US 9,813,406 B2
Device authentication in ad-hoc networks
Pavel Levin, Brooklyn, NY (US)
Assigned to EMPIRE TECHNOLOGY DEVELOPMENT LLC, Wilmington, DE (US)
Appl. No. 14/370,637
Filed by EMPIRE TECHNOLOGY DEVELOPMENT LLC, Wilmington, DE (US)
PCT Filed Feb. 20, 2014, PCT No. PCT/US2014/017383
§ 371(c)(1), (2) Date Jul. 3, 2014,
PCT Pub. No. WO2015/126398, PCT Pub. Date Aug. 27, 2015.
Prior Publication US 2015/0237040 A1, Aug. 20, 2015
Int. Cl. H04L 29/06 (2006.01); G06F 17/30 (2006.01); G06F 15/16 (2006.01); G06F 7/04 (2006.01)
CPC H04L 63/0823 (2013.01) [H04L 63/18 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method to authenticate an invitee device, the method comprising:
receiving, by an evaluator device from the invitee device, at a first receive time, a first message, wherein:
the invitee device is different from the evaluator device,
a first communication link, of a first security level, is established between the invitee device and an inviter device prior to the receipt of the first message by the evaluator device,
the inviter device is different from the evaluator device, and
the inviter device is different from the invitee device;
receiving, by the evaluator device from the inviter device, at a second receive time, a second message through a second communication link of a second security level, wherein the first security level is higher than the second security level;
determining, by the evaluator device, a receive time difference between the first receive time and the second receive time; and
authenticating, by the evaluator device, the invitee device based on the receive time difference, the first message, and the second message.