×

Method and apparatus for providing secure communication among constrained devices

  • US 10,728,043 B2
  • Filed: 07/20/2016
  • Issued: 07/28/2020
  • Est. Priority Date: 07/21/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method for secure communication between constrained devices comprising:

  • issuing, by an authorization server, cryptographic communication rights among a plurality of constrained devices where each of the plurality of constrained devices comprises no more than one cryptographic algorithm code module per cryptographic function wherein issuing comprises issuing asymmetric key based configuration certificates or symmetric key based tickets to the plurality of constrained devices that include data identifying at least other constrained devices of the plurality of constrained devices with whom a subject constrained device is permitted to cryptographically communicate with to allow the plurality of constrained devices to cryptographically exchange information between specified ones of the plurality of constrained devices;

    receiving, by the authorization server, a cryptographic communication rights request associated with at least a first of the plurality of constrained devices in response to a cryptographic algorithm update request that requests a replacement cryptographic code module update for a constrained device;

    providing, by the authorization server, a response to the cryptographic communication rights request that requests a replacement cryptographic code module update, comprising an identification of a subset of the plurality of constrained devices that have cryptographic communication rights in common with the identified first of the plurality of constrained devices;

    wherein providing, by the authorization server, the response comprising the identification of the subset of the plurality of constrained devices that have cryptographic communication rights comprises determining which of the plurality of constrained devices have cryptographic communication rights with the identified first constrained device based on authorized communication rights authorized by the authorization server; and

    wherein the issued asymmetric key based configuration certificates or symmetric key based tickets further include data identifying an action that the subject constrained device is permitted to perform on another constrained device.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×