Secure configuration of a wireless sensor network
    1.
    发明授权
    Secure configuration of a wireless sensor network 有权
    无线传感器网络的安全配置

    公开(公告)号:US08913747B2

    公开(公告)日:2014-12-16

    申请号:US13241007

    申请日:2011-09-22

    摘要: A method for secure configuration of a sensor system involves identifying a new sensor not activated within the sensor system, the new sensor including a new sensor identifier, establishing a first transmission link between the new sensor and a sensor controller, transmitting the new sensor identifier between the sensor and the sensor controller, generating a key pair for the sensor controller, the key pair including a controller public key and a controller private key, generating a key pair for the new sensor, the key pair including a sensor public key and a sensor private key, transmitting the controller public key to the new sensor and the sensor public key to the sensor controller, and generating a pairwise key within the sensor controller and the new sensor.

    摘要翻译: 一种用于传感器系统的安全配置的方法包括识别在传感器系统内未被激活的新传感器,新的传感器包括新的传感器标识符,在新的传感器和传感器控制器之间建立第一传输链路, 传感器和传感器控制器,生成用于传感器控制器的密钥对,密钥对包括控制器公钥和控制器私钥,为新传感器生成密钥对,密钥对包括传感器公共密钥和传感器 私钥,将控制器公开密钥发送到传感器控制器的新传感器和传感器公共密钥,并在传感器控制器和新传感器内生成成对密钥。

    Determining the network location of a user device based on transmitter fingerprints
    3.
    发明授权
    Determining the network location of a user device based on transmitter fingerprints 有权
    基于发射机指纹确定用户设备的网络位置

    公开(公告)号:US07885668B2

    公开(公告)日:2011-02-08

    申请号:US11343460

    申请日:2006-01-31

    IPC分类号: H04W24/00 H04W4/00 H04M11/00

    摘要: Reliably identifying an AP through which a user device is accessing one or more networks, and reliably determining the current network location of the user device. An AP and network location may be reliably identified using a set of transmitter fingerprints unique to the AP or network location, respectively. In response to a user device receiving at least one signal from at least one unknown entity, a transmitter fingerprint set of the at least one entity may be determined from the at least one signal. It then may be determined whether the at least one entity is an AP having an ID known to the user device, and/or whether the current network location is known by the user device. The user device may determine information that may be divulged with the at least one entity based on this determination.

    摘要翻译: 可靠地识别用户设备正在访问一个或多个网络的AP,并且可靠地确定用户设备的当前网络位置。 可以使用AP或网络位置独有的一组发射机指纹来可靠地识别AP和网络位置。 响应于用户设备从至少一个未知实体接收至少一个信号,可以根据至少一个信号确定至少一个实体的发射机指纹集。 然后可以确定至少一个实体是具有用户设备已知的ID的AP和/或当前网络位置是否被用户设备知道。 用户设备可以基于该确定来确定可以与该至少一个实体泄露的信息。

    User interface and data structure for transmitter fingerprints of network locations
    4.
    发明授权
    User interface and data structure for transmitter fingerprints of network locations 有权
    网络位置的发射机指纹的用户界面和数据结构

    公开(公告)号:US07515576B2

    公开(公告)日:2009-04-07

    申请号:US11343646

    申请日:2006-01-31

    IPC分类号: H04Q7/20

    摘要: A fingerprint table or other type of data structure including a plurality of entries may be provided, each entry including a transmitter fingerprint set of a respective network location. Determining whether a current network location is a network location known to a user device may include comparing a determined transmitter fingerprint set of the entity with the transmitter fingerprint set of one or more fingerprint table entries. A user interface may be provided that enables a user to control when a transmitter fingerprint set is determined, compared with fingerprint table entries and/or recorded.

    摘要翻译: 可以提供包括多个条目的指纹表或其他类型的数据结构,每个条目包括相应网络位置的发射机指纹集。 确定当前网络位置是否是用户设备已知的网络位置可以包括将确定的实体的发射机指纹集与一个或多个指纹表条目的发射机指纹集进行比较。 可以提供用户界面,其使得用户能够控制何时确定发射器指纹集,与指纹表条目进行比较和/或记录。

    SECURE CONFIGURATION OF A WIRELESS SENSOR NETWORK
    5.
    发明申请
    SECURE CONFIGURATION OF A WIRELESS SENSOR NETWORK 有权
    无线传感器网络的安全配置

    公开(公告)号:US20120008783A1

    公开(公告)日:2012-01-12

    申请号:US13241007

    申请日:2011-09-22

    IPC分类号: H04K1/02

    摘要: A method for secure configuration of a sensor system involves identifying a new sensor not activated within the sensor system, the new sensor including a new sensor identifier, establishing a first transmission link between the new sensor and a sensor controller, transmitting the new sensor identifier between the sensor and the sensor controller, generating a key pair for the sensor controller, the key pair including a controller public key and a controller private key, generating a key pair for the new sensor, the key pair including a sensor public key and a sensor private key, transmitting the controller public key to the new sensor and the sensor public key to the sensor controller, and generating a pairwise key within the sensor controller and the new sensor.

    摘要翻译: 一种用于传感器系统的安全配置的方法包括识别在传感器系统内未被激活的新传感器,新的传感器包括新的传感器标识符,在新的传感器和传感器控制器之间建立第一传输链路, 传感器和传感器控制器,生成用于传感器控制器的密钥对,密钥对包括控制器公钥和控制器私钥,为新传感器生成密钥对,密钥对包括传感器公共密钥和传感器 私钥,将控制器公开密钥发送到传感器控制器的新传感器和传感器公共密钥,并在传感器控制器和新传感器内生成成对密钥。

    KEY MANAGEMENT IN SECURE NETWORK ENCLAVES
    7.
    发明申请
    KEY MANAGEMENT IN SECURE NETWORK ENCLAVES 有权
    安全网络安全的关键管理

    公开(公告)号:US20100318800A1

    公开(公告)日:2010-12-16

    申请号:US12483095

    申请日:2009-06-11

    IPC分类号: H04L9/00

    摘要: A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located.

    摘要翻译: 用于计算机系统的分层密钥生成和分发机制,其中设备被组织成安全的飞地。 该机制使网络访问能够被定制,以达到每个设备所需的最低权限。 在层次结构的最低层,密钥用于形成设备之间的安全关联。 层次结构的每个级别的密钥都是从层次较高级别的密钥和密钥导出信息生成的。 密钥导出信息可以从设备的标识符或消息内容中确定,从而支持加密功能的硬件卸载。 因为可以基于参与安全关联的主机所在的包围来生成密钥,所以系统包括一种机构,通过该机制,设备可以发现它们所在的飞地。

    Session mobility for wireless devices
    8.
    发明授权
    Session mobility for wireless devices 有权
    无线设备的会话移动性

    公开(公告)号:US07561694B1

    公开(公告)日:2009-07-14

    申请号:US11108273

    申请日:2005-04-18

    IPC分类号: H04K1/00

    摘要: A wireless system includes at least one network computing system, a proxy server, a controller, and wireless devices. When a wireless device is already a member of a first group but moves into range of a second group, that device may initiate a request to join the second group, thereby ensuring that the wireless device can send and receive information through the second group. The proxy server maintains a list of authorized wireless devices and their primary controller, thereby routing information from one or more network computing systems to the proper controller, so that the wireless device may receive information from one of those network computing systems as necessary. When the wireless device becomes joined to a new controller, the proxy updates its list, thus ensuring continuity between the wireless device and the one or more network computing systems.

    摘要翻译: 无线系统包括至少一个网络计算系统,代理服务器,控制器和无线设备。 当无线设备已经是第一组的成员但移动到第二组的范围时,该设备可以发起加入第二组的请求,从而确保无线设备可以通过第二组发送和接收信息。 代理服务器维护授权无线设备及其主控制器的列表,从而将信息从一个或多个网络计算系统路由到适当的控制器,使得无线设备可以根据需要从这些网络计算系统之一接收信息。 当无线设备连接到新的控制器时,代理更新其列表,从而确保无线设备与一个或多个网络计算系统之间的连续性。

    Secure configuration of a wireless sensor network
    9.
    发明授权
    Secure configuration of a wireless sensor network 有权
    无线传感器网络的安全配置

    公开(公告)号:US08051489B1

    公开(公告)日:2011-11-01

    申请号:US11083494

    申请日:2005-03-18

    IPC分类号: G06F7/04

    摘要: A method for secure configuration of a sensor system involves identifying a new sensor not activated within the sensor system, the new sensor including a new sensor identifier, establishing a first transmission link between the new sensor and a sensor controller, transmitting the new sensor identifier between the sensor and the sensor controller, generating a key pair for the sensor controller, the key pair including a controller public key and a controller private key, generating a key pair for the new sensor, the key pair including a sensor public key and a sensor private key, transmitting the controller public key to the new sensor and the sensor public key to the sensor controller, and generating a pairwise key within the sensor controller and the new sensor.

    摘要翻译: 一种用于传感器系统的安全配置的方法包括识别在传感器系统内未被激活的新传感器,新的传感器包括新的传感器标识符,在新的传感器和传感器控制器之间建立第一传输链路, 传感器和传感器控制器,生成用于传感器控制器的密钥对,密钥对包括控制器公钥和控制器私钥,为新传感器生成密钥对,密钥对包括传感器公共密钥和传感器 私钥,将控制器公开密钥发送到传感器控制器的新传感器和传感器公共密钥,并在传感器控制器和新传感器内生成成对密钥。

    DISCOVERY OF SECURE NETWORK ENCLAVES
    10.
    发明申请
    DISCOVERY OF SECURE NETWORK ENCLAVES 有权
    发现安全网络包装

    公开(公告)号:US20100318799A1

    公开(公告)日:2010-12-16

    申请号:US12483052

    申请日:2009-06-11

    IPC分类号: H04L9/32

    摘要: A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located.

    摘要翻译: 用于计算机系统的分层密钥生成和分发机制,其中设备被组织成安全的飞地。 该机制使网络访问能够被定制,以达到每个设备所需的最低权限。 在层次结构的最低层,密钥用于形成设备之间的安全关联。 层次结构的每个级别的密钥都是从层次较高级别的密钥和密钥导出信息生成的。 密钥导出信息可以从设备的标识符或消息内容中确定,从而支持加密功能的硬件卸载。 因为可以基于参与安全关联的主机所在的包围来生成密钥,所以系统包括一种机构,通过该机制,设备可以发现它们所在的飞地。