System, method, and apparata for secure communications using an electrical grid network
First Claim
1. A security system comprising:
- an input/output device connected to an in-band communications device in an in-band channel network for receiving at the input/output device an instruction to accept or deny a request for a location certificate to verify that at least one in-band request for an action or a transaction received at an application server was initiated by a human operator from a pre-designated location authorized to make the request to the application server via the in-band communications device;
at least one electric power meter associated with the pre-designated location for receiving the accepted request and transmitting the same over at least one electrical power conductor line of an electric power distribution network, wherein the at least one conductor line is used as an out-of-band communications channel network that is separate from the in-band communication channel network; and
wherein the input/output device outputs information about an event indicating information about (i) attempts that are or have been made to tamper with the input/output device or (ii) whether the input/output device has been successfully tampered with, as soon as one or both events are detected, during a pre-determined monitoring period, or when the input/output device performs a forensic audit.
0 Assignments
0 Petitions
Accused Products
Abstract
A secure communications and location authorization system using a power line or a potion thereof as a side-channel that mitigates man-in-the-middle attacks on communications networks and devices connected to those networks. The system includes a power grid server associated with a substation, or curb-side distribution structure such as a transformer, an electric meter associated with a structure having electric service and able to communicate with the power grid server, a human authorization detector input device connected to the electric meter and the power grid server. The human authorization detector is able to receive an input from a user physically located at the structure and capable of communicating with the power grid server via the electric meter. The user'"'"'s physical input into the device causing a request to be sent to the power grid server that then generates a location certificate for the user. Without the location certificate, access to the communications network and devices connected to those networks can be denied.
61 Citations
33 Claims
-
1. A security system comprising:
-
an input/output device connected to an in-band communications device in an in-band channel network for receiving at the input/output device an instruction to accept or deny a request for a location certificate to verify that at least one in-band request for an action or a transaction received at an application server was initiated by a human operator from a pre-designated location authorized to make the request to the application server via the in-band communications device; at least one electric power meter associated with the pre-designated location for receiving the accepted request and transmitting the same over at least one electrical power conductor line of an electric power distribution network, wherein the at least one conductor line is used as an out-of-band communications channel network that is separate from the in-band communication channel network; and wherein the input/output device outputs information about an event indicating information about (i) attempts that are or have been made to tamper with the input/output device or (ii) whether the input/output device has been successfully tampered with, as soon as one or both events are detected, during a pre-determined monitoring period, or when the input/output device performs a forensic audit. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for location authentication, comprising the steps of:
-
displaying on a human authorization detector device connected to an in-band communications channel network via a computer or a terminal at least some action or transaction data including parameters corresponding to the action or transaction requested over the in-band communications channel network; requesting at the human authorization detector device an input from an operator to accept or deny a location certificate request, wherein the accept or deny decision can be indicated by the operator only by physically operating a switch on the human authorization detector device; receiving accept or deny decision from the operator at the human authorization detector device; transmitting, in the case of an acceptance input, a request for the location certificate together with an authentication token to at least one electric power meter associated with a pre-designated location where the human authorization detector device is also located; requesting over at least a portion of an electrical power distribution grid network used as an out-of-band communications channel network that is separate from the in-band communications channel network the location certificate from a power grid server connected to the out-of-band communications channel network; determining by the power grid server if the acceptance input originated from one of a plurality of pre-designated locations pre-authorized to make the request, and if so, generating a digitally signed location certificate for the requested action or transaction which includes a digital digest of the parameters corresponding to the requested action or transaction and a time-stamp or other cryptographically-generated tokens or nonces; receiving the location certificate from the power grid server at the human authorization detector via the out-of-band communications channel network; and wherein the human authorization detector device outputs information about an event indicating information about (i) attempts that are or have been made to tamper with the human authorization detector device or (ii) whether the human authorization detector device has been successfully tampered with, as soon as one or both events are detected, during a pre-determined monitoring period, or when the human authorization detector device performs a forensic audit. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification