Method and apparatus for medium access control in powerline communication network systems
First Claim
1. A method of performing encryption key management in an AC powerline communication network system, wherein the communication network system includes at least one receiving client device and at least one originating client device, and wherein the at least one receiving client device lacks user input capability, and wherein the at least one originating client device has user input capability, comprising the steps of:
- (a) inputting one of a hard-wired key and a password into the at least one originating client device;
(b) creating an encryption key update payload message comprising a current network encryption key encrypted by a hard-wired key;
(c) transmitting the encryption key update payload message from the at least one originating client device to the at least one receiving client device; and
(d) replacing a previous network encryption key with the current network encryption key in the at least one receiving client device.
7 Assignments
0 Petitions
Accused Products
Abstract
An inventive Medium Access Control (MAC) protocol for powerline networking systems is described. The inventive MAC protocol controls access to and use of a physical medium (power lines) in a powerline networking system. The MAC protocol method and apparatus includes a method of providing “blanking intervals” in which devices using newer versions of the protocol “clear out” earlier version devices. The use of blanking intervals greatly eases backward compatibility of the network when the protocol is upgraded with new versions. The method of using blanking intervals is closely coupled to a technique of using “beacons.” The beacons are used to propagate blanking interval information throughout the network. The beacons also include a mechanism for informing devices of the expiration of blanking information. The MAC also includes a method of establishing and maintaining “virtual circuit” connections between selected devices on the network. The virtual circuits can be established in powerline networking systems not having a central controller. A method of assigning unique Logical Network Identifiers (LNIs) to logical networks in the powerline networking system is also described. The LNIs uniquely identify each of the logical networks in the network. A means for creating, managing and distributing network encryption keys is also described. The encryption keys are used by the devices in the powerline networking system to prevent data from being shared with unauthorized users.
176 Citations
67 Claims
-
1. A method of performing encryption key management in an AC powerline communication network system, wherein the communication network system includes at least one receiving client device and at least one originating client device, and wherein the at least one receiving client device lacks user input capability, and wherein the at least one originating client device has user input capability, comprising the steps of:
-
(a) inputting one of a hard-wired key and a password into the at least one originating client device;
(b) creating an encryption key update payload message comprising a current network encryption key encrypted by a hard-wired key;
(c) transmitting the encryption key update payload message from the at least one originating client device to the at least one receiving client device; and
(d) replacing a previous network encryption key with the current network encryption key in the at least one receiving client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 15, 17, 19)
-
-
14. An encryption key management AC powerline networking circuit, comprising:
-
(a) at least one originating client device, capable of receiving user input, adapted to input a hard-wired key and a password, wherein the originating client device is adapted to create an encryption key update payload message comprising a current network encryption key encrypted by the hard-wired key, and wherein the originating client device is adapted to transmit the encryption key update payload message to another client device; and
(b) at least one receiving client device, operatively coupled to the at least one originating client device, wherein the receiving client device is adapted to receive the encryption key update payload message, and adapted to create a key update acknowledgment payload message comprising the hard-wired key encrypted by a current network encryption key.
-
-
16. An AC powerline networking circuit for managing encryption keys, comprising:
-
(a) means for inputting one of a hard-wired key and a password;
(b) means, responsive to the input means, for encrypting a current network encryption key utilizing a hard-wired key and for encrypting the hard-wired key utilizing a current network encryption key;
(c) means, operatively coupled to the encrypting means, for transmitting an encryption key update payload message to a first device and for transmitting a key update acknowledgment payload message to a second device; and
(d) means, responsive to the transmitting means, for receiving a beacon, the encryption key update payload message and the key update acknowledgment payload message.
-
-
18. An AC powerline networking circuit for managing encryption keys, comprising:
-
(a) means for inputting one of a hard-wired key and a password to a first device;
(b) a first encrypting means, responsive to the input means, for encrypting a current network encryption key utilizing a hard-wired key;
(c) a first transmitting means, operatively coupled to the first encrypting means, for transmitting an encryption key update payload message to a second device;
(d) a first receiving means, operatively coupled to the first transmitting means, for receiving the encryption key update payload message;
(e) means, operatively coupled to the first receiving means, for decrypting the encryption key update payload message;
(f) a second encrypting means, operatively coupled to the decrypting means, for encrypting the hard-wired key utilizing the current network encryption key;
(g) a second transmitting means, operatively coupled to the second encrypting means, for transmitting a key update acknowledgment payload message to the first device; and
(h) a second receiving means, operatively coupled to the second transmitting means, for determining if a beacon and the key update acknowledgment payload message is received by the first device.
-
-
20. A method of managing multiple MAC protocols in an AC powerline communication network system, wherein the communication network system comprises a plurality of devices, and wherein a first set of the plurality of devices uses a first MAC protocol and wherein a second set of the plurality of devices uses a second MAC protocol, and wherein the first MAC protocol is a previous MAC version and the second MAC protocol is a current MAC version, comprising the steps of:
-
(a) selecting a newer-version MAC protocol device to control a blanking interval;
(b) determining a period and a duration of the blanking interval of step (a);
(c) transmitting a message at a predetermined interval, wherein the message specifies the period and the duration of the blanking interval;
(d) allowing devices using the second MAC protocol to perform contention-based access during the blanking interval; and
(e) allowing devices using the first MAC protocol to perform contention-based access during a special contention resolution slot. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method of controller-less reservation based access in an AC powerline communication network system, wherein the communication network system includes a plurality of communication clients, comprising the steps of:
-
(a) broadcasting a reservation establishment payload that establishes a reservation between an originating client and a recipient client;
(b) determining a reservation schedule based upon clients that have active reservations, wherein the reservation schedule includes a plurality of reservation access periods, and wherein a specified originating client and a specified recipient client communicate during a specified reservation access period;
(c) transmitting information between clients during the plurality of reservation access periods based upon the reservation schedule determined during step (b); and
(d) determining whether to renew or to terminate reservations. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A method of identifying logical networks in an AC powerline communication network system, wherein the communication network system comprises a plurality of communication clients, and wherein each client is uniquely associated with a logical network, the method comprising the steps of:
-
(a) determining a unique logical network identifier (LNI) for a selected plurality of clients;
(b) broadcasting information regarding the unique LNI;
(c) creating tables that map client addresses to the LNI; and
(d) communicating data only between the selected plurality of clients associated with the unique LNI. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. A method of controlling communication between devices in an AC powerline communication network system, wherein a first set of the devices uses a first MAC protocol and wherein a second set of the devices uses a second MAC protocol, wherein the first MAC protocol is a previous MAC version and the second MAC protocol is a current MAC version, and wherein medium blanking messages are transmitted on the network by a controlling one of the second set of devices, wherein the blanking messages contain blanking information that defines a blanking interval during which only the second set of devices are allowed to communicate, comprising the steps of:
-
(a) determining whether a selected device is capable of receiving the blanking messages from the controlling device;
(b) if the selected device is capable of receiving the blanking messages, assembling a respective and associated beacon message unique to the selected device, wherein the assembled beacon message is based upon information contained in received blanking messages, and wherein the beacon message includes blanking information contained in the received blanking messages, and proceeding to step (d), else proceeding to step (c);
(c) if the selected device is incapable of receiving the blanking messages, assembling the beacon message based upon beacon messages received from other network devices, wherein each beacon message includes a lifetime field that is used by all of the devices in determining whether to use a received beacon message when assembling their respective and associated beacon messages; and
(d) periodically transmitting the beacon message assembled in steps (b) or (c) to other devices in the network. - View Dependent Claims (51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67)
-
Specification