The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 29, 2016

Filed:

Dec. 20, 2013
Applicant:

John A. Nix, Evanston, IL (US);

Inventor:

John A. Nix, Evanston, IL (US);

Assignee:

M2M and IoT Technologies, LLC, Evanston, IL (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 9/00 (2006.01); H04L 9/32 (2006.01); H04W 52/02 (2009.01); H04W 12/04 (2009.01); H04W 4/00 (2009.01); H04L 9/08 (2006.01); H04W 12/06 (2009.01); H04W 12/02 (2009.01); H04L 29/08 (2006.01); H04L 29/06 (2006.01); H04L 9/30 (2006.01); G06F 21/35 (2013.01);
U.S. Cl.
CPC ...
H04L 9/3247 (2013.01); G06F 21/35 (2013.01); H04L 9/006 (2013.01); H04L 9/085 (2013.01); H04L 9/0816 (2013.01); H04L 9/0861 (2013.01); H04L 9/0894 (2013.01); H04L 9/30 (2013.01); H04L 9/32 (2013.01); H04L 9/321 (2013.01); H04L 63/0272 (2013.01); H04L 63/045 (2013.01); H04L 63/061 (2013.01); H04L 67/04 (2013.01); H04W 4/005 (2013.01); H04W 12/02 (2013.01); H04W 12/04 (2013.01); H04W 12/06 (2013.01); H04W 52/0216 (2013.01); H04W 52/0235 (2013.01); G06F 2221/2105 (2013.01); G06F 2221/2107 (2013.01); G06F 2221/2115 (2013.01); H04L 63/0442 (2013.01); H04L 63/123 (2013.01); H04L 2209/805 (2013.01);
Abstract

Methods and systems are provided for efficient and secure 'Machine-to-Machine' (M2M) between modules and servers. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private/public keys using cryptographic algorithms and a set of cryptographic parameters. The module can authenticate the submission of derived public keys. The module and server can mutually derive shared secret keys using the PKI keys. Data can be encrypted and decrypted using a set of cryptographic algorithms, the secret shared keys, and the set of cryptographic parameters. A module can send and receive sets of cryptographic parameters in order to flexibly and securely communicate with a variety of servers over time.


Find Patent Forward Citations

Loading…