INCREASED COMMUNICATION SECURITY
First Claim
Patent Images
1. A method of increasing communication security, said method comprising:
- generating authentication data;
generating a Constrained Application Protocol (CoAP) message including said authentication data; and
communicating said CoAP message from a first computer system to a second computer system.
2 Assignments
0 Petitions
Accused Products
Abstract
Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack.
-
Citations
20 Claims
-
1. A method of increasing communication security, said method comprising:
-
generating authentication data; generating a Constrained Application Protocol (CoAP) message including said authentication data; and communicating said CoAP message from a first computer system to a second computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable medium having computer-readable program code embodied therein for causing a computer system to perform a method of increasing communication security, said method comprising:
-
generating authentication data; generating a Constrained Application Protocol (CoAP) message including said authentication data; and communicating said CoAP message from a first computer system to a second computer system. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising a processor and a memory, wherein said memory comprises instructions for causing said processor to implement a method of increasing communication security, said method comprising:
-
generating authentication data; generating a Constrained Application Protocol (CoAP) message including said authentication data; and communicating said CoAP message from a first computer system to a second computer system. - View Dependent Claims (18, 19, 20)
-
Specification