Hashed Strings for Machine-to-Machine Communication Based on Time and Secret Strings
First Claim
Patent Images
1. A method comprising:
- receiving a request to invoke a machine-to-machine communication to permit remote control of a vehicle, wherein the request includes a vehicle string that identifies the vehicle and one or more secret strings;
generating one or more hashed strings based on the request and a current time; and
transmitting a remote control request to the vehicle, wherein the remote control request includes the one or more hashed strings.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, devices, and storage media provide for receiving a request to invoke a machine-to-machine communication to permit remote control of a device, wherein the request includes a device string that identifies the device and one or more secret strings; generating one or more hashed strings based on the request and a current time; and transmitting a remote control request to the device, wherein the remote control request includes the one or more hashed strings and the one or more secret strings.
-
Citations
21 Claims
-
1. A method comprising:
-
receiving a request to invoke a machine-to-machine communication to permit remote control of a vehicle, wherein the request includes a vehicle string that identifies the vehicle and one or more secret strings; generating one or more hashed strings based on the request and a current time; and transmitting a remote control request to the vehicle, wherein the remote control request includes the one or more hashed strings. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A network device comprising:
-
a communication interface; one or more memories that store instructions; and one or more processors to execute the instructions to; receive, via the communication interface, a request to invoke a machine-to-machine communication to permit remote control of a vehicle, wherein the request includes a vehicle string that identifies the vehicle and one or more secret strings; generate one or more hashed strings based on the vehicle string, the one or more secret strings, and a current time; and transmit a remote control request to the vehicle, wherein the remote control request includes the one or more hashed strings. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory storage medium storing instructions executable by a computational device to:
-
receive a request to invoke a machine-to-machine communication to permit remote control of a device, wherein the request includes a device string that identifies the device and one or more secret strings; generate one or more hashed strings based on the one or more secret strings, the device string, and a current time; and generate a remote control request that includes the one or more hashed strings. - View Dependent Claims (17, 18, 19)
-
-
20. A method comprising:
-
receiving a request to invoke a machine-to-machine communication to permit remote control of a device, wherein the request includes a device string that identifies the device and one or more secret strings, wherein the one or more secret strings include an action string that indicates an action to be remotely performed by the device; generating one or more hashed strings based on the device string, the one or more secret strings, and a current time; and transmitting a remote control request to the device, wherein the remote control request includes the one or more hashed strings and the one or more secret strings.
-
-
21. The method of claim 21, wherein the one or more secret strings include a role string that indicates a role of a user invoking an action to be remotely performed by the device, wherein the device includes a vehicle and the role includes one of a driver of the vehicle or an owner of the vehicle.
Specification