Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communicating with a machine to machine device

a technology of machine to machine device and communication channel, which is applied in the field of communication channel with machine to machine device, can solve the problems of many machine to machine devices, difficult to reach, and difficult management, and achieve the effect of reducing the data overhead of the m2m device and/or the bootstrapping server, reducing or eliminating unnecessary data transfers

Inactive Publication Date: 2016-08-11
VODAFONE IP LICENSING
View PDF16 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patent is about a method of reducing data overhead in M2M devices and the bootstrapping server by linking the lifetimes of secure interfaces to the lifetime of security information. This helps to avoid unnecessary bootstrapping runs and reduces data transfers between the M2M device and the server. Additionally, the patent describes how the NAF can act as a router to pass traffic between the M2M device and the server without modifying the server's functionality or requiring it to be aware of the GBA. The technical effects of this method are reduced data overhead and more efficient communication between the M2M device and the server.

Problems solved by technology

Machine to Machine (M2M) devices are often numerous, hard-to-reach, and have constrained capabilities (owing to low cost, small size, low processing power or limited battery life).
All of this makes their management, often remote, very complicated.
To date, most of the limited number of deployments of GBA in the world has been for mobile broadcast.
These alternatives all work well with mobile devices and operators already, so service providers use them, although they are not as secure as GBA.
Strong security is not possible with current alternatives such as a user-entered PIN or a bootstrapping message delivered by an SMS.
These alternatives would either not be feasible or they would not provide the required level of security.
First, there might not be a user around to enter a PIN (as most M2M devices operate independently from human intervention).
Second, the service provider may be likely to want strong security (e.g. because M2M devices may include critical infrastructure), whereas PIN-based bootstrapping has weaker security.
Third, if a PIN or SMS-based bootstrapping goes wrong (server connects to wrong client, client connects to wrong server, or there is a Man-In-The-Middle), then the user is likely to notice, complain and get it fixed, whereas an M2M device is unlikely to notice and complain, so may be permanently compromised.
Neither is particularly practical by way of existing methods.
Moreover, as mentioned above, the OMA Device Management is not compatible for use with an M2M device, as discussed above.
Moreover, for the reasons mentioned above, the OMA Device Management and the standard document are incompatible, and a combination of the GBA Push for OMA Device Management with the standard document is not feasible, as it would result in the wrong device management protocol (i.e. one that is not suitable for M2M devices, particularly simple M2M devices), and some very laborious effort to make the two compatible and delete the elements which are redundant.
However, coaps requires a secure association to be provisioned between a device and a network server (DM Server) while providing no strong means to provision such an association from scratch.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communicating with a machine to machine device
  • Communicating with a machine to machine device
  • Communicating with a machine to machine device

Examples

Experimental program
Comparison scheme
Effect test

example object info

[0300]

ObjectObject MultipleObjectIDURNInstances?Mandatory?LWM2M0YesYesSecurity

[0301]Resource Info:

ResourceRange orNameTypeEnumerationUnitsDescriptionsLWM2MString 0-255 bytes—Uniquely identifies theServer URILWM2M Server or LWM2MBootstrap Server, and is in the form: “coaps: / / host:port”,where host is an IP address orFQDN, and port is the UDPport of the Server.BootstrapBoolean—Determines if the currentServerinstance concerns a LWM2MBootstrap Server (true) or astandard LWM2M Server(false)SecurityInteger 0-3—Determines which UDPModechannel security mode is used0: Pre-Shared Key mode1: Raw Public Key mode2: Certificate mode3: NoSec modePublic KeyOpaque—Stores the LWM2M Client'sor IdentityCertificate (Certificate mode),public key (RPK mode) or PSK Identity (PSK mode). The format is defined in Section E.1.1.ServerOpaque—Stores the LWM2M Server's Public Keyor LWM2M Bootstrap or IdentityServer's Certificate (Certificate mode), public key (RPK mode) or PSK Identity (PSK mode). The format is de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides methods and apparatus for administering an interface between a machine-to-machine, M2M, device and a network application function, NAF, for secure communication between the M2M device and the NAF. In one method, the M2M device administers the interface by transmitting administration data to the NAF, wherein the administration data comprises a name for the M2M device, and wherein the name for the M2M device is equal to, or derived at least in part from, or otherwise linked to, at least part of data that are shared between the M2M device and a boot-strapping server.

Description

FIELD OF THE INVENTION[0001]The present invention relates to a method and system for administering an interface between a machine to machine, M2M, device and a network application function, NAF, for secure communication between the M2M device and the NAF.BACKGROUND OF THE INVENTION[0002]Machine to Machine (M2M) devices are often numerous, hard-to-reach, and have constrained capabilities (owing to low cost, small size, low processing power or limited battery life). All of this makes their management, often remote, very complicated. Moreover, M2M devices often need to be managed in a secure manner. For example, they may contain information that is commercially sensitive and / or confidential for the one or more entities that manage and / or own said devices. There is a need to remotely manage them in a secure way, while respecting these constraints.[0003]The M2M device needs to be able to contact a device management (DM) server in a secure manner. Whilst at the time of manufacture the dev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06H04W4/00H04W12/02G06F21/71H04W12/04G06F9/44G06F9/4401H04W4/50H04W4/70
CPCH04L63/062H04W8/04H04L63/10H04W4/001H04W4/005H04W4/14H04W12/02H04W12/04H04W88/02H04W88/06H04L2463/061H04L63/08G06F13/1689G06F13/28G06F13/4027H04L67/1095H04W4/12H04W12/06H04W52/0229H04L63/029H04L63/0428H04L63/061H04L63/0823H04L63/166G06F21/71H04L67/42H04L63/0442H04L63/0838H04L67/125H04W28/08H04W80/06G06F21/606H04L63/04H04L63/20H04B1/3816H04L63/0876H04L9/0861H04L63/0869H04W4/70H04W4/50Y02D10/00Y02D30/70H04W12/37H04W12/0431H04L9/0819H04L63/068H04L63/0853G06F9/44H04L63/00H04L67/00H04W8/005H04L9/0816H04W12/40H04W12/033H04W12/084H04W12/00H04L67/01G06F9/4401
Inventor BONE, NICK
Owner VODAFONE IP LICENSING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products