System, method and apparata for secure communications using an electrical grid network
First Claim
1. A method for tracking the location of any device that runs on electricity;
- comprising the steps of;
whenever the device is powered ON, automatically generating and sending a message to a Location Tracking Server (LTS), via the electric power plug, to the power meter that monitors the electricity usage from the plug to which the device is connected;
The message including timestamps, device identifiers, tracking server identifiers and cryptographic authentication challenge/nonce values;
the power meter appending its own location identifiers along with all the necessary cryptographic authentication tokens, timestamps, state-indicators to the message and sending the combined message over an out-of-band communication channel that spans at least a portion of the electric grid which is connected to the said electric power meter on the upstream side;
to a Location Tracking Server;
at the Location Tracking Server, verifying all the timestamps and cryptographic tokens and determining whether the location reported by the meter is a pre-designated safe location where the device normally operates or whether the device is at an unexpected location and potentially stolen;
the Location Tracking Server preparing a reply message (referred to as a “
blessing”
) including a recommendation or directive to the device being tracked, indicating what level of functionality the device should operate in;
along with cryptographic tokens, nonces and timestamps;
the Location Tracking Server sending its blessing back in the reverse direction over the forward path including the at least some portion of the electric grid connected to the electric power meter on the upstream side;
the electric power meter relaying the message to the device being tracked via the power plug;
the device being tracked receiving the blessing message, decrypting it if required and verifying the cryptographic credentials and/or responses from the Location Tracking Server and learning the state it is expected to go into, and entering that state.
0 Assignments
0 Petitions
Accused Products
Abstract
A secure communications and location authorization system using a power line or a potion thereof as a side-channel that mitigates man-in-the-middle attacks on communications networks and devices connected to those networks. The system includes a power grid server associated with a substation, or curb-side distribution structure such as a transformer, an electric meter associated with a structure having electric service and able to communicate with the power grid server, a human authorization detector input device connected to the electric meter and the power grid server. The human authorization detector is able to receive an input from a user physically located at the structure and capable of communicating with the power grid server via the electric meter. The user'"'"'s physical input into the device causing a request to be sent to the power grid server that then generates a location certificate for the user. Without the location certificate, access to the communications network and devices connected to those networks can be denied.
24 Citations
26 Claims
-
1. A method for tracking the location of any device that runs on electricity;
- comprising the steps of;
whenever the device is powered ON, automatically generating and sending a message to a Location Tracking Server (LTS), via the electric power plug, to the power meter that monitors the electricity usage from the plug to which the device is connected;
The message including timestamps, device identifiers, tracking server identifiers and cryptographic authentication challenge/nonce values;the power meter appending its own location identifiers along with all the necessary cryptographic authentication tokens, timestamps, state-indicators to the message and sending the combined message over an out-of-band communication channel that spans at least a portion of the electric grid which is connected to the said electric power meter on the upstream side;
to a Location Tracking Server;at the Location Tracking Server, verifying all the timestamps and cryptographic tokens and determining whether the location reported by the meter is a pre-designated safe location where the device normally operates or whether the device is at an unexpected location and potentially stolen; the Location Tracking Server preparing a reply message (referred to as a “
blessing”
) including a recommendation or directive to the device being tracked, indicating what level of functionality the device should operate in;
along with cryptographic tokens, nonces and timestamps;the Location Tracking Server sending its blessing back in the reverse direction over the forward path including the at least some portion of the electric grid connected to the electric power meter on the upstream side; the electric power meter relaying the message to the device being tracked via the power plug; the device being tracked receiving the blessing message, decrypting it if required and verifying the cryptographic credentials and/or responses from the Location Tracking Server and learning the state it is expected to go into, and entering that state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
- comprising the steps of;
-
14. A system for tracking the location of any device that runs on electricity;
- comprising;
a Location Tracking Server (LTS); a power meter; a device that runs on electricity configured so that whenever the device is powered ON, the device automatically generates and sends a message to the Location Tracking Server (LTS), via an electric power plug, to the power meter that monitors the electricity usage from the plug to which the device is connected;
the message including timestamps, device identifiers, tracking server identifiers and cryptographic authentication challenge/nonce values;wherein the power meter is configured to append its own location identifiers along with all the necessary cryptographic authentication tokens, timestamps, state-indicators to the message and sends the combined message over an out-of-band communication channel that spans at least a portion of the electric grid which is connected to the power meter on the upstream side;
to the Location Tracking Server;wherein the Location Tracking Server is configured to perform steps including at the Location Tracking Server, verifying all the timestamps and cryptographic tokens and determining whether the location reported by the power meter is a pre-designated safe location where the device normally operates or whether the device is at an unexpected location and potentially stolen; preparing a reply message (referred to as a “
blessing”
) including a recommendation or directive to the device being tracked, indicating what level of functionality the device should operate in;
along with cryptographic tokens, nonces and timestamps;sending its blessing back in the reverse direction over the forward path including the at least some portion of the electric grid connected to the power meter on the upstream side; wherein the power meter is configured to relay the blessing to the device being tracked via the power plug; and wherein the device being tracked is configured to receive the blessing, decrypting it if required and verifying the cryptographic credentials and/or responses from the Location Tracking Server and learning the state it is expected to go into, and enter that state. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
- comprising;
Specification