Hashed strings for machine-to-machine communication based on time and secret strings
First Claim
Patent Images
1. A method comprising:
- receiving, by a network device, a request to invoke a machine-to-machine communication to permit remote control of a vehicle, wherein the request includes a vehicle string that identifies the vehicle and one or more secret strings, wherein the one or more secret strings include a role string that indicates a role of a user invoking an action to be remotely performed by the vehicle;
generating, by the network device, one or more hashed strings based on the request and a current time; and
transmitting, by the network device, a remote control request to the vehicle, wherein the remote control request includes the one or more hashed strings.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, devices, and storage media provide for receiving a request to invoke a machine-to-machine communication to permit remote control of a device, wherein the request includes a device string that identifies the device and one or more secret strings; generating one or more hashed strings based on the request and a current time; and transmitting a remote control request to the device, wherein the remote control request includes the one or more hashed strings and the one or more secret strings.
13 Citations
21 Claims
-
1. A method comprising:
-
receiving, by a network device, a request to invoke a machine-to-machine communication to permit remote control of a vehicle, wherein the request includes a vehicle string that identifies the vehicle and one or more secret strings, wherein the one or more secret strings include a role string that indicates a role of a user invoking an action to be remotely performed by the vehicle; generating, by the network device, one or more hashed strings based on the request and a current time; and transmitting, by the network device, a remote control request to the vehicle, wherein the remote control request includes the one or more hashed strings. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A network device comprising:
-
a communication interface; one or more memories that store instructions; and one or more processors to execute the instructions to; receive, via the communication interface, a request to invoke a machine-to-machine communication to permit remote control of a vehicle, wherein the request includes a vehicle string that identifies the vehicle and one or more secret strings, wherein the one or more secret strings include a role string that indicates a role of a user invoking an action to be remotely performed by the vehicle; generate one or more hashed strings based on the vehicle string, the one or more secret strings, and a current time; and transmit a remote control request to the vehicle, wherein the remote control request includes the one or more hashed strings. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory storage medium storing instructions executable by a computational device to:
-
receive a request to invoke a machine-to-machine communication to permit remote control of a device, wherein the request includes a device string that identifies the device and one or more secret strings, wherein the one or more secret strings include a role string that indicates a role of a user invoking an action to be remotely performed by the device; generate one or more hashed strings based on the one or more secret strings, the device string, and a current time; and generate a remote control request that includes the one or more hashed strings. - View Dependent Claims (17, 18, 19)
-
-
20. A method comprising:
-
receiving, by a network device, a request to invoke a machine-to-machine communication to permit remote control of a device, wherein the request includes a device string that identifies the device and secret strings, wherein the secret strings include an action string that indicates an action to be remotely performed by the device and a role string that indicates a role of a user invoking the action to be remotely performed by the device; generating, by the network device, one or more hashed strings based on the device string, the secret strings, and a current time; and transmitting, by the network device, a remote control request to the device, wherein the remote control request includes the one or more hashed strings and the secret strings. - View Dependent Claims (21)
-
Specification