Power management and security for wireless modules in “machine-to-machine” communications
First Claim
1. A computer system comprising:
- (a) one or more processors; and
(b) one or more computer-readable media operatively connected to the one or more processors and having stored thereon instructions that, when executed by the one or more processors, cause the computer system to perform a method of saving power during machine to machine communication of sensor information over a wireless network, the method comprising steps of;
(1) storing, by the computer system at a wireless module, identity information related to the wireless module;
(2) transmitting, by the computer system from the wireless module to a communication network server via the wireless network, the identity information to identify the wireless module to a wireless network server and establish a connection with the communication network server;
(3) changing, by the computer system at the wireless module, a processor of the wireless module to a sleep mode and a radio of the wireless module to an off mode;
(4) determining, by the computer system at the wireless module, whether a predetermined sleep mode time has expired;
(5) changing, by the computer system at the wireless module when the predetermined sleep mode time has expired, the processor of the wireless module to an active mode and the radio to an on state;
(6) recording, by the computer system at the wireless module, sensor information;
(7) encrypting, by the computer system at the wireless module, the sensor information using a derived key based on at least a module private key;
(8) transmitting, by the computer system from the wireless module via the wireless network, the encrypted sensor information;
(9) receiving, by the computer system at the wireless module via the wireless network, encrypted confirmation information;
(10) decrypting, by the computer system at the wireless module, using the derived key, the encrypted confirmation information;
(11) confirming, by the computer system at the wireless module, that the encrypted sensor information was received by an application server based at least on the decrypted confirmation information; and
(12) changing, by the computer system at the wireless module, by a processor of the wireless module a sleep mode and by a radio of the wireless module an off mode in response to the determination that the encrypted sensor information was received by an application server.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications. A wireless module operating in a wireless network and with access to the Internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (PLMN) that supports wireless wide area network technology including 3rd generation (3G) and 4th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state. Messages between the wireless module and server can be transmitted according to the UDP or UDP Lite protocol with channel coding in the datagram body for efficiency while providing robustness to bit errors. The wireless module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The wireless module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The communication system between the wireless module and the server can conserve battery life in the wireless module while providing a system that is secure, scalable, and robust.
-
Citations
16 Claims
-
1. A computer system comprising:
-
(a) one or more processors; and (b) one or more computer-readable media operatively connected to the one or more processors and having stored thereon instructions that, when executed by the one or more processors, cause the computer system to perform a method of saving power during machine to machine communication of sensor information over a wireless network, the method comprising steps of; (1) storing, by the computer system at a wireless module, identity information related to the wireless module; (2) transmitting, by the computer system from the wireless module to a communication network server via the wireless network, the identity information to identify the wireless module to a wireless network server and establish a connection with the communication network server; (3) changing, by the computer system at the wireless module, a processor of the wireless module to a sleep mode and a radio of the wireless module to an off mode; (4) determining, by the computer system at the wireless module, whether a predetermined sleep mode time has expired; (5) changing, by the computer system at the wireless module when the predetermined sleep mode time has expired, the processor of the wireless module to an active mode and the radio to an on state; (6) recording, by the computer system at the wireless module, sensor information; (7) encrypting, by the computer system at the wireless module, the sensor information using a derived key based on at least a module private key; (8) transmitting, by the computer system from the wireless module via the wireless network, the encrypted sensor information; (9) receiving, by the computer system at the wireless module via the wireless network, encrypted confirmation information; (10) decrypting, by the computer system at the wireless module, using the derived key, the encrypted confirmation information; (11) confirming, by the computer system at the wireless module, that the encrypted sensor information was received by an application server based at least on the decrypted confirmation information; and (12) changing, by the computer system at the wireless module, by a processor of the wireless module a sleep mode and by a radio of the wireless module an off mode in response to the determination that the encrypted sensor information was received by an application server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification