×

SPOOFING PROTECTION PROTOCOL FOR NETWORK-CONNECTED THINGS

  • US 20170118187A1
  • Filed: 10/22/2015
  • Published: 04/27/2017
  • Est. Priority Date: 10/22/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system including instructions recorded on a non-transitory computer-readable storage medium, and executable by at least one processor, the system comprising:

  • a protocol controller configured to cause the at least one processor to execute a spoofing protection protocol for verifying a message received over a network from a network-connected thing, in the presence of a spoofed message transmitted from a spoofed thing illicitly representing the network-connected thing, the protocol controller including a message handler configured to implement the spoofing protection protocol includingreceiving a message identified as originating from the network-connected thing;

    executing a verification of a transmission characteristic of the message against an expected transmission characteristic previously stored with respect to the network-connected thing within a transmission characteristic repository, anddetermining whether the message originated from the network-connected thing, based on the verification.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×