This application claims priority to a European Application Serial No. 15306041.3, filed on Jun. 30, 2015, which is herein incorporated by reference in its entirety.
The present invention relates to credential acquisition, specifically, the acquisition of credentials by multiple devices for wireless network authentication.
Today, many ways exist to communicate information between mobile devices using wireless means such as IEEE 802.11 (WiFi), Bluetooth Low Energy (BLE), Near Field Communication (NFC), cellular, and the like. But, those wireless means are all based on ElectroMagnetic (EM) signals that do not prevent the channel or access point from being sniffed or hacked. Other technology methods can be envisioned to establish an ephemeral, private and secure communication channel for a limited duration within a circumvented space, such as in providing access to a WLAN. In the last few years, some industries have considered alternate solutions such as using an ultrasonic signal as a communication means. The main advantage for ultrasonic signal communication over radio frequency technology is the fact that the ultrasonic range is only a few meters and that it doesn't go through walls. So, ultrasonic technology is a much better choice for preventing or limiting interception by sniffing or hacking. Ultrasonic technology is also cost effective as it relies on current and available microphone and speakers equipping the mobile device and thus doesn't require extra interface modules.
Companies such as like Naratte™ and Pronto™ currently use this technology whose main use case is to perform a payment or to get a coupon. Chromecast™ is also a player in that field in using this technology inspired from SlickLogin™ acquisition for pairing devices. Patent Publication US2013/0176984 describes how to give access to WLAN in transmitting the establishment information through ultrasonic sound superimposed on an audible sound. The means of superimposing the establishment information over the sound would be based on watermarking. The information can include SSID and encryption key and also a password or identifier.
One problem with Near Field Communication (NFC) is that although it has a level of security with a single device, if multiple devices are within the reception range of NFC, then unauthorized monitoring and hacking can still occur. The solution disclosed herein is an alternative to NFC. One example problem of a WiFi configuration is how to securely and easily add new devices to a given WiFi network. Today, a provider of a WiFi network (end user or enterprise) has to provide information about the used SSID, login information and the password/keys. This exchange is always cumbersome and prone to typing errors. An alternative is desirable.
This summary is provided to introduce a selection of concepts in a simplified form as a prelude to the more detailed description that is presented later. The summary is not intended to identify key or essential features of the invention, nor is it intended to delineate the scope of the claimed subject matter.
In one embodiment, a method to distribute an access credential to multiple devices using ultrasonic communication includes a master device receiving the number of slave devices N to receive the access credential and determining a distribution sequence for ultrasonic distribution communication between the master device and the plurality of slave devices. The access credential is divided into N credential chunks and one of the credential chunks is transmitted to each of the N slave devices using the distribution sequence. The slave devices then share the credential chunks according to the distribution sequence and reconstruct the access credential which can then be used by the slave devices to access a wireless network.
In another embodiment, an apparatus to distribute an access credential to a plurality of slave devices using ultrasonic communication includes a processor to determine a distribution sequence for ultrasonic communication between the apparatus and the plurality of slave devices, the processor dividing the access credential into credential chunks. An ultrasonic transceiver, under control of the processor, for transmitting one credential chunk to each of the plurality of slave devices according to the distribution sequence is also included. The ultrasonic transceiver transmits the distribution sequence to the plurality of slave devices, wherein the plurality of slave devices share respective credential chunks between the plurality of slave devices according to the distribution sequence. The slave devices reconstruct the access credential at each of the plurality of slave devices after receiving a reconstruction sequence.
In another embodiment, an apparatus to reconstruct access credential for a wireless network where the apparatus is one of a plurality of slave devices and includes an ultrasonic transceiver to receive a chunk of the access credential and a distribution sequence transmitted by a master device. A processor is used to control the ultrasonic transceiver to transmit the received chunk to the plurality of slave devices, the transmitting occurring according to the distribution sequence. The ultrasonic transceiver receives a respective chunk from each of the plurality of slave devices, wherein multiple chunks of the access credential are received. A reconstruction sequence is also received and the processor acts to reconstruct the access credential using the reconstruction sequence. A network interface is used to access a wireless network using the reconstructed access credential.
Additional features and advantages of the invention will be made apparent from the following detailed description of illustrative embodiments which proceeds with reference to the accompanying figures. It should be understood that the drawings are for purposes of illustrating the concepts of the disclosure and is not necessarily the only possible configuration for illustrating the disclosure.
The foregoing summary of the invention, as well as the following detailed description of illustrative embodiments, is better understood when read in conjunction with the accompanying drawings, which are included by way of example, and not by way of limitation with regard to the claimed invention. In the drawings, like numbers represent similar elements.
In the following description of various illustrative embodiments, reference is made to the accompanying drawings, which form a part thereof, and in which is shown, by way of illustration, how various embodiments in the invention may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modification may be made without departing from the scope of the present invention.
The above problems may be addressed through the use of ultrasonic communication between the devices to be connected to an access point of a WLAN. Speakers and microphones are widely available for ultrasonic communications in most mobile devices, allowing for contactless data exchange. For the ultrasonic communication as used herein is defined as being above 20 kHz. This frequency range is supported by regular microphones and speaker technologies. In some embodiments, the message exchanges using ultrasonic communications may have a time-to-life information content to prevent replay attacks and to limit the validation of the messages. The current invention describes a method to securely establish an ephemeral ultrasonic communication enlarged from point to multipoint to give to the end user all the necessary credentials that will allow them to have access to a private WLAN.
The use of ultrasonic technology as presented herein provides access to a private WiFi network without explicitly exposing credentials such as a login name or a password. To achieve this benefit, the message sending method presented is sequenced in a way that every participant/receiver will get only a part of the overall key. To obtain and build the entire key to get full access to the WiFi network, all participants have to cooperate and build the full WLAN access key or other access credentials.
Other advantages of the present invention include the replacement of near field communications through ultrasonic communication, the use of off-the-shelf mobile devices that are all equipped of microphone and speakers as master or slave devices, contactless and secure communications, and avoidance of easy WLAN credential exposure because the credential is never transmitted in total to be intercepted by a would-be hacker.
An example use of the current invention will allow a meeting organizer equipped of a mobile device to securely configure the wireless access network for the external invitees also equipped each with a mobile device through a way that is effortless as it will not require any login or password divulgation. It is assumed that the number N of invitees is known in order to divide the necessary credential information by this number N. The credential information necessary to access to the wireless network could be composed of 4 elements: the SSID, the login name, the password, and an additional element is the number of slave devices N.
All of the above 4 elements are termed the Access Network Credential Information (ANCI), and will be divided into N chunks. First the meeting organizer will ask the invitees to power “on” their mobile devices and click on a dedicated application icon (app) which will put their device in an ultrasonic listening mode. The master mobile device (M) 105 belonging to the meeting organizer will be put on the meeting table as a center piece and all invitee's devices are placed physically around as shown in
First is the initialization phase that determines which slave will receive the first ANCI chunk. Prior to conducting the following actions, the organizer has entered the number of participant on his mobile device, such as a smartphone, tablet, laptop, PDA, or other mobile equivalent. This allows the organizer's device, termed the master device M to check that all participants have replied. To do so, a specific ultrasonic sequence message
Seq. is broadcasted from the master device M device to the slave devices. The slave devices respond within an acknowledgement message providing their unique identifier (ID). When the master device M has received the N acknowledgements, corresponding to the N slave devices, the master device M will determine which slave device will receive the ANCI1 by sorting the slave devices by each acknowledgement arrival time. The arrival time will be unique as each slave device is physically located differently compared with the master device M device 105. That is, the distance between M 105 and the N slave devices are different. Per
The process occurs in two phases. Phase 1 is defined as a respective ANCI chunk being distributed using sequential ultrasonic transmissions from the master device M device to the slave devices. In order for a slave device to interpret uniquely the first broadcasted ANCI chunk, ANCI1, the master device M device will encrypt the ANCI1 chunk with the unique ID of the first slave device in a distribution sequence such that only 1 slave device is able to interpret the ANCI. Thus the sequential transmissions from the slave device M are as follows.
The master device M device broadcasts the encrypted ANCI1 with the S2 unique identifier (ID) to all slave devices that are in a listening mode. Only the first ranked slave device (S2 in the example) is able to decode the ANCI1 and it will store it and stop interacting. As a first embodiment, S2 will acknowledge this sequence by sending back a specific ultrasonic sound that will indicate to the master device M that the ANCI1 transmission ended successfully and that M can send the next message ANCI2. A second embodiment would be for the master device M to send sequentially the chunks from ANCI1 to ANCIN without waiting for acknowledge. The advantage of the first embodiment is that it verifies that the N chunk transmission sequencing to the correct slave has occurred.
Then the M device sends the ANCI2 encrypted with S1 unique ID to the slave devices. Only the 2nd ranked slave device is able to decode the ANCI2 and it will store it and stop interacting. This ANCI chunk transmission sequence will end when all slave devices have acknowledged successfully. The slave device status at the end this first phase is presented in
To enhance the security and the prevention of hacking, the order sequence of sending the ANCI chunk could be totally arbitrary (i.e. random) as opposed to the distance-based sequence discussed above. If an arbitrary (random) sequence is implemented and managed by the M device, the M device could provide the order of the sequence to all slaves at the end of the phase 2. Additionally, to minimize the occurrence of replay attacks, a time of life or a limited number of repetitions of the sequence can be used by the device M. This action would also serve to limit the validation of the messages.
Phase 2 is the mutual exchange between slave devices of their missing ANCI chunks. During phase 2, each slave device will exchange the missing ANCI chunk with each other in order to get the complete number of ANCI chunks. As S2 was the first to stop listening it can be understood that S2 will first send/broadcast through ultrasonic communication its chunk ANCI1 to all listening slave devices. Each slave device which will capture successfully the ANCI1 will acknowledge by sending a specific ultrasonic signal to notify S2 that the capture was successful. As the slave device knows the number of total slaves, it can wait until all remaining slave devices have acknowledged successfully. Then slave S1 sends the ANCI2 in the same way. This procedure produces a buildup of ANCI chunks in each slave device. Starting with the distribution of chunks at the end of Phase 2, shown in
At this point, the end of phase 2, the contents of each slave device are as indicated in
At this point, the M device could send to each of the slave devices the specific order that the received chunks must have in order to reconstruct the credential information. Although the order of ANCI1+ANCI2+ANCI3+ANCI4+ANCI5 is the original credential order, each slave has received its chunks in various orders as indicated in
At step 401, the ultrasonic credential application that allows the master mobile device to distribute a credential to slave devices is initiated. At step 405, the master device M receives the number N of the slave devices. Typically, this number may be entered by a user of the device M 105 or it may be a selection or a fixed or pre-selected value. At step 410 the slave devices, assumed to be turned on, are initiated. Step 410 involves sending to the slave devices an ultrasonic sequence initialization message Seqini which allows the master device M to establish communication with the slave devices that are in range and to check if all N slave participants have replied. The slave devices respond to the Seqini with an acknowledgement transmission from the slave to the master device M and provide the slave device unique ID.
At step 415, the device M determines the order of distribution (distribution sequence) of the chunks to the slave devices. There are several options for performing this operation. In one embodiment, an order of which slave will receive by sorting them by each arrival time. The arrival time will be unique as each slave device is placed differently against M device meaning the distance between M and the slave devices are different (see
Thus, time of arrival (i.e. distance of slave to master) can be used to set a distribution sequence order for the distribution of the chunks of the credential from the master device to the slave devices.
As will be described below, the distribution sequence is also a distribution communication sequence because it is the sequence used to initially distribute chunks of an access credential to the slaves via an ultrasonic communication. Thus, the distribution sequence can also be termed an ultrasonic distribution communication sequence because the distribution sequence controls the order of the communication from the master device to the slave devices of the credential chunks.
Once the number N of the slave devices needing an authorization credential is determined in step 405 and verified in step 410, then the Access Network Credential Information (ANCI) can be determined. The ANCI information can be the SSID of the wireless network to be accessed by the slave devices, the login name, the password, and the number of slave devices N. this information is divided into N number of separate chunks at step 420. Each chunk is identified with a chunk identifier. In an example, chunks ANCI1 thorough ANCI5 are determined if the number of slaves is 5. Steps 405. 410, 415, and 420 may be performed in an order different from that of example method 400 of
In step 425, chunks of the ANCI are transmitted to each slave in the distribution sequence determined in step 415. Step 425 also includes receiving acknowledgements from slaves that have received respective chunks. For example, in the example embodiment of
At step 440, device M may optionally send a message to all of the slave devices to start phase 2 of the method. In phase 2, the slaves share their respective chunks of the ANCI credential. Phase 2 is completed when all of the slaves have received all of the ANCI chunks. This event is optionally reported to the master device M at step 445 by a transmission from the last slave in the distribution sequence receiving the last shared chunk of the credential. At this point each slave device has all of the chunks of the credential. The method a sharing of the various chunks of credential is described using
At step 510, the slave device receives a communication from the master device M. The communication is one of the chunks of the credential needed to access a wireless network. The credential intended for a specific slave is encrypted with the slave ID so that only the slave having the corresponding ID can properly decode the chunk that is transmitted. The slave device receives the intended chunk at step 510 and stores the chunk. At step 515, the slave device acknowledges that the chunk has been received and decoded by sending to the master device M an acknowledgement message. At the master device, upon reception of the acknowledgement, the master device M continues to send out chunks of the credential. Phase 1 is completed when all of the slave devices have received their respective ANCI chunk and have acknowledged receipt to the master device M.
At step 520, the slave receives the distribution sequence from the master. The distribution sequence is transmitted via an ultrasonic broadcast transmission to all slave devices. As an option, if the collection of slave devices can be organized as a multicast group, then an ultrasonic multicast transmission may be made. In either event the slave receives the distribution sequence which is used in the chunk sharing process and credential reconstruction process described below.
At step 522, the slave may optionally receive a chunk sharing message from the master device M to begin phase 2. Steps 525, 530, and 532 function to have the slave transmit its chunk received in phase 1 to all other slaves using the distribution sequence. Step 525 starts phase 2 that allows slaves to exchange their mutual ANCIs until they have all of them ready for reconstruction. Step 525 functions to share the received chunk, such as those in the
Assuming that the particular slave completes step 530, then that slave receives other chunks transmitted from other slave devices at step 535. Note that according to where in the distribution sequence the slave is, step 535 may be performed before steps 525 and 530. At step 538, a slave, such as the last slave in the distribution sequence may optionally transmit a chunk sharing complete message to the master device M. At step 540, the slave devices receive, via ultrasonic communication, the sequence of reconstruction in a broadcast message. The reconstruction sequence is a message containing an arrangement needed by each individual slave device to reconstruct the access credential. For example, looking at
It should be noted that the master and slave devices respond to each other via the functionality of
Alternative embodiments to the above-described example are possible. For example, instead of sharing the ANCI chunks, the ultrasonic communication system can also use encoded chunks, including redundant information from the neighbor nodes. Such a coding scheme transforms a message of N symbols (corresponding to the N participants) into a longer message (code word) with n symbols (strictly lower than the N) such that the original message can be recovered from a subset of the n symbols.
The advantage of this alternate embodiment is a higher redundancy of the system. That means that not all participating devices have to cooperate (due to node failures or departures). In turn, such an extension of the basic principles to the alternate embodiment also opens the system for attacks, so a compromise between security and redundancy should be addressed. However, in the alternate embodiment, the system will also be faster in exchanging the ANCI chunks as the nodes do not need to wait until all nodes sent their part of the code.
Generally, the master or slave device is a mobile device such as but not limited to a cell phone, PDA, tablet, laptop, wearable electronic device, and the like. Device 600 can be used as either a master or a slave due to the presence of an application program that is installed in the device allowing functionality of either the master method of
A hardware controller/processor 608 is used to execute instructions, the instructions being resident on either the control memory 610 or the storage medium 606. The controller/processor 608 executes application program instructions, such as those resulting from flow diagrams of
Audio interface 602, having an ultrasonic transceiver 102, is an ultrasonic interface allowing the transmission and reception of ultrasonic communications between master device and slave devices according to the principles of the invention. Although this interface is shown as being one unit, the audio interface may be split up as an audio speaker for transmission of ultrasonic messages or a microphone for reception of ultrasonic messages. The elements of device 600 support the functionality presented in
The implementations described herein may be implemented in, for example, a method or process, an apparatus, or a combination of hardware and software. Even if only discussed in the context of a single form of implementation (for example, discussed only as a method), the implementation of features discussed may also be implemented in other forms. For example, implementation can be accomplished via a hardware apparatus, or via a hardware and software apparatus. An apparatus may be implemented in, for example, appropriate hardware, software, and firmware. The methods may be implemented in, for example, an apparatus such as, for example, a processor, which refers to any processing device, including, for example, a computer, a microprocessor, an integrated circuit, or a programmable logic device.
Additionally, the methods may be implemented by instructions being performed by a processor, and such instructions may be stored on a processor or computer-readable media such as, for example, an integrated circuit, a software carrier or other storage device such as, for example, a hard disk, a compact diskette (“CD” or “DVD”), a random access memory (“RAM”), a read-only memory (“ROM”) or any other magnetic, optical, or solid state media. The instructions may form an application program tangibly embodied on a computer-readable medium such as any of the media listed above or known to those of skill in the art. The instructions thus stored are useful to execute elements of hardware and software to perform the steps of the method described herein.
Number | Date | Country | Kind |
---|---|---|---|
15306041.3 | Jun 2015 | EP | regional |