Simple Group Security for Machine-to-Machine Networking (SGSM2M)
First Claim
1. A method of generating a group identity for a set of devices, the method comprising:
- acquiring an identity for each one of the devices in the set;
joining the identities into a common identity data set;
creating the group identity for the set of devices by performing a hash function on the common identity data set.
2 Assignments
0 Petitions
Accused Products
Abstract
A group identity for a set of devices is generated by acquiring an identity for each one of the devices and joining the identities into a common identity data set. A group identity for the set of devices is created by performing a hash function on the common identity set and using a resulting hash value as the group identity. A group identity for a set of devices is verified by acquiring a first group identity from a trusted party. An identity is acquired from each device in the set and the identities are joined into a common identity data set and a second group identity is created for the set of devices by performing a hash function on the common identity data set. A determination is made whether there is a match between the first group identity and the second group identity.
17 Citations
21 Claims
-
1. A method of generating a group identity for a set of devices, the method comprising:
-
acquiring an identity for each one of the devices in the set; joining the identities into a common identity data set; creating the group identity for the set of devices by performing a hash function on the common identity data set. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A device for generating a group identity for a set of devices, the device comprising a processing unit being configured to:
-
acquire an identity for each one of the devices in the set; join the identities into a common identity data set; create the group identity for the set of devices by performing a hash function on the common identity data set.
-
-
11. A method of verifying a group identity for a set of devices, comprising:
-
acquiring, from a trusted party, a first group identity; acquiring an identity from each one of the devices in the set; joining the identities into a common identity data set; creating a second group identity for the set of devices by performing a hash function on the common identity data set; and determining whether there is a match between the first group identity and the second group identity. - View Dependent Claims (12, 13, 14, 15, 20, 21)
-
-
16. A device for verifying a group identity for a set of devices, the device comprising a processing unit being configured to:
-
acquire, from a trusted party, a first group identity; acquire an identity from each one of the devices in the set; join the identities into a common identity data set; create a second group identity for the set of devices by performing a hash function on the common identity data set; and determine whether there is a match between the first group identity and the second group identity. - View Dependent Claims (17, 18, 19)
-
Specification