WO2017089247A1 - System for verifying distance measurements - Google Patents
System for verifying distance measurements Download PDFInfo
- Publication number
- WO2017089247A1 WO2017089247A1 PCT/EP2016/078219 EP2016078219W WO2017089247A1 WO 2017089247 A1 WO2017089247 A1 WO 2017089247A1 EP 2016078219 W EP2016078219 W EP 2016078219W WO 2017089247 A1 WO2017089247 A1 WO 2017089247A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- time
- measurement
- distance
- data
- time data
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/74—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
- G01S13/76—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted
- G01S13/765—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems wherein pulse-type signals are transmitted with exchange of information between interrogator and responder
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/74—Systems using reradiation of radio waves, e.g. secondary radar systems; Analogous systems
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S7/00—Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
- G01S7/02—Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
- G01S7/36—Means for anti-jamming, e.g. ECCM, i.e. electronic counter-counter measures
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S7/00—Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
- G01S7/02—Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
- G01S7/40—Means for monitoring or calibrating
Definitions
- the invention relates to a device for distance measurement via wireless communication according to a predetermined protocol between the device acting as a first device and a further device for wireless communication acting as a second device.
- the invention further relates to a method for distance measurement, a provider server method, and computer program products for use in a device or server.
- the present invention relates generally to the field of indoor location systems, and more in particular provides various devices and methods for verifying distance
- a need for location aware services exists in indoor areas. For example in large indoor complexes, such as hospitals, universities, parking lots, shopping malls, and/or offices, wireless services may be provides to mobile devices at close distance.
- An indoor location system may provide a service to consumers (hereafter end-users); a service that end-users will eventually rely on.
- Such location based services may be provided only to devices that are close by, i.e. at a limited distance to the service providing device. It is therefore important that the distance measurement is reliable.
- One aspect of reliability for an end-user is the accuracy of the distance that is being reported.
- Location based services are increasingly being deployed in various advertisement, payment, shopping and other environments, using a multitude of recently introduced technologies, such as NFC, iBeacon, coded light, etc. See e.g. the article "Beacons close in on proximity-based applications” by George Malim” available via
- NFC is even used for payments because due to its close proximity based on the very limited signal range it is trusted to be safe.
- a known system for distance measurement is recently developed in a new version of the protocol for wireless communication defined in IEEE 802.11.
- the new version comprises a ranging protocol for determining a distance between two devices, and allows for accurate distance measurement and determining location of devices up to 1 meter or even lower resolution.
- the ranging protocol called Fine Timing Measurement procedure (FTM), is defined in [reference 1] IEEE 802.1 IREV-mc Chapter 10.24.6, and accurately measures the Round-Trip Time (RTT) of the signal using measurement messages, and derives the distance based on the measured travelling time of the messages.
- FTM Fine Timing Measurement procedure
- this application is in the field of ranging protocols. These correspond to what is known as time-of- flight measurements which measure the time it take for the electromagnetic radiation to travel between the transmitter and the receiver. They are fundamentally different than the distance measurement as performed in IP/HTTP protocol, a.k.a. ping times, which measure the time it takes for an IP data packet to transit in a network from a source device to a sink device, wherein such transit may include a number of intermediate devices. Assuming a wireless signal propagated in free air with substantially the speed of light, it takes 3.3 ns for the radiation to cover a distance of a meter while Wi-Fi station are able to reach a time granularity of around 0.1ns.
- ping distances are in the order of ms (hence 6 orders or magnitude higher).
- HDCP High Definition Content Protection 2.0 standard
- distance measurement is performed based on pinging and a received is deemed in close proximity if the round trip is less than 20 ms.
- An initiating wireless device that initiates a request to start a round trip time measurement needs the responding device to determine an interval between sending a message and receiving the response, and send the time interval to the initiating device.
- An initiating wireless device that initiates a request to start a round trip time measurement needs the responding device to determine an interval between sending a message and receiving the response, and send the time interval to the initiating device.
- By sending false data a device can actually claim it is closer or further away than it is in reality. This could lead to possible abuse of a location based service if a device trusts received distance/location information to be accurate. For example a location based service may automatically start some transaction.
- the measurement data or the received distance may be tampered with and therefore cannot be fully trusted.
- the predetermined protocol comprising a ranging protocol for determining a distance between the first and the second device based on a round trip time measurement, in which ranging protocol
- the first device sends a measurement message at a first time (tl);
- the second device receives the measurement message at a second time (t2);
- the second device transmits a measurement acknowledge at a third time (t3);
- the first device receives the measurement acknowledge at a fourth time (t4);
- the method comprising, for assessing the determined distance
- a device for distance measurement via wireless communication via wireless communication according to a predetermined protocol between a first device and a second device is further provided.
- the predetermined protocol comprising a ranging protocol for determining a distance between the first and the second device based on a round trip time measurement, in which ranging protocol - the first device sends a measurement message at a first time (tl);
- the second device receives the measurement message at a second time (t2);
- the second device transmits a measurement acknowledge at a third time (t3);
- the first device receives the measurement acknowledge at a fourth time (t4); the device comprising
- transceiver (111) for transmitting and receiving messages
- a message processor (112) arranged for generating messages to be transmitted and for processing received messages;
- the message processor (112) further arranged, for assessing the determined distance
- a reference interval value for the second device indicative of an interval between receiving a measurement message and transmitting a measurement acknowledge
- a provider server method for use in a provider server for cooperating with a first device as described above, the method comprising
- the first time data represents the time interval between the first time and the fourth time, e.g. by the values of tl and t4 or by a difference value of t4 - tl .
- the second time data represents the time interval between the second time and the third time, e.g. by the values of t2 and t3 or by a difference value of t3 - 12.
- the determining of the distance by determining a travelling time of the messages between the first device and the second device based on the first time data and the second time data requires a calculation of the round trip travelling time by subtracting the time interval t3 - 12 represented by the second time data from the time interval t4 - tl represented by the first time data and using the speed of light to derive the actual distance.
- the ranging protocol may prescribe that the second device performs said calculation and transfers the determined distance to the first device.
- the second device transfers the second time data to the first device or a further distance calculation device, which perform the calculation.
- the second time data as provided by the second device is used enabling said calculation. So a malignant second device may intentionally manipulate the determined distance or erroneous values for the second time data may be provided.
- the above features have the effect that when a device participates in a ranging protocol acting as a second device which provides the second time data or the determined distance to a first device, the determined distance is verified by the first device.
- the distance is calculated by the second device based on a round trip time measurement according to the ranging protocol.
- first device sends a measurement message at a first time (tl); the second device receives the measurement message at a second time (t2); the second device transmits a measurement acknowledge at a third time (t3); and the first device receives the measurement acknowledge at a fourth time (t4).
- the first device determines first time data representing a time interval between the first time and the fourth time and sends the first time data to the second device.
- the second device determines second time data representing a time interval between the second time and the third time, and the distance by determining a travelling time of the messages between the first device and the second device based on the first time data and the second time data.
- the second device transfers the determined distance to the first device.
- the second device may intentionally send a different value as the determined distance, e.g. a short distance pretending to be close by the first device.
- the first device is arranged to verify whether the determined distance is reliable as follows by assessing the determined distance.
- First third time data is determined by subtracting from the first time data a calculated travelling time of the messages between the first device and the second device based on the determined distance. Also, the first device obtains a reference interval value for the second device indicative of an interval between receiving a
- the first device verifies whether the determined distance is reliable by comparing the third time data to the reference interval value.
- the reliability of the determined distance is confirmed, and when a substantial difference is found, the determined distance is deemed not reliable. Subsequent processes or access rights are now controlled by the first device in dependence of the verified distance.
- either the 1 st device or both devices provide all required information to a 3 rd device which performs the distance measurement and distance reliability verification.
- the message processor is arranged to determine identifier data indicative of hardware and/or software present in the second device, and to obtain the reference interval from a database based on the identifier data.
- the identifier data may be derived from a message of the predetermined protocol from the second device.
- the database provides reference values for many devices and/or chipsets used in practice.
- the message processor is arranged for obtaining respective measurement data from multiple respective distance measurements via the ranging protocol and for said assessing by detecting differences between the respective measurement data.
- Various embodiments are provided for acquiring and using the respective measurement data so as to increase the level of reliability.
- a method according to the invention may be implemented on a computer as a computer implemented method, or in dedicated hardware, or in a combination of both.
- Executable code for a method according to the invention may be stored on a computer program product.
- Examples of computer program products include memory devices such as a memory stick, optical storage devices such as an optical disc, integrated circuits, servers, online software, etc.
- the computer program product may comprise non-transitory program code means stored on a computer readable medium for performing a method according to the invention when said program product is executed on a computer.
- the computer program comprises computer program code means adapted to perform all the steps or stages of a method according to the invention when the computer program is run on a computer.
- the computer program is embodied on a computer readable medium.
- a computer program product downloadable from a network and/or stored on a computer-readable medium and/or microprocessor-executable medium, the product comprising program code instructions for implementing a method as described above when executed on a computer.
- Another aspect of the invention provides a method of making the computer program available for downloading, for example included in a location based application. This aspect is used when the computer program is uploaded into, e.g., Apple's App Store, Google's Play Store, or Microsoft's Windows Store, and when the computer program is available for downloading from such a store.
- Figure 1 shows devices for wireless communication and distance measurement
- Figure 2 shows a ranging protocol
- Figure 3 shows a system of multiple devices for wireless communication and distance measurement
- Figure 4 shows a method for distance measurement via wireless communication
- Figure 5 shows a provider server method for providing reference information
- Figure 6a shows a computer readable medium
- Figure 6b shows in a schematic representation of a processor system.
- the distance measurement methods and devices using wireless communication as described below provide at least a basic function, i.e. providing information on the current distance between a mobile device to another device, e.g. on a fixed position, usually in an indoor environment.
- the above basic function can be used in a distance, location or position based service.
- This service in turn can be used to provide further services.
- the distance could be used to subsequently direct or guide a device user from one location to another; e.g. along a series of locations; i.e. on a route.
- a route could be created on the fly; e.g. using a web-based shopping service based on an end-user's shopping list.
- the end-user could be made aware of points of interest, which in a shopping context could represent special offers, etc.
- Some example use cases include:
- Figure 1 shows devices for wireless communication and distance measurement.
- a system 100 for wireless communication comprises a first device 110 and a second device 120, the devices being physically apart at a distance 140.
- the first device has a first transceiver 111 and a first message processor 112.
- the second device has a second transceiver 121 and a second message processor 122.
- the devices are equipped for wireless communication, as schematically indicated by shape 130 and arrows which connect the transceivers 111,121.
- the devices are arranged for distance measurement via the wireless communication according to a predetermined protocol between the first device and the second device.
- the predetermined protocol includes a ranging protocol for determining a distance between the first and the second device, as further detailed below with reference to Figure 2.
- the predetermined protocol is WiFi according to IEEE 802.11 [ref 1 , but other wireless protocols may also be used, such as Bluetooth, when provided with an appropriate ranging protocol based on round trip time measurement.
- Figure 2 shows a schematic diagram of a ranging protocol.
- a first device DEVI exchanges messages to a second device DEV2 as indicated by arrows between two vertical timelines representing the progress of time in downward direction.
- the second device sends a request message R Q to initiate a round trip time measurement, which is a sequence of messages, time measurements and calculations as described now.
- the request message is acknowledged by a message ACK1 from the first device to the second device.
- the ranging protocol may alternatively be initiated by the first device.
- the first device sends measurement message Ml at a first time tl, also called time of departure of Ml .
- the second device receives the measurement message Ml at a second time t2, also called time of arrival of Ml .
- the second device transmits a measurement acknowledge ACK1 at a third time t3, also called time of departure of ACK1, and the first device receives the measurement acknowledge ACK1 at a fourth time t4, also called time of arrival of ACK1.
- the time interval between tl and t4 may be called round trip time, while the interval between t2 and t3 may be called response time.
- the times tl,t4 and t2,t3 are detected by the respective message processor using a local clock signal or any other available clock signal having a frequency that is high enough to represent time differences of a few nanoseconds to enable calculating distances up to a few meters travelled by the messages Ml and ACK 1 during the round trip time measurement representative of the distance 140 between the devices.
- the first transceiver is arranged for transmitting and receiving the above messages.
- the first message processor is arranged for processing the messages according to the predetermined protocol and the ranging protocol. Specifically the first message processor determines first time data representing a time interval between the first time tl and the fourth time t4. Subsequently, in a message M2, the first time data is send to the second device, which may send an acknowledge message ACK2.
- the first time data in message M2 contains the values of tl and t4, or the interval between tl and t4.
- the first message processor receives a determined distance from the second device in a report, for example in a range report message R P.
- the second transceiver is arranged for transmitting and receiving messages.
- the second message processor is arranged for processing the messages according to the predetermined protocol and the ranging protocol. Specifically the second message processor determines second time data representing a time interval between the second time t2 and the third time t3. Subsequently, in the message M2, the second message processor receives the first time data. Then the second message processor determines the distance by determining a travelling time of the messages between the first device and the second device based on the first time data and the second time data. Finally the second message processor transfers the determined distance to the first device in a report, for example in the range report message RRP. Alternatively, the second device may transfer the second time data to the first device or a further distance calculation device, which respective device performs the calculation of the determined distance based on the second time data as received from the second device.
- tl and t4 In order to accurately measure the round trip time between the two wireless devices, it requires both wireless devices to participate in the time measurements, for example by measuring tl and t4, or t2 and t3 in the exemplary FTM mechanism defined in IEEE 802.1 IREV-mc, and send the measurement data of the time instants (tl , t2, t3, t4), the intervals (t3 - 12, t4 - tl) or the resulting calculated distance to the other device.
- FTM devices are called stations STA, and a Receiving STA can request a Sending STA to send FTM frames that contain a specific set of timing information, in particular tl and t4 as described above.
- the Receiving STA Based on the received timing information from the Sending STA and the local timing information t2 and t3 at the Receiving STA, the Receiving STA is able to measure the RTT at a granularity of 0.1ns. Based on the RTT measurement, the Receiving STA is able to calculate its distance to the Sending STA very precisely. It is noted that the FTM procedure between two STAs can take place pre-association.
- the device acting as the second device DEV2 can use values for t2 and t3 with a larger difference than in reality and/or intentionally miscalculate and/or misreport the distance to be lower than the actual physical distance.
- Wi-Fi Protected Setup a mechanism that enable a wireless device that offers a localized service to validate the received timing/distance measurements before initiating or allowing an automatic action to be triggered.
- the benefits of doing so prevents possible abuse, which means the validated distance/location can be used as a possible "authentication" step that may be used instead of or in addition to other authentication mechanisms such as Wi-Fi Protected Setup, and hence is very helpful in increasing the ease of use of Wi-Fi based services.
- Wi-Fi location based services to be a viable alternative for other location based service mechanisms that are considered to be more safe, e.g. based on other technologies such as NFC and coded light.
- the distance between a first and a second wireless device is determined by performing time measurements on wireless messages.
- the first wireless station subsequently validates the values received from the second wireless station to determine if the values adhere to reference criteria. If so, the received values are considered valid, and the first device takes the determined distance as reliable. For example the first device may now automatically accept an incoming connection request from the second device.
- the mechanism is as follows.
- the first message processor is arranged, for assessing the determined distance, to determine third time data by subtracting from the first time data a calculated travelling time of the messages between the first device and the second device based on the determined distance. Subsequently the first message processor is arranged to obtain a reference interval value for the second device indicative of an interval between receiving a measurement message and transmitting a measurement acknowledge. Finally the first message processor is arranged to verify whether the determined distance is reliable by comparing the third time data to the reference interval value. In an embodiment, the first message processor is arranged for said verifying to compare the third time data to the reference interval value, and, if deviating by more than a predetermined error margin, qualify the determined distance as not reliable.
- the error margin may be expressed in time representing a corresponding error margin in meters according to the speed of light.
- the first message processor is arranged to determine identifier data indicative of hardware and/or software present in the second device, and to obtain the reference interval from a database based on the identifier data.
- a database may contain reference intervals for respective known hardware devices, for example chip sets or mobile devices of known types.
- the type of second device may be known to be an Apple iPhone 6, and the database may have the reference data for that type of mobile phone.
- the first message processor is arranged to derive the identifier data from a message of the predetermined protocol from the second device. If the manufacturer or model of the second device cannot be determined or for some reason the device or device type is deemed unreliable or reference data is not available the first message processor may signal this for further processing, e.g. for triggering a different authentication process.
- the identifier data may be derived from other messages in the predetermined protocol, or from a different layer in the communication stack.
- the MAC address of the second device that is available from the MAC header in the Wi-Fi protocol can be used to determine the manufacturer of the device or the Wi-Fi chipset used within the device. This can be done by the first message processor using a webservice such as available from http://www.macvendorlookup.com or by using an internal stored database based on the official list on http://standards-oui.ieee.org/oui.txt. In addition to the manufacturer or device type the service or a further database should contain reference data based on specifications or reference measurements for the device.
- the first message processor is arranged to adapt the database by storing and/or updating at least one reference value based on measurement data of the second device.
- a 'self- learning system' may be made in which the database is dynamically built up by storing and updating reference values for a range of MAC addresses based on
- the initial database may contain a limited set of reference values for popular devices (considering that the top 10 smartphone devices cover a significant majority of the market).
- a more reliable authentication method may be demanded after which the device type may be added to the database.
- Unreliable or improbable measurements values shall not be used to update the database.
- the ranging protocol comprises a reference message.
- the reference message may for example be added to the ranging protocol as defined in IEEE 802.11 [ref.1]. Such reference message may be triggered by a preceding reference request message, or may be a standard part of the ranging protocol, for example included in the initial ranging request R Q.
- the first message processor is arranged for said obtaining the reference interval based on the reference message as received from the second device. Subsequently the reference interval is compared to the calculated value of the third time data. Additional security may be achieved by having the second device send the reference message before the second device acquires the first time data of the actual round trip time measurement. Thereto the first message processor is arranged for receiving the reference message before sending the first time data.
- the first message processor is arranged for obtaining respective measurement data from multiple respective distance measurements via the ranging protocol and for said assessing by detecting differences between the respective measurement data.
- the first device may detect anomalies that result from the second device manipulating the ranging protocol.
- the first message processor is arranged to execute said multiple respective distance measurements between the first device and the second device. Subsequently differences are determined between the respective second time data of a first respective measurement data and the respective second time data of subsequent respective measurement data. Normally such differences should be about zero, but small differences may be measured due to inaccuracies in the time measurements. To accommodate such inaccuracies a tolerance or margin may be defined, e.g. a predetermined error margin in time or distance (one nanosecond corresponding to about 0,3 meter). If the measured differences are below said margin, the message processor determines that the determined distance is reliable. However, if calculations show a substantial differences in the second time data of the respective measurements, it is assumed that the second devices manipulates the reported distance and the determined distance is not reliable.
- a tolerance or margin may be defined, e.g. a predetermined error margin in time or distance (one nanosecond corresponding to about 0,3 meter).
- the first message processor is arranged to execute said multiple respective distance measurements as a sequence of distance measurements between the first device and the second device and to determine a sequence interval between measurements in the sequence.
- a sequence of measurements may be part of the ranging protocol, for example, as in IEEE 802.11 [reference 1].
- a database is accessed to retrieve a reference value for sequence interval.
- the first message processor compares the sequence interval to the reference sequence interval from the database. If the measured interval, e.g. the average value and or a standard deviation, are equal to the reference value within a predetermined margin, the message processor determines that the determined distance is reliable. However, if substantial differences exist between the sequence interval values of the respective measurements, it is assumed that the second devices manipulate the reported distance or second time data and the determined distance is not reliable.
- the first message processor is arranged to obtain a reverse measurement data from a reverse execution of the ranging protocol between the second device and the first device.
- the reverse measurement data comprises reverse first time data, i.e. as provided by the second device and transferred to the first device.
- the first message processor is arranged to determine the distance as prescribed by the ranging protocol as reversely executed and compare the reverse determined distance to the determined distance as earlier received in the initial instance of the ranging protocol. Both distances should be equal, at least within a tolerance for measurement inaccuracies, if the second device transmitted reliable values for the determined distance and the reverse first time data.
- the first message processor is arranged to determine fourth time data by subtracting, from the reverse first time data, the third time data (as used by the first device itself) and a calculated travelling time of the messages between the first device and the second device based on the determined distance.
- the fourth time data should be about zero, but a small value may be found due to inaccuracies in the time measurements.
- a tolerance or margin may be defined. If the fourth time data is below said margin, the message processor determines that the determined distance is reliable. The first message processor determines that the determined distance is unreliable if the fourth time data exceeds a predetermined error margin.
- the reverse execution of the ranging protocol and subsequent use of the reverse measurement data as described above may be applied in addition to, or as an alternative to, the earlier described verification of the determined distance by comparing the third time data to said reference interval value.
- the reverse ranging protocol may be executed first, which forces a manipulating second device to decide the amount of bogus time that is subtracted from the first time data without knowing the actual distance between the first device and the second device. Then the normal instance of the ranging protocol follows, and the manipulating second device needs to consistently manipulate the second time data, which is complicated and errors therein may be detect easily.
- the ranging protocol comprises an additional attribute or additional message that may for example be added to the ranging protocol as defined in IEEE 802.11 [ref. l], containing a credential (e.g. public key) or a hash of a credential or an encrypted credential.
- the second device has to include such credential or hash of a credential or an encrypted credential as part of the message exchange for the ranging protocol.
- the first device would have to include such credential, hash of a credential or encrypted credential.
- the preferred field containing the credential or hash of a credential or an encrypted credential in a message of the ranging protocol is a field of which the signal or at least part of the signal transferring that field is used to measure the transmit or arrival time of the message, so that it is very difficult if not impossible for another device to insert its credential or hash of its credential or its encrypted credential in a message that is used to measure distance between the first and second device.
- the first device can be certain that the credential or hash of a credential or an encrypted credential in a message of the ranging protocol is indeed the one of the second devive with which it is executing the range measurement protocol.
- the first message processor is arranged to process this credential or hash of a credential or encrypted credential, and verifies if it matches a credential that has previously been used by a device with which it has successivefully performed device authentication and established mutual trust, such as by using the Wi-Fi Protected Setup Protocol, Device Provisioning Protocol, Diffie-Hellman key exchange and/or the 4- way WPA2 handshake. If a match is found, the first device may assume that the distance measurements between the first and second device can be trusted and deemed reliable.
- the first device will distrust the distance measurements between the first and second device and perform additional steps to verify the reliability of the distance measurements, such as using the mechanisms as described in other embodiments.
- the measured values e.g. the first time data and/or second time data
- the measured values are encrypted using a key that was agreed or is derived from agreed credentials between the first and second device as established during an earlier device authentication procedure performed between the first and second device.
- the second device has to include a credential or hash of credential or an encrypted credential that will be used during later connection setup.
- the first message processor is arranged to process and store the received credential or hash of credential or an encrypted credential in conjunction with the measured distance between the first device and the second device, in order to securely correlate the measured distances with the particular device that connects with that credential.
- the first device verifies if the same credential or a derivative thereof is used whilst performing the device authentication, such as during performing the Wi-Fi Protected Setup Protocol, Device Provisioning Protocol, Diffie- Hellman key exchange and/or whilst performing the 4-way WPA2 handshake.
- the first device can determine that the device with which it is connecting, is the same device as for which a particular distance measurement was done.
- the credential was a public key
- the first device can be certain that the second device is the one that it measured the range to and not an imposter.
- Figure 3 shows a system of multiple devices for wireless communication and distance measurement.
- the system 300 is equal to the system 100 as described above with reference to Figures 1 and 2, but further has at least a third device 150.
- the first device and the second device are physically apart at a distance 140.
- the first device and the third device are physically apart at a second distance 141, and the second device and the third device are physically apart at a third distance 142.
- the third device has a third transceiver and a third message processor (not shown), which are similar to the corresponding elements of the second device.
- the devices are equipped for wireless communication, as schematically indicated by shape 130 and arrows which connect the devices via their respective transceivers.
- the devices are arranged for distance measurement via the wireless communication according to a predetermined protocol between the first device and the second device, including the ranging protocol as further elucidated above.
- a predetermined protocol between the first device and the second device, including the ranging protocol as further elucidated above.
- Various further embodiments are now described using at least the third device for determining said reliability of the distances reported by the second device.
- the first message processor is arranged to obtain at least one further measurement data from a distance measurement between a further device and the second device, and to obtain the reference interval value from the further
- the further device may also derive the respective second time data during executing the ranging protocol with the second device, using a message processor arranged as in the first device. Subsequently, the further device may transfer said respective second time data to the first device.
- the first device is now enabled to verify whether the determined distance is reliable by comparing the third time data to the received respective second time data as the reference interval value.
- the second device now must consistently manipulate both instances of the ranging protocol responding to different devices. Using the same manipulated value for the second time data may be impossible or may result in inconsistent distances, which will be detected by the first device based on the respective second time data as receive from the further device. It is noted that the first and further device need not know their actual distance to still find manipulated values for the second time data.
- the first message processor is arranged to obtain at least one further measurement data from a distance measurement between at least one further device and the second device and deriving at least one further determined distance from the further measurement data.
- the first determined distance and the further determined distance can be mapped to the actual physical intermediate distance between the first device and the further device, which may be known, predetermined or also be measured using the ranging protocol.
- the first message processor obtains actual position or distance data of the least one further device relative to the first device.
- the first message processor verifies whether the determined distance is reliable by determining whether an estimated position of the second device relative to the first device is derivable based on the determined distance and the at least one further determined distance.
- the estimated position is based on basic geometry of the existence of a triangle of the intermediate distance and both determined distances. For example, if the sum of both determined distances is smaller than said intermediate distance, no triangle can be found, making said determined distances unreliable.
- the first message processor may verify whether the determined distance is reliable by determining whether an estimated position of the second device relative to the first device is in accordance with a predetermined floor plan around the first device.
- the floor plan indicates where a person carrying the second device may be present, which can be crosschecked using one or more determined distances. For example, if three measurements to three different trusted devices acting as first device are executed, and the positions of said three trusted devices are known relative to the floor plan, it can be determined whether the second device is at a location that can be used by a human walking according to the floor plan.
- the first device performs distance measurement with the third device in order to decide to set up a connection between the first and third device.
- the first device or third device are approached also by the second device to perform distance measurement, it is beneficial if the first device would be able to verify whether the second and third device are operating independently or whether they are cooperating to perform distance measurement (i.e. by the second and third device
- a device may be configured to reject distance measurement request frames and/or reject authentication requests from the other two devices and/or reject setting up a connection to the other two devices if the device receives distance measurement frames from two or more different devices within a specified short time period, or if the distance measurement request frames from the two or more different devices arrive at an earlier time than a preconfigured time after the first of those two devices has started sending its measurement requests (e.g. in case it was agreed in the protocol that two devices that cooperate to perform distance measurements have to issue their measurement frames at least a certain specified time period after each other and coordinate their measurements accordingly).
- a common credential e.g. common symmetric key, public/private key pair
- hash of credential or encrypted credentail as part of the distance measurement protocol that they are executing with the third device, that can be verified by the third device for their validity when receiving the distance measurement request frames from both devices, by performing a challenge-response exchange between the third and the first device based on that received credential and a challenge-response exchange between the third and the second device based on that received credential.
- the received distance measurement frames are receiving within a
- the device that receives the distance measurement request frames and the common credential, hash of credential or encrypted credential from the other two devices rejects setting up a connection with any of those two devices if the common credential or a derivative thereof is not used or cannot be correctly verified to be used whilst performing the device authentication between the device and each of the other two devices, such as during performing the Wi-Fi Protected Setup Protocol, Device Provisioning Protocol, Diffie-Hellman key exchange and/or whilst performing the 4-way WPA2 handshake.
- this embodiment relates in addition to a method and a first device for deciding whether to accept the setup of a wireless connection between the first device and either a second device or a third device, , the method comprising:
- the first message processor is arranged to determine at least one signal strength of at least one message received during the predetermined protocol, and to verify whether the determined distance is reliable by comparing the signal strength to an expected signal strength at the determined distance.
- the predetermined protocol may provide information on the received signal strength at the second station. Knowing the transmitted power and the determined distance the expected signal strength can be calculated.
- the first station may change the transmitter power until no response is received from the second device, which transmitted signal strength can be predicted knowing the determined distance, and deviations can be detected. For example, if the communication is lost much earlier, i.e. at a higher transmitter power than calculated for the received determined distance, the distance is deemed unreliable.
- the first message processor is arranged, upon assessing that the determined distance is not reliable, to proceed to a different process instead of the expected distance based process.
- the normal distance based process would be to grant access to a location based service or local peripheral. If the determined distance is deemed unreliable, all further communication and/or access may be refused, and/or warning message may be sent to a management system or guard keeper.
- the first message processor may be arranged, before progressing to any normal distance based process, to engage a different security protocol with the second device may be executed, such as requesting additional credentials and/or a personal identification of the user.
- the different security protocol may be an additional process or a further enhanced execution of the main protocol, and may e.g.
- the first message processor is arranged to request a further distance measurement using a different ranging protocol and/or a different type of wireless communication, for example NFC at a very close distance or by the human operator of the second device to provide some identification and/or biometrical data like a fingerprint.
- the first message processor may be arranged, before progressing to any normal distance based process, to deny or restrict access to at least some data and/or to at least one application in the first device. For example a basic service may be provided even if the distance is deemed unreliable, while an extended service is provided if the distance is deemed reliable.
- a first wireless station offers a Wi-Fi Aware service which indicates it requires measuring the distance by setting e.g. a "ranging" flag to mandatory.
- a second wireless station that wants to connect to that service needs to perform distance measurement such as using the FTM method as defined in IEEE 802.1 IREV-mc [ref 1]. In order to do so, the second wireless station assumes the FTM initiator role and issues an FTM request to the first wireless station.
- the first wireless station If the first wireless station receives an FTM request from the second wireless station, the first wireless station will in its turn initiate an FTM burst and provide the measured timestamps tl and t4 to the second wireless station, which can use these values to accurately determine the round trip time (RTT) and hence the distance between the first and second wireless station.
- the second wireless station needs to send the resulting distance in a FTM Measurement Range Report to the first wireless station if the first wireless station set the Ranging Report bit in the Ranging Setup Attribute to 1.
- the first wireless station would need to trust the measurements it receives in order to determine the subsequent steps for the second wireless station, such as automatically accepting an incoming connection request.
- the first wireless station In order for the first wireless station to validate the measured distance, one or more of the following mechanisms may be used. Since the first wireless station knows tl and t4 (let's say in nanoseconds), it can calculate the value (t3-t2) as follows using the received range result value (let's say in meters) from the second wireless station "dl":
- t3-t2 7 ns. That means it took about 2 times 3 ns travelling time and processing the request on second wireless station (i.e. t3-t2) took 7 nanoseconds.
- the second wireless station wants to claim it is close by even when it is not, the t3-t2 would in reality be shorter. Since the actual measurements need to be so precise in nanoseconds resolution, they are likely to take place inside the hardware of the Wi-Fi chip (not in any software driver layer that may be used e.g. to send FTM range measurement report), so the determined value of t3-t2 can be verified with the specification of the Wi-Fi chipset being used.
- the first wireless device checks a database of information about actual processing time, and optionally also possible error margin, for FTM requests for the Wi-Fi chipset being used by the second wireless device.
- the Wi-Fi chipset being used can be derived from various sources of information (such as P2P Information Elements) received during pre-association discovery (e.g. using probe request/response frames, beacon frames), such as which MAC address range is used, manufacturer information/device model being advertised, radio characteristics such as defined in well known protocols IEEE 802.1 lk and IEEE 802.1 lh.
- the measured processing time does not correspond to the information in the database within a certain error/safety margin, then the first wireless station will act differently.
- the first station will not automatically accept an incoming connection request from the second station, and may request the second wireless station to use a different authentication method (e.g. PIN, Push Button, or other WPS configuration method by setting a "config method" attribute to the appropriate value, or e.g. by checking if the second wireless station is part of the same secure wireless network as the first wireless station for example using ping messages to a MAC address corresponding or derived from the MAC address used by the second wireless station during FTM measurements, whilst both connected securely to a WLAN access point).
- a different authentication method e.g. PIN, Push Button, or other WPS configuration method by setting a "config method" attribute to the appropriate value, or e.g. by checking if the second wireless station is part of the same secure wireless network as the first wireless station for example using ping messages to a MAC address corresponding or derived from the MAC address used by the second wireless station during FTM measurements, whilst both connected securely to a WLAN access point).
- multiple FTM measurements and/or ranging reports are requested, e.g. in an FTM burst.
- the second wireless station can only know how to manipulate its distance after it has received tl and t4 from the first wireless station.
- t3-t2 may be difficult. Unless second wireless station changed its radio to always send the ACK on t3 with a delay, the first t3 and t4 in the burst may be quite different from the subsequent measurements in the FTM burst.
- enhanced FTM measurement devices may be mandated to first send the values for t2 and t3 in a message to first wireless station before the first wireless station sends its tl and t4 to the second wireless station.
- the first wireless station may use any strange differences in measurements to mark the measurements from the second wireless station as being suspicious and not automatically accept an incoming connection request from the second wireless station.
- the first wireless station will act (also) as an FTM initiator, i.e. initiating a reverse distance measurement, and issue an FTM request to the second wireless station.
- the second wireless station now has to measure tl and t4 and transfer these to the first wireless station.
- the first wireless station can cross validate with a database if the measurements for tl and t4 are done within the parameters and/or behaviour of the Wi-Fi chipset being used. For example, verify whether start times of sending the FTM measurement frames (in a burst) correspond to the normal interval used in the Wi-Fi chipset between two consecutive FTM measurement frames given the attribute values in the FTM request, such as Partial TSF Timer or minimum delta as explained in 10.24.6.4
- the first wireless station may request a third wireless station, e.g. another Access Point in a Wireless Distribution System or Wi-Fi Aware NAN cluster, or a close by trusted P2P device, to perform distance measurement with the second wireless station.
- a third wireless station e.g. another Access Point in a Wireless Distribution System or Wi-Fi Aware NAN cluster, or a close by trusted P2P device.
- a third wireless station e.g. another Access Point in a Wireless Distribution System or Wi-Fi Aware NAN cluster, or a close by trusted P2P device.
- these measurements of which the results are transferred to the first wireless station, in conjunction with distance measurements done between the first and third station, and other information provided by the third wireless station about the second wireless station.
- Such other information may include reported signal strength, noise histogram, and other wireless signal parameters, which may be used to cross-validate the measurements between the first and second wireless station.
- the location of the second wireless station may be marked as suspicious, upon which the first wireless station will act accordingly e.g. by requiring additional authentication.
- Also suspicious would be if the measured distances between the first and second and third and second stations would not correspond to reported signal strengths of the second station in relation to the first and third wireless station. E.g. if it is measured to be very close to both the first and third wireless station using FTM based approach, but the signal strength is quite different, then this is suspicious because one would expect the second station to be right in between the first and third station in that case. This can be further refined by using direction information (e.g.
- the first wireless station may reduce its signal strength by reducing its radio power in accordance with the measured distance between the first and second wireless station.
- the first wireless station may derive that the second wireless station is not within the proper signal range and may mark the measured distance as suspicious.
- the second wireless device uses a very strong radio it may circumvent this check, so it is not a definite way of deciding the measurement is non-suspicious.
- the first station generates an out-of-band signal that only a person that claims to be at a certain distance can notice, e.g. spoken instructions or show a message on a nearby screen, for example with a request to the user to move closer to the first wireless station, which is then verified by the first wireless station.
- the first wireless station may track the location of the second device for a longer time and correlate the trajectory with a floor map, e.g. to see if the trajectory makes sense given the walkways inside the building (e.g. person does not walk through walls, but through doors, and does not walk straight through a table or couch).
- the second wireless station is supposed to be a stationary device (such as a nearby display) and the first wireless station is a mobile device, then the movement pattern of the first wireless station can be used to see if it matches the measured distances to see if the first wireless station really comes closer to the second wireless station when walking towards it.
- Figure 4 shows a method for distance measurement via wireless communication according to a predetermined protocol between a device acting as a first device and a further device for wireless communication acting as a second device.
- the devices are physically apart at a distance 140.
- the devices are arranged for distance measurement via the wireless communication according to a predetermined protocol between the first device and the second device.
- the predetermined protocol includes a ranging protocol for determining a distance between the first and the second device, as further detailed below with reference to Figure 2.
- the first device and the second device are similar to the first and second device as shown in Figure 1 and further described with reference to the Figures 1-3.
- the method may be executed by a processor in the first device, by may also be processed by a processor in a different device and/or at a different time based on the received values.
- the method may be executed at a third device that is not actively participating in the ranging protocol, but receives all messages and is aware of the distance between the third device and the third device. If at a close distance to the first device, the third device can verify all data by receiving the protocol messages of the ranging protocol.
- the method starts at node START 401.
- the method may execute the ranging protocol and perform the time measurements as described with reference to figure 2.
- the method obtains the determined distance and is aware of the first time data of the first device.
- stage CALC 403 the method calculates the travelling time of the messages between the first device and the second device based on the determined distance.
- stage DT3 404 in which third time data is determined by subtracting from the first time data the calculated travelling time of the messages.
- identifier data is determined that is indicative of hardware and/or software present in the second device.
- a reference interval value is obtained for the second device.
- the reference interval is indicative of an interval between receiving a measurement message and transmitting a measurement acknowledge, which is to be expected for the second device.
- the reference interval may be obtained in various ways, which are described above with reference to the message processor in the first device.
- the reference interval is obtained from a database, either locally accessible or remotely via internet by connecting to a provider server using a method as described below with reference to Figure 5.
- the method verifies whether the determined distance is reliable by comparing the third time data to the reference interval value. The method terminates at node END 407.
- Figure 5 shows a provider server method for providing reference information for use in a provider server for cooperating with a device as described above with reference to Figures 1 and 2.
- the method starts at node START 501.
- the method may execute storing reference time data for respective devices indicative of processing time in the ranging protocol. This stage may be performed only once, e.g. at manufacture or initialization of the provider server.
- the database may also be updated regularly when new reference data becomes available.
- stage RCID 503 the method receives, from a requesting device, identifier data indicative of hardware and/or software present in a second device that is to be verified.
- stage RRD respective reference time data for the second device based on the identifier data is retrieved.
- the reference time data is indicative of the reference interval value for the second device.
- the retrieved reference time data is transmitted to the first device.
- the requesting device is enabled to verify whether the determined distance is reliable by comparing the third time data as calculated to the reference interval value.
- Computer program products downloadable from a network and/or stored on a computer-readable medium and/or microprocessor-executable medium, are provided that comprise program code instructions for implementing the above methods when executed on a computer for protecting location information, as elucidated further below.
- the above system may be applied, for example, in indoor and outdoor positioning systems, or location-based services using wireless devices.
- the invention applies generally to any system wherein conditionally data or location based services are provided to a user based on the distance of a mobile device to the device that measures the distance.
- the system can be applied in portable devices and stationary devices supporting Wi- Fi, Wi-Fi Aware, or Wi-Fi Direct.
- the system or methods according to the present invention may be used in conjunction with one or more indoor location technologies based on visible light or radio frequency signals.
- indoor location technologies may make use of established RF communication standards such as 802.15.7, 802.11, 802.15.4, Zigbee, Thread or Bluetooth® Low Energy (BLE) also known as Bluetooth® Smart.
- BLE Bluetooth® Low Energy
- the claimed invention may make use of multiple location technologies; for example in order to accommodate for an installed base and/or to enable participants to use their technology of preference.
- the device 110 for distance measurement and the device 120 that acts as a second device to be measured, and the provider server each comprise a processor which executes appropriate software stored at the devices; for example, that software may have been downloaded and/or stored in a corresponding memory, e.g., a volatile memory such as RAM or a non- volatile memory such as Flash (not shown).
- the devices and servers may for example be equipped with microprocessors and memories (not shown).
- the devices and server may, in whole or in part, be implemented in programmable logic, e.g., as field-programmable gate array (FPGA).
- FPGA field-programmable gate array
- the devices and server may be implemented, in whole or in part, as a so-called application-specific integrated circuit (ASIC), i.e. an integrated circuit (IC) customized for their particular use.
- ASIC application-specific integrated circuit
- the circuits may be implemented in CMOS, e.g., using a hardware description language such as Verilog, VHDL etc.
- stage STR 502 and RCID 503 of the provider server method be executed, at least partially, in parallel, with the stages RNGP 402, CALC 403 and DT3 404 of the device method.
- a given step may not have finished completely before a next step is started.
- a method according to the invention may be executed using software, which comprises instructions for causing a processor system to perform the respective method.
- Software may only include those steps taken by a particular sub-entity of the system.
- the software may be stored in a suitable storage medium, such as a hard disk, a floppy, a memory etc.
- the software may be sent as a signal along a wire, or wireless, or using a data network, e.g., the Internet.
- the software may be made available for download and/or for remote usage on a server.
- a method according to the invention may be executed using a bitstream arranged to configure programmable logic, e.g., a field-programmable gate array (FPGA), to perform the method.
- FPGA field-programmable gate array
- the software may be in the form of source code, object code, a code intermediate source and object code such as partially compiled form, or in any other form suitable for use in the implementation of the method according to the invention.
- An embodiment relating to a computer program product comprises computer executable instructions corresponding to each of the processing steps of at least one of the methods set forth. These instructions may be subdivided into subroutines and/or be stored in one or more files that may be linked statically or dynamically.
- Another embodiment relating to a computer program product comprises computer executable instructions corresponding to each of the means of at least one of the systems and/or products set forth.
- Figure 6a shows a computer readable medium 1000 having a writable part
- the computer program 1010 comprising a computer program 1020, the computer program 1020 comprising instructions for causing a processor system to perform one or more of the above methods in the system as described with reference to Figure 1-5.
- the computer program 1020 may be embodied on the computer readable medium 1000 as physical marks or by means of magnetization of the computer readable medium 1000. However, any other suitable embodiment is conceivable as well. Furthermore, it will be appreciated that, although the computer readable medium 1000 is shown here as an optical disc, the computer readable medium 1000 may be any suitable computer readable medium, such as a hard disk, solid state memory, flash memory, etc., and may be non-recordable or recordable.
- the computer program 1020 comprises instructions for causing a processor system to perform said methods.
- FIG. 6b shows in a schematic representation of a processor system 1100 according to an embodiment of the device or server as described with reference to Figure 1-5.
- the processor system comprises one or more integrated circuits 1110.
- the architecture of the one or more integrated circuits 1110 is schematically shown in the Figure.
- Circuit 1110 comprises a processing unit 1120, e.g., a CPU, for running computer program components to execute a method according to an embodiment and/or implement its modules or units.
- Circuit 1110 comprises a memory 1122 for storing programming code, data, etc. Part of memory 1122 may be read-only.
- Circuit 1 110 may comprise a communication element 1126, e.g., an antenna, connectors or both, and the like.
- Circuit 1110 may comprise a dedicated integrated circuit 1124 for performing part or all of the processing defined in the method.
- Processor 1120, memory 1122, dedicated IC 1124 and communication element 1126 may be connected to each other via an interconnect 1130, say a bus.
- the processor system 1110 may be arranged for contact and/or contact-less communication, using an antenna and/or connectors, respectively.
- a first device for distance measurement via wireless communication uses a ranging protocol for determining a distance to a second device via a round trip time measurement, wherein first time data represents the round trip time and second time data represents a response time between receiving a request and sending a corresponding acknowledge.
- the second device receives the round trip time and determines the distance.
- the first device determines third time data by subtracting from the first time data a calculated travelling time of the messages between the first device and the second device based on the determined distance, obtains a reference interval value for the second device indicative of an interval between receiving a request and transmitting an acknowledge, and verifies whether the determined distance is reliable by comparing the third time data to the reference interval value.
Landscapes
- Engineering & Computer Science (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Radar Systems Or Details Thereof (AREA)
Abstract
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201680068378.2A CN108291960B (en) | 2015-11-23 | 2016-11-21 | System for validating distance measurements |
EP16798490.5A EP3380862A1 (en) | 2015-11-23 | 2016-11-21 | System for verifying distance measurements |
US15/777,408 US11150339B2 (en) | 2015-11-23 | 2016-11-21 | System for verifying distance measurements |
MX2018006208A MX2018006208A (en) | 2015-11-23 | 2016-11-21 | System for verifying distance measurements. |
RU2018118765A RU2721685C2 (en) | 2015-11-23 | 2016-11-21 | System for checking distance measurements |
BR112018010185-0A BR112018010185B1 (en) | 2015-11-23 | 2016-11-21 | DISTANCE MEASUREMENT METHOD, DISTANCE MEASUREMENT DEVICE AND PROVIDER SERVER METHOD |
JP2018519843A JP6982569B2 (en) | 2015-11-23 | 2016-11-21 | System for verifying distance measurements |
ZA2018/04210A ZA201804210B (en) | 2015-11-23 | 2018-06-22 | System for verifying distance measurements |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP15195759.4 | 2015-11-23 | ||
EP15195759 | 2015-11-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017089247A1 true WO2017089247A1 (en) | 2017-06-01 |
Family
ID=54707546
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2016/078219 WO2017089247A1 (en) | 2015-11-23 | 2016-11-21 | System for verifying distance measurements |
Country Status (10)
Country | Link |
---|---|
US (1) | US11150339B2 (en) |
EP (1) | EP3380862A1 (en) |
JP (1) | JP6982569B2 (en) |
CN (1) | CN108291960B (en) |
BR (1) | BR112018010185B1 (en) |
MX (1) | MX2018006208A (en) |
RU (1) | RU2721685C2 (en) |
TW (1) | TWI726941B (en) |
WO (1) | WO2017089247A1 (en) |
ZA (1) | ZA201804210B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3573355A1 (en) | 2018-05-24 | 2019-11-27 | Koninklijke Philips N.V. | Device for wireless communication with other devices |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10609581B2 (en) * | 2016-06-03 | 2020-03-31 | Samsung Electronics Co., Ltd | Method and apparatus for setup of wireless communication |
US10362461B2 (en) * | 2016-12-27 | 2019-07-23 | Denso Corporation | System and method for microlocation sensor communication |
EP3563614B1 (en) | 2016-12-29 | 2023-07-19 | Koninklijke Philips N.V. | Wireless communication system |
DE102017207830A1 (en) * | 2017-03-27 | 2018-09-27 | Bayerische Motoren Werke Ag | Apparatus and method for determining a distance |
TWI678684B (en) * | 2018-03-22 | 2019-12-01 | 宏碁股份有限公司 | Distance detection system and distance detection apparatus |
CN112424639B (en) * | 2018-06-22 | 2024-05-28 | ams有限公司 | Measuring distance to object using time of flight and pseudo-random bit sequence |
US10993110B2 (en) * | 2018-07-13 | 2021-04-27 | Nvidia Corp. | Connectionless fast method for configuring Wi-Fi on displayless Wi-Fi IoT device |
KR102535839B1 (en) * | 2018-09-14 | 2023-05-24 | 삼성전자주식회사 | Electronic device for detecting external object by using antenna module and method thereof |
KR102704304B1 (en) * | 2018-09-28 | 2024-09-09 | 애플 인크. | Ranging between mobile devices |
US10908274B2 (en) * | 2019-01-11 | 2021-02-02 | Samsung Electronics Co... Ltd. | Framework and methods to acknowledge the ranging configuration for IEEE 802.15.4Z |
EP3700235A1 (en) * | 2019-02-19 | 2020-08-26 | Koninklijke Philips N.V. | System for trusted distance measurement |
EP3700234A1 (en) | 2019-02-19 | 2020-08-26 | Koninklijke Philips N.V. | System for trusted distance measurement |
US11540137B2 (en) * | 2019-04-17 | 2022-12-27 | Apple Inc. | Pairing devices based on distance |
US11405894B2 (en) * | 2019-07-09 | 2022-08-02 | Samsung Electronics Co., Ltd. | System and method of establishing communication for exchanging ranging information |
CN111796260B (en) * | 2019-08-12 | 2023-09-12 | 维沃移动通信有限公司 | Distance measurement method and equipment |
US11304031B2 (en) | 2019-10-10 | 2022-04-12 | Samsung Electronics Co., Ltd. | Wireless local area network system, method of transmitting distance information and measuring distance of wireless local area network system |
KR20210079800A (en) | 2019-12-20 | 2021-06-30 | 삼성전자주식회사 | Electronic device and controlling method of electronic device |
US20230047564A1 (en) * | 2020-01-24 | 2023-02-16 | Cryptography Research, Inc. | Authentication timers |
US10976406B1 (en) * | 2020-02-28 | 2021-04-13 | Juniper Networks, Inc. | Multi-layer statistical wireless terminal location determination |
JP2021150918A (en) * | 2020-03-23 | 2021-09-27 | 株式会社東海理化電機製作所 | Communication device and program |
US11726173B2 (en) * | 2020-05-21 | 2023-08-15 | Cisco Technology, Inc. | Attack detection and mitigation for fine timing measurement |
JP7434130B2 (en) | 2020-09-24 | 2024-02-20 | 株式会社東芝 | Distance measuring device and method |
CN112203223B (en) * | 2020-12-02 | 2021-03-02 | 北京大唐高鸿数据网络技术有限公司 | Position determination method and device and Internet of vehicles equipment |
WO2022222006A1 (en) * | 2021-04-19 | 2022-10-27 | 北京小米移动软件有限公司 | Ranging method and apparatus, communication device, and storage medium |
CN115308725A (en) * | 2022-08-10 | 2022-11-08 | 湖南北云科技有限公司 | Distance measurement method, device and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6002708A (en) * | 1994-07-22 | 1999-12-14 | Aether Wire & Location, Inc. | Spread spectrum localizers |
EP1839072A2 (en) * | 2005-01-11 | 2007-10-03 | Koninklijke Philips Electronics N.V. | Time of flight |
WO2007121488A1 (en) * | 2006-04-18 | 2007-10-25 | Qualcomm Incorporated | Verified distance ranging |
US20090076911A1 (en) * | 2007-06-20 | 2009-03-19 | Dang Minh Vo | Mobile coupons utilizing peer to peer ranging |
US20100130229A1 (en) * | 2008-11-21 | 2010-05-27 | Qualcomm Incorporated | Wireless-based positioning adjustments using a motion sensor |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9215581B2 (en) * | 2006-04-14 | 2015-12-15 | Qualcomm Incorported | Distance-based presence management |
TWI371192B (en) * | 2006-04-18 | 2012-08-21 | Qualcomm Inc | Verified distance ranging |
JP5012809B2 (en) | 2006-11-14 | 2012-08-29 | 日本電気株式会社 | Server, communication system, determination method and program |
US20100135178A1 (en) * | 2008-11-21 | 2010-06-03 | Qualcomm Incorporated | Wireless position determination using adjusted round trip time measurements |
US8750267B2 (en) | 2009-01-05 | 2014-06-10 | Qualcomm Incorporated | Detection of falsified wireless access points |
US8965285B2 (en) * | 2011-05-13 | 2015-02-24 | Nokia Corporation | Touch inquiry |
US9459337B2 (en) * | 2013-05-30 | 2016-10-04 | Qualcomm Incorporated | Methods and systems for enhanced round trip time (RTT) exchange |
US9320010B2 (en) * | 2013-12-24 | 2016-04-19 | Intel Corporation | Apparatus, system and method of estimating a location of a mobile device |
-
2016
- 2016-11-21 US US15/777,408 patent/US11150339B2/en active Active
- 2016-11-21 BR BR112018010185-0A patent/BR112018010185B1/en active IP Right Grant
- 2016-11-21 JP JP2018519843A patent/JP6982569B2/en active Active
- 2016-11-21 EP EP16798490.5A patent/EP3380862A1/en active Pending
- 2016-11-21 CN CN201680068378.2A patent/CN108291960B/en active Active
- 2016-11-21 WO PCT/EP2016/078219 patent/WO2017089247A1/en active Application Filing
- 2016-11-21 TW TW105138040A patent/TWI726941B/en active
- 2016-11-21 RU RU2018118765A patent/RU2721685C2/en active
- 2016-11-21 MX MX2018006208A patent/MX2018006208A/en unknown
-
2018
- 2018-06-22 ZA ZA2018/04210A patent/ZA201804210B/en unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6002708A (en) * | 1994-07-22 | 1999-12-14 | Aether Wire & Location, Inc. | Spread spectrum localizers |
EP1839072A2 (en) * | 2005-01-11 | 2007-10-03 | Koninklijke Philips Electronics N.V. | Time of flight |
WO2007121488A1 (en) * | 2006-04-18 | 2007-10-25 | Qualcomm Incorporated | Verified distance ranging |
US20090076911A1 (en) * | 2007-06-20 | 2009-03-19 | Dang Minh Vo | Mobile coupons utilizing peer to peer ranging |
US20100130229A1 (en) * | 2008-11-21 | 2010-05-27 | Qualcomm Incorporated | Wireless-based positioning adjustments using a motion sensor |
Non-Patent Citations (3)
Title |
---|
"Fine timing measurement procedure", pages: 1773 - 1784 |
GEORGE MALIM, BEACONS CLOSE IN ON PROXIMITY-BASED APPLICATIONS, Retrieved from the Internet <URL:http://www.wireless-mag.com/Features/33937/beacons-close-in-on-proximity-based-applications.aspx#.VfwrlvnBG_k> |
IEEE P802.11-REVMC / D4.2, September 2015 (2015-09-01) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3573355A1 (en) | 2018-05-24 | 2019-11-27 | Koninklijke Philips N.V. | Device for wireless communication with other devices |
WO2019224243A1 (en) | 2018-05-24 | 2019-11-28 | Koninklijke Philips N.V. | Device for wireless communication with other devices |
Also Published As
Publication number | Publication date |
---|---|
ZA201804210B (en) | 2020-05-27 |
RU2721685C2 (en) | 2020-05-21 |
CN108291960B (en) | 2022-07-05 |
TW201721171A (en) | 2017-06-16 |
MX2018006208A (en) | 2018-08-01 |
CN108291960A (en) | 2018-07-17 |
JP6982569B2 (en) | 2021-12-17 |
RU2018118765A3 (en) | 2020-02-03 |
TWI726941B (en) | 2021-05-11 |
BR112018010185B1 (en) | 2023-11-07 |
JP2019503472A (en) | 2019-02-07 |
US20180335514A1 (en) | 2018-11-22 |
RU2018118765A (en) | 2019-12-25 |
BR112018010185A2 (en) | 2018-11-21 |
US11150339B2 (en) | 2021-10-19 |
EP3380862A1 (en) | 2018-10-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11150339B2 (en) | System for verifying distance measurements | |
US11641683B2 (en) | Wireless communication system | |
US11805414B2 (en) | Systems and methods for initial authentication of wireless communication | |
JP6694952B2 (en) | Generate and publish verified location information | |
EP3029972B1 (en) | Smart beacon data security | |
US9319835B2 (en) | Securely managed location-and-tracking service access | |
KR101783662B1 (en) | Authenticated time-of-flight indoor positioning systems and methods | |
JP2015531054A (en) | Method, node and computer program for device location confirmation | |
TW201724894A (en) | Secure fine timing measurement protocol | |
US12089052B2 (en) | System for trusted distance measurement | |
TW202127919A (en) | Progressive global positioning system and method thereof | |
JP7493525B2 (en) | A system for trusted distance measurements. | |
US11082853B2 (en) | System and method for avoiding signal spoofing attacks in wireless broadband networks | |
JP2008287542A (en) | Terminal authentication system, terminal authentication method, program and recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16798490 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2018519843 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15777408 Country of ref document: US Ref document number: MX/A/2018/006208 Country of ref document: MX |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112018010185 Country of ref document: BR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2018118765 Country of ref document: RU |
|
ENP | Entry into the national phase |
Ref document number: 112018010185 Country of ref document: BR Kind code of ref document: A2 Effective date: 20180518 |