WO2014138333A1 - Systems and methods for secure high-speed link maintenance via nfc - Google Patents

Systems and methods for secure high-speed link maintenance via nfc Download PDF

Info

Publication number
WO2014138333A1
WO2014138333A1 PCT/US2014/021002 US2014021002W WO2014138333A1 WO 2014138333 A1 WO2014138333 A1 WO 2014138333A1 US 2014021002 W US2014021002 W US 2014021002W WO 2014138333 A1 WO2014138333 A1 WO 2014138333A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication unit
wireless communication
wireless
code
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2014/021002
Other languages
English (en)
French (fr)
Inventor
Paul Husted
Thomas P. Cargill
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Priority to CN201480011732.9A priority Critical patent/CN105191250B/zh
Priority to JP2015561635A priority patent/JP6165894B2/ja
Priority to KR1020157027377A priority patent/KR101770708B1/ko
Priority to EP14714854.8A priority patent/EP2965489A1/en
Publication of WO2014138333A1 publication Critical patent/WO2014138333A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/38Connection release triggered by timers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/121Timestamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/04Interfaces between hierarchically different network devices
    • H04W92/10Interfaces between hierarchically different network devices between terminal device and access point, i.e. wireless air interface

Definitions

  • the present application relates generally to wireless communications, and more specifically to systems, methods, and devices for maintaining a link using near field communications.
  • communications networks are used to exchange messages among several interacting spatially-separated devices.
  • Networks may be classified according to geographic scope, which could be, for example, a metropolitan area, a local area, or a personal area. Such networks would be designated respectively as a wide area network (WAN), metropolitan area network (MAN), local area network (LAN), wireless local area network (WLAN), or personal area network (PAN).
  • WAN wide area network
  • MAN metropolitan area network
  • LAN local area network
  • WLAN wireless local area network
  • PAN personal area network
  • Networks also differ according to the switching/routing technique used to interconnect the various network nodes and devices (e.g. circuit switching vs. packet switching), the type of physical media employed for transmission (e.g. wired vs. wireless), and the set of communication protocols used (e.g. Internet protocol suite, SONET (Synchronous Optical Networking), Ethernet, etc.).
  • SONET Synchronous Optical Networking
  • Wireless networks are often preferred when the network elements are mobile and thus have dynamic connectivity needs, or if the network architecture is formed in an ad hoc, rather than fixed, topology.
  • Wireless networks employ intangible physical media in an unguided propagation mode using electromagnetic waves in the radio, microwave, infra-red, optical, etc. frequency bands. Wireless networks advantageously facilitate user mobility and rapid field deployment when compared to fixed wired networks.
  • Wireless networks may include security protocols to protect data that is transferred wirelessly over the networks.
  • security protocols include wired equivalent privacy (WEP), Wi-Fi Protected Access (WPA), Advanced Encryption Standard (AES), a Pairwise Master Key (PMK), and the like.
  • wired networks may include security protocols to protect data that is transferred, such as hypertext transfer protocol secure (HTTPS), firewalls, and the like.
  • HTTPS hypertext transfer protocol secure
  • these security protocols may be compromised if a person has access to the right tools or equipment. In some situations, a higher level of security may be desired when communicating via wired or wireless networks.
  • One aspect of this disclosure provides a system comprising one or more apparatuses that communicate with a second apparatus.
  • the system comprises a first wireless communication unit configured to communicate with the second apparatus via a first wireless protocol.
  • the first wireless communication unit may transmit a first message to the second apparatus.
  • the system further comprises a second wireless communication unit configured to communicate with the second apparatus over a communication link via a second wireless protocol.
  • the second wireless communication unit may be further configured to disconnect the communication link if the first wireless communication unit does not receive a second message from the second apparatus within a predetermined amount of time after transmission of the first message.
  • Another aspect of this disclosure provides a method of communicating with a second apparatus.
  • the method comprises communicating, by a first wireless communication unit, with the second apparatus via a first wireless protocol.
  • the first wireless communication unit may transmit a first message to the second apparatus.
  • the method further comprises communicating, by a second wireless communication unit, with the second apparatus over a communication link via a second wireless protocol.
  • the method further comprises disconnecting, by the second wireless communication unit, the communication link if the first wireless communication unit does not receive a second message from the second apparatus within a predetermined amount of time after transmission of the first message.
  • Another aspect of this disclosure provides an apparatus for communicating with a second apparatus.
  • the apparatus comprises first means for communicating with the second apparatus via a first wireless protocol.
  • the first means for communicating may transmit a first message to the second apparatus.
  • the apparatus further comprises second means for communicating with the second apparatus over a communication link via a second wireless protocol.
  • the apparatus further comprises means for disconnecting the communication link if the first means for communicating does not receive a second message from the second apparatus within a predetermined amount of time after transmission of the first message.
  • Another aspect of this disclosure provides a non-transitory computer-readable medium comprising code that, when executed, causes an apparatus to communicate, using a first wireless communication unit, with a second apparatus via a first wireless protocol.
  • the first wireless communication unit may transmit a first message to the second apparatus.
  • the medium further comprises code that, when executed, causes an apparatus to communicate, using a second wireless communication unit, with the second apparatus over a communication link via a second wireless protocol.
  • the medium further comprises code that, when executed, causes an apparatus to disconnect, using the second wireless communication unit, the communication link if the first wireless communication unit does not receive a second message from the second apparatus within a predetermined amount of time after transmission of the first message.
  • FIG. 1 shows an exemplary wireless communication system in which aspects of the present disclosure may be employed.
  • FIG. 2 shows a functional block diagram of an exemplary wireless device that may be employed within the wireless communication system of FIG. 1.
  • FIG. 3 illustrates a wireless communication system in which a station communicates via a short-range communication protocol and a long-range communication protocol.
  • FIG. 4 illustrates another wireless communication system in which a station communicates via a short-range communication protocol and a long-range communication protocol.
  • FIG. 5 illustrates a decision diagram for maintaining a secure connection between a station and an access point.
  • FIG. 6 illustrates another decision diagram for maintaining a secure connection between a station and an access point.
  • FIG. 7 is a flowchart of a process for communicating with a station in the wireless communication systems of FIGS. 1, 3, and/or 4.
  • FIG. 8 is a functional block diagram of an exemplary device that may be employed within the wireless communication systems FIGS. 1, 3, and/or 4.
  • Wireless and wireless network technologies may include various types of short-range communications (e.g., near-field communication (NFC), radio-frequency identification (RFID), radio frequency (RF), etc.) and long-range communications.
  • the short-range communications may be characterized by communications between devices that are 0-4 cm apart.
  • Long-range communications may include any local wireless area network (WLAN) protocol (e.g., any IEEE 802.11 protocol, Bluetooth, etc.), any wireless wide area network (WW AN) protocol (e.g., LTE, CDMA, WiMAX, GSM, etc.), any wired network protocol (e.g., IEEE 1394, Ethernet, universal serial bus (USB), etc.), and the like.
  • WLAN wireless area network
  • WW AN wireless wide area network
  • wired network protocol e.g., IEEE 1394, Ethernet, universal serial bus (USB), etc.
  • a WLAN may be used to interconnect nearby devices together, employing widely used networking protocols.
  • a WW AN may be used to interconnect devices separated by a distance, employing widely used networking protocols.
  • the various aspects described herein may apply to any communication standard, such as a wireless protocol or a wired protocol.
  • wireless signals may be transmitted according to a short-range communication protocol or a long-range communication protocol using orthogonal frequency-division multiplexing (OFDM), direct-sequence spread spectrum (DSSS) communications, a combination of OFDM and DSSS communications, or other schemes.
  • Wired signals may be transmitted according to a short-range communication protocol or a long-range communication protocol using similar data transmission and/or compression techniques. Implementations of such a protocol may be used for secure communications, mobile banking, mobile telephony, payment transactions, network access, and the like.
  • aspects of certain devices implementing any of the above-mentioned protocols may consume less power than devices implementing other wired or wireless protocols, and/or may be used to transmit wired or wireless signals across a relatively long range, for example about one kilometer or longer.
  • a short-range communication network and/or a long- range communication network includes various devices which are the components that access the wired or wireless network.
  • devices there may be two types of devices: access points ("APs") and clients (also referred to as stations, or "STAs").
  • APs access points
  • STAs stations
  • an AP may serve as a hub or base station for the communication network
  • an STA serves as a user of the communication network.
  • an STA may be a laptop computer, a personal digital assistant (PDA), a mobile phone, etc.
  • PDA personal digital assistant
  • an STA connects to an AP via a WiFi (e.g., an IEEE 802.11 protocol) compliant wireless link or a mobile carrier compliant wireless link (e.g., LTE, CDMA, WiMAX, GSM, etc.) to obtain general connectivity to the Internet or to other wide area networks.
  • a WiFi e.g., an IEEE 802.11 protocol
  • a mobile carrier compliant wireless link e.g., LTE, CDMA, WiMAX, GSM, etc.
  • an STA may also be used as an AP.
  • An access point may also comprise, be implemented as, or known as a
  • An AP may further comprise a femto cell, a cell tower, a wired or wireless gateway, a mobile prepaid card, an RFID reader/writer, a portable electronic device, a computer, a docking station, a charging station, an automated teller machine (ATM), or the like.
  • RNC Radio Network Controller
  • BSC Base Station Controller
  • BTS Base Transceiver Station
  • BS Base Station
  • TF Transceiver Function
  • Radio Router Radio Transceiver, or some other terminology.
  • An AP may further comprise a femto cell, a cell tower, a wired or wireless gateway, a mobile prepaid card, an RFID reader/writer, a portable electronic device, a computer, a docking station, a charging station, an automated teller machine (ATM), or the like.
  • ATM automated teller machine
  • a station “STA” may also comprise, be implemented as, or known as an access terminal ("AT”), a subscriber station, a subscriber unit, a mobile station, a remote station, a remote terminal, a user terminal, a user agent, a user device, user equipment, or some other terminology.
  • an access terminal may comprise a cellular telephone, a cordless telephone, a Session Initiation Protocol ("SIP”) phone, a wireless local loop (“WLL”) station, a personal digital assistant (“PDA”), a handheld device having wireless connection capability, or some other suitable processing device connected to a wireless modem.
  • SIP Session Initiation Protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • a phone e.g., a cellular phone or smartphone
  • a computer e.g., a laptop
  • a portable communication device e.g., a headset
  • a portable computing device e.g., a personal data assistant
  • an entertainment device e.g., a music or video device, or a satellite radio
  • gaming device or system e.g., a gaming console, a global positioning system device, or any other suitable device that is configured to communicate via a wireless medium.
  • certain of the devices described herein may implement the a short-range and/or long-range communication protocol.
  • Such devices may be used for secure communications, mobile banking, mobile telephony, payment transactions, and/or network access.
  • the devices may instead or in addition be used in a healthcare context, for example for personal healthcare. They may also be used for surveillance, to enable extended-range Internet connectivity (e.g. for use with hotspots), or to implement machine-to-machine communications.
  • FIG. 1 shows an exemplary wireless communication system 100 in which aspects of the present disclosure may be employed.
  • the wireless communication system 100 may operate pursuant to a wireless standard, for example the IEEE 802.11 standard.
  • the wireless communication system 100 may include an AP 104, which communicates with STAs 106.
  • a variety of processes and methods may be used for transmissions in the wireless communication system 100 between the AP 104 and the STAs 106.
  • signals may be sent and received between the AP 104 and the STAs 106 in accordance with OFDM/OFDMA techniques. If this is the case, the wireless communication system 100 may be referred to as an OFDM/OFDMA system.
  • signals may be sent and received between the AP 104 and the STAs 106 in accordance with CDMA techniques. If this is the case, the wireless communication system 100 may be referred to as a CDMA system.
  • a communication link that facilitates transmission from the AP 104 to one or more of the STAs 106 may be referred to as a downlink (DL) 108, and a communication link that facilitates transmission from one or more of the STAs 106 to the AP 104 may be referred to as an uplink (UL) 110.
  • DL downlink
  • UL uplink
  • a downlink 108 may be referred to as a forward link or a forward channel
  • an uplink 110 may be referred to as a reverse link or a reverse channel.
  • the AP 104 may act as a base station and provide wireless communication coverage in a basic service area (BSA) 102.
  • BSA basic service area
  • the AP 104 along with the STAs 106 associated with the AP 104 and that use the AP 104 for communication may be referred to as a basic service set (BSS).
  • BSS basic service set
  • the wireless communication system 100 may not have a central AP 104, but rather may function as a peer-to-peer network between the STAs 106. Accordingly, the functions of the AP 104 described herein may alternatively be performed by one or more of the STAs 106.
  • the AP 104 may transmit a beacon signal (or simply a "beacon"), via a communication link such as the downlink 108, to other nodes STAs 106 of the system 100, which may help the other nodes STAs 106 to synchronize their timing with the AP 104, or which may provide other information or functionality.
  • beacons may be transmitted periodically. In one aspect, the period between successive transmissions may be referred to as a superframe. Transmission of a beacon may be divided into a number of groups or intervals.
  • the beacon may include, but is not limited to, such information as timestamp information to set a common clock, a peer-to-peer network identifier, a device identifier, capability information, a superframe duration, transmission direction information, reception direction information, a neighbor list, and/or an extended neighbor list, some of which are described in additional detail below.
  • a beacon may include information both common (e.g. shared) amongst several devices, and information specific to a given device.
  • a STA 106 may be required to associate with the AP 104 in order to send communications to and/or receive communications from the AP 104.
  • information for associating is included in a beacon broadcast by the AP 104.
  • the STA 106 may, for example, perform a broad coverage search over a coverage region. A search may also be performed by the STA 106 by sweeping a coverage region in a lighthouse fashion, for example.
  • the STA 106 may transmit a reference signal, such as an association probe or request, to the AP 104.
  • the AP 104 may use backhaul services, for example, to communicate with a larger network, such as the Internet or a public switched telephone network (PSTN).
  • PSTN public switched telephone network
  • FIG. 2 shows an exemplary functional block diagram of a wireless device 202 that may be employed within the wireless communication system 100 of FIG. 1.
  • the wireless device 202 is an example of a device that may be configured to implement the various methods described herein.
  • the wireless device 202 may comprise the AP 104 or one of the STAs 106.
  • the wireless device 202 may include a processor 204 which controls operation of the wireless device 202.
  • the processor 204 may also be referred to as a central processing unit (CPU).
  • Memory 206 which may include both read-only memory (ROM) and random access memory (RAM), may provide instructions and data to the processor 204.
  • a portion of the memory 206 may also include non-volatile random access memory (NVRAM).
  • the processor 204 typically performs logical and arithmetic operations based on program instructions stored within the memory 206.
  • the instructions in the memory 206 may be executable to implement the methods described herein.
  • the processor 204 may comprise or be a component of a processing system implemented with one or more processors.
  • the one or more processors may be implemented with any combination of general-purpose microprocessors, microcontrollers, digital signal processors (DSPs), field programmable gate array (FPGAs), programmable logic devices (PLDs), controllers, state machines, gated logic, discrete hardware components, dedicated hardware finite state machines, or any other suitable entities that can perform calculations or other manipulations of information.
  • the processing system may also include machine -readable media for storing software.
  • Software shall be construed broadly to mean any type of instructions, whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise. Instructions may include code (e.g., in source code format, binary code format, executable code format, or any other suitable format of code). The instructions, when executed by the one or more processors, cause the processing system to perform the various functions described herein.
  • the wireless device 202 may also include a housing 208 that may include a transmitter 210 and/or a receiver 212 to allow transmission and reception of data between the wireless device 202 and a remote location.
  • the transmitter 210 and receiver 212 may be combined into a transceiver 214.
  • An antenna 216 may be attached to the housing 208 and electrically coupled to the transceiver 214.
  • the wireless device 202 may also include (not shown) multiple transmitters, multiple receivers, multiple transceivers, and/or multiple antennas.
  • the wireless device 202 may include a transceiver and/or antenna for short-range communications and a transceiver and/or antenna for long-range communications.
  • the wireless device 202 may also include a signal detector 218 that may be used in an effort to detect and quantify the level of signals received by the transceiver 214.
  • the signal detector 218 may detect such signals as total energy, energy per subcarrier per symbol, power spectral density and other signals.
  • the wireless device 202 may also include a digital signal processor (DSP) 220 for use in processing signals.
  • DSP 220 may be configured to generate a packet for transmission.
  • the packet may comprise a physical layer data unit (PPDU).
  • PPDU physical layer data unit
  • the wireless device 202 may further comprise a user interface 222 in some aspects.
  • the user interface 222 may comprise a keypad, a microphone, a speaker, and/or a display.
  • the user interface 222 may include any element or component that conveys information to a user of the wireless device 202 and/or receives input from the user.
  • the various components of the wireless device 202 may be coupled together by a bus system 226.
  • the bus system 226 may include a data bus, for example, as well as a power bus, a control signal bus, and a status signal bus in addition to the data bus.
  • a data bus for example, as well as a power bus, a control signal bus, and a status signal bus in addition to the data bus.
  • Those of skill in the art will appreciate the components of the wireless device 202 may be coupled together or accept or provide inputs to each other using some other mechanism.
  • processor 204 may be used to implement not only the functionality described above with respect to the processor 204, but also to implement the functionality described above with respect to the signal detector 218 and/or the DSP 220. Further, each of the components illustrated in FIG. 2 may be implemented using a plurality of separate elements.
  • the wireless device 202 may comprise an AP 104 or an STA 106 and may be used to transmit and/or receive communications. That is, either AP 104 or STA 106 may serve as transmitter or receiver devices. Certain aspects contemplate signal detector 218 being used by software running on memory 206 and processor 204 to detect the presence of a transmitter or receiver.
  • wireless networks may include security protocols to protect data that is transferred wirelessly over the networks.
  • security protocols include wired equivalent privacy (WEP), Wi-Fi Protected Access (WPA), Advanced Encryption Standard (AES), a Pairwise Master Key (PMK), and the like.
  • wired networks may include security protocols to protect data that is transferred, such as hypertext transfer protocol secure (HTTPS), firewalls, and the like.
  • HTTPS hypertext transfer protocol secure
  • security protocols may be compromised if a person has access to the right tools or equipment. For example, tools or equipment may be used to determine an encryption key and discreetly decrypt transmitted data.
  • the possibility that security protocols may be compromised could be especially troublesome for certain applications. For example, if security protocols are compromised while a user is engaged in mobile banking, the user may suffer a financial loss. Thus, in some situations, a higher level of security may be desired when communicating via wired or wireless networks.
  • a higher level of network security may be achieved via devices capable of communicating via a short-range communication and a long-range communication.
  • the short-range communication may provide data or otherwise allow a device to communicate via a secure link over the long-range communication.
  • Such embodiments and variations thereof are disclosed in greater detail below with respect to FIGS. 3-8.
  • FIG. 3 illustrates a wireless communication system 300 in which a STA 306 communicates via a short-range communication protocol and a long-range communication protocol.
  • the transceiver 214 of the STA 306 may include a short-range communication transceiver configured to communicate with a short-range base station (e.g., AP 304A) via a short-range communication protocol 312 and a long-range communication transceiver configured to communicate with a long- range base station (e.g., AP 304A) via a long-range communication protocol 314.
  • the short-range communication transceiver may be coupled to a processor, such as processor 204, and/or the long-range communication transceiver.
  • the short-range communication transceiver may be hardwired to the processor 204 and/or the long-range communication transceiver.
  • a short-range base station may include an access point, a femto cell, a cell tower, a mobile prepaid card, an RFID reader/writer, a portable electronic device, a computer, a docking station, a charging station, an automated teller machine (ATM), or the like.
  • a long-range base station may include an access point, a femto cell, a cell tower, a wired or wireless gateway, a portable electronic device, a computer, an ATM, or the like.
  • the short-range base station and the long-range base station are the same device, AP 304A.
  • the AP 304A may perform the functions of the short-range base station and the long-range base station.
  • the short-range base station and the long-range base station are separate devices.
  • the short-range communication protocol 312 may be an
  • NFC protocol and the long-range communication protocol 314 may be a WiFi protocol (e.g., an IEEE 802.11 protocol). While specific communication protocols are provided in FIG. 3, this is merely illustrative as one skilled in the art will recognize that the disclosure provided herein applies to any communication protocol.
  • the AP 304A may relay communications between the
  • the communications may be relayed over communication link 316.
  • Such communications may be relayed using any wired or wireless communication protocol.
  • the STA 306 may authenticate with a long-range communication network via the rules determined by the long-range communication protocol 314 to establish a communication link between the STA 306 and the AP 304A in its capacity as a long-range base station. For example, the STA 306 may perform handshaking with the long-range communication network via the AP 304A, including providing the appropriate security information (e.g., a passphrase, a key, a token, etc.), to gain access to the long-range communication network. The STA 306 may perform this authentication while located at position 308.
  • the appropriate security information e.g., a passphrase, a key, a token, etc.
  • the STA 306 may authenticate with a long-range communication network via the short-range communication protocol 312 to establish a communication link between the STA 306 and the AP 304A in its capacity as a long- range base station.
  • the STA 306 may be configured to receive data from the AP 304A in its capacity as a short-range base station via the short-range communication protocol 312.
  • the data may include a code (e.g., a passphrase, a key, a token, etc.) recognized by devices, such as the AP 304A, that communicate via the long- range communication protocol 314.
  • the code may provide access to the long-range communication network.
  • the data may include a security key that provides access to a WiFi network.
  • the STA 306 may then request, from the AP 304A in its capacity as the long-range base station, access to the long-range communication network using the code received via the short-range communication protocol 312.
  • the short-range communication protocol 312 may be further used to maintain or modify the communication link between the STA 306 and the AP 304A over the long- range communication protocol 314.
  • the AP 304A in its capacity as the short-range base station may periodically transmit a message to the STA 306.
  • each message may include a new code.
  • the long-range communication network may request or otherwise expect the STA 306 to transmit the new code (or a derivative of the new code) via the long-range communication protocol 314 in order to maintain the communication link.
  • the long-range communication network may also expect the STA 306 to use the new code (or a derivative of the new code) to modify the security (or encryption) parameters of the communication link in order to maintain the communication link.
  • the STA 306 receives the new code via the short-range communication protocol 312 and transmits the new code (or a derivative of the new code) back to the AP 304A in its capacity as the long-range base station or another device in the long-range communication network (or if the STA 306 uses the new code or a derivative of the new code to modify the security or encryption parameters of the communication link), then the communication link may be maintained. If the STA 306 does not receive the new code via the short-range communication protocol 312 and/or does not transmit the new code (or a derivative of the new code) back to the AP 304A in its capacity as the long-range base station or another device in the long-range communication network, then the communication link may be terminated.
  • the STA 306 may periodically transmit a message to the AP 304A in its capacity as the short-range base station.
  • the message may include an indication that the STA 306 is still present and within range of the AP 304A.
  • the message may include payment information used to maintain the communication link. If the AP 304A in its capacity as the short-range base station receives the message or periodically receives messages during a requested interval, then the communication link may be maintained. If the AP 304A in its capacity as the short- range base station does not receive the message or does not periodically receive messages during a requested interval, then the communication link may be terminated.
  • the message may include a request to acknowledge receipt. If the STA 306 transmits an acknowledgement message to the AP 304A in its capacity as the short-range base station that acknowledges receipt of the message transmitted by the AP 304A in its capacity as the short-range base station, then the AP 304A may maintain the communication link or provide information to the STA 306 (e.g., a code) that would allow the STA 306 to maintain the communication link. If the STA 306 does not acknowledge receipt of the message transmitted by the AP 304A in its capacity as the short-range base station, then the AP 304A may disconnect the communication link or not provide information to the STA 306 that would allow the device to maintain the communication link.
  • the STA 306 may not receive the new code and/or may not acknowledge receipt of the message from the AP 304A in its capacity as the short-range base station if the STA 306A is moved to a different location.
  • the STA 306 is configured to communicate with the AP 304A via the short-range communication protocol 312 when located near or at position 308.
  • the position 308 may be within a certain distance of the AP 304A (e.g., 1 cm).
  • the AP 304A in its capacity as the short-range base station and/or the short-range communication transceiver of the AP 304A may only be configured to transmit messages for a short distance (e.g., 0-4 cms).
  • the STA 306 may no longer be able to communicate with the AP 304A via the short-range communication protocol 312. Thus, the STA 306 would not receive the new code and/or would not acknowledge receipt of the message from the AP 304A in its capacity as the short-range base station. As illustrated in FIG. 3, the communication link via the long-range communication protocol 314 may then be terminated after waiting a predetermined period of time for the STA 306 to respond.
  • the AP 304A may also verify the identity of the STA 306.
  • the STA 306 may transmit identifying data to the AP 304A in its capacity as the long-range base station in addition to a code in order to authenticate and/or maintain a communication link via the long-range communication protocol 314.
  • the AP 304A may be configured to disconnect the communication link even though a new code may be transmitted and/or receipt of the message transmitted by the AP 304A in its capacity as the short- range base station may be acknowledged by the other STA.
  • FIG. 4 illustrates another wireless communication system 400 in which a STA
  • the transceiver 214 of the STA 406 may include a short-range communication transceiver configured to communicate with a short-range base station (e.g., AP 404 A) via a short-range communication protocol 412 and a long-range communication transceiver configured to communicate with a long- range base station (e.g., AP 404B) via a long-range communication protocol 414.
  • the short-range communication transceiver may be coupled to a processor, such as processor 204, and/or the long-range communication transceiver.
  • the short-range communication transceiver may be hardwired to the processor 204 and/or the long-range communication transceiver.
  • the short-range base station and the long-range base station are separate devices, AP 404A and AP 404B.
  • the short-range communication protocol 412 may be an NFC protocol and the long-range communication protocol 414 may be LTE. While specific communication protocols are provided in FIG. 4, this is merely illustrative as one skilled in the art will recognize that the disclosure provided herein applies to any communication protocol.
  • the STA 406 may authenticate with a long-range communication network via the rules determined by the long-range communication protocol 414 to establish a communication link between the STA 406 and the AP 404B.
  • the STA 406 may perform handshaking with the long-range communication network via the AP 404B, including providing the appropriate security information (e.g., a passphrase, a key, a token, etc.), to gain access to the long-range communication network.
  • the STA 406 may perform this authentication while located at position 408.
  • the STA 406 may authenticate with a long-range communication network via the short-range communication protocol 412 to establish a communication link between the STA 406 and the AP 404B.
  • the STA 406 may be configured to receive data from the AP 404A via the short-range communication protocol 412.
  • the data may include a code (e.g., a passphrase, a key, a token, etc.) recognized by devices, such as the AP 404B, that communicate via the long- range communication protocol 414.
  • the code may provide access to the long-range communication network.
  • the data may include a security key that provides access to an LTE network.
  • the STA 406 may then request, from the AP 404B, access to the long-range communication network using the code received via the short- range communication protocol 412.
  • the short-range communication protocol 412 may be further used to maintain of modify the communication link between the STA 406 and the AP 404B over the long-range communication protocol 414.
  • the AP 404A may periodically transmit a message to the STA 406.
  • each message may include a new code.
  • the long-range communication network may request or otherwise expect the STA 406 to transmit the new code (or a derivative of the new code) via the long-range communication protocol 414 in order to maintain the communication link.
  • the long-range communication network may also expect the STA 306 to use the new code (or a derivative of the new code) to modify the security (or encryption) parameters of the communication link in order to maintain the communication link.
  • the STA 406 receives the new code via the short-range communication protocol 412 and transmits the new code (or a derivative of the new code) to the AP 404B or another device in the long-range communication network (or if the STA 306 uses the new code or a derivative of the new code to modify the security or encryption parameters of the communication link), then the communication link may be maintained. If the STA 406 does not receive the new code via the short-range communication protocol 412 and/or does not transmit the new code (or a derivative of the new code) to the AP 404B or another device in the long-range communication network, then the communication link may be terminated.
  • the STA 406 may periodically transmit a message to the AP 404A.
  • the message may include an indication that the STA 406 is still present and within range of the AP 404A.
  • the message may include payment information used to maintain the communication link. If the AP 404A receives the message or periodically receives messages during a requested interval, then the communication link may be maintained. If the AP 404A does not receive the message or does not periodically receive messages during a requested interval, then the communication link may be terminated.
  • the message may include a request to acknowledge receipt. If the STA 406 transmits an acknowledgement message to the AP 404A that acknowledges receipt of the message transmitted by the AP 404A, then the AP 404A may inform the AP 404B via link 416 to maintain the communication link or provide information to the STA 406 (e.g., a code) that would allow the STA 406 to maintain the communication link. If the STA 406 does not acknowledge receipt of the message transmitted by the AP 404A, then the AP 404A may inform the AP 404B via link 416 to disconnect the communication link or not provide information to the STA 406 that would allow the STA 406 to maintain the communication link.
  • the STA 406 does not acknowledge receipt of the message transmitted by the AP 404A
  • the AP 404A may inform the AP 404B via link 416 to disconnect the communication link or not provide information to the STA 406 that would allow the STA 406 to maintain the communication link.
  • the STA 406 may not receive the new code and/or may not acknowledge receipt of the message from the AP 404A if the STA 406 is moved from the position 408 to a different location, such as position 410.
  • the STA 406 is configured to communicate with the AP 404 A when located near or at position 408.
  • the position 408 may be within a certain distance of the AP 404A (e.g., 1 cm).
  • the AP 404A and/or the short-range communication transceiver of the AP 404A may only be configured to transmit messages for a short distance (e.g., 0-4 cms).
  • the STA 406 may no longer be able to communicate with the AP 404A. Thus, the AP 406 would not receive the new code and/or would not acknowledge receipt of the message from the AP 404A. As illustrated in FIG. 4, the communication link via the long-range communication protocol 414 may then be terminated after waiting a predetermined period of time for the STA 406 to respond.
  • the AP 404A and/or the AP 404B may also verify the identity of the STA 406. For example, the STA 406 may transmit identifying data to the AP 404B in addition to a code in order to authenticate and/or maintain a communication link via the long-range communication protocol 414. Thus, if the STA 406 is moved away from the position 408 or any location close to the AP 404A and another STA takes the place of STA 406, then the AP 404B may be configured to disconnect the communication link even though a new code may be transmitted and/or receipt of the message transmitted by the AP 404A may be acknowledged by the other STA.
  • a STA may be a mobile phone and the short-range and long-range base stations may be an ATM.
  • the mobile phone may be configured to communicate with the ATM via NFC and WiFi. For example, when the mobile phone is placed near or on the ATM, the mobile phone may receive a code via NFC. The mobile phone may use the code to connect to the WiFi network operated by the ATM.
  • a user Once connected to the ATM WiFi network, a user may be able to conduct secure transactions with the ATM via the mobile phone (e.g., the mobile phone may include an application that the user interacts with). As soon as the mobile phone is moved a certain distance away from the ATM (e.g., from position 308 to position 310), the ATM may disconnect the communication link between the mobile phone and the ATM over the WiFi network (e.g., the application may be disabled).
  • the STA may be a mobile phone
  • the short-range base station may be an NFC hub (e.g., a port or device that is configured to communicate via NFC)
  • the long-range base station may be a WiFi AP.
  • the mobile phone may be configured to communicate with the NFC hub via NFC and with the WiFi AP via WiFi.
  • the mobile phone may transmit payment information to the NFC hub.
  • the payment information may include data that allows the NFC hub to charge the user of the mobile phone a fee.
  • the mobile phone may periodically transmit this payment information every few seconds.
  • the NFC hub may provide a code to the mobile phone that allows the mobile phone to connect to the WiFi network.
  • the code may be transmitted once or a new code may be transmitted each time payment information is received.
  • the NFC hub may inform the WiFi AP that the mobile phone has supplied payment information.
  • the WiFi AP may then allow the mobile phone to connect to its WiFi network as long as payment information is transmitted to the NFC hub (e.g., as long as the mobile phone is not moved away from the NFC hub).
  • FIG. 5 illustrates a decision diagram 500 for maintaining a secure connection between a STA and an AP.
  • the decision diagram 500 may be executed by a processor, such as the processor 204, of a short-range base station (e.g., the APs 304A and/or 404A).
  • a processor such as the processor 204
  • a short-range base station e.g., the APs 304A and/or 404A.
  • the process for maintaining a secure connection starts at block 502.
  • a message is sent to a device, such as the STA 306 or 406, via a first wireless protocol.
  • the first wireless protocol is a short-range communication protocol.
  • the short-range base station determines whether a reply to the message was received. If a reply is received, the diagram 500 proceeds to block 508. If a reply is not received, the diagram 500 proceeds to block 510.
  • a communication link is established between the device and a long-range base station via a second wireless protocol.
  • the second wireless protocol is a long-range communication protocol.
  • a communication link is not established between the device and the long-range base station via the second wireless protocol.
  • a second message is sent to the device via the first wireless protocol.
  • the short-range base station determines whether a reply to the second message was received. If a reply is received, the diagram 500 proceeds to block 516. If a reply is not received, the diagram 500 proceeds to block 518. [0071] At block 516, the communication link via the second wireless protocol between the device and the long-range base station is maintained. After block 516, the diagram 500 proceeds back to block 512.
  • the communication link via the second wireless protocol between the device and the long-range base station is disconnected.
  • the short-range base station and/or the long-range base station may disconnect the communication link.
  • the diagram 500 proceeds to block 520 and ends.
  • FIG. 6 illustrates another decision diagram 600 for maintaining a secure connection between a STA and an AP.
  • the decision diagram 600 may be executed by a processor, such as the processor 204, of a short-range base station and/or a long-range base station (e.g., the APs 304A, 404A, and/or 404B).
  • the process for maintaining a secure connection starts at block 602.
  • a code is sent to a device, such as the STA 306 or 406, via a first wireless protocol.
  • the first wireless protocol is a short-range communication protocol.
  • the short-range and/or long-range base station determines whether the code is received via a second wireless protocol.
  • the second wireless protocol is a long-range communication protocol. If the code is received, the diagram 600 proceeds to block 608. If the code is not received, the diagram 600 proceeds to block 610.
  • a communication link is established between the device and the long-range base station via the second wireless protocol.
  • a communication link is not established between the device and the long-range base station via the second wireless protocol.
  • a new code is generated.
  • the new code is sent to the device via the first wireless protocol.
  • the short-range and/or long range base station determines whether the new code is received via the second wireless protocol. If the new code is received, the diagram 600 proceeds to block 618. If the new code is not received, the diagram 600 proceeds to block 622.
  • the communication link via the second wireless protocol between the device and the long-range base station is maintained and/or the security (or encryption) of the communication link via the second wireless protocol is modified based on the new code.
  • modifying the security (or encryption) of the communication link via the second wireless protocol each time a new code is received enhances the security of the connection between the device and the long-range base station.
  • the short-range base station waits a predetermined period of time. In an embodiment, the short-range base station periodically generates new codes. The period of time may correspond to the duration of time that elapses between the generation of codes by the short-range base station. After block 620, the diagram 600 proceeds back to block 612.
  • the communication link via the second wireless protocol between the device and the long-range base station is disconnected.
  • the short-range base station and/or the long-range base station may disconnect the communication link.
  • FIG. 7 is a flowchart of a process 700 for communicating with a STA in the wireless communication systems of FIGS. 1, 3, and/or 4.
  • a first wireless communication unit communicates with a second apparatus via a first wireless protocol.
  • the first wireless communication unit is a short-range base station.
  • the second apparatus is a STA.
  • the first wireless protocol is a short-range communication protocol.
  • a first message is transmitted via the first wireless protocol.
  • a second wireless communication unit communicates with the second apparatus over a communication link via a second wireless protocol.
  • the second wireless communication unit is a long-range base station.
  • the second wireless protocol is a long-range communication protocol.
  • the communication link is disconnected by the second wireless communication unit if the first wireless communication unit does not receive a second message from the second apparatus within a predetermined amount of time after transmission of the first message. After block 706, the process 700 ends.
  • FIG. 8 is a functional block diagram of an exemplary device 800 that may be employed within the wireless communication systems 100, 300, and/or 400.
  • the device 800 includes first means 802 for communicating with the second apparatus via a first wireless protocol.
  • first means 802 for communicating with the second apparatus via a first wireless protocol may be configured to perform one or more of the functions discussed above with respect to block 702.
  • the device 800 further includes second means 804 for communicating with the second apparatus over a communication link via a second wireless protocol.
  • second means 804 for communicating with the second apparatus over a communication link via a second wireless protocol may be configured to perform one or more of the functions discussed above with respect to block 704.
  • the device 800 further includes means 806 for disconnecting the communication link if the first means for communicating does not receive a second message from the second apparatus within a predetermined amount of time after transmission of the first message.
  • means 806 for disconnecting the communication link if the first means for communicating does not receive a second message from the second apparatus within a predetermined amount of time after transmission of the first message may be configured to perform one or more of the functions discussed above with respect to block 706.
  • determining encompasses a wide variety of actions.
  • determining may include calculating, computing, processing, deriving, investigating, looking up (e.g., looking up in a table, a database or another data structure), ascertaining and the like. Also, “determining” may include receiving (e.g., receiving information), accessing (e.g., accessing data in a memory) and the like. Also, “determining” may include resolving, selecting, choosing, establishing and the like. Further, a "channel width" as used herein may encompass or may also be referred to as a bandwidth in certain aspects.
  • a phrase referring to "at least one of a list of items refers to any combination of those items, including single members.
  • "at least one of: a, b, or c” is intended to cover: a, b, c, a-b, a-c, b-c, and a-b-c.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array signal
  • PLD programmable logic device
  • a general purpose processor may be a microprocessor, but in the alternative, the processor may be any commercially available processor, controller, microcontroller or state machine.
  • a processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
  • the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium.
  • Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
  • a storage media may be any available media that can be accessed by a computer.
  • such computer-readable media can comprise RAM, ROM, EEPROM, CD- ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
  • any connection is properly termed a computer-readable medium.
  • the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave
  • the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium.
  • Disk and disc includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray® disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers.
  • computer readable medium may comprise non-transitory computer readable medium (e.g., tangible media).
  • computer readable medium may comprise transitory computer readable medium (e.g., a signal). Combinations of the above should also be included within the scope of computer-readable media.
  • the methods disclosed herein comprise one or more steps or actions for achieving the described method.
  • the method steps and/or actions may be interchanged with one another without departing from the scope of the claims.
  • the order and/or use of specific steps and/or actions may be modified without departing from the scope of the claims.
  • certain aspects may comprise a computer program product for performing the operations presented herein.
  • a computer program product may comprise a computer readable medium having instructions stored (and/or encoded) thereon, the instructions being executable by one or more processors to perform the operations described herein.
  • the computer program product may include packaging material.
  • Software or instructions may also be transmitted over a transmission medium.
  • the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave
  • coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of transmission medium.
  • modules and/or other appropriate means for performing the methods and techniques described herein can be downloaded and/or otherwise obtained by a user terminal and/or base station as applicable.
  • a user terminal and/or base station can be coupled to a server to facilitate the transfer of means for performing the methods described herein.
  • various methods described herein can be provided via storage means (e.g., RAM, ROM, a physical storage medium such as a compact disc (CD) or floppy disk, etc.), such that a user terminal and/or base station can obtain the various methods upon coupling or providing the storage means to the device.
  • storage means e.g., RAM, ROM, a physical storage medium such as a compact disc (CD) or floppy disk, etc.
  • CD compact disc
  • floppy disk etc.
  • any other suitable technique for providing the methods and techniques described herein to a device can be utilized.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Communication Control (AREA)
PCT/US2014/021002 2013-03-06 2014-03-06 Systems and methods for secure high-speed link maintenance via nfc Ceased WO2014138333A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201480011732.9A CN105191250B (zh) 2013-03-06 2014-03-06 用于经由nfc来保持安全高速链路的系统和方法
JP2015561635A JP6165894B2 (ja) 2013-03-06 2014-03-06 Nfcを介した安全な高速リンク維持のためのシステムおよび方法
KR1020157027377A KR101770708B1 (ko) 2013-03-06 2014-03-06 Nfc를 통한 보안 고속 링크 유지를 위한 시스템들 및 방법들
EP14714854.8A EP2965489A1 (en) 2013-03-06 2014-03-06 Systems and methods for secure high-speed link maintenance via nfc

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/786,943 2013-03-06
US13/786,943 US9277402B2 (en) 2013-03-06 2013-03-06 Systems and methods for secure high-speed link maintenance via NFC

Publications (1)

Publication Number Publication Date
WO2014138333A1 true WO2014138333A1 (en) 2014-09-12

Family

ID=50424736

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/021002 Ceased WO2014138333A1 (en) 2013-03-06 2014-03-06 Systems and methods for secure high-speed link maintenance via nfc

Country Status (6)

Country Link
US (1) US9277402B2 (enExample)
EP (1) EP2965489A1 (enExample)
JP (1) JP6165894B2 (enExample)
KR (1) KR101770708B1 (enExample)
CN (1) CN105191250B (enExample)
WO (1) WO2014138333A1 (enExample)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450890A (zh) * 2014-09-24 2016-03-30 富士施乐株式会社 信息处理设备、系统和信息处理方法
JP2016197840A (ja) * 2015-04-06 2016-11-24 レノボ・シンガポール・プライベート・リミテッド 携帯式電子機器の情報セキュリティを確保する方法、携帯式電子機器および機能拡張装置
JPWO2017183244A1 (ja) * 2016-04-19 2019-02-21 ソニー株式会社 情報処理装置、情報処理システムおよび情報処理方法

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3015830B1 (fr) * 2013-12-19 2017-03-17 Sagem Defense Securite Dispositif d'interconnexion de reseaux de communication a securite controlee
US20150229751A1 (en) * 2014-02-07 2015-08-13 Microsoft Corporation Securely determining the location of a user
JP6364938B2 (ja) * 2014-05-07 2018-08-01 富士通株式会社 通信システム、携帯通信機及び無線通信方法
JP6727565B2 (ja) * 2014-08-22 2020-07-22 華為技術有限公司Huawei Technologies Co.,Ltd. Wpsを用いてネットワーク接続を確立する方法およびモバイルwi−fiデバイス
EP3029964B1 (en) * 2014-12-05 2016-09-28 Axis AB Method for improving audio experience for a user of an audio device
US9838390B2 (en) * 2015-03-31 2017-12-05 Afero, Inc. System and method for automatic wireless network authentication
GB2538802A (en) * 2015-05-29 2016-11-30 Nordic Semiconductor Asa Wireless communication
US10187455B2 (en) * 2015-07-28 2019-01-22 Microsoft Technology Licensing, Llc Automated network connection sharing
US11457809B1 (en) * 2015-12-08 2022-10-04 Verily Life Sciences Llc NFC beacons for bidirectional communication between an electrochemical sensor and a reader device
US10104111B2 (en) * 2016-02-17 2018-10-16 Sony Corporation Network security for internet of things
JP6634931B2 (ja) * 2016-03-31 2020-01-22 ブラザー工業株式会社 通信装置
US10134207B2 (en) * 2017-04-20 2018-11-20 Saudi Arabian Oil Company Securing SCADA network access from a remote terminal unit
WO2019149720A1 (de) * 2018-02-01 2019-08-08 Kaltenbach & Voigt Gmbh Verfahren und system zum aufbau einer drahtlosen datenkommunikationsverbindung zwischen einer dentaleinheit und einem zusätzlichen gerät
US10897398B2 (en) 2019-02-04 2021-01-19 Saudi Arabian Oil Company Embedded dynamic configuration assignment for unprotected remote terminal unit (RTU)
US11288378B2 (en) 2019-02-20 2022-03-29 Saudi Arabian Oil Company Embedded data protection and forensics for physically unsecure remote terminal unit (RTU)
US12347296B2 (en) 2020-08-06 2025-07-01 Saudi Arabian Oil Company Emulated facility safety with correlated sound frequency modeling
US12340670B2 (en) 2020-08-06 2025-06-24 Saudi Arabian Oil Company Emulated facility safety with embedded enhanced interface management
US11341830B2 (en) 2020-08-06 2022-05-24 Saudi Arabian Oil Company Infrastructure construction digital integrated twin (ICDIT)
US11843944B2 (en) * 2020-12-31 2023-12-12 Hughes Network Systems, Llc Satellite terminal IP radio MOCA link security
US11687053B2 (en) 2021-03-08 2023-06-27 Saudi Arabian Oil Company Intelligent safety motor control center (ISMCC)
US12024985B2 (en) 2022-03-24 2024-07-02 Saudi Arabian Oil Company Selective inflow control device, system, and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1335563A2 (en) * 2002-02-06 2003-08-13 Xerox Corporation Method for securing communication over a network medium
WO2006054232A1 (en) * 2004-11-16 2006-05-26 Koninklijke Philips Electronics N.V. Method and apparatus for disassociating a wireless station in a wireless network
WO2006106393A2 (en) * 2005-04-04 2006-10-12 Nokia Corporation Access management in a wireless local area network

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3871113B2 (ja) * 2001-09-28 2007-01-24 株式会社日立製作所 通信端末装置、通信確立方法、および該方法に係るプログラム
US6965674B2 (en) * 2002-05-21 2005-11-15 Wavelink Corporation System and method for providing WLAN security through synchronized update and rotation of WEP keys
JP4136694B2 (ja) * 2003-02-07 2008-08-20 キヤノン株式会社 無線端末、基地局および通信リンク維持方法
WO2005004385A1 (ja) * 2003-06-30 2005-01-13 Fujitsu Limited 無線通信認証プログラムおよび無線通信プログラム
US7366901B2 (en) 2003-08-01 2008-04-29 Ixi Mobile (R&D), Ltd. Device, system, method and computer readable medium for identifying and authenticating a cellular device using a short-range radio address
US7990998B2 (en) 2004-12-22 2011-08-02 Qualcomm Incorporated Connection setup using flexible protocol configuration
JP2006186418A (ja) * 2004-12-24 2006-07-13 Fuji Xerox Co Ltd 通信デバイス及び通信制御方法
JP4702944B2 (ja) * 2005-12-16 2011-06-15 キヤノン株式会社 通信装置およびその制御方法及び通信システム
US8522019B2 (en) 2007-02-23 2013-08-27 Qualcomm Incorporated Method and apparatus to create trust domains based on proximity
JP5458796B2 (ja) * 2009-10-19 2014-04-02 株式会社リコー 通信装置及び通信制御方法
WO2012099541A1 (en) 2011-01-17 2012-07-26 Agency For Science, Technology And Research Method and device for mobile data offload
EP2493233A1 (en) 2011-02-28 2012-08-29 Research In Motion Limited Wireless communication system with nfc-controlled access and related methods
US8494165B1 (en) * 2012-01-18 2013-07-23 Square, Inc. Secure communications between devices using a trusted server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1335563A2 (en) * 2002-02-06 2003-08-13 Xerox Corporation Method for securing communication over a network medium
WO2006054232A1 (en) * 2004-11-16 2006-05-26 Koninklijke Philips Electronics N.V. Method and apparatus for disassociating a wireless station in a wireless network
WO2006106393A2 (en) * 2005-04-04 2006-10-12 Nokia Corporation Access management in a wireless local area network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2965489A1 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450890A (zh) * 2014-09-24 2016-03-30 富士施乐株式会社 信息处理设备、系统和信息处理方法
CN105450890B (zh) * 2014-09-24 2018-09-28 富士施乐株式会社 信息处理设备、系统和信息处理方法
JP2016197840A (ja) * 2015-04-06 2016-11-24 レノボ・シンガポール・プライベート・リミテッド 携帯式電子機器の情報セキュリティを確保する方法、携帯式電子機器および機能拡張装置
JPWO2017183244A1 (ja) * 2016-04-19 2019-02-21 ソニー株式会社 情報処理装置、情報処理システムおよび情報処理方法

Also Published As

Publication number Publication date
CN105191250B (zh) 2018-08-03
CN105191250A (zh) 2015-12-23
KR20150122244A (ko) 2015-10-30
KR101770708B1 (ko) 2017-08-23
JP6165894B2 (ja) 2017-07-19
JP2016516330A (ja) 2016-06-02
EP2965489A1 (en) 2016-01-13
US9277402B2 (en) 2016-03-01
US20140254799A1 (en) 2014-09-11

Similar Documents

Publication Publication Date Title
US9277402B2 (en) Systems and methods for secure high-speed link maintenance via NFC
EP2893733B1 (en) Systems, apparatus, and methods for association in multi-hop networks
KR102147446B1 (ko) 고속 초기 링크 셋업 동안의 인증을 위한 시스템들, 방법들, 및 장치
US10057766B2 (en) Methods and systems for authentication interoperability
US9794796B2 (en) Systems and methods for simplified store and forward relays
EP3228124B1 (en) Methods, apparatuses and computer program for efficient access point discovery,
US9491621B2 (en) Systems and methods for fast initial link setup security optimizations for PSK and SAE security modes
WO2014179337A1 (en) Apparatus and method for power save during initial link setup

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201480011732.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14714854

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2015561635

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2014714854

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20157027377

Country of ref document: KR

Kind code of ref document: A