Power management and security for wireless modules in “machine-to-machine” communications
First Claim
1. A system for supporting machine-to-machine communications, the system comprising:
- a wireless module for changing a processor between a sleep state and an active state, for changing a radio between a radio off state and a connected state, for recording a private key and a wireless module identity in a memory, and for sending a message comprising an Internet Protocol (IP) packet and receiving a response, wherein the message includes (i) a module digital signature processed using the private key, (ii) a sensor measurement, and (iii) the wireless module identity, wherein the wireless module, in sequence, (a) changes the processor from the sleep state to the active state, (b) changes the radio from the radio off state to the connected state, (c) sends the message and receives the response, wherein, after the wireless module receives the response, the wireless module (d) sends a detach message before receiving a radio bearer reconfiguration message and a radio resource control connection release, and then (e) changes the radio to the radio off state and the processor to the sleep state, and wherein the wireless module sends the detach message (x) while the wireless module comprises a 4G radio resource control connected (RRC_CONNECTED) state and (y) before the wireless module utilizes a discontinuous reception (DRX) state.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications. A wireless module operating in a wireless network and with access to the Internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (PLMN) or a wireless local area network (LAN). The wireless module may include a sensor and may be installed next to a monitored unit. The wireless module may utilize active states for collecting and sending data, and sleep states at other times to conserve a battery and/or energy usage. The wireless module minimize the time spent in a radio resource control (RRC) connected state. Messages between the wireless module and server can be transmitted according to a user datagram protocol (UDP). The wireless module and server can utilize public key infrastructure (PKI) for encryption and digital signatures.
141 Citations
44 Claims
-
1. A system for supporting machine-to-machine communications, the system comprising:
a wireless module for changing a processor between a sleep state and an active state, for changing a radio between a radio off state and a connected state, for recording a private key and a wireless module identity in a memory, and for sending a message comprising an Internet Protocol (IP) packet and receiving a response, wherein the message includes (i) a module digital signature processed using the private key, (ii) a sensor measurement, and (iii) the wireless module identity, wherein the wireless module, in sequence, (a) changes the processor from the sleep state to the active state, (b) changes the radio from the radio off state to the connected state, (c) sends the message and receives the response, wherein, after the wireless module receives the response, the wireless module (d) sends a detach message before receiving a radio bearer reconfiguration message and a radio resource control connection release, and then (e) changes the radio to the radio off state and the processor to the sleep state, and wherein the wireless module sends the detach message (x) while the wireless module comprises a 4G radio resource control connected (RRC_CONNECTED) state and (y) before the wireless module utilizes a discontinuous reception (DRX) state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
14. A system for reporting a sensor measurement, the system comprising:
a wireless module for changing a radio in the wireless module between a radio off state and a connected state, for recording a key in a memory, and for sending a message comprising an Internet Protocol (IP) packet and receiving a response to the message, wherein the message includes a module identity and a module encrypted data encrypted using the key, wherein the module encrypted data includes the sensor measurement, wherein the wireless module, in sequence, (i) changes the radio to the connected state from the radio off state, (ii) sends the message and receives the response, wherein after the wireless module receives the response, the wireless module (iii) changes the radio to the radio off state from the connected state before receiving (a) a radio bearer reconfiguration message, and (b) a radio resource control connection release, and wherein the wireless module changes the radio from the connected state to the radio off state (x) after the wireless module enters a 4G Long Term Evolution (LTE) radio resource control connected (RRC_CONNECTED) state and (y) before the wireless module utilizes a discontinuous reception (DRX) state. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
30. A method for supporting machine-to-machine communications, the method comprising a wireless module, in sequence:
-
reading a public key, an address, and a wireless module private key from a nonvolatile memory; changing a radio in the wireless module from a radio off state to a connected state, wherein the radio off state comprises the radio not utilizing a discontinuous receiver (DRX) timer; sending a message to the address, wherein the message comprises a user datagram protocol (UDP) packet, wherein the UDP packet includes (i) a module encrypted data processed using the public key, and (ii) a module digital signature processed using the wireless module private key, and wherein the module encrypted data includes a sensor measurement; receiving a response to the message, and; sending a detach message before (i) receiving a radio bearer reconfiguration message after receiving the response, and (ii) receiving a radio resource control connection release after receiving the response. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
Specification