-
">11.
公开(公告)号:US20180262329A1
公开(公告)日:2018-09-13
申请号:US15972914
申请日:2018-05-07
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
CPC classification number: H04L9/0861 , G06F21/35 , G06F2221/2105 , G06F2221/2107 , G06F2221/2115 , H04J11/00 , H04L9/006 , H04L9/0816 , H04L9/0841 , H04L9/085 , H04L9/088 , H04L9/0894 , H04L9/14 , H04L9/30 , H04L9/3066 , H04L9/32 , H04L9/321 , H04L9/3239 , H04L9/3247 , H04L9/3249 , H04L9/3263 , H04L12/2854 , H04L63/0272 , H04L63/0435 , H04L63/0442 , H04L63/045 , H04L63/0464 , H04L63/061 , H04L63/0807 , H04L63/123 , H04L63/166 , H04L67/04 , H04L2209/24 , H04L2209/72 , H04L2209/805 , H04W4/70 , H04W8/082 , H04W12/0013 , H04W12/02 , H04W12/04 , H04W12/06 , H04W40/005 , H04W52/0216 , H04W52/0235 , H04W52/0277 , H04W76/27 , H04W80/04 , H04W84/12 , H04W88/12 , H05K999/99 , Y02D70/00 , Y02D70/1222 , Y02D70/1224 , Y02D70/1242 , Y02D70/1244 , Y02D70/1262 , Y02D70/1264 , Y02D70/142 , Y02D70/144 , Y02D70/146 , Y02D70/162 , Y02D70/164 , Y02D70/166 , Y02D70/21 , Y02D70/24
Abstract: A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key.
-
12.
公开(公告)号:US10063940B1
公开(公告)日:2018-08-28
申请号:US15703410
申请日:2017-09-13
Applicant: Network-1 Technologies, Inc.
Inventor: Ingemar J. Cox
IPC: H04N21/43 , H04N21/84 , G06F17/30 , H04N21/478 , H04N21/44 , H04N21/858 , H04N21/61 , H04N21/258
CPC classification number: H04L67/1095 , G06F16/248 , G06F16/285 , G06F16/29 , G06F16/40 , G06F16/43 , G06F16/433 , G06F16/434 , G06F16/48 , G06F16/51 , G06F16/532 , G06F16/5838 , G06F16/5866 , G06F16/73 , G06F16/951 , G06F16/9535 , G06F16/9566 , G06Q30/02 , G06Q30/0256 , G06Q30/0277 , G06Q30/0601 , G06Q30/0625 , G06Q40/12 , H04H60/37 , H04H60/58 , H04H60/59 , H04H2201/90 , H04L43/16 , H04L61/256 , H04L65/4076 , H04L65/601 , H04L67/02 , H04M1/72583 , H04N21/23418 , H04N21/2407 , H04N21/25841 , H04N21/43 , H04N21/4394 , H04N21/44008 , H04N21/47815 , H04N21/4788 , H04N21/6125 , H04N21/812 , H04N21/84 , H04N21/8586
Abstract: A computer system comprising one or more processors and computer-readable media operatively connected thereto, having stored thereon instructions for carrying out the steps of: maintaining one or more databases comprising first electronic data comprising digitally created reference compact electronic representations for each of a plurality of reference electronic works and second electronic data associated with the reference electronic works and related to action information corresponding thereto; obtaining a first digitally created compact electronic representation comprising one or more extracted feature vectors of a first electronic work; identifying a matching reference electronic work by comparing the first digitally created compact electronic representation of the first electronic work with the first electronic data using a sub-linear search of the first electronic data; determining the action information corresponding to the matching reference electronic work based on the second electronic data; and associating the determined action information with the first electronic work.
-
公开(公告)号:US20180212946A1
公开(公告)日:2018-07-26
申请号:US15928848
申请日:2018-03-22
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
CPC classification number: H04L63/08 , H04B1/3816 , H04L9/0819 , H04L9/0869 , H04L9/3271 , H04L63/0428 , H04L63/0435 , H04L63/06 , H04L63/062 , H04L63/101 , H04W4/70 , H04W12/06
Abstract: A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone.
-
14.
公开(公告)号:US10003461B2
公开(公告)日:2018-06-19
申请号:US15642088
申请日:2017-07-05
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
IPC: H04L9/00 , H04W88/12 , H04W84/12 , H04W12/04 , H04W52/02 , H04L9/08 , H04W4/00 , H04L9/14 , H04L29/06 , H04L9/32 , H04W12/06 , H04W12/02 , H04L29/08 , H04L9/30 , G06F21/35 , H04W80/04 , H04W76/04 , H04W40/00 , H04L12/28 , H04J11/00 , H04W8/08
CPC classification number: H04L9/0861 , G06F21/35 , G06F2221/2105 , G06F2221/2107 , G06F2221/2115 , H04J11/00 , H04L9/006 , H04L9/0816 , H04L9/0841 , H04L9/085 , H04L9/088 , H04L9/0894 , H04L9/14 , H04L9/30 , H04L9/3066 , H04L9/32 , H04L9/321 , H04L9/3239 , H04L9/3247 , H04L9/3249 , H04L9/3263 , H04L12/2854 , H04L63/0272 , H04L63/0435 , H04L63/0442 , H04L63/045 , H04L63/0464 , H04L63/061 , H04L63/0807 , H04L63/123 , H04L63/166 , H04L67/04 , H04L2209/24 , H04L2209/72 , H04L2209/805 , H04W4/70 , H04W8/082 , H04W12/0013 , H04W12/02 , H04W12/04 , H04W12/06 , H04W40/005 , H04W52/0216 , H04W52/0235 , H04W52/0277 , H04W76/27 , H04W80/04 , H04W84/12 , H04W88/12 , H05K999/99 , Y02D70/00 , Y02D70/1222 , Y02D70/1224 , Y02D70/1242 , Y02D70/1244 , Y02D70/1262 , Y02D70/1264 , Y02D70/142 , Y02D70/144 , Y02D70/146 , Y02D70/162 , Y02D70/164 , Y02D70/166 , Y02D70/21 , Y02D70/24
Abstract: Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications. A wireless module operating in a wireless network and with access to the Internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (PLMN) that supports wireless wide area network technology including 3rd generation (3G) and 4th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state. Messages between the wireless module and server can be transmitted according to the UDP or UDP Lite protocol with channel coding in the datagram body for efficiency while providing robustness to bit errors. The wireless module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The wireless module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The communication system between the wireless module and the server can conserve battery life in the wireless module while providing a system that is secure, scalable, and robust.
-
公开(公告)号:US09998281B2
公开(公告)日:2018-06-12
申请号:US15457700
申请日:2017-03-13
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
CPC classification number: H04L9/0861 , G06F21/35 , G06F2221/2105 , G06F2221/2107 , G06F2221/2115 , H04J11/00 , H04L9/006 , H04L9/0816 , H04L9/0841 , H04L9/085 , H04L9/088 , H04L9/0894 , H04L9/14 , H04L9/30 , H04L9/3066 , H04L9/32 , H04L9/321 , H04L9/3239 , H04L9/3247 , H04L9/3249 , H04L9/3263 , H04L12/2854 , H04L63/0272 , H04L63/0435 , H04L63/0442 , H04L63/045 , H04L63/0464 , H04L63/061 , H04L63/0807 , H04L63/123 , H04L63/166 , H04L67/04 , H04L2209/24 , H04L2209/72 , H04L2209/805 , H04W4/70 , H04W8/082 , H04W12/02 , H04W12/04 , H04W12/06 , H04W40/005 , H04W52/0216 , H04W52/0235 , H04W52/0277 , H04W76/27 , H04W80/04 , H04W84/12 , H04W88/12 , H05K999/99 , Y02D70/00 , Y02D70/1222 , Y02D70/1224 , Y02D70/1242 , Y02D70/1244 , Y02D70/1262 , Y02D70/1264 , Y02D70/142 , Y02D70/144 , Y02D70/146 , Y02D70/162 , Y02D70/164 , Y02D70/166 , Y02D70/21 , Y02D70/24
Abstract: A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key.
-
公开(公告)号:US09961060B2
公开(公告)日:2018-05-01
申请号:US14751119
申请日:2015-06-25
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
CPC classification number: H04L63/08 , H04B1/3816 , H04L9/0819 , H04L9/0869 , H04L9/3271 , H04L63/0428 , H04L63/0435 , H04L63/06 , H04L63/062 , H04L63/101 , H04W4/70 , H04W12/06
Abstract: A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone.
-
17.
公开(公告)号:US09807472B1
公开(公告)日:2017-10-31
申请号:US15356087
申请日:2016-11-18
Applicant: Network-1 Technologies, Inc.
Inventor: Ingemar J. Cox
IPC: H04N21/43 , H04N21/84 , H04N21/61 , H04N21/858 , H04N21/258 , H04N21/44 , H04N21/478 , G06F17/30
CPC classification number: H04N21/812 , G06F17/30017 , G06F17/30023 , G06F17/30026 , G06F17/30038 , G06F17/30047 , G06F17/30241 , G06F17/30256 , G06F17/30268 , G06F17/30277 , G06F17/3028 , G06F17/30554 , G06F17/30598 , G06F17/30823 , G06F17/30864 , G06F17/30867 , G06F17/30887 , G06Q30/02 , G06Q30/0256 , G06Q30/0277 , G06Q30/0601 , G06Q30/0625 , G06Q40/12 , H04H60/37 , H04H60/58 , H04H60/59 , H04H2201/90 , H04L43/16 , H04L61/256 , H04L65/4076 , H04L65/601 , H04L67/02 , H04L67/1095 , H04M1/72583 , H04N21/23418 , H04N21/2407 , H04N21/25841 , H04N21/43 , H04N21/4394 , H04N21/44008 , H04N21/47815 , H04N21/4788 , H04N21/6125 , H04N21/84 , H04N21/8586
Abstract: A computer system comprising one or more processors and computer-readable media operatively connected thereto, having stored thereon instructions for carrying out the steps of: maintaining one or more databases comprising first electronic data comprising digitally created reference compact electronic representations for each of a plurality of reference electronic works and second electronic data associated with the reference electronic works and related to action information corresponding thereto; obtaining a first digitally created compact electronic representation comprising one or more extracted feature vectors of a first electronic work; identifying a matching reference electronic work by comparing the first digitally created compact electronic representation of the first electronic work with the first electronic data using a sub-linear search of the first electronic data; determining the action information corresponding to the matching reference electronic work based on the second electronic data; and associating the determined action information with the first electronic work.
-
公开(公告)号:US12207094B2
公开(公告)日:2025-01-21
申请号:US18416534
申请日:2024-01-18
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
Abstract: A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone.
-
公开(公告)号:US12166869B2
公开(公告)日:2024-12-10
申请号:US18229907
申请日:2023-08-03
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
IPC: H04L9/08 , G06F21/33 , G06F21/35 , H04J11/00 , H04L9/00 , H04L9/06 , H04L9/14 , H04L9/30 , H04L9/32 , H04L9/40 , H04L12/28 , H04L67/04 , H04W4/70 , H04W8/08 , H04W12/02 , H04W12/03 , H04W12/04 , H04W12/041 , H04W12/06 , H04W40/00 , H04W52/02 , H04W76/27 , H04W80/04 , H04W84/12 , H04W88/12
Abstract: A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.
-
公开(公告)号:US20240250938A1
公开(公告)日:2024-07-25
申请号:US18416534
申请日:2024-01-18
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
CPC classification number: H04L63/08 , H04B1/3816 , H04L9/0819 , H04L9/0869 , H04L9/3271 , H04L63/0428 , H04L63/0435 , H04L63/06 , H04L63/062 , H04L63/101 , H04W4/70 , H04W12/06 , H04W12/35
Abstract: A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone.
-
-
-
-
-
-
-
-
-