摘要 |
Technologies are generally described for methods and systems effective to authenticate an invited device. In some examples, a method for authenticating an invited device may include receiving, by an evaluating device, a first message from the invited device. The evaluating device may receive the first message at a first receiving time. The method may also include receiving, by the evaluating device, a second message from the inviting device. The evaluating device may receive the second message at a second receiving time. A first sending time, of the first message, and a second sending time, of the second message, may be mutually synchronized. The method may also include determining a receiving time difference between the first receiving time and the second receiving time. The method may also include, by the evaluating device, authenticating the invited device based on the receiving time difference, the first message and the second message. |
主权项 |
1. A method to authenticate an invited device, the method comprising, by an evaluating device:
receiving, at a first receiving time, a first message from the invited device; receiving, at a second receiving time, a second message from an inviting device; determining a receiving time difference between the first receiving time and the second receiving time; and authenticating the invited device based on the receiving time difference, the first message and the second message. |