Increased communication security
First Claim
Patent Images
1. A system comprising:
- a first computer system; and
a second computer system,wherein said first computer system is configured to generate a Constrained Application Protocol (CoAP) message including authentication data and message data, and wherein said first computer system is further configured to communicate said CoAP message for delivery to said second computer system, andwherein said second computer system is configured to perform message validation based on said authentication data, wherein said second computer system is configured to determine that said CoAP message is invalid if at least one condition is not met, wherein said at least one condition includes whether a payload of said CoAP message is at least a predetermined size, and wherein said second computer system is configured to perform, if said CoAP message is valid, at least one operation associated with said CoAP message.
2 Assignments
0 Petitions
Accused Products
Abstract
A system may include a first computer system and a second computer system. The first computer system may be configured to generate a Constrained Application Protocol (CoAP) message including authentication data and message data. The first computer system may be further configured to communicate the CoAP message for delivery to the second computer system. The second computer system may be configured to perform message validation based on the authentication data.
-
Citations
26 Claims
-
1. A system comprising:
-
a first computer system; and a second computer system, wherein said first computer system is configured to generate a Constrained Application Protocol (CoAP) message including authentication data and message data, and wherein said first computer system is further configured to communicate said CoAP message for delivery to said second computer system, and wherein said second computer system is configured to perform message validation based on said authentication data, wherein said second computer system is configured to determine that said CoAP message is invalid if at least one condition is not met, wherein said at least one condition includes whether a payload of said CoAP message is at least a predetermined size, and wherein said second computer system is configured to perform, if said CoAP message is valid, at least one operation associated with said CoAP message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
a first computer system; and a second computer system, wherein said first computer system is configured to generate a Constrained Application Protocol (CoAP) message including authentication data and message data, and wherein said first computer system is further configured to communicate said CoAP message for delivery to said second computer system, and wherein said second computer system is configured to perform message validation based on said authentication data, wherein said second computer system is configured to determine that said CoAP message is invalid if at least one condition is not met, wherein said at least one condition includes whether said CoAP message includes a unique identifier associated with said first computer system, and wherein said second computer system is configured to perform, if said CoAP message is valid, at least one operation associated with said CoAP message. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification