×

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)

  • US 9,276,740 B2
  • Filed: 10/16/2013
  • Issued: 03/01/2016
  • Est. Priority Date: 09/10/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for supporting machine-to-machine communications, the method performed by a server, the method comprising:

  • authenticating a first message, wherein the first message includes (i) a first module public key with a first module public key identity, (ii) a module identity that comprises a first string, and (iii) a first source Internet protocol address and port (IP;

    port) number;

    receiving a module instruction and the module identity from an application server;

    receiving a second message, wherein the second message includes a module encrypted data, the module identity, and a second source IP;

    port number, wherein the first source IP;

    port number and the second source IP;

    port number differ from one another, wherein the module identity in the second message includes a second string, and wherein the first string and the second string are associated with a serial number of a module;

    sending a first response to the second source IP;

    port number after receiving the second message, wherein the server receives the second message after receiving the module instruction, wherein the first response includes a server encrypted data, wherein the server encrypted data is ciphered using the first module public key, and wherein the server encrypted data includes the module instruction and a security token;

    sending a second response, wherein the second response includes (i) a key generation command for generating a public key infrastructure (PKI) key pair and (ii) a set of cryptographic parameters, and wherein the generated PKI key pair is used for authentication;

    using the first module public key to authenticate a third message after sending the second response, wherein the third message includes a second module public key with a second module public key identity and the module identity; and

    ,authenticating a fourth message, wherein the fourth message includes the module identity, the second module public key identity, a third source IP;

    port number, and a module digital signature, wherein the server authenticates the module digital signature using the authenticated second module public key, and wherein the third source IP;

    port number and the second source IP;

    port number differ from one another.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×