×

Power management and security for wireless modules in “machine-to-machine” communications

  • US 10,523,432 B2
  • Filed: 02/08/2019
  • Issued: 12/31/2019
  • Est. Priority Date: 09/10/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer system comprising:

  • (a) one or more processors; and

    (b) one or more computer-readable media operatively connected to the one or more processors and having stored thereon instructions that, when executed by the one or more processors, cause the computer system to perform a method of saving power during machine to machine communication of sensor information over a wireless network, the method comprising steps of;

    (1) storing, by the computer system at a wireless module, identity information related to the wireless module;

    (2) transmitting, by the computer system from the wireless module to a communication network server via the wireless network, the identity information to identify the wireless module to a wireless network server and establish a connection with the communication network server;

    (3) changing, by the computer system at the wireless module, a processor of the wireless module to a sleep mode and a radio of the wireless module to an off mode;

    (4) determining, by the computer system at the wireless module, whether a predetermined sleep mode time has expired;

    (5) changing, by the computer system at the wireless module when the predetermined sleep mode time has expired, the processor of the wireless module to an active mode and the radio to an on state;

    (6) recording, by the computer system at the wireless module, sensor information;

    (7) encrypting, by the computer system at the wireless module, the sensor information using a derived key based on at least a module private key;

    (8) transmitting, by the computer system from the wireless module via the wireless network, the encrypted sensor information;

    (9) receiving, by the computer system at the wireless module via the wireless network, encrypted confirmation information;

    (10) decrypting, by the computer system at the wireless module, using the derived key, the encrypted confirmation information;

    (11) confirming, by the computer system at the wireless module, that the encrypted sensor information was received by an application server based at least on the decrypted confirmation information; and

    (12) changing, by the computer system at the wireless module, by a processor of the wireless module a sleep mode and by a radio of the wireless module an off mode in response to the determination that the encrypted sensor information was received by an application server.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×