METHOD AND APPARATUS FOR ESTABLISHMENT OF PRIVATE COMMNUNICATION BETWEEN DEVICES
20170272948 · 2017-09-21
Inventors
Cpc classification
H04J11/0069
ELECTRICITY
H04W4/80
ELECTRICITY
H04L51/00
ELECTRICITY
H04W12/02
ELECTRICITY
H04L63/06
ELECTRICITY
International classification
H04W12/02
ELECTRICITY
H04W4/20
ELECTRICITY
H04W8/18
ELECTRICITY
H04W4/00
ELECTRICITY
Abstract
The invention relates to a method and devices for mutual communication between devices, and to computer programs enabling such communication. According to the invention, in a first device is controlled a transmitter module operable in a local radio communications network to transmit a sequence of radio signal pulses representing a predetermined code. In at least one second device a receiver module is scanning said local radio communications network to detect said predetermined code. A contact network of the user of said at least second device is accessed, and the predetermined code is checked in the second device against the user's contact network for a match stored in the network profiles for the contacts. Then a validation key is fetched, that relates to a matching contact found in said contact network, and a connection establishment request containing the validation key is sent over said local radio communications network from the second device to the first device. Thus the origin of the connection establishment request is validated in the first device.
Claims
1-30. (canceled)
31. A method of communication between devices, comprising the steps of: controlling in a first device a transmitter module operable in a local radio communications network to transmit a sequence of radio signal pulses representing a predetermined code; scanning in at least one second device by a receiver module for said local radio communications network to detect said predetermined code; accessing with said at least one second device a contact network of the user of said at least second device; checking in said at least one second device said predetermined code against the user's contact network for a match stored in the network profiles for the contacts; fetching at least a validation key related to a matching contact found in said contact network; sending over said local radio communications network from said at least one second device a connection establishment request using at least said validation key to said first device; validating the origin of the said connection establishment request in said first device.
32. A method according to claim 31, wherein the validation of said connection establishment request opens a direct communication channel between said first and second devices in a preferred communications network.
33. A method according to claim 31, wherein the contact network is a centralized service for personal information storage and distribution.
34. A method according to claim 31, wherein the local radio communications network is selected from one or more of the following: Bluetooth, WLAN, WiFi Direct, or LTE D2D.
35. An apparatus comprising at least one processing core, at least one memory including computer program code and at least one communication transceiver module operable in at least one local radio communications network, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to: controlling a radio transmitter in said transceiver module to transmit a sequence of radio signal pulses representing a predetermined code identifying a user of said apparatus over a local radio communications network to listening external devices; receiving from at least one listening external device with a receiver in said transceiver module a connection establishment request containing a validation key from a user of said listening external device, wherein the validation key is related to the user profile of the user of said apparatus in a contact network of the user of said external device, and is matched with said sent predetermined code; validating the origin of said connection establishment request and opening a direct communications channel to said at least one listening external device in a preferred radio communications network.
36. An apparatus comprising at least one processing core, at least one memory including computer program code and at least one communication transceiver module operable in at least one local radio communications network, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to: scanning with a receiver in said communication transceiver module over a local radio communications network for sequence of radio signal pulses representing a predetermined code; receiving from at least one transmitting external device a sequence of radio signal pulses representing said predetermined code identifying a user of said transmitting external device; matching the identity of said user encoded in said received predetermined code with a contact identity stored in said apparatus in a user profile of a contact network; fetching a validation key related to said user of said transmitting external device and sending a connection establishment request to said transmitting external device using said validation key; receiving a validation for said connection establishment request from said transmitting external device and opening a direct communications channel to said transmitting external device in a preferred communications network.
37. An apparatus according to claim 36, wherein said sequence of radio signal pulses representing a predetermined code is a Morse code.
38. An apparatus according to claim 36, wherein the contact network is a centralized service for personal information storage and distribution.
39. An apparatus according to claim 36, wherein the local radio communications network is selected from one or more of the following: Bluetooth, WLAN, WiFi Direct, or LTE D2D.
40. An apparatus according to claim 36, wherein the preferred communications network is the internet.
41. An apparatus according to claim 36, wherein the preferred communications network is a cellular network.
42. An apparatus according to claim 36, wherein the preferred communications network is one of the following: Bluetooth, WLAN, WiFi Direct, or LTE D2D.
43. An apparatus according to claim 36, wherein said sequence of radio signal pulses representing a predetermined code is generated by altering the output signal of said transmitter between on and off states.
44. An apparatus according to claim 36, wherein said sequence of radio signal pulses representing a predetermined code is generated by modulating the output signal of said transmitter to alternate between states as required by said predetermined code.
45. An apparatus according to claim 44, wherein the sequence of radio signal pulses are amplitude modulated.
46. An apparatus according to claim 44, wherein the sequence of radio signal pulses are frequency modulated.
47. An apparatus according to claim 36, wherein said sequence of radio signal pulses representing a predetermined code for said contacts are stored in advance in said at least one memory to restrict the matching of codes to only stored ones.
48. A non-transitory computer readable medium having stored thereon a set of computer readable instructions that, when executed by at least one processor, cause an apparatus to at least: controlling a radio transmitter to transmit a sequence of radio signal pulses representing a predetermined code identifying a user of said apparatus over a local radio communications network to listening external devices; receiving from at least one listening external device with a receiver a connection establishment request containing a validation key from a user of said listening external device, wherein the validation key is related to the user profile of the user of said apparatus in a contact network of the user of said listening external device, and is matched with said sent predetermined code; validating the origin of said connection establishment request and opening a direct communications channel to said at least one listening external device in a preferred radio communications network.
49. A non-transitory computer readable medium having stored thereon a set of computer readable instructions that, when executed by at least one processor, cause an apparatus to at least: scanning with a receiver over a local radio communications network for sequence of radio signal pulses representing a predetermined code; receiving from at least one transmitting external device a sequence of radio signal pulses representing said predetermined code identifying a user of said transmitting external device; matching the identity of a user encoded in said received predetermined code with a contact identity stored in said apparatus in a user profile of a contact network; fetching a validation key related to said user of said transmitting external device and sending a connection establishment request to said transmitting external device using said validation key; receiving a validation for said connection establishment request from said transmitting external device and opening a direct communications channel to said transmitting external device in a preferred communications network.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0050]
[0051]
[0052]
[0053]
DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS
[0054] Referring to
[0055] The contact network service 10 has in its database a list 12 of subscribers, each of which may have an OTA (Over The Air) discovery package 13, which in a social network environment enables the detection of that user by his or her friends, as described in connection with
[0056] Further information may consist of the time when the user User1 announces his or her availability for OTA contact attempts. This may for energy saving purposes be organized in beacon cycles. The beacon may use the time of day as a common reference for all users, and define a repetitive start time of an active beacon duty cycle and the duration of the cycle. With such an information exchange (e.g. during earlier communications between the parties), the discovering device knows in advance when to contact User1 and may set the discovery parameters for User1 to be most power and time optimized.
[0057] The OTA package is added to social network profiles to make the service support for the over-the-air discovery. The profile information may include a current discovery state of the user, i.e. either the user is discoverable or not discoverable. Other status states may exist depending on the user's configuration and preferences. E.g. if user has different groups of friends, or belongs to different communities, then the state may refer to limited discovery where the user is only discoverable by certain group(s). Whenever the user switches on or off his local link beacon, an application running in the device may be configured to update the discovery state in the profile accordingly. Also the amount and details of the information disclosed in the OTA discovery package 13 may vary between groups and full details can be made available to friends only. This depends on the settings available in the contact or social network.
[0058] Reference is now made to
[0059] In more detail, the listening User2 scans with his device over one (or more) radio communications networks for morse signatures. User2 checks the received morse signatures against his social network records, for which purpose he is logged in to his social network. User2 finds that one of his friends (User1) uses e.g. the morse name XYZ, and fetches the public key for the User1 from his social network (e.g. facebook). User2 then sends a connection establishment request to User1 which is signed using the public key of User1. User1 then may validate this connection establishment request with his private key. In order to avoid a man-in-the middle attack, User1 may also validate the answer to his friend User2 with the public key of User2.
[0060] The encryption keys may be used as above to secure the communication link between the two devices. Alternatively, it can also be used only for an initial first authentication, and then the devices may directly exchange a secure key e.g. by a Diffie-Hellmann key exchange protocol or other similar means.
[0061] Any user may advertise the Morse code to his friends or a selected group of such, and the friends have then the code directly available. The code may be temporary and expire automatically at a set time, e.g. in order to avoid the user being subject to tracing and/or the social network account to malicious hacking. A new temporary Morse code need to be updated in the social network, and can then be fetched by the friends. A user may also cache the Morse codes of his friends in the memory of his device including any code expiry information, to avoid frequent network set-ups to check already found codes. Thereby only new or renewed codes need to be checked.
[0062] In another embodiment, User2 may first check the code and then make the local connectivity receiver of his device only to discover selected codes. With this approach, detected Morse codes other than those cached in memory are ignored. In practice, this may be done by storing the codes for a number of contacts in advance in the memory of the device, whereby only stored codes are checked for a match against the personal network contacts of User2.
[0063] Referring now to
[0064]
[0065] The device 40 may include a separate memory unit 42, which may comprise a random-access memory and/or permanent memory. Memory 42 may comprise at least one RAM chip. Memory 42 may comprise magnetic, optical and/or holographic memory, for example. Memory 42 is at least in part accessible to processor 41 and may at least partly be a storage of computer instructions that processor 41 is configured to execute. When computer instructions configured to cause processor 41 to perform certain actions are stored in memory 42, and device 40 overall is configured to run under the direction of processor 41 using computer instructions from memory 42, processor 41 and/or its at least one processing core may be considered to be configured to perform said certain actions.
[0066] The device 40 has a transceiver unit 46, which comprise a transmitter 43 and a receiver 44. Transmitter 43 and receiver 44 are configured to transmit and receive, respectively, information in accordance with at least one cellular or non-cellular standard. Transmitter 43 may comprise more than one transmitter. Receiver 44 may comprise more than one receiver. Transmitter 43 and/or receiver 44 may be configured to operate in accordance with global system for mobile communication, GSM, wideband code division multiple access, WCDMA, long term evolution, LTE, IS-95, wireless local area network, WLAN, Ethernet and/or worldwide interoperability for microwave access, WiMAX, standards, for example.
[0067] Device 40 also comprises a short range radio communication transceiver 45. The transceiver 45 supports at least one such technology, such as Bluetooth, WLAN, Wi-Fi Direct, LTE D2D, Wibree or similar technologies.
[0068] The device 40 typically comprises a user interface, not shown. A user interface (UI) may comprise at least one of a display, a keyboard, a touchscreen, a vibrator arranged to signal to a user by causing device 40 to vibrate, a speaker and a microphone. A user is able to operate device 40 via UI, for example to accept incoming telephone calls, to originate telephone calls or video calls, to browse the Internet, to manage digital files stored in memory 42 or on a cloud accessible via transmitter 43 and receiver 44, or via NFC transceiver 45, and/or to play games.
[0069] The device 40 may also be arranged to accept a user identity module (not shown), such as a subscriber identity module (SIM) card installable in device 40. The device 40 may comprise further devices not illustrated in
[0070] The processor 41 may be furnished with a transmitter arranged to output information from processor 41, via electrical leads internal to device 40, to other devices comprised in device 40. Such a transmitter may comprise a serial bus transmitter arranged to, for example, output information via at least one electrical lead to memory 42 for storage therein. Alternatively to a serial bus, the transmitter may comprise a parallel bus transmitter. Likewise processor 41 may comprise a receiver arranged to receive information in processor 41, via electrical leads internal to device 40, from other devices comprised in device 40. Such a receiver may comprise a serial bus receiver arranged, for example, to receive information via at least one electrical lead from receiver 44 for processing in processor 41. Alternatively to a serial bus, the receiver may comprise a parallel bus receiver.
[0071] Processor 41, memory 42, transmitter 43, receiver 44, the transceiver 45, and/or any other modules or devices may be interconnected by electrical leads internal to device 40 in a multitude of different ways. For example, each of the aforementioned devices may be separately connected to a master bus internal to device 40, to allow for the devices to exchange information. However, as the skilled person will appreciate, this is only one example and depending on the embodiment various ways of interconnecting at least two of the aforementioned devices may be selected without departing from the scope of the present invention.
[0072] First, the user needs to install an application layer software application 47 (an “app”) into the communication device 40 of
[0073] In this sequence, short off=dot; long off=dash, on=separator. A different separator need to be in place between the letters, here the slash “/” above can be replaced by a “long on” or a “very long off”.
[0074] With L1 is here meant the physical layer of the local radio communications network being used; all network technologies and protocols have their own standardized layers, and is not in the scope of the present invention to present these in any detail. For example, the Open Systems Interconnection model (OSI) characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers. The model is a product of the Open Systems Interconnection project at the International Organization for Standardization (ISO), maintained by the identification ISO/IEC 7498-1.
[0075] The software application using the devices according to the invention need to have access to the physical layer L1 of the network used, but it is within the capacity of one skilled in the art to design software that can manipulate the various layers of a network protocol in order for it to serve the purpose of the SW application in question.
[0076] Obviously it lies within the scope of the invention to be able to use other variants for coding such physical layer L1 communication, e.g. where an “off” is the separator mark, and the length of the “on” sequence correspond to either a dot or a dash. Also other sequence codes than Morse code may be equally useful, as in fact the user of the device may not need to know what code is used himself A user may need only to type a desired alphanumeric code name that will then be translated into a Morse or some other code.
[0077] In another more advanced embodiment, the Morse code or some other type of sequential code may be used to modulate the L1 carrier to a simple PCM code where the dots, dashes and separators would have their own codeword. This would potentially be more power efficient than switching the carrier wave on and off, but would on the other hand require more advanced inter-layer communication in the mobile device.
[0078] It is to be understood that the embodiments of the invention disclosed are not limited to the particular systems, process steps, or components disclosed herein, but are extended to equivalents thereof as would be recognized by those ordinarily skilled in the relevant arts. It should also be understood that terminology employed herein is used for the purpose of describing particular embodiments only and is not intended to be limiting.
[0079] Reference throughout this specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases “in one embodiment” or “in an embodiment” in various places throughout this specification are not necessarily all referring to the same embodiment.
[0080] As used herein, a plurality of items, structural elements, components, and/or systems may be presented in a common list for convenience. However, these lists should be construed as though each member of the list is individually identified as a separate and unique member. Thus, no individual member of such list should be construed as a de facto equivalent of any other member of the same list solely based on their presentation in a common group without indications to the contrary. In addition, various embodiments and example of the present invention may be referred to herein along with alternatives for the various components thereof It is understood that such embodiments, examples, and alternatives are not to be construed as de facto equivalents of one another, but are to be considered as separate and autonomous representations of the present invention.
[0081] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention can be practiced without one or more of the specific details, or with other methods, components, systems, etc. In other instances, well-known structures or operations are not shown or described in detail to avoid obscuring aspects of the invention.
[0082] While the forgoing examples are illustrative of the principles of the present invention in one or more particular applications, it will be apparent to those of ordinary skill in the art that numerous modifications in form, usage and details of implementation can be made without the exercise of inventive faculty, and without departing from the principles and concepts of the invention. Accordingly, it is not intended that the invention be limited, except as by the claims set forth below.