Securing communications between interconnected devices
First Claim
1. A system comprising:
- a device node of a network, the device node comprising;
one or more first processors; and
first memory storing first instructions that, when executed by the one or more first processors, cause the device node to;
encrypt, using a first key, a first session identifier in order to obtain a first encrypted session identifier;
a computing device used to access the device node, the computing device comprising;
one or more second processors; and
second memory storing second instructions that, when executed by the one or more second processors, cause the computing device to;
receive, from the device node, the first encrypted session identifier;
decrypt, using the first key, the first encrypted session identifier in order to obtain a first decrypted session identifier;
encrypt, using a second key, the first decrypted session identifier in order to obtain a second encrypted session identifier;
encrypt, using a third key, a message for the device node in order to obtain an encrypted message; and
transmit, to the device node, the second encrypted session identifier and the encrypted message;
wherein the first instructions, when executed, further cause the device node to, in response to receiving the second encrypted session identifier;
decrypt, using the second key, the second encrypted session identifier in order to obtain a second decrypted session identifier; and
decrypt, using the third key, the encrypted message in order to obtain the message for the device node.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and devices for forming networks of interconnected devices are provided. Individual devices of the network are configured to utilize multiple wireless communication standards which may include wireless LAN communication standards, short-range wireless communication standards, and low-power wireless communication standards. User utilize access devices to monitor and control the devices of the network. Communications transmitted to devices of the network may be routed through a server located remotely relative to the network as well as through other devices of the network. The devices of the network are configured with multiple security modes having different security features resulting in different response times. The security mode a device utilizes when communicating with an access device or another device of the network is selectable by the user.
132 Citations
23 Claims
-
1. A system comprising:
-
a device node of a network, the device node comprising; one or more first processors; and first memory storing first instructions that, when executed by the one or more first processors, cause the device node to; encrypt, using a first key, a first session identifier in order to obtain a first encrypted session identifier; a computing device used to access the device node, the computing device comprising; one or more second processors; and second memory storing second instructions that, when executed by the one or more second processors, cause the computing device to; receive, from the device node, the first encrypted session identifier; decrypt, using the first key, the first encrypted session identifier in order to obtain a first decrypted session identifier; encrypt, using a second key, the first decrypted session identifier in order to obtain a second encrypted session identifier; encrypt, using a third key, a message for the device node in order to obtain an encrypted message; and transmit, to the device node, the second encrypted session identifier and the encrypted message; wherein the first instructions, when executed, further cause the device node to, in response to receiving the second encrypted session identifier; decrypt, using the second key, the second encrypted session identifier in order to obtain a second decrypted session identifier; and decrypt, using the third key, the encrypted message in order to obtain the message for the device node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
by a computing device used to access a device node of a network; receiving, from the device node, a first encrypted session identifier, wherein the first encrypted session identifier is encrypted with a first key associated with the device node; retrieving, from memory of the computing device and based on a device node identifier of the device node, the first key, a second key associated with the device node, and a third key associated with the device node; decrypting, using the first key, the first encrypted session identifier in order to obtain a first decrypted session identifier; encrypting, using the second key, the first decrypted session identifier in order to obtain a second encrypted session identifier; encrypting, using the third key, a message for the device node in order to obtain an encrypted message; and transmitting, to the device node, the second encrypted session identifier and the encrypted message; wherein receipt, by the device node, of the second encrypted session identifier and the encrypted message causes the device node to; decrypt, using the second key, the second encrypted session identifier in order to obtain a second decrypted session identifier; and decrypt, using the third key, the encrypted message in order to obtain the message for the device node. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A method comprising:
by a device node of a network; encrypting, using a first key, a first session identifier in order to obtain a first encrypted session identifier; transmitting, to a computing device used to access the device node, the first encrypted session identifier; receiving, from the computing device, a second encrypted session identifier encrypted with a second key different from the first key; receiving, from the computing device, an encrypted message encrypted with a third key different from the first key and different from the second key wherein the encrypted message comprises a command for the device node to execute; decrypting, using the second key, the second encrypted session identifier in order to obtain a second decrypted session identifier; evaluating whether the second decrypted session identifier matches the first session identifier; and at least in response to determining that the second decrypted session identifier matches the first session identifier, decrypting, using the third key, the encrypted message in order to obtain the command and executing the command obtained. - View Dependent Claims (18, 19, 20, 21, 22, 23)
Specification