Wireless firmware updates
First Claim
Patent Images
1. A method comprising:
- receiving, at a user device, from a server, one or more firmware update packets, and wherein the one or more firmware update packets are encrypted by a lock key;
transmitting, by the user device, a user profile to a locking device comprising a physical locking component and circuitry configured to control locking and unlocking of the physical locking component, wherein the user profile comprises a user key;
decrypting, by the locking device, the user profile to generate a decrypted user profile, wherein the user profile is decrypted using the lock key;
generating, by the user device, an encrypted firmware update command, the encrypted firmware update command encrypted using the user key of the user profile;
transmitting, by the user device, the encrypted firmware update command and the encrypted firmware update packets to the locking device;
decrypting, by the locking device, the encrypted firmware update command using the user key and the encrypted firmware update packets using the lock key; and
installing, by the locking device, the decrypted firmware update responsive to successfully decrypting the encrypted firmware update command and the encrypted firmware update packets.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are methods and devices for securely updating firmware of locking devices. One method includes receiving a lock identifier from a locking device; determining that the lock identifier is associated with a user profile by comparing the lock identifier to a set of lock identifiers; receiving a firmware update packet from a server, wherein the firmware packet is encrypted by a lock key; transmitting the firmware update packet to the lock; decrypting the firmware update using the lock key; validating the encrypted firmware update; and installing the firmware update.
77 Citations
24 Claims
-
1. A method comprising:
-
receiving, at a user device, from a server, one or more firmware update packets, and wherein the one or more firmware update packets are encrypted by a lock key; transmitting, by the user device, a user profile to a locking device comprising a physical locking component and circuitry configured to control locking and unlocking of the physical locking component, wherein the user profile comprises a user key; decrypting, by the locking device, the user profile to generate a decrypted user profile, wherein the user profile is decrypted using the lock key; generating, by the user device, an encrypted firmware update command, the encrypted firmware update command encrypted using the user key of the user profile; transmitting, by the user device, the encrypted firmware update command and the encrypted firmware update packets to the locking device; decrypting, by the locking device, the encrypted firmware update command using the user key and the encrypted firmware update packets using the lock key; and installing, by the locking device, the decrypted firmware update responsive to successfully decrypting the encrypted firmware update command and the encrypted firmware update packets. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. One or more computer-readable storage media having instructions stored thereon that, when executed by a processor, cause the processor to implement operations including:
-
receiving, from a server, one or more firmware update packets, wherein the one or more firmware update packets are encrypted by a lock key; transmitting a user profile to a locking device comprising a physical locking component and circuitry configured to control locking and unlocking of the physical locking component, wherein the user profile comprises a user key; generating an encrypted firmware update command, the encrypted firmware update command encrypted using the user key of the user profile; and transmitting the encrypted firmware update command and the encrypted firmware update packets to the locking device, the locking device configured to decrypt the encrypted firmware update command using the user key extracted from the user profile, decrypt the encrypted firmware update packets using the lock key, and install the decrypted firmware update in response to successfully decrypting the encrypted firmware update command and the encrypted firmware update packets. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A locking device comprising:
-
a physical locking component; circuitry that controls locking and unlocking of the physical locking component, wherein the circuitry is configured to; receive an encrypted user profile from a user device, the user profile encrypted by a server using a lock key and comprising a user key; decrypting the user profile to generate a decrypted user profile, wherein the user profile is decrypted using the lock key; receive a firmware update command from the user device, wherein the firmware update command is encrypted using the user key; receive one or more firmware update packets from the user device, wherein the one or more firmware update packets are encrypted by the server using the lock key; decrypt the encrypted firmware update command using the user key; decrypt the encrypted firmware update packets using the lock key; and install the decrypted firmware update responsive to successfully decrypting the firmware update command and the firmware update packets. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification