The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 23, 2021

Filed:

May. 08, 2019
Applicant:

Iot and M2m Technologies, Llc, Evanston, IL (US);

Inventor:

John A. Nix, Evanston, IL (US);

Assignee:

lOT AND M2M TECHNOLOGIES, LLC, Evanston, IL (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/08 (2006.01); H04W 12/06 (2021.01); H04L 29/06 (2006.01); H04L 9/30 (2006.01); H04L 9/32 (2006.01); H04L 12/24 (2006.01); H04W 12/041 (2021.01); H04W 84/12 (2009.01); H04L 9/06 (2006.01);
U.S. Cl.
CPC ...
H04L 9/0841 (2013.01); H04L 9/0861 (2013.01); H04L 9/3013 (2013.01); H04L 9/3066 (2013.01); H04L 9/3263 (2013.01); H04L 41/0809 (2013.01); H04L 63/0435 (2013.01); H04W 12/041 (2021.01); H04W 12/06 (2013.01); H04L 9/0643 (2013.01); H04L 2209/80 (2013.01); H04W 84/12 (2013.01);
Abstract

A network can operate a WiFi access point with credentials. An unconfigured device can support a Device Provisioning Protocol (DPP), and record bootstrap public keys and initiator private keys. The network can record bootstrap public and responder private keys and operate a DPP server. A responder proxy can establish a secure and mutually authenticated connection with the network. The network can (i) derive responder ephemeral public and private keys, (ii) record the initiator bootstrap public key, and (iii) select a responder mode for the responder. The network can derive an encryption key with at least the (i) recorded the initiator bootstrap public key and (ii) derived responder ephemeral private key. The network can encrypt credentials using at least the derived encryption key and send the encrypted credentials through the responder proxy to the initiator, which can forward the encrypted credentials to the device, thereby supporting a device configuration.


Find Patent Forward Citations

Loading…