SECURE AUTHENTICATED DISTANCE MEASUREMENT
20190238530 ยท 2019-08-01
Inventors
Cpc classification
H04L63/0428
ELECTRICITY
H04L2463/101
ELECTRICITY
H04L63/107
ELECTRICITY
H04L9/30
ELECTRICITY
G06F21/10
PHYSICS
H04L63/062
ELECTRICITY
H04L9/3263
ELECTRICITY
International classification
G06F21/10
PHYSICS
H04L9/30
ELECTRICITY
H04L9/32
ELECTRICITY
Abstract
The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a second communication device, wherein the first and the second communication device share a common secret and the common secret is used for performing the distance measurement between the first and the second communication device. The invention also relates to a method of determining whether data stored on a first communication device are to be accessed by a second communication device. Moreover, the invention relates to a communication device for performing authenticated distance measurement to a second communication device. The invention also relates to an apparatus for playing back multimedia content comprising a communication device.
Claims
1. A first device for controlling delivery of protected content to a second device, the first device comprising a processor circuit, the processor circuit arranged to execute instructions, the instructions arranged to: receive a certificate from the second device prior to sending a first signal, wherein the certificate is associated with the second device; provide the first signal to the second device when the certificate indicates that the second device is compliant with at least one compliance rule; receive a second signal from the second device after providing the first signal, wherein the second signal is derived from a secret known by the second device; and provide the protected content to the second device when the first device determines that the second signal is derived from the secret and a time between the providing of the first signal and the receiving of the second signal is less than a predetermined time.
2. The first device of claim 1, wherein the secret is securely provided to the second device by the first device.
3. The first device of claim 1, wherein determining that the second signal is derived from the secret comprises: modifying the first signal, wherein the modifying requires the secret; and determining that the modified first signal is identical to the second signal.
4. The first device of claim 1, wherein determining that the second signal is derived from the secret comprises: modifying the first signal; and determining that the modified first signal is identical to the second signal.
5. The first device of claim 1, wherein the predetermined time is based on a communication system associated with the first device.
6. The first device of claim 1, further comprising instructions arranged to provide the secret to the second device.
7. The first device of claim 1, wherein the second signal comprises the first signal modified by the secret.
8. The first device of claim 1 wherein the secret comprises a random number.
9. The first device of claim 1 wherein the secret is encrypted with a public key.
10. The first device of claim 1 wherein the first signal comprises a random number.
11. The first device of claim 1, wherein the second signal comprises an XOR operation of the first signal with the secret.
12. The first device of claim 1, further comprising instructions arranged to receive the secret from the second device.
13. The first device of claim 1, wherein the secret is used for generating a secure channel between the first device and the second device.
14. The second device of claim 1, wherein determining that the second signal is derived from the secret comprises: modifying the second signal, wherein the modifying requires the secret; and determining that the modified second signal is identical to the first signal.
15. The first device of claim 1, wherein determining that the second signal is derived from the secret comprises: modifying the second signal; and determining that the modified second signal is identical to the first signal.
16. The first device of claim 1, wherein the secret is known by the first device.
17. The first device of claim 2, wherein determining that the second signal is derived from the secret comprises: modifying the first signal, wherein the modifying requires the secret; and determining that the modified first signal is identical to the second signal.
18. The first device of claim 2, wherein determining that the second signal is derived from the secret comprises: modifying the first signal; and determining that the modified first signal is identical to the second signal.
19. The first device of claim 2, wherein the predetermined time is based on a communication system associated with the first device.
20. The first device of claim 2, further comprising instructions arranged to provide the secret to the second device.
21. The first device of claim 2, wherein the second signal comprises the first signal modified by the secret.
22. The first device of claim 2, wherein the secret comprises a random number.
23. The first device of claim 2, wherein the secret is encrypted with a public key.
24. The first device of claim 2, wherein the first signal comprises a random number.
25. The first device of claim 2, wherein the second signal comprises an XOR operation of the first signal with the secret.
26. The first device of claim 2, wherein determining that the second signal is derived from the secret comprises: modifying the second signal, wherein the modifying requires the secret; and determining that the modified second signal is identical to the first signal.
27. The first device of claim 2, wherein determining that the second signal is derived from the secret comprises: modifying the second signal; and determining that the modified second signal is identical to the first signal.
28. The first device of claim 2, wherein the secret is used for generating a secure channel between the first device and the second device.
29. A method of controlling delivery of protected content from a first device to a second device, the first device comprising a processor circuit the processor circuit arranged to execute instructions implementing the method, the method comprising: receiving a certificate from the second device prior to sending a first signal, wherein the certificate is associated with the second device; providing the first signal to the second device when the certificate indicates that the second device is compliant with at least one compliance rule; receiving a second signal from the second device after providing the first signal, wherein the second signal is derived from a secret known by the second device; sending the protected content from the first device to the second device when the first device determines that the second signal is derived from the secret and a time between the providing of the first signal and the receiving of the second signal is less than a predetermined time.
30. The method of claim 29, wherein the secret is securely provided to the second device by the first device.
31. The method of claim 29, wherein determining that the second signal is derived from the secret comprises: modifying the first signal according to the secret; and determining that the modified first signal is identical to the second signal.
32. The method of claim 29, wherein determining that the second signal is derived from the secret comprises: modifying the first signal; and determining that the modified first signal is identical to the second signal.
33. The method of claim 29, wherein the predetermined time is based on a communication system associated with the first device.
34. The method of claim 29, further comprising providing the secret to the second device.
35. The method of claim 29, wherein the second signal comprises the first signal modified by the secret.
36. The method of claim 29, wherein the secret comprises a random number.
37. The method of claim 29, wherein the secret is encrypted with a public key.
38. The method of claim 29, wherein the first signal comprises a random number.
39. The method of claim 29, wherein the second signal comprises an XOR operation of the first signal with the secret.
40. The method of claim 29, further comprising instructions arranged to receive the secret from the second device.
41. The method of claim 29, wherein the secret is used for generating a secure channel between the first device and the second device.
42. The method of claim 29, wherein determining that the second signal is derived from the secret comprises: modifying the second signal according to the secret; and determining that the modified second signal is identical to the first signal.
43. The first device of claim 3, wherein determining that the second signal is derived from the secret comprises: modifying the first signal, wherein the modifying requires the secret; and determining that the modified first signal is identical to the second signal.
44. The method of claim 30, wherein determining that the second signal is derived from the secret comprises: modifying the first signal, wherein the modifying requires the secret; and determining that the modified first signal is identical to the second signal.
45. The method of claim 30, wherein determining that the second signal is derived from the secret comprises: modifying the first signal; and determining that the modified first signal is identical to the second signal.
46. The method of claim 30, wherein the second signal comprises the first signal modified by the secret.
47. The method of claim 30, wherein determining that the second signal is derived from the secret comprises: modifying the second signal, wherein the modifying requires the secret; and determining that the modified second signal is identical to the first signal.
48. The method of claim 30, wherein determining that the second signal is derived from the secret comprises: modifying the second signal, wherein the modifying requires the secret; and determining that the modified second signal is identical to the first signal.
49. The method of claim 44, wherein the second signal comprises an XOR operation of the first signal with the secret.
50. The method of claim 44, wherein the secret comprises a first random number.
51. The method of claim 50, wherein the secret is used for generating a secure channel between the first device and the second device.
52. The method of claim 50, wherein the secret is encrypted with a public key.
53. The method of claim 52, wherein the first signal comprises a second random number.
Description
[0046] In the following preferred embodiments of the invention will be described referring to the figures, wherein:
[0047]
[0048]
[0049]
[0050]
[0051]
[0052] In the example a device is a computer, but it could e.g. also be a DVD drive, a CD drive or a Video, as long as the device comprises a communication device for performing the distance measurement.
[0053] In a specific example the distance might not have to be measured between the computer, on which the data are stored, and the other device, it could also be a third device e.g. a device being personal to the owner of the content which is within the predefined distance.
[0054] In
[0055] Then in step 209, a signal for distance measurement is transmitted to the second device 203; the second device modifies the received signal according to the secret and retransmits the modified signal back to the first device. The first device 201 measures the round trip time between the signal leaving and the signal returning and checks if the returned signal was modified according to the exchanged secret. The modification of the returned signal according to some secret will most likely be dependent on the transmission system and the signal used for distance measurement, i.e. it will be specific for each communication system (such as 1394, Ethernet, Bluetooth, IEEE 802.11, etc.).
[0056] The signal used for the distance measurement may be a normal data bit signal, but also special signals other than for data communication may be used. In an embodiment spread spectrum signals are used to be able to get high resolution and to be able to cope with bad transmission conditions (e.g. wireless environments with a lot of reflections).
[0057] In a specific example a direct sequence spread spectrum signal is used for distance measurement; this signal could be modified by XORing the chips (e.g. spreading code consisting of 127 chips) of the direct sequence code by the bits of the secret (e.g. secret consists also of 127 bits). Also, other mathematical operations as XOR could be used.
[0058] The authentication 205 and exchange of secret 207 could be performed using the protocols described in some known ISO standards ISO 9798 and ISO 11770. For example the first device 201 could authenticate the second device 203 according to the following communication scenario: [0059] First device.fwdarw.Second device: R.sub.BText 1 [0060] where R.sub.B is a random number [0061] Second device.fwdarw.First device: CertATokenAB [0062] Where CertA is a certificate of A
TokenAB=R.sub.AR.sub.BBText3sS.sub.A(R.sub.AR.sub.BBText2) [0063] R.sub.A is a random number [0064] Indentifier B is an option [0065] sS.sub.A is a signature set by A using private key S.sub.A
[0066] If TokenAB is replaced with the token as specified in ISO 11770-3 we at the same time can do secret key exchange. We can use this by substituting Text2 by:
Text2:=eP.sub.B(AKText2)Text3 [0067] Where eP.sub.B is encrypted with Public key B [0068] A is identifier of A [0069] K is a secret to be exchanged
[0070] In this case the second device 203 determines the key (i.e. has key control), this is also called a key transport protocol, but also a key agreement protocol could be used. This may be undesirable in which case it can be reversed, such that the first device determines the key. A secret key has now been exchanged according to step 207 in
[0071] After the distance has been measured in a secure authenticated way as described above content, data can be sent between the first and the second device in step 211 in
[0072]
[0073] In