×

Spoofing protection protocol for network-connected things

  • US 9,985,945 B2
  • Filed: 10/22/2015
  • Issued: 05/29/2018
  • Est. Priority Date: 10/22/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system for implementing a spoofing protection protocol for verifying a message received over a network from a network-connected thing, in the presence of a spoofed message transmitted from a spoofed thing illicitly representing the network-connected thing, the system including instructions recorded on a non-transitory computer-readable storage medium, and executable by at least one processor, wherein the instructions, when executed by the at least one processor, cause the at least one processor to:

  • control a transmission characteristic of the network-connected thing;

    store the controlled transmission characteristic within a transmission characteristic repository;

    receive a message identified as originating from the network-connected thing;

    execute a verification of a received transmission characteristic of the message against the controlled transmission characteristic previously stored with respect to the network-connected thing within the transmission characteristic repository, anddetermine whether the message originated from the network-connected thing, based on the verification.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×