JP2019507971A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2019507971A5 JP2019507971A5 JP2018531057A JP2018531057A JP2019507971A5 JP 2019507971 A5 JP2019507971 A5 JP 2019507971A5 JP 2018531057 A JP2018531057 A JP 2018531057A JP 2018531057 A JP2018531057 A JP 2018531057A JP 2019507971 A5 JP2019507971 A5 JP 2019507971A5
- Authority
- JP
- Japan
- Prior art keywords
- iot
- encryption engine
- key
- secret
- client device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims 15
Applications Claiming Priority (7)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/967,627 US10091242B2 (en) | 2015-12-14 | 2015-12-14 | System and method for establishing a secondary communication channel to control an internet of things (IOT) device |
| US14/967,644 US10447784B2 (en) | 2015-12-14 | 2015-12-14 | Apparatus and method for modifying packet interval timing to identify a data transfer condition |
| US14/967,680 US10805344B2 (en) | 2015-12-14 | 2015-12-14 | Apparatus and method for obscuring wireless communication patterns |
| US14/967,644 | 2015-12-14 | ||
| US14/967,680 | 2015-12-14 | ||
| US14/967,627 | 2015-12-14 | ||
| PCT/US2016/066513 WO2017106258A1 (en) | 2015-12-14 | 2016-12-14 | System and method for establishing a secondary communication channel to control an internet of things (iot) device |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2019507971A JP2019507971A (ja) | 2019-03-22 |
| JP2019507971A5 true JP2019507971A5 (enExample) | 2020-01-30 |
| JP7004654B2 JP7004654B2 (ja) | 2022-01-21 |
Family
ID=59057498
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2018531057A Active JP7004654B2 (ja) | 2015-12-14 | 2016-12-14 | モノのインターネット(IoT)デバイスを制御するための二次の通信チャネルを確立するためのシステム及び方法 |
Country Status (2)
| Country | Link |
|---|---|
| JP (1) | JP7004654B2 (enExample) |
| WO (1) | WO2017106258A1 (enExample) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP6674413B2 (ja) | 2017-06-28 | 2020-04-01 | キヤノン株式会社 | 通信装置、制御方法、及びプログラム |
| CN109756450B (zh) | 2017-11-03 | 2021-06-15 | 华为技术有限公司 | 一种物联网通信的方法、装置、系统和存储介质 |
| CN108933650B (zh) * | 2018-06-28 | 2020-02-14 | 阿里巴巴集团控股有限公司 | 数据加解密的方法及装置 |
| WO2021250764A1 (ja) * | 2020-06-09 | 2021-12-16 | 三菱電機株式会社 | ブルートゥース機器の無線接続方法 |
| CN116094846A (zh) * | 2023-04-10 | 2023-05-09 | 睿云联(厦门)网络通讯技术有限公司 | 基于tcp长连接的远程运维系统和方法 |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH01307341A (ja) * | 1988-06-06 | 1989-12-12 | Fujitsu Ltd | 移動体データ暗号化通信方式 |
| US7055027B1 (en) * | 1999-03-22 | 2006-05-30 | Microsoft Corporation | System and method for trusted inspection of a data stream |
| EP1623551B1 (en) | 2003-05-12 | 2007-01-17 | NTT DoCoMo, Inc. | Network security method and system |
| US8132247B2 (en) * | 2007-08-03 | 2012-03-06 | Citrix Systems, Inc. | Systems and methods for authorizing a client in an SSL VPN session failover environment |
| US20100306572A1 (en) * | 2009-06-01 | 2010-12-02 | Alexandro Salvarani | Apparatus and method to facilitate high availability in secure network transport |
| JP5566322B2 (ja) | 2011-03-24 | 2014-08-06 | Kddi株式会社 | バックアップ用通信回線共用システム |
| US20140258405A1 (en) * | 2013-03-05 | 2014-09-11 | Sean Perkin | Interactive Digital Content Sharing Among Users |
| US8782774B1 (en) * | 2013-03-07 | 2014-07-15 | Cloudflare, Inc. | Secure session capability using public-key cryptography without access to the private key |
| US10158608B2 (en) | 2013-07-02 | 2018-12-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Key establishment for constrained resource devices |
| US9348689B2 (en) * | 2014-10-07 | 2016-05-24 | Belkin International Inc. | Backup-instructing broadcast to network devices responsive to detection of failure risk |
-
2016
- 2016-12-14 WO PCT/US2016/066513 patent/WO2017106258A1/en not_active Ceased
- 2016-12-14 JP JP2018531057A patent/JP7004654B2/ja active Active
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6844908B2 (ja) | セキュアセッションの確立と暗号化データ交換のためのコンピュータ利用システム及びコンピュータ利用方法 | |
| Wazid et al. | Secure remote user authenticated key establishment protocol for smart home environment | |
| US10812969B2 (en) | System and method for configuring a wireless device for wireless network access | |
| JP6301244B2 (ja) | モノのインターネットのためのデータグラム転送における軽量認証のためのコンピュータ実施システムおよび方法 | |
| US9008312B2 (en) | System and method of creating and sending broadcast and multicast data | |
| JP2020144873A (ja) | 通信保護を備えた聴覚装置および関連する方法 | |
| CN113612797A (zh) | 一种基于国密算法的Kerberos身份认证协议改进方法 | |
| CN109495274A (zh) | 一种去中心化智能锁电子钥匙分发方法及系统 | |
| CN109787761A (zh) | 一种基于物理不可克隆函数的设备认证与密钥分发系统和方法 | |
| WO2016144257A3 (en) | Method and system for facilitating authentication | |
| CN110087240B (zh) | 基于wpa2-psk模式的无线网络安全数据传输方法及系统 | |
| JP2019507971A5 (enExample) | ||
| EP3000216B1 (en) | Secured data channel authentication implying a shared secret | |
| CN107682152B (zh) | 一种基于对称密码的群组密钥协商方法 | |
| WO2007028328A1 (en) | Method, system and device for negotiating about cipher key shared by ue and external equipment | |
| US20050210247A1 (en) | Method of virtual challenge response authentication | |
| CN107682380B (zh) | 一种交叉认证的方法及装置 | |
| US8356175B2 (en) | Methods and apparatus to perform associated security protocol extensions | |
| KR20130046781A (ko) | 무선 네트워크 접속 인증 방법 및 그 시스템 | |
| CN110719169A (zh) | 传输路由器安全信息的方法及装置 | |
| CN107454063B (zh) | 一种用户交互认证方法、设备及系统 | |
| Gupta et al. | Security mechanisms of Internet of things (IoT) for reliable communication: a comparative review | |
| TWI856757B (zh) | 無網際網路電子裝置資通安全認證方法 | |
| Bergstrom et al. | Anatomy of a heatwave: how Antarctica recorded a 20.75 C day last month | |
| Boudguiga et al. | Server assisted key establishment for WSN: A MIKEY-Ticket approach |