Increased communication security
First Claim
Patent Images
1. A method of increasing communication security, said method comprising:
- generating authentication data based on message data, wherein said message data includes an authentication mechanism identifier, and wherein said generating further comprises generating said authentication data using an authentication mechanism associated with said authentication mechanism identifier;
generating a Constrained Application Protocol (CoAP) message including said authentication data and said message data; and
communicating said CoAP message from a first computer system for delivery to a second computer system.
2 Assignments
0 Petitions
Accused Products
Abstract
Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system for delivery to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack.
-
Citations
24 Claims
-
1. A method of increasing communication security, said method comprising:
-
generating authentication data based on message data, wherein said message data includes an authentication mechanism identifier, and wherein said generating further comprises generating said authentication data using an authentication mechanism associated with said authentication mechanism identifier; generating a Constrained Application Protocol (CoAP) message including said authentication data and said message data; and communicating said CoAP message from a first computer system for delivery to a second computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable medium having computer-readable program code embodied therein for causing a computer system to perform a method of increasing communication security, said method comprising:
-
generating authentication data based on message data, wherein said message data includes an authentication mechanism identifier, and wherein said generating further comprises generating said authentication data using an authentication mechanism associated with said authentication mechanism identifier; generating a Constrained Application Protocol (CoAP) message including said authentication data and said message data; and communicating said CoAP message from a first computer system for delivery to a second computer system. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising a processor and a memory, wherein said memory comprises instructions for causing said processor to implement a method of increasing communication security, said method comprising:
-
generating authentication data based on message data, wherein said message data includes an authentication mechanism identifier, and wherein said generating further comprises generating said authentication data using an authentication mechanism associated with said authentication mechanism identifier; generating a Constrained Application Protocol (CoAP) message including said authentication data and said message data; and communicating said CoAP message from a first computer system for delivery to a second computer system. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification