Power management and security for wireless modules in “machine-to-machine” communications
First Claim
1. A method for a wireless module to transmit a sensor measurement, the method performed by the wireless module, the method comprising the wireless module, in sequence:
- changing (i) a processor from a sleep state to an active state and (ii) a radio from a radio off state to a connected state;
transmitting a message with the sensor measurement and receiving a response, wherein the message includes a module digital signature processed with a private key for the wireless module;
transmitting a detach message, wherein, after receiving the response and before transmitting the detach message, the wireless module does not receive (i) a radio bearer reconfiguration message, and (ii) a radio resource control connection release, and wherein the wireless module transmits the detach message (x) while the radio for the wireless module comprises a radio resource control connected (RRC_CONNECTED) state and (y) before the radio for the wireless module utilizes a discontinuous reception (DRX) state; and
,changing (i) the radio to the radio off state and (ii) the processor to the sleep state.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications. A wireless module operating in a wireless network and with access to the Internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (PLMN) that supports wireless wide area network technology including 3rd generation (3G) and 4th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state. Messages between the wireless module and server can be transmitted according to the UDP or UDP Lite protocol with channel coding in the datagram body for efficiency while providing robustness to bit errors. The wireless module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The wireless module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The communication system between the wireless module and the server can conserve battery life in the wireless module while providing a system that is secure, scalable, and robust.
188 Citations
20 Claims
-
1. A method for a wireless module to transmit a sensor measurement, the method performed by the wireless module, the method comprising the wireless module, in sequence:
-
changing (i) a processor from a sleep state to an active state and (ii) a radio from a radio off state to a connected state; transmitting a message with the sensor measurement and receiving a response, wherein the message includes a module digital signature processed with a private key for the wireless module; transmitting a detach message, wherein, after receiving the response and before transmitting the detach message, the wireless module does not receive (i) a radio bearer reconfiguration message, and (ii) a radio resource control connection release, and wherein the wireless module transmits the detach message (x) while the radio for the wireless module comprises a radio resource control connected (RRC_CONNECTED) state and (y) before the radio for the wireless module utilizes a discontinuous reception (DRX) state; and
,changing (i) the radio to the radio off state and (ii) the processor to the sleep state. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for a wireless module to transmit a sensor measurement, the method performed by the wireless module, the method comprising the wireless module:
-
recording a symmetric key in a nonvolatile memory; changing (i) a processor from a sleep state to an active state and (ii) a radio from a radio off state to a connected state, transmitting a message containing a module encrypted data and receiving a response, wherein module encrypted data includes the sensor measurement, and wherein the sensor measurement is encrypted with the symmetric key; transmitting a detach message, wherein, after receiving the response and before transmitting the detach message, the wireless module does not receive (i) a radio bearer reconfiguration message, and (ii) a radio resource control connection release, and wherein the wireless module transmits the detach message (x) while the radio for the wireless module comprises a radio resource control connected (RRC_CONNECTED) state and (y) before the radio for the wireless module utilizes a discontinuous reception (DRX) state; and
,changing (i) the radio to the radio off state and (ii) the processor to the sleep state. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method for supporting machine-to-machine communications, the method performed by a wireless module, the method comprising:
-
reading a symmetric key and an address from a nonvolatile memory; changing a radio in the wireless module from a radio off state to a connected state, wherein the radio off state comprises the radio does not utilize a discontinuous receive (DRX) timer; transmitting a message to the address, wherein the message comprises a user datagram protocol (UDP) packet, wherein the UDP packet includes a module encrypted data encrypted, wherein the wireless module encrypts the module encrypted data with the symmetric key, and wherein the module encrypted data includes a sensor measurement; receiving a response to the message; and
,transmitting a detach message before (i) receiving a radio bearer reconfiguration message after receiving the response, and (ii) receiving a radio resource control connection release after receiving the response. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification