Increased communication security
First Claim
Patent Images
1. An apparatus comprising:
- a security component configured to generate authentication data based on message data, wherein said message data includes an authentication mechanism identifier, and wherein said security component is further configured to generate said authentication data using an authentication mechanism associated with said authentication mechanism identifier;
a message generation component configured to generate a Constrained Application Protocol (CoAP) message including said authentication data and said message data; and
a communication interface configured to communicate said CoAP message.
2 Assignments
0 Petitions
Accused Products
Abstract
Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system for delivery to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack.
-
Citations
33 Claims
-
1. An apparatus comprising:
-
a security component configured to generate authentication data based on message data, wherein said message data includes an authentication mechanism identifier, and wherein said security component is further configured to generate said authentication data using an authentication mechanism associated with said authentication mechanism identifier; a message generation component configured to generate a Constrained Application Protocol (CoAP) message including said authentication data and said message data; and a communication interface configured to communicate said CoAP message. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus comprising:
-
a communication interface configured to receive a Constrained Application Protocol (CoAP) message including authentication data and message data; a security component configured to perform message validation based on said authentication data, wherein said security component is further configured to perform said message validation by accessing an authentication mechanism identifier from said message data, and wherein said security component is further configured to perform said message validation using an authentication mechanism associated with said authentication mechanism identifier; and an operation component configured to perform, if said CoAP message is valid, at least one operation associated with said CoAP message. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
a first computer system; and a second computer system, wherein said first computer system is configured to generate a Constrained Application Protocol (CoAP) message including authentication data and message data, and wherein said first computer system is further configured to communicate said CoAP message for delivery to said second computer system, and wherein said second computer system is configured to perform message validation, responsive to receiving said CoAP message, based on said authentication data, wherein said second computer system is further configured to perform said message validation by accessing an authentication mechanism identifier from said message data, and wherein said second computer system is further configured to perform said message validation using an authentication mechanism associated with said authentication mechanism identifier. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification