17520511. SECURITY TECHNIQUES FOR RANGING IN WIRELESS NETWORKS simplified abstract (QUALCOMM Incorporated)

From WikiPatents
Jump to navigation Jump to search

SECURITY TECHNIQUES FOR RANGING IN WIRELESS NETWORKS

Organization Name

QUALCOMM Incorporated

Inventor(s)

Anantharaman Balasubramanian of San Diego CA (US)

Kapil Gulati of Belle Mead NJ (US)

Shuanshuan Wu of San Diego CA (US)

Hong Cheng of Basking Ridge NJ (US)

Shailesh Patil of San Diego CA (US)

Gene Wesley Marsh of San Diego CA (US)

Sony Akkarakaran of Poway CA (US)

SECURITY TECHNIQUES FOR RANGING IN WIRELESS NETWORKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17520511 titled 'SECURITY TECHNIQUES FOR RANGING IN WIRELESS NETWORKS

Simplified Explanation

Methods, systems, and devices for wireless communication are described in this patent application. The innovation focuses on supporting security techniques for ranging in wireless networks. The patent proposes a process where a first device initiates a ranging procedure with a second device by transmitting an indication. In response, the second device transmits signaling to the first device and one or more third devices.

  • The first device and the one or more third devices determine a respective location metric associated with the second device based on the signaling.
  • The one or more third devices transmit their respective location metric to the first device.
  • The first device uses the communicated location metric(s) to determine whether an eavesdropper is present.
  • Based on the determination, the first device can then communicate with the second device.

Potential Applications

This technology has potential applications in various wireless communication scenarios, including:

  • Secure communication in wireless networks
  • Location-based services and applications
  • Internet of Things (IoT) devices and networks
  • Wireless sensor networks

Problems Solved

The patent addresses the following problems:

  • Ensuring secure communication in wireless networks
  • Detecting the presence of eavesdroppers
  • Improving the accuracy of location-based services
  • Enhancing the security of IoT devices and networks

Benefits

The benefits of this technology include:

  • Enhanced security in wireless communication
  • Improved accuracy in determining device location
  • Protection against eavesdropping and unauthorized access
  • Increased reliability and trustworthiness of wireless networks


Original Abstract Submitted

Methods, systems, and devices for wireless communication are described to support security techniques for ranging in wireless networks. A first device may transmit an indication to initiate a ranging procedure with a second device, and in response to the indication, the second device may transmit signaling to the first device and to one or more third devices. The first device and the one or more third devices may each determine a respective location metric associated with the second device based on the signaling. The one or more third devices may each transmit, to the first device, the respective location metric. Based on the communicated location metric(s), the first device may determine whether an eavesdropper is present and may communicate with the second device based on the determination.