This disclosure is based upon French Application No. 00/09774, filed on Jul. 26, 2000 and International Application No. PCT/FR01/02353, filed Jul. 19, 2001, the contents of which are incorporated herein by reference.
The invention relates to radiofrequency networks in which the network units communicate with one another by means of radiofrequency links and, more particularly, a method, in the networks, which permits two units in the network to recognise each other and to then communicate in a secure manner.
Making radiofrequency links between electronic units such as a personal computer, a printer, a mobile or fixed-line phone, etc., is known by making use of, for example, the specifications of a network known as “BLUETOOTH” which are defined in documents ETS 300-328 and ETS 300-339.
In such a BLUETOOTH network, the units each have an address by which they can be identified but this address is clearly transmitted in radiofrequency signals. The result is that the radiofrequency links are not secure.
To overcome this problem, it is proposed to enter an identical secret code in each of the two units to be connected and this will then permit session keys to be generated for authentication and encryption.
This process can prove to be tiresome, in that it is necessary to key in the code twice on a keyboard and the code may have numerous digits or letters.
Moreover, some network units, an earphone for a mobile phone, for example, might not have a keyboard, with the result that this code must be registered permanently, or almost permanently, in the unit with no keyboard. This leads to permission to access the network for anyone who picks up the unit, without having to identify themselves as a user.
It is also proposed to connect the two units with a cable link in order to exchange the session keys under maximum security, to ensure subsequent authentication and encryption. The inconvenient thing about this solution resides in the fact that each unit must be fitted with a special plug which will differ from one unit to another. An aim of the present invention, therefore, is to implement a process of recognition between two units in a radiofrequency network, a method which allows secure recognition of the two units to occur.
The invention, therefore, relates to a method of secure recognition between two units in a radiofrequency network, characterised in that it comprises the following steps, which consist in:
(d1) transmitting signals according to a radiation pattern, in such a way that the signals are only picked up by the slave unit,
(d2) launching a standard connection process to the radiofrequency network, and, in the case of successful connection to the radiofrequency network,
(d3) generating a recognition key with the intention of making subsequent connections secure,
(d4) re-transmitting signals according to the normal radiation pattern,
Steps (d1) and (d2) are repeated in the event of the failure of step (d2), connection to the radiofrequency network. Steps (d1) and (d2) are repeated at least once with a radiation diagram with a greater range. The increase in range is achieved by modifying the signal strength from the master unit, in particular. The invention also relates to a master unit to build the method according to the invention and which comprises a transmitter-receiver connected to a transmitting-receiving antenna, so as to implement a transmission-reception device, characterised by the transmission-reception device comprising means for modifying the range of the radiation pattern, so as to have an initial range corresponding to normal operation, and at least one second range smaller than the first one, to implement the method according to the invention.
Other characteristics and advantages of the present invention will become apparent on reading the following description of a particular embodiment, the said description being given by reference to the attached drawings in which:
The invention will be described in the establishment of a radiofrequency connection between a mobile phone 10 and an earphone 12 (
The units in a BLUETOOTH network are each fitted with a radiofrequency antenna, indicated at 14 for the phone 10 and 16 for the earphone 12.
As the two units 10 and 12 are to be interconnected, the first step of the method, according to the invention, consists in:
(a) switching on the two units with a button (button 24) and 12. The effect of this switching-on will be to start up the transmitter-receiver of each unit and to activate some functions such as the display on a screen 18 and a keypad 20 of the phone 10.
This screen 18 will display, for example, a menu with several options, one of which will be called “RECOGNITION”.
In the case of the two phones being equipped with a screen and a keypad, they will display the same menu. Then, in this case, the second step of the method consists in:
(b) selecting one of the two units as the master unit and the other as the slave unit. This selection does not exist in the case where only one of the two units has a display screen and a selection keypad, in which case it is the master unit.
As a result of this selection, the phone 10 acts as a master unit, whereas the earphone 12 acts as a slave unit.
When this selection has been made, the third step consists in:
(c) moving the two phones 10 and 12 closer together, so that their antennae 14 and 16 are in immediate proximity to one another.
At the end of this step, the phones do not yet transmit any radiofrequency signal.
The fourth step consists in:
(d) launching on the master unit, i.e., phone 10, an automatic secure recognition process by selecting the option “RECOGNITION” on the menu displayed on the screen 18, via the selection buttons 22.
The effect of this launching of the “RECOGNITION” process is to cause the standard process of connecting to the radiofrequency network to be implemented by the two units, but with one very important difference:
the master unit transmitter transmits radiofrequency signals according to a radiation pattern which has an extremely limited range, so as to be picked up only by another unit right next to it, such as the earphone 12 (
As soon as the slave unit is integrated in the radiofrequency network by the standard network process, the master unit generates a recognition key which is then used to make subsequent exchanges of information secure, between the master unit and the slave unit.
When the recognition key is known to the two units, the method, according to the invention, terminates and this termination is displayed on the screen (18) by a suitable message. The master unit re-transmits, according to the normal radiation pattern, which corresponds to the normal range. The two units can then be placed at a distance from each other and continue to exchange information according to the standard network process, but those exchanges are secure, thanks to the recognition key.
If the method does not result in recognition, this fault is communicated to the user by a display or by any other means. The user may then recommence the method at step (b) without changing the master unit or by using the other unit as the master unit when it is possible to do so.
If several slave units are in operation within the zone covered by the radiation pattern, their presence will be detected by the master unit, which will then give a forceful message indicating this situation, for example, “Insecure environment: several units present”.
In order to take account of the fact that the range of a radiation pattern depends on the power available from the batteries of the master unit, the method of the invention provides for several successive signal transmissions by the master unit at increasing power levels, in the case of the recognition process not ending with the lowest power level.
These transmissions at increasing power levels are stopped as soon as the recognition process has ended.
The implementation of the method according to the invention entails the master unit being modified to be able to transmit signals in accordance with at least two radiation patterns, one with a limited range for recognition and the other with a normal range for normal operation without recognition.
This can be achieved by using two different antennae, one for recognition, according to the invention, and the other for normal operation. Just one antenna can also be used, with a power stage 28 providing power which is modulated, for example, by modifying its input impedance 30 (
The input impedance 30 is then modified, so as to tune the oscillating circuit progressively, and to attain the minimum power-level required for the signals transmitted by the master unit to be picked up by the slave unit.
The directivity of the antenna can also be modified, so as to favour a particular transmission angle corresponding to the arrow 36. Only the slave unit 38 which is set in this direction 36 will receive the transmitted signals.
When the secure link has been established between two units, according to the method of the invention, it can be interrupted, either voluntarily, by stopping one of the two units, or by exceeding the master unit radiation range.
In both cases, the secure link can only be reestablished by restarting the steps of the method at its beginning, which involves establishing the new link with another recognition key.
It will not, however, be necessary to repeat step (a), starting the unit, which has not been stopped, since a restart button has been provided to set the unit to step (b).
Number | Date | Country | Kind |
---|---|---|---|
00 09774 | Jul 2000 | FR | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/FR01/02353 | 7/19/2001 | WO | 00 | 5/27/2003 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO02/09345 | 1/31/2002 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5581598 | Hachiga | Dec 1996 | A |
6094487 | Butler et al. | Jul 2000 | A |
6157826 | Lee | Dec 2000 | A |
6163843 | Inoue et al. | Dec 2000 | A |
6167513 | Inoue et al. | Dec 2000 | A |
6199161 | Ahvenainen | Mar 2001 | B1 |
6326926 | Shoobridge et al. | Dec 2001 | B1 |
6334059 | Stilp et al. | Dec 2001 | B1 |
6463290 | Stilp et al. | Oct 2002 | B1 |
6493550 | Raith | Dec 2002 | B1 |
6496928 | Deo et al. | Dec 2002 | B1 |
6760319 | Gerten et al. | Jul 2004 | B1 |
6985750 | Vicknair et al. | Jan 2006 | B1 |
7158756 | Palin et al. | Jan 2007 | B2 |
7164353 | Puleston et al. | Jan 2007 | B2 |
7286834 | Walter | Oct 2007 | B2 |
7289631 | Ishidoshiro | Oct 2007 | B2 |
7295556 | Roese et al. | Nov 2007 | B2 |
20030210787 | Billhartz et al. | Nov 2003 | A1 |
20060014547 | Walter | Jan 2006 | A1 |
20070201087 | Saito | Aug 2007 | A1 |
Number | Date | Country |
---|---|---|
2 254 225 | Sep 1992 | GB |
Number | Date | Country | |
---|---|---|---|
20030200434 A1 | Oct 2003 | US |