System and method for implementing secure communications for internet of things (IOT) devices
First Claim
1. A method, comprising:
- providing, with a computing device, connectivity between a first device and a second device over at least one network, by establishing an Internet-of-Things (“
IoT”
) protocol-based, machine-to-machine communication channel between the first device and the second device over the at least one network that allows autonomous machine-to-machine communications between the first device and the second device, without any user interaction or any user input during the autonomous machine-to-machine communications;
receiving, with the computing device, an indication from at least one of the first device and the second device that at least one data packet of the plurality of data packets will contain sensitive information; and
automatically establishing, based at least in part on receiving the indication from at least one of the first device and the second device that at least one data packet of the plurality of data packets will contain sensitive information, without any user interaction or any user input, and with the computing device, a secure off-the-record (“
OTR”
) communication session within the IoT protocol-based, machine-to-machine communication channel between the first device and the second device over the at least one network, the secure OTR communication session providing encrypted machine-to-machine communications between the first device and the second device, without any content of communications that is exchanged between the first device and the second device over the secure OTR communication session being recorded or, logged wherein the secure OTR communication session utilizes one or more cryptographic protocols or techniques selected from a group consisting of AES symmetric-key algorithm, Diffie-Hellman key exchange, SHA-1 hash function, forward secrecy, deniable authentication, and malleable encryption, wherein the IoT protocol-based, machine-to-machine communication channel is established using an IoT protocol, wherein the secure OTR communication session is established using an OTR communication protocol, and wherein the OTR communication protocol is part of the IoT protocol, and wherein the first device and the second device are located in proximity to each other.
1 Assignment
0 Petitions
Accused Products
Abstract
Novel tools and techniques might provide for implementing secure communications for IoT devices. In various embodiments, a gateway or computing device might provide connectivity between or amongst two or more Internet of Things (“IoT”) capable devices, by establishing an IoT protocol-based, autonomous machine-to-machine communication channel amongst the two or more IoT capable devices. For sensitive and/or private communications, the gateway or computing device might establish a secure off-the-record (“OTR”) communication session within the IoT protocol-based, autonomous machine-to-machine channel, thereby providing encrypted machine-to-machine communications amongst the two or more IoT capable devices, without any content of communications that are exchanged amongst the IoT capable devices over the secure OTR communication session being recorded or logged. In some cases, the secure OTR communication session utilizes cryptographic protocols including, without limitation, one or more of AES symmetric-key algorithm, Diffie-Hellman key exchange, SHA-1 hash function, forward secrecy, deniable authentication, malleable encryption, and/or the like.
126 Citations
14 Claims
-
1. A method, comprising:
-
providing, with a computing device, connectivity between a first device and a second device over at least one network, by establishing an Internet-of-Things (“
IoT”
) protocol-based, machine-to-machine communication channel between the first device and the second device over the at least one network that allows autonomous machine-to-machine communications between the first device and the second device, without any user interaction or any user input during the autonomous machine-to-machine communications;receiving, with the computing device, an indication from at least one of the first device and the second device that at least one data packet of the plurality of data packets will contain sensitive information; and automatically establishing, based at least in part on receiving the indication from at least one of the first device and the second device that at least one data packet of the plurality of data packets will contain sensitive information, without any user interaction or any user input, and with the computing device, a secure off-the-record (“
OTR”
) communication session within the IoT protocol-based, machine-to-machine communication channel between the first device and the second device over the at least one network, the secure OTR communication session providing encrypted machine-to-machine communications between the first device and the second device, without any content of communications that is exchanged between the first device and the second device over the secure OTR communication session being recorded or, logged wherein the secure OTR communication session utilizes one or more cryptographic protocols or techniques selected from a group consisting of AES symmetric-key algorithm, Diffie-Hellman key exchange, SHA-1 hash function, forward secrecy, deniable authentication, and malleable encryption, wherein the IoT protocol-based, machine-to-machine communication channel is established using an IoT protocol, wherein the secure OTR communication session is established using an OTR communication protocol, and wherein the OTR communication protocol is part of the IoT protocol, and wherein the first device and the second device are located in proximity to each other. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computing device, comprising:
-
at least one processor; and a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the computing device to; provide connectivity between a first device and a second device over at least one network, by establishing an Internet-of-Things (“
IoT”
) protocol-based, machine-to-machine communication channel between the first device and the second device over the at least one network that allows autonomous machine-to-machine communications between the first device and the second device, without any user interaction or any user input during the autonomous machine-to-machine communications;receive an indication from at least one of the first device and the second device that at least one data packet of the plurality of data packets will contain sensitive information; and automatically establish, based at least in part on receiving the indication from at least one of the first device and the second device that at least one data packet of the plurality of data packets will contain sensitive information and without any user interaction or any user input, a secure off-the-record (“
OTR”
) communication session within the IoT protocol-based, machine-to-machine communication channel between the first device and the second device over the at least one network, the secure OTR communication session providing encrypted machine-to-machine communications between the first device and the second device, without any content of communications that is exchanged between the first device and the second device over the secure OTR communication session being recorded or, logged, wherein the secure OTR communication session utilizes one or more cryptographic protocols or techniques selected from a group consisting of AES symmetric-key algorithm, Diffie-Hellman key exchange, SHA-1 hash function, forward secrecy, deniable authentication, and malleable encryption, wherein the IoT protocol-based, machine-to-machine communication channel is established using an IoT protocol, wherein the secure OTR communication session is established using an OTR communication protocol, and wherein the OTR communication protocol is part of the IoT protocol, and wherein the first device and the second device are located in proximity to each other. - View Dependent Claims (11)
-
-
12. An Internet-of-Things (“
- IoT”
) capable device, comprising;at least one processor; and a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the IoT capable device to; send an indication to a computing system that at least one data packet of the plurality of data packets will contain sensitive information; and send information to a second IoT capable device over a secure off-the-record (“
OTR”
) communication session that is automatically established, without any user interaction or any user input, within an IoT protocol-based, machine-to-machine communication channel between the IoT capable device and the second IoT capable device over at least one network, the secure OTR communication session providing encrypted machine-to-machine communications between the IoT capable device and the second IoT capable device, without the information being recorded or, logged wherein the secure OTR communication session utilizes one or more cryptographic protocols or techniques selected from a group consisting of AES symmetric-key algorithm, Diffie-Hellman key exchange, SHA-1 hash function, forward secrecy, deniable authentication, and malleable encryption, wherein the IoT protocol-based, machine-to-machine communication channel is established using an IoT protocol, wherein the secure OTR communication session is established using an OTR communication protocol, and wherein the OTR communication protocol is part of the IoT protocol, and wherein the first device and the second device are located in proximity to each other. - View Dependent Claims (13, 14)
- IoT”
Specification