18495441. FINE TIME MEASUREMENT LOCATION CONFIGURATION INFORMATION PROTECTION simplified abstract (Cisco Technology, Inc.)
FINE TIME MEASUREMENT LOCATION CONFIGURATION INFORMATION PROTECTION
Organization Name
Inventor(s)
Jerome Henry of Pittsboro NC (US)
Brian D. Hart of Sunnyvale CA (US)
Peiman Amini of Fremont CA (US)
Stephen M. Orr of Apex NC (US)
Sudhir K. Jain of Fremont CA (US)
FINE TIME MEASUREMENT LOCATION CONFIGURATION INFORMATION PROTECTION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18495441 titled 'FINE TIME MEASUREMENT LOCATION CONFIGURATION INFORMATION PROTECTION
Simplified Explanation: The patent application discusses the protection of Fine Time Measurement (FTM) Location Configuration Information (LCI) with authentication and selective client enablement. It involves obtaining key-pairs from a Certificate Authority, determining venue locations, and creating hashes of LCI for secure transmission.
- The controller obtains a key-pair from a Certificate Authority (CA).
- The controller determines the venue location of an Access Point (AP).
- The AP creates a hash of LCI using the private key.
- The LCI and hash are sent to the Station (STA) for secure communication.
Key Features and Innovation:
- Protection of FTM LCI with authentication.
- Selective client enablement for secure communication.
- Use of key-pairs for encryption and decryption.
- Creation of hashes for data integrity verification.
Potential Applications: This technology can be applied in secure communication systems, IoT devices, and network infrastructure for protecting sensitive location information.
Problems Solved:
- Ensuring the security of FTM LCI.
- Preventing unauthorized access to location data.
- Establishing a secure communication channel between APs and STAs.
Benefits:
- Enhanced data security.
- Improved privacy protection.
- Secure transmission of location information.
- Selective client access control.
Commercial Applications: Secure communication systems for industries such as healthcare, finance, and government agencies. Market implications include increased demand for data security solutions in various sectors.
Prior Art: Prior research on secure communication protocols, encryption techniques, and data protection methods can provide insights into similar technologies.
Frequently Updated Research: Stay updated on advancements in encryption technologies, secure communication protocols, and data protection mechanisms to enhance the security of FTM LCI.
Questions about Fine Time Measurement (FTM) Location Configuration Information (LCI): 1. How does the use of key-pairs enhance the security of FTM LCI protection? 2. What are the potential implications of selective client enablement in secure communication systems?
Original Abstract Submitted
Fine Time Measurement (FTM) Location Configuration Information (LCI) protection and, specifically, FTM LCI protection with authentication and selective client enablement may be provided. To perform FTM LCI protection, a controller may first obtain a key-pair including a public key and a private key from a Certificate Authority (CA). The controller my determine a venue location where an Access Point (AP) is located. The controller may send a Certificate Signing Request (CSR) with the venue location to the CA. In response to sending the CSR, the controller may receive a public key certificate from the CA, wherein the public key certificate includes the venue location. The AP may receive a request for Location Configuration Information (LCI) from a Station (STA), wherein the LCI includes an AP location. The AP creates a hash of LCI of the AP using the private key and sends the LCI and the hash to the STA.