Apparatus and method for sharing WiFi security data in an internet of things (IoT) system
First Claim
1. A method comprising:
- establishing a secure communication channel between an Internet of Things (IoT) hub and an IoT service using a first secret, the secure communication channel being established through a client device;
generating a second secret on the client device and transmitting the second secret to the IoT hub;
encrypting a wireless key using the second secret on the client device to generate a first-encrypted key, the wireless key usable to establish a secure communication channel over a local wireless network;
transmitting the first-encrypted key to the IoT service;
encrypting the first-encrypted key at the IoT service using the first secret to generate a twice-encrypted key;
transmitting the twice-encrypted key to the IoT hub over the secure communication channel;
decrypting the twice-encrypted key at the IoT hub using the first secret to generate the first-encrypted key and decrypting the first-encrypted key at the IoT hub using the second secret to generate the wireless key; and
using the wireless key to establish a secure wireless connection between the IoT hub and the local wireless network.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for connecting an Internet of Things (IoT) hub to a wireless network. One embodiment of the method includes establishing a secure communication channel between an IoT hub and an IoT service through a client device using a first secret; generating a second secret on the client device and transmitting it to the IoT hub; encrypting a wireless key using the second secret to generate a first-encrypted key and transmitting it to the IoT service; encrypting the first-encrypted key using the first secret to generate a twice-encrypted key and transmitting it to the IoT hub over the secure communication channel; decrypting the twice-encrypted key at the IoT hub using the first secret to generate the first-encrypted key and decrypting it using the second secret to generate the wireless key usable to establish a secure wireless connection between the IoT hub and the local wireless network.
-
Citations
26 Claims
-
1. A method comprising:
-
establishing a secure communication channel between an Internet of Things (IoT) hub and an IoT service using a first secret, the secure communication channel being established through a client device; generating a second secret on the client device and transmitting the second secret to the IoT hub; encrypting a wireless key using the second secret on the client device to generate a first-encrypted key, the wireless key usable to establish a secure communication channel over a local wireless network; transmitting the first-encrypted key to the IoT service; encrypting the first-encrypted key at the IoT service using the first secret to generate a twice-encrypted key; transmitting the twice-encrypted key to the IoT hub over the secure communication channel; decrypting the twice-encrypted key at the IoT hub using the first secret to generate the first-encrypted key and decrypting the first-encrypted key at the IoT hub using the second secret to generate the wireless key; and using the wireless key to establish a secure wireless connection between the IoT hub and the local wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
an Internet of Things (IoT) hub to communicatively couple a plurality of IoT devices; an IoT service to establish a secure communication channel with the IoT hub using a first secret, the secure communication channel being established through a client device; the client device including a security module to generate a second secret, the client device to transmit the second secret to the IoT hub; the security module to encrypt a wireless key using the second secret on the client device to generate a first-encrypted key, the wireless key usable to establish a secure communication channel over a local wireless network; the client device to transmit the first-encrypted key to the IoT service; the IoT service to encrypt the first-encrypted key using the first secret to generate a twice-encrypted key and to transmit the twice-encrypted key to the IoT hub over the secure communication channel; the IoT hub to decrypt the twice-encrypted key using the first secret to generate the first-encrypted key and to decrypt the first-encrypted key at the IoT hub using the second secret to generate the wireless key; and the IoT hub using the wireless key to establish a secure wireless connection over the local wireless network. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification