Power-line communications with communication channel to and/or from endpoint circuits with authentication methodology
First Claim
1. For use in a power-line communication system, a method performed by data processing electronic circuitry, the method comprising:
- receiving a plurality of symbols from a plurality of endpoint circuits and over a plurality of communications channels on power lines in the power-line communication system;
obtaining respective and different decryption keys from an encryption table that lists the respective and different decryption keys and corresponding assignments to the plurality of endpoint circuits;
decrypting a first symbol of the plurality of symbols using a first decryption key that is assigned to a first endpoint circuit;
computing, from the first symbol as decrypted using the first decryption key, a first measure of error that includes a first bit error rate;
decrypting the first symbol using a second decryption key that is assigned to a second endpoint circuit;
computing, from the first symbol as decrypted using the second decryption key, a second measure of error that includes a second bit error rate;
comparing the first and second bit error rates to a threshold error measure;
identifying, in response to the first bit error rate exceeding the threshold error measure, the first symbol as a valid symbol from the first endpoint circuit; and
logging the first symbol as valid relative to the first endpoint circuit.
2 Assignments
0 Petitions
Accused Products
Abstract
In a power-line communication system, a data processing electronic circuitry can receive a plurality of symbols from a plurality of endpoint circuits and over a plurality of communications channels on power lines in a power-line communication system. A first symbol of the plurality of symbols can be decrypted using a first decryption key that is assigned to a first endpoint circuit. From the first decryption, a first measure of error is computed that includes a first bit error rate. The first symbol is decrypted using a second decryption key that is assigned to a second endpoint circuit. From the second decryption, a second measure of error is computed that includes a second bit error rate. The first and second bit error rates are compared to a threshold error measure to determine validity.
50 Citations
15 Claims
-
1. For use in a power-line communication system, a method performed by data processing electronic circuitry, the method comprising:
-
receiving a plurality of symbols from a plurality of endpoint circuits and over a plurality of communications channels on power lines in the power-line communication system; obtaining respective and different decryption keys from an encryption table that lists the respective and different decryption keys and corresponding assignments to the plurality of endpoint circuits; decrypting a first symbol of the plurality of symbols using a first decryption key that is assigned to a first endpoint circuit; computing, from the first symbol as decrypted using the first decryption key, a first measure of error that includes a first bit error rate; decrypting the first symbol using a second decryption key that is assigned to a second endpoint circuit; computing, from the first symbol as decrypted using the second decryption key, a second measure of error that includes a second bit error rate; comparing the first and second bit error rates to a threshold error measure; identifying, in response to the first bit error rate exceeding the threshold error measure, the first symbol as a valid symbol from the first endpoint circuit; and logging the first symbol as valid relative to the first endpoint circuit. - View Dependent Claims (2, 3, 4, 5, 6, 14, 15)
-
-
7. For use in a power-line communication system, a non-transitory computer readable storage medium encoded with computer instructions that, when executed by a computer, cause the computer to perform operations comprising:
-
receiving a plurality of symbols from a plurality of endpoint circuits and over a plurality of communications channels on power lines in the power-line communication system; obtaining respective and different decryption keys from an encryption table that lists the respective and different decryption keys and corresponding assignments to the plurality of endpoint circuits; decrypting a first symbol of the plurality of symbols using a first decryption key that is assigned to a first endpoint circuit; computing, from the first symbol as decrypted using the first decryption key, a first measure of error that includes a first bit error rate; decrypting the first symbol using a second decryption key that is assigned to a second endpoint circuit; computing, from the first symbol as decrypted using the second decryption key, a second measure of error that includes a second bit error rate; comparing the first and second bit error rates to a threshold error measure; identifying, in response to the first bit error rate exceeding the threshold error measure, the first symbol as a valid symbol from the first endpoint circuit; and logging the first symbol as valid relative to the first endpoint circuit.
-
-
8. A power-line communication system comprising:
-
a power-distribution processing unit, including a circuit, configured to couple to a set of endpoints via power lines, the processing unit including one or more processors configured to interact with the set of endpoints and further configured to; receive a plurality of symbols from a plurality of endpoint circuits and over a plurality of communications channels on power lines in the power-line communication system; obtain respective and different decryption keys from an encryption table that lists the respective and different decryption keys and corresponding assignments to the plurality of endpoint circuits; decrypt a first symbol of the plurality of symbols using a first decryption key that is assigned to a first endpoint circuit; compute, from the first symbol as decrypted using the first decryption key, a first measure of error that includes a first bit error rate; decrypt the first symbol using a second decryption key that is assigned to a second endpoint circuit; compute, from the first symbol as decrypted using the second decryption key, a second measure of error that includes a second bit error rate; compare the first and second bit error rates to a threshold error measure; identify, in response to the first bit error rate exceeding the threshold error measure, the first symbol as a valid symbol from the first endpoint circuit; and log the first symbol as valid relative to the first endpoint circuit. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification