Power management and security for wireless modules in “machine-to-machine” communications
First Claim
1. A method for a wireless module to transmit a sensor measurement, the method performed by the wireless module, the method comprising the wireless module, in sequence:
- changing (i) a processor from a sleep state to an active state and (ii) a radio from a radio off state to a connected state;
transmitting a message, wherein the message includes (i) the sensor measurement, (ii) a server address, and (iii) a module identity for the wireless module;
receiving a response, wherein the response includes (i) a channel coding, (ii) a security token, and (iii) a module instruction, wherein the module instruction includes a sleep timer; and
changing (i) the processor from the active state to the sleep state, and (ii) the radio from the connected state to the radio off state, before (a) the radio for the wireless module utilizes a discontinuous reception (DRX) state and while (b) the wireless module comprises a radio resource control connected (RRC_CONNECTED) state, wherein the processor uses the sleep timer to determine a duration of the sleep state.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications. A wireless module operating in a wireless network and with access to the Internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (PLMN) that supports wireless wide area network technology including 3rd generation (3G) and 4th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state. Messages between the wireless module and server can be transmitted according to the UDP or UDP Lite protocol with channel coding in the datagram body for efficiency while providing robustness to bit errors. The wireless module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The wireless module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The communication system between the wireless module and the server can conserve battery life in the wireless module while providing a system that is secure, scalable, and robust.
185 Citations
20 Claims
-
1. A method for a wireless module to transmit a sensor measurement, the method performed by the wireless module, the method comprising the wireless module, in sequence:
-
changing (i) a processor from a sleep state to an active state and (ii) a radio from a radio off state to a connected state; transmitting a message, wherein the message includes (i) the sensor measurement, (ii) a server address, and (iii) a module identity for the wireless module; receiving a response, wherein the response includes (i) a channel coding, (ii) a security token, and (iii) a module instruction, wherein the module instruction includes a sleep timer; and changing (i) the processor from the active state to the sleep state, and (ii) the radio from the connected state to the radio off state, before (a) the radio for the wireless module utilizes a discontinuous reception (DRX) state and while (b) the wireless module comprises a radio resource control connected (RRC_CONNECTED) state, wherein the processor uses the sleep timer to determine a duration of the sleep state. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for a wireless module to transmit a sensor measurement, the method performed by the wireless module, the method comprising the wireless module:
-
recording a first sleep timer, a module identity, a key, and a server address in a nonvolatile memory; using the first sleep timer to change (i) a processor from a sleep state to an active state and (ii) a radio from a radio off state to a connected state; transmitting a message to the server address, wherein the message includes the module identity and module encrypted data, wherein the module encrypted data is encrypted using the key, and wherein module encrypted data includes the sensor measurement; receiving a response, wherein the response includes a channel coding, a security token, and a module instruction, wherein the module instruction includes a second sleep timer; and changing (i) the processor from the active state to the sleep state, and (ii) the radio from the connected state to the radio off state, before the wireless module receives a radio resource connection release, wherein the processor uses the second sleep timer to determine a duration of the sleep state. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method for supporting machine-to-machine communications, the method performed by a wireless module, the method comprising:
-
reading from a nonvolatile memory (i) a module identity, (ii) a key, and (iii) a server address; changing a radio in the wireless module from a radio off state to a connected state, wherein the radio off state comprises the radio not utilizing a discontinuous receive (DRX) timer; transmitting a message to the server address, wherein the message comprises a user datagram protocol (UDP) packet, wherein the UDP packet includes module encrypted data, wherein the wireless module encrypts the module encrypted data using the key, and wherein the module encrypted data includes a sensor measurement and a security token; receiving a response to the message, wherein the response includes the security token and a digital signature for the security token; and changing (i) the processor from the active state to the sleep state, and (ii) the radio from the connected state to the radio off state. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification