Authenticating environmental sensor systems based on security keys in communication systems
First Claim
1. A method of operating an environmental sensor system comprising a sensor portion to perform a plurality of environmental sensor functions and a communication portion that stores a plurality of security keys, the method comprising:
- in the sensor portion, monitoring at least one environmental condition to detect a trigger condition related to the environmental condition;
in the communication portion, transferring an access request for delivery to a remote data system responsive to the detection of the trigger condition;
in the communication portion, receiving a security challenge transferred by the remote data system, and in response, transferring a security answer for delivery to the remote data system that includes at least one hash result generated using at least one of the security keys;
in the communication portion, receiving a security grant transferred by the remote data system indicating one of the hash results;
in the communication portion, selecting at least one of the environmental sensor functions based on an association of the environmental sensor functions with one of the security keys used to generate the hash result indicated in the security grant;
in the sensor portion, performing the selected environmental sensor function to obtain sensor data; and
in the communication portion, transferring the sensor data for delivery to the remote data system.
6 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and software for operating environmental sensor systems are provided herein. In one example, a method is provided that includes monitoring environmental conditions to detect a trigger condition and transferring an access request for delivery to a data system responsive to the trigger condition. The method also includes receiving a security challenge transferred by the data system, and in response, transferring a security answer for delivery to the data system that includes a hash result generated using one of the security keys, and receiving a security grant transferred by the data system indicating one of the hash results. The method also includes selecting an environmental sensor function based on an association with one of the security keys used to generate the hash result indicated in the security grant, performing the environmental sensor function to obtain sensor data, and transferring the sensor data for delivery to the data system.
-
Citations
20 Claims
-
1. A method of operating an environmental sensor system comprising a sensor portion to perform a plurality of environmental sensor functions and a communication portion that stores a plurality of security keys, the method comprising:
-
in the sensor portion, monitoring at least one environmental condition to detect a trigger condition related to the environmental condition; in the communication portion, transferring an access request for delivery to a remote data system responsive to the detection of the trigger condition; in the communication portion, receiving a security challenge transferred by the remote data system, and in response, transferring a security answer for delivery to the remote data system that includes at least one hash result generated using at least one of the security keys; in the communication portion, receiving a security grant transferred by the remote data system indicating one of the hash results; in the communication portion, selecting at least one of the environmental sensor functions based on an association of the environmental sensor functions with one of the security keys used to generate the hash result indicated in the security grant; in the sensor portion, performing the selected environmental sensor function to obtain sensor data; and in the communication portion, transferring the sensor data for delivery to the remote data system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An environmental sensor system, comprising:
-
a sensor portion configured to perform a plurality of environmental sensor functions and monitor environmental conditions to detect a trigger condition; a communication portion that stores a plurality of security keys and is configured to; transfer an access request for delivery to a remote data system responsive to the detection of the trigger condition; receive a security challenge transferred by the remote data system, and in response, transfer a security answer for delivery to the remote data system that includes at least one hash result generated using at least one of the security keys; receive a security grant transferred by the remote data system indicating one of the hash results; select one of the environmental sensor functions based on an association of the environmental sensor function with one of the security keys used to generate the hash result indicated in the security grant; the sensor portion configured to perform the selected environmental sensor function to obtain sensor data; and the communication portion configured to transfer the sensor data for delivery to the remote data system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification