Secure Telemetric Link
First Claim
1. In a telecommunications network having at least first and second nodes in communication with each other, a method of making secure at least one communication between the at least first and second nodes during a communication session, comprising the steps of:
- assigning to each node an identifier unique to each node within the network;
assigning to each node a device key unique to each node within the network;
assigning to the network a network key;
establishing a communication session between the at least first and second nodes;
providing the network key to at least the second node;
providing the second node'"'"'s identifier to the first node;
providing to the first node the second node'"'"'s device key in a manner not subject to unauthorized discovery;
preparing a first communication comprising the first node'"'"'s identifier and the second node'"'"'s identifier;
securing the first communication with the second node'"'"'s device key;
transmitting the first communication to the second node;
decrypting at the second node the first communication using the second node'"'"'s device key;
providing the first node with the network key subject to verification that the second node'"'"'s device key was used to secure the first communication; and
securing a second communication among the at least first and second nodes using the network key.
1 Assignment
0 Petitions
Accused Products
Abstract
A communications protocol is used to provide data privacy, message integrity, message freshness, and user authentication to telemetric traffic, such as to and from implantable medical devices in a body area network. In certain embodiments, encryption, message integrity, and message freshness are provided through use of token-like nonces and ephemeral session-keys derived from device identification numbers and pseudorandom numbers.
53 Citations
30 Claims
-
1. In a telecommunications network having at least first and second nodes in communication with each other, a method of making secure at least one communication between the at least first and second nodes during a communication session, comprising the steps of:
-
assigning to each node an identifier unique to each node within the network; assigning to each node a device key unique to each node within the network; assigning to the network a network key; establishing a communication session between the at least first and second nodes; providing the network key to at least the second node; providing the second node'"'"'s identifier to the first node; providing to the first node the second node'"'"'s device key in a manner not subject to unauthorized discovery; preparing a first communication comprising the first node'"'"'s identifier and the second node'"'"'s identifier; securing the first communication with the second node'"'"'s device key; transmitting the first communication to the second node; decrypting at the second node the first communication using the second node'"'"'s device key; providing the first node with the network key subject to verification that the second node'"'"'s device key was used to secure the first communication; and securing a second communication among the at least first and second nodes using the network key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
16. In a telecommunications network having at least first and second nodes in communication with each other, a method of making secure at least one communication between the at least first and second nodes during a communication session, comprising the steps of:
-
assigning to each node an identifier unique to each node within the network; assigning to each node a device key unique to each node within the network; assigning to the network a network key; establishing a communication session between the at least first and second nodes; providing the network key to at least the first node; providing the second node'"'"'s identifier to the first node; securely providing to the first node the second node'"'"'s device key; transmitting from the second node to the first node a first communication comprising the first node'"'"'s identifier, the second node'"'"'s identifier, and the network key, wherein the first communication is secured with the second node'"'"'s device key; and securing a second communication among the at least first and second nodes using the network key. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification