Processing

Please wait...

Settings

Settings

Goto Application

1. WO2019046021 - SELF-ORGANIZING MOBILE PEER-TO-PEER MESH NETWORK AUTHENTICATION

Publication Number WO/2019/046021
Publication Date 07.03.2019
International Application No. PCT/US2018/046992
International Filing Date 17.08.2018
IPC
H04W 12/06 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
06Authentication
G06F 21/35 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
34involving the use of external additional devices, e.g. dongles or smart cards
35communicating wirelessly
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 84/18 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
84Network topologies
18Self-organising networks, e.g. ad hoc networks or sensor networks
H04W 12/08 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
08Access security
H04L 29/08 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
08Transmission control procedure, e.g. data link level control procedure
CPC
B64C 39/024
BPERFORMING OPERATIONS; TRANSPORTING
64AIRCRAFT; AVIATION; COSMONAUTICS
CAEROPLANES; HELICOPTERS
39Aircraft not otherwise provided for
02characterised by special use
024of the remote controlled vehicle type, i.e. RPV
G06F 21/35
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
34involving the use of external additional devices, e.g. dongles or smart cards
35communicating wirelessly
G06F 2221/2111
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
2221Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
2111Location-sensitive, e.g. geographical location, GPS
H04L 2209/80
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
80Wireless
H04L 63/0869
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
0869for achieving mutual authentication
H04L 63/107
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
10for controlling access to network resources
107wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
Applicants
  • RAYTHEON COMPANY [US]/[US]
Inventors
  • THEODORE, David James
  • SIMS, Blake Cameron
  • RIOS, Andres
  • DOE, Hyperia
  • LEE, Jesse Jonathan
  • LOPEZ, Alfonso Andres
Agents
  • GIFFORD, Eric A.
Priority Data
62/552,03630.08.2017US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SELF-ORGANIZING MOBILE PEER-TO-PEER MESH NETWORK AUTHENTICATION
(FR) AUTHENTIFICATION DE RÉSEAU MAILLÉ PAIR À PAIR MOBILE À AUTO-ORGANISATION
Abstract
(EN)
A plurality of authentication devices form and manage a self-organizing mobile peer-to-peer mesh network to provide robust authentication of mobile peers, humans and or mobile devices such as drones, cars, satellites, robots etc. The mesh network may supplement traditional fixed point of entry authentication to combat social engineering penetrations or be used in situations where fixed-point authentication is not viable. Network efficiency can be enhanced by using two-level encryption, a first level of encryption based on permissions to join a mesh network and a simpler second level of encryption based on knowledge shared with members of the network for communication. Making the permissions a function of location can make the network more robust. Re-authenticating member peers based on the occurrence of defined events can further enhance security.
(FR)
L'invention concerne une pluralité de dispositifs d'authentification qui forment et gèrent un réseau maillé pair à pair mobile à auto-organisation afin de fournir une authentification robuste de pairs mobiles, d'êtres humains et de dispositifs mobiles tels que des drones, des voitures, des satellites, des robots etc. Le réseau maillé peut compléter un point fixe traditionnel d'authentification d'entrée afin de lutter contre des pénétrations d'ingénierie sociale ou être utilisé dans des situations où une authentification de point fixe n'est pas viable. L'efficacité de réseau peut être améliorée par utilisation d'un chiffrement à deux niveaux, un premier niveau de chiffrement basé sur des permissions pour rejoindre un réseau maillé et d'un second niveau de chiffrement plus simple sur la base de connaissances partagées avec des éléments du réseau pour une communication. Faire des permissions une fonction de localisation peut rendre le réseau plus robuste. Des pairs de membre de ré-authentification sur la base de l'occurrence d'événements définis peuvent en outre améliorer la sécurité.
Latest bibliographic data on file with the International Bureau