetooth in a portable terminal
US20150117295A1 (en) * 2013-10-30 2015-04-30 Electronics And Telecommunications Research Institute Method and apparatus for device-to-device communication
US9240982B2 (en) * 2013-12-27 2016-01-19 Canon Information And Imaging Solutions, Inc. Method for associating an image-forming device, a mobile device, and a user
GB2515853B (en) 2014-02-25 2015-08-19 Cambridge Silicon Radio Ltd Latency mitigation
GB2512747B (en) * 2014-02-25 2015-04-01 Cambridge Silicon Radio Ltd Mesh relay
US20150288667A1 (en) * 2014-04-08 2015-10-08 Samsung Electronics Co., Ltd. Apparatus for sharing a session key between devices and method thereof
US9679128B1 (en) * 2014-09-22 2017-06-13 Amazon Technologies, Inc. De-authentication of wearable devices
EP3057275B1 (en) * 2015-02-10 2020-08-05 TTTech Computertechnik AG Extended distribution unit
US11516673B2 (en) * 2017-05-22 2022-11-29 Becton, Dickinson And Company Systems, apparatuses and methods for secure wireless pairing between two devices using embedded out-of-band (OOB) key generation
US10389529B2 (en) * 2017-06-27 2019-08-20 Uniken, Inc. Entropy-based authentication of mobile financial transaction
WO2019015739A1 (en) * 2017-07-17 2019-01-24 Sonova Ag Encrypted audio streaming
EP3461162A1 (en) * 2017-09-21 2019-03-27 Siemens Aktiengesellschaft Method, communication partner and system for computer-assisted creation of a cryptographically protected communication link between a first communication partner and a second communication partner
FR3074990B1 (en) * 2017-12-12 2021-10-29 Roam Data Inc METHOD OF PAIRING ELECTRONIC TERMINALS, TERMINALS AND CORRESPONDING PROGRAM
WO2021174213A1 (en) * 2020-02-28 2021-09-02 Verifone, Inc. Systems, methods and devices for bluetooth numeric comparison pairing
ES2980876A1 (en) * 2023-03-03 2024-10-03 Tarlogic Security S L METHOD AND SYSTEM FOR DETERMINING A PREVIOUS BLUETOOTH PAIRING BETWEEN DEVICES

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020065065A1 (en) * 2000-11-30 2002-05-30 E. Michael Lunsford Method and system for applying line of sight IR selection of a receiver to implement secure transmission of data to a mobile computing device via an RF link
EP1335563A2 (en) * 2002-02-06 2003-08-13 Xerox Corporation Method for securing communication over a network medium
US20040120297A1 (en) * 2002-08-31 2004-06-24 Mcdonnell James Thomas Edward Method of and apparatus for providing access control information to a wireless node of a wireless data network

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2229964A (en) * 1938-10-26 1941-01-28 Gen Electric Television synchronizing system
US4626904A (en) * 1985-11-12 1986-12-02 Control Data Corporation Meter for passively logging the presence and identity of TV viewers
US4890102A (en) * 1987-05-26 1989-12-26 Cabletron, Inc. Visual display for communication network monitoring and troubleshooting
US5144217A (en) * 1989-03-03 1992-09-01 Black & Decker Inc. Cordless tool battery housing and charging system
US5471204A (en) * 1988-04-09 1995-11-28 Nec Corporation Radio communication apparatus capable of notifying reception of a call signal in a perceptual mode determined by counting a number of times of the reception
DE4116273C1 (en) * 1991-05-17 1992-10-29 Union Special Gmbh, 7000 Stuttgart, De
US5460124A (en) * 1993-07-15 1995-10-24 Perimeter Technologies Incorporated Receiver for an electronic animal confinement system
KR0144521B1 (en) * 1994-04-08 1998-07-15 쯔지 하루오 Light emitting display device having light receiving element for receiving light from light emitting element and self-holding and optical passage for guiding drive light to the light receiving element
US6901241B2 (en) * 1998-02-11 2005-05-31 Telefonaktiebolaget L M Ericsson (Publ) System, method and apparatus for secure transmission of confidential information
DE19815747C1 (en) * 1998-04-08 1999-10-28 Bosch Gmbh Robert Sensor device for detecting wetting on a pane
DE19815746C1 (en) * 1998-04-08 1999-11-04 Bosch Gmbh Robert Sensor device for detecting wetting on a pane
KR100722175B1 (en) * 2000-03-03 2007-05-29 코닌클리케 필립스 일렉트로닉스 엔.브이. Transferring data from one device to another
US6879263B2 (en) * 2000-11-15 2005-04-12 Federal Law Enforcement, Inc. LED warning light and communication system
US6919815B2 (en) * 2002-01-24 2005-07-19 Emerson Electric Co. Appliance control communication methods and apparatus
KR20060130715A (en) * 2004-03-03 2006-12-19 닛본 덴끼 가부시끼가이샤 Positioning system, positioning method, and program thereof
JP2006085594A (en) * 2004-09-17 2006-03-30 Nec Corp Visible light information providing device and system, visible light information reader, visible light information providing method, its program and computer readable information recording medium with the program recorded
CA2609877C (en) * 2005-01-25 2015-05-26 Tir Technology Lp Method and apparatus for illumination and communication
US20060238365A1 (en) * 2005-04-24 2006-10-26 Elio Vecchione Short-range wireless power transmission and reception

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020065065A1 (en) * 2000-11-30 2002-05-30 E. Michael Lunsford Method and system for applying line of sight IR selection of a receiver to implement secure transmission of data to a mobile computing device via an RF link
EP1335563A2 (en) * 2002-02-06 2003-08-13 Xerox Corporation Method for securing communication over a network medium
US20040120297A1 (en) * 2002-08-31 2004-06-24 Mcdonnell James Thomas Edward Method of and apparatus for providing access control information to a wireless node of a wireless data network

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10893879B2 (en) 2006-06-09 2021-01-19 Biomet Manufacturing, Llc Patient-specific knee alignment guide and associated method
GB2455059A (en) * 2007-10-09 2009-06-03 Symbian Software Ltd Transmitting device pairing information over multiple available out of band channels/interfaces
US8798265B2 (en) 2009-02-27 2014-08-05 Blackberry Limited Secure data transfer on a handheld communications device
EP2224669A1 (en) * 2009-02-27 2010-09-01 Research In Motion Limited Secure data transfer on a handheld communications device
US20120294441A1 (en) * 2009-02-27 2012-11-22 Research In Motion Limited Secure data transfer on a handheld communications device
US8345866B2 (en) 2009-02-27 2013-01-01 Research In Motion Limited Secure data transfer on a handheld communications device
US20130089200A1 (en) * 2009-02-27 2013-04-11 Research In Motion Limited Secure data transfer on a handheld communications device
US8798266B2 (en) 2009-02-27 2014-08-05 Blackberry Limited Secure data transfer on a handheld communications device
EP2381645A1 (en) * 2010-04-26 2011-10-26 Kapsch TrafficCom AG Method and device for radio-based programming of wireless terminals
US9380117B2 (en) 2010-04-26 2016-06-28 Kapsch Trafficcom Ag Device and method for radio programming wireless terminal devices
US8873618B2 (en) 2011-02-28 2014-10-28 Blackberry Limited Device to transmit data by displaying a coded image generated according to a selectable encoding scheme and associated methods
EP2495891A1 (en) * 2011-02-28 2012-09-05 Research In Motion Limited Device to transmit data by displaying a coded image generated according to a selectable encoding scheme and associated methods
WO2012167200A1 (en) * 2011-06-01 2012-12-06 Qualcomm Incorporated Selective admission into a network sharing session
US10681021B2 (en) 2011-06-01 2020-06-09 Qualcomm Incorporated Selective admission into a network sharing session
US9008315B2 (en) 2012-01-20 2015-04-14 Digimarc Corporation Shared secret arrangements and optical data transfer
US9847976B2 (en) 2012-01-20 2017-12-19 Digimarc Corporation Shared secret arrangements and optical data transfer
US8879735B2 (en) 2012-01-20 2014-11-04 Digimarc Corporation Shared secret arrangements and optical data transfer
WO2013109934A1 (en) * 2012-01-20 2013-07-25 Digimarc Corporation Shared secret arrangements and optical data transfer
US9277401B2 (en) 2013-01-22 2016-03-01 Qualcomm Incorporated Device utilizing an optical signal to access an access point
WO2014116526A1 (en) * 2013-01-22 2014-07-31 Qualcomm Incorporated Method, security server and device utilizing an optical signal to access an access point
GB2558097B (en) * 2014-04-17 2019-03-06 Z Integrated Digital Tech Inc Electronic test device data communication
US10681516B2 (en) 2014-04-17 2020-06-09 Z-Integrated Digital Technologies, Inc. Electronic test device data communication
CN104618018A (en) * 2014-12-30 2015-05-13 北京智谷睿拓技术服务有限公司 Data transmission method and device based on visible light communication
CN104618018B (en) * 2014-12-30 2018-09-18 北京智谷睿拓技术服务有限公司 Data transmission method based on visible light communication and device
WO2016186539A1 (en) * 2015-05-19 2016-11-24 Telefonaktiebolaget Lm Ericsson (Publ) A communications system, a station, a controller of a light source, and methods therein for authenticating the station to access a network.
US10594680B2 (en) 2015-05-19 2020-03-17 Telefonaktiebolaget Lm Ericsson (Publ) Communications system, a station, a controller of a light source, and methods therein for authenticating the station to access a network

Also Published As

Publication number Publication date
US20100005294A1 (en) 2010-01-07

Similar Documents

Publication Publication Date Title
US20100005294A1 (en) Security in Wireless Environments Using Out-Of-Band Channel Communication
CN112449328B (en) Bluetooth searching method, system and related device
US7809361B2 (en) Address privacy in short-range wireless communication
US7124953B2 (en) Visual encoding of a content address to facilitate data transfer in digital devices
US7478755B2 (en) Communication system, communication apparatus and method, recording medium, and program
US10609538B2 (en) Method and device for identifying bluetooth headset voice source
CN113207122B (en) Message transmission method and device
JP2006270808A (en) Mobile communications network system, portable communications terminal, authentication device, and these drive methods and drive programs
US20080195866A1 (en) System and method for human assisted secure information exchange
US20220346159A1 (en) Bluetooth pairing method and related apparatus
US8270903B2 (en) Method for displaying information in mobile communication terminal using bluetooth
WO2015117352A1 (en) Data processing method, data sending and receiving terminal, and data transmission system
CN103944723A (en) Bluetooth device authentication method and Bluetooth devices
CN115696322A (en) Key updating method, system and related device in Beidou communication system
JP2014090413A (en) Method and apparatus for connecting to wireless local area network
EP4439499A1 (en) Digital key generation system and method, vehicle unlocking method and apparatus, and device
JP2005333188A (en) Communication method and communication apparatus
EP1089499A2 (en) Radio communications network system and its radio terminal
FI124250B (en) Improved connectivity solution
CN105763516B (en) The method and apparatus that terminal sends data to net external equipment out of WLAN
CN109842960A (en) Connect method for building up and device
CN115701016B (en) Authentication verification method, system and related device in satellite communication system
Gupta et al. Light Codes for Fast Two-Way Human-Centric Visual Communication
WO2023098356A1 (en) Fingerprint identification method and system, and electronic device
Kindberg et al. Evidently secure device associations

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05792602

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 12083708

Country of ref document: US