17818264. MUTUAL AUTHENTICATION FOR RELIABLE CONFIGURATION RECEPTION OVER REFERENCE SIGNALS simplified abstract (QUALCOMM Incorporated)

From WikiPatents
Jump to navigation Jump to search

MUTUAL AUTHENTICATION FOR RELIABLE CONFIGURATION RECEPTION OVER REFERENCE SIGNALS

Organization Name

QUALCOMM Incorporated

Inventor(s)

Yavuz Yapici of Florham Park NJ (US)

Tao Luo of San Diego CA (US)

Junyi Li of Fairless Hills PA (US)

MUTUAL AUTHENTICATION FOR RELIABLE CONFIGURATION RECEPTION OVER REFERENCE SIGNALS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17818264 titled 'MUTUAL AUTHENTICATION FOR RELIABLE CONFIGURATION RECEPTION OVER REFERENCE SIGNALS

Simplified Explanation

The abstract of this patent application describes a system where a first network node can authenticate itself to a second network node by transmitting an authentication proof based on a first credential. The second network node can then verify the authenticity of the first network node based on this proof. The second network node can send a configuration request to the first network node, which includes a phase-modulated indication of a second credential associated with the second network node. The configuration request is based on a random phase. The first network node can authenticate the second network node based on this configuration request and respond with a configuration response, which includes a phase-modulated confidential parameter. The configuration response is based on the configuration request.

  • The first network node transmits an authentication proof to the second network node based on a first credential.
  • The second network node identifies the authenticity of the first network node based on the authentication proof.
  • The second network node sends a configuration request to the first network node, indicating a second credential using phase modulation.
  • The configuration request is based on a random phase.
  • The first network node authenticates the second network node based on the configuration request.
  • The first network node responds with a configuration response, including a phase-modulated confidential parameter.
  • The configuration response is based on the configuration request.

Potential applications of this technology:

  • Secure communication between network nodes.
  • Authentication and verification of network nodes.
  • Configuration and parameter exchange between network nodes.

Problems solved by this technology:

  • Ensuring the authenticity of network nodes.
  • Securely exchanging credentials and configuration information.
  • Preventing unauthorized access to network nodes.

Benefits of this technology:

  • Enhanced security in network communication.
  • Efficient and reliable authentication process.
  • Protection against unauthorized access and tampering.


Original Abstract Submitted

A first network node may transmit an authentication proof to a second network node. The authentication proof may be based on a first credential associated with the first network node. The first network node may be authenticable based on the authentication proof. The second network node may identify whether the first network node is authentic based on the authentication proof. The second network node may transmit a configuration request to the first network node. The configuration request may include a phase-modulated indication of a second credential associated with the second network node. The configuration request may be based on a random phase. The second network node may be authenticable based on the configuration request. The first network node may transmit a configuration response to the second network node. The configuration response may include a phase-modulated confidential parameter. The configuration response may be based on the configuration request.