×

Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys

  • US 9,288,059 B2
  • Filed: 09/27/2013
  • Issued: 03/15/2016
  • Est. Priority Date: 09/10/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for a hardware module with a radio to use a public key and a private key, the method performed by the hardware module, the method comprising:

  • receiving a set of parameters, wherein the set of parameters includes a value for an elliptic curve and a key length;

    deriving the private key and the public key using a key pair generation algorithm with the received set of parameters, wherein the hardware module records the derived private key in a nonvolatile memory, wherein the derived private key is used at least, in part, for processing a module digital signature, and wherein the hardware module authenticates with the module digital signature;

    reading (i) a module identity using a read-only address in the hardware module, and (ii) a shared secret key from the nonvolatile memory;

    transmitting via the radio a first message, wherein the first message includes the derived public key, a module public key identity and the module identity, and wherein the hardware module uses the shared secret key to authenticate the first message;

    transmitting via the radio a second message from an interne protocol address and port (IP;

    port) number, wherein the second message includes a module encrypted data, the module identity, and the module digital signature, wherein the module encrypted data (i) is ciphered using an asymmetric ciphering algorithm and (ii) includes a value for a symmetric key, and wherein the module digital signature is processed using the derived private key; and

    ,receiving via the radio a response at the IP;

    port number, wherein the response includes a server encrypted data, and wherein the server encrypted data includes a module instruction, and wherein the server encrypted data is decrypted using the symmetric key.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×