×

Systems and methods for secure communications between devices

  • US 10,114,939 B1
  • Filed: 09/22/2014
  • Issued: 10/30/2018
  • Est. Priority Date: 09/22/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for secure communications between devices, the steps of the method being performed by an intermediary computing device, comprising at least one processor, that provides authentication and privilege evaluation services to constrained devices, the method comprising:

  • receiving, from a control device that is capable of transmitting control directives to a constrained smart device, a first X.509 certificate that binds an identity with a public encryption key and identifies the control device;

    retrieving, from the first X.509 certificate;

    authentication information comprising the public encryption key;

    a permission setting indicating that the control device is only permitted to submit a device configuration command to configure the constrained smart device specified by the first X.509 certificate, wherein other types of commands are not permitted; and

    an extension, within the first X.509 certificate, comprising a request from the control device to interact with the constrained smart device that lacks resources to perform authentication and privilege evaluation, wherein the requested interaction comprises a request to submit a command to the constrained smart device;

    determining, based on the request included in the extension, that the control device is requesting to submit a command to the constrained smart device;

    additionally receiving, from the constrained smart device, a second X.509 certificate;

    retrieving, from the second X.509 certificate, authentication information that identifies the constrained smart device;

    analyzing the authentication information in the first X.509 certificate in an attempt to use the authentication information to authenticate the control device;

    analyzing the authentication information in the second X.509 certificate in an attempt to use the authentication information to authenticate the constrained smart device;

    authenticating the control device based on the analyzed authentication information in the first X.509 certificate;

    authenticating the constrained smart device based on the analyzed authentication information in the second X.509 certificate; and

    upon successful authentication of the control device and the constrained smart device and in response to the determination that the requested interaction comprises a request to submit a command to the constrained smart device, restricting the requested interaction based on the permission setting in the first X.509 certificate, wherein restricting the requested interaction comprises;

    allowing the requested interaction in response to a determination that the requested interaction comprises a request to configure the constrained smart device;

    orrejecting the requested interaction in response to a determination that the requested interaction comprises a request to perform a type of command that is not a request to configure the constrained smart device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×