Power management and security for wireless modules in “machine-to-machine” communications
First Claim
1. A method of saving power during machine to machine communication of sensor information over a wireless network comprising steps of:
- (a) storing, at a wireless module, identity information related to the wireless module;
(b) transmitting, from the wireless module to a communication network server via the wireless network, the identity information to identify the wireless module to the wireless network server and establish a connection with the communication network;
(c) changing, at the wireless module, a processor of the wireless module to a sleep mode and a radio of the wireless module to an off mode;
(d) determining, at the wireless module, whether a predetermined sleep mode time has expired;
(e) changing, at the wireless module when the predetermined sleep mode time has expired, the processor of the wireless module to an active mode and the radio to an on state;
(f) recording, at the wireless module, sensor information;
(g) encrypting, at the wireless module, the sensor information using a derived key based on at least a module private key;
(h) transmitting, from the wireless module via the wireless network, the encrypted sensor information;
(i) receiving, at the wireless module via the wireless network, encrypted confirmation information;
(j) decrypting, at the wireless module, using the derived key the encrypted confirmation information;
(k) confirming, at the wireless module, that the encrypted sensor information was received by an application server based at least on the decrypted confirmation information; and
(l) changing, at the wireless module, by a processor of the wireless module a sleep mode and by a radio of the wireless module an off mode in response to the determination that the encrypted sensor information was received by an application server.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications. A wireless module operating in a wireless network and with access to the Internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (PLMN) that supports wireless wide area network technology including 3rd generation (3G) and 4th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state. Messages between the wireless module and server can be transmitted according to the UDP or UDP Lite protocol with channel coding in the datagram body for efficiency while providing robustness to bit errors. The wireless module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The wireless module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The communication system between the wireless module and the server can conserve battery life in the wireless module while providing a system that is secure, scalable, and robust.
174 Citations
16 Claims
-
1. A method of saving power during machine to machine communication of sensor information over a wireless network comprising steps of:
-
(a) storing, at a wireless module, identity information related to the wireless module; (b) transmitting, from the wireless module to a communication network server via the wireless network, the identity information to identify the wireless module to the wireless network server and establish a connection with the communication network; (c) changing, at the wireless module, a processor of the wireless module to a sleep mode and a radio of the wireless module to an off mode; (d) determining, at the wireless module, whether a predetermined sleep mode time has expired; (e) changing, at the wireless module when the predetermined sleep mode time has expired, the processor of the wireless module to an active mode and the radio to an on state; (f) recording, at the wireless module, sensor information; (g) encrypting, at the wireless module, the sensor information using a derived key based on at least a module private key; (h) transmitting, from the wireless module via the wireless network, the encrypted sensor information; (i) receiving, at the wireless module via the wireless network, encrypted confirmation information; (j) decrypting, at the wireless module, using the derived key the encrypted confirmation information; (k) confirming, at the wireless module, that the encrypted sensor information was received by an application server based at least on the decrypted confirmation information; and (l) changing, at the wireless module, by a processor of the wireless module a sleep mode and by a radio of the wireless module an off mode in response to the determination that the encrypted sensor information was received by an application server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification