Secure equipment automation using a personal base station
First Claim
Patent Images
1. A personal base station, comprising:
- a radio transceiver receiving data from and transmitting data to a mobile station, said data including commands;
a security module, coupled to said radio transceiver, authenticating an identity of said mobile station using bi-directional verification, and said security module producing an output based on an authenticated identity of said mobile station; and
an application interface, coupled to said radio transceiver and said security module, and being connectable to application equipment, said application interface translating data received by said radio transceiver when permitted based on said output from said security module.
8 Assignments
0 Petitions
Accused Products
Abstract
A system and method for preventing unauthorized use of a remotely operated system, by using a sophisticated bi-directional verification schemes. The bi-directional verification schemes are based on random challenge and response between a mobile station and a cellular network. The cellular network discriminates between "pirate" mobile stations and mobile stations authorized to use the cellular network. The security afforded by bi-directional verification is applied to a system and method for use in conjunction with remotely operated systems, including one or more pieces of application equipment or a home automation system.
193 Citations
19 Claims
-
1. A personal base station, comprising:
-
a radio transceiver receiving data from and transmitting data to a mobile station, said data including commands; a security module, coupled to said radio transceiver, authenticating an identity of said mobile station using bi-directional verification, and said security module producing an output based on an authenticated identity of said mobile station; and an application interface, coupled to said radio transceiver and said security module, and being connectable to application equipment, said application interface translating data received by said radio transceiver when permitted based on said output from said security module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for making secure transmissions between a mobile station and application equipment, the method comprising the steps of:
-
receiving and transmitting data between a mobile station and a personal base station, said data including commands; authenticating an identity of said mobile station using bi-directional verification; and translating between said personal base station and said application equipment when the identity of said mobile station is authenticated. - View Dependent Claims (17, 18, 19)
-
Specification