-
41.
公开(公告)号:US10250386B2
公开(公告)日:2019-04-02
申请号:US15973012
申请日:2018-05-07
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
IPC: H04L9/00 , H04L9/08 , H04L9/14 , H04L9/30 , H04L9/32 , H04W4/70 , H04W8/08 , G06F21/35 , H04J11/00 , H04L12/28 , H04L29/06 , H04L29/08 , H04W12/02 , H04W12/04 , H04W12/06 , H04W40/00 , H04W52/02 , H04W76/27 , H04W80/04 , H04W84/12 , H04W88/12
Abstract: Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications. A wireless module operating in a wireless network and with access to the Internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (PLMN) that supports wireless wide area network technology including 3rd generation (3G) and 4th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state. Messages between the wireless module and server can be transmitted according to the UDP or UDP Lite protocol with channel coding in the datagram body for efficiency while providing robustness to bit errors. The wireless module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The wireless module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The communication system between the wireless module and the server can conserve battery life in the wireless module while providing a system that is secure, scalable, and robust.
-
公开(公告)号:US10187206B2
公开(公告)日:2019-01-22
申请号:US15680758
申请日:2017-08-18
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
IPC: H04L29/06 , H04L9/08 , H04W52/02 , H04W12/04 , H04W4/70 , H04W76/27 , H04L9/32 , H04W12/06 , H04W12/02 , G06F21/35 , H04L9/14 , H04L9/30 , H04J11/00 , H04L12/28 , H04W8/08 , H04W40/00 , H04W80/04 , H04L9/00 , H04L29/08 , H04W84/12 , H04W88/12
Abstract: A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.
-
公开(公告)号:US10177911B2
公开(公告)日:2019-01-08
申请号:US15983957
申请日:2018-05-18
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
IPC: H04L9/30 , H04L29/06 , H04L9/08 , H04L9/32 , H04L9/00 , H04W8/08 , H04J11/00 , H04L12/28 , H04W40/00 , H04W52/02 , H04W80/04 , H04W12/02 , H04W12/06 , G06F21/35 , H04W4/70 , H04W76/27 , H04L9/14 , H04W12/04 , H04L29/08 , H04W88/12 , H04W84/12
Abstract: Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module can include a sensor and/or actuator. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private/public keys using cryptographic algorithms and a set of parameters. A server can use a shared secret key to authenticate the submission of derived public keys with an associated module identity. For the very first submission of a public key derived the module, the shared secret key can comprise a pre-shared secret key which can be loaded into the module using a pre-shared secret key code.
-
公开(公告)号:US20180367522A1
公开(公告)日:2018-12-20
申请号:US16110804
申请日:2018-08-23
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
CPC classification number: H04L63/08 , H04B1/3816 , H04L9/0819 , H04L9/0869 , H04L9/3271 , H04L63/0428 , H04L63/0435 , H04L63/06 , H04L63/062 , H04L63/101 , H04W4/70 , H04W12/0023 , H04W12/06
Abstract: A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone.
-
45.
公开(公告)号:US10063936B1
公开(公告)日:2018-08-28
申请号:US15689528
申请日:2017-08-29
Applicant: Network-1 Technologies, Inc.
Inventor: Ingemar J. Cox
IPC: H04N21/43 , H04N21/81 , H04N21/4788 , H04N21/61 , H04N21/478 , H04N21/234
CPC classification number: H04L67/1095 , G06F16/248 , G06F16/285 , G06F16/29 , G06F16/40 , G06F16/43 , G06F16/433 , G06F16/434 , G06F16/48 , G06F16/51 , G06F16/532 , G06F16/5838 , G06F16/5866 , G06F16/73 , G06F16/951 , G06F16/9535 , G06F16/9566 , G06Q30/02 , G06Q30/0256 , G06Q30/0277 , G06Q30/0601 , G06Q30/0625 , G06Q40/12 , H04H60/37 , H04H60/58 , H04H60/59 , H04H2201/90 , H04L43/16 , H04L61/256 , H04L65/4076 , H04L65/601 , H04L67/02 , H04M1/72583 , H04N21/23418 , H04N21/2407 , H04N21/25841 , H04N21/43 , H04N21/4394 , H04N21/44008 , H04N21/47815 , H04N21/4788 , H04N21/6125 , H04N21/812 , H04N21/84 , H04N21/8586
Abstract: A method comprising the steps of: receiving, from a user electronic device at a computer system, one or more extracted feature vectors that are compact representations of one or more video frames of a video displayed at the user device; identifying, at the computer system, one or more products related to the one or more video frames based at least in part on an approximate nearest neighbor search of an electronic database of reference feature vectors corresponding to one or more reference works that identifies any match within a threshold of at least one of the reference feature vectors to the one or more extracted feature vectors but does not guarantee to identify the closest match to the one or more extracted feature vectors; providing, by the computer system to the user electronic device, the identified one or more products along with action information associated with the identified one or more products, wherein the action information is related to an action to be performed at the user electronic device; receiving, at the computer system from the user electronic device, a selection of one of the identified one or more products; and providing, to the electronic device, machine readable instructions for performance of the action associated with the selected one of the identified one or more products.
-
公开(公告)号:US09805066B1
公开(公告)日:2017-10-31
申请号:US15356127
申请日:2016-11-18
Applicant: Network-1 Technologies, Inc.
Inventor: Ingemar J. Cox
CPC classification number: H04N21/812 , G06F17/30017 , G06F17/30023 , G06F17/30026 , G06F17/30038 , G06F17/30047 , G06F17/30241 , G06F17/30256 , G06F17/30268 , G06F17/30277 , G06F17/3028 , G06F17/30554 , G06F17/30598 , G06F17/30823 , G06F17/30864 , G06F17/30867 , G06F17/30887 , G06Q30/02 , G06Q30/0256 , G06Q30/0277 , G06Q30/0601 , G06Q30/0625 , G06Q40/12 , H04H60/37 , H04H60/58 , H04H60/59 , H04H2201/90 , H04L43/16 , H04L61/256 , H04L65/4076 , H04L65/601 , H04L67/02 , H04L67/1095 , H04M1/72583 , H04N21/23418 , H04N21/2407 , H04N21/25841 , H04N21/43 , H04N21/4394 , H04N21/44008 , H04N21/47815 , H04N21/4788 , H04N21/6125 , H04N21/84 , H04N21/8586
Abstract: A method including the steps of: receiving, by a computer system including at least one computer, a first electronic media work uploaded from a first electronic device; extracting one or more features from the first electronic media work; linking the first electronic media work with a reference electronic media work identifier associated with a reference electronic media work to generate correlation information relating the first electronic media work with at least an action associated with the reference electronic media work identifier; storing the correlation information; receiving, from a second electronic device, a query related to the first electronic media work; correlating the query with action information related to an action to be performed based at least in part on the correlation information; generating machine-readable instructions based upon the action information; and providing the machine-readable instructions to the second electronic device to be used in performing the action.
-
公开(公告)号:US09544663B1
公开(公告)日:2017-01-10
申请号:US14981145
申请日:2015-12-28
Applicant: Network-1 Technologies, Inc.
Inventor: Ingemar J. Cox
IPC: H04N21/43 , H04N21/84 , H04N21/61 , H04N21/858 , H04N21/258
CPC classification number: H04N21/812 , G06F17/30017 , G06F17/30023 , G06F17/30026 , G06F17/30038 , G06F17/30047 , G06F17/30241 , G06F17/30256 , G06F17/30268 , G06F17/30277 , G06F17/3028 , G06F17/30554 , G06F17/30598 , G06F17/30823 , G06F17/30864 , G06F17/30867 , G06F17/30887 , G06Q30/02 , G06Q30/0256 , G06Q30/0277 , G06Q30/0601 , G06Q30/0625 , G06Q40/12 , H04H60/37 , H04H60/58 , H04H60/59 , H04H2201/90 , H04L43/16 , H04L61/256 , H04L65/4076 , H04L65/601 , H04L67/02 , H04L67/1095 , H04M1/72583 , H04N21/23418 , H04N21/2407 , H04N21/25841 , H04N21/43 , H04N21/4394 , H04N21/44008 , H04N21/47815 , H04N21/4788 , H04N21/6125 , H04N21/84 , H04N21/8586
Abstract: A computer system comprising one or more processors and computer-readable media operatively connected thereto, having stored thereon instructions for carrying out the steps of: maintaining one or more databases comprising first electronic data comprising digitally created reference compact electronic representations for each of a plurality of reference electronic works and second electronic data associated with the reference electronic works and related to action information corresponding thereto; obtaining a first digitally created compact electronic representation comprising one or more extracted feature vectors of a first electronic work; identifying a matching reference electronic work by comparing the first digitally created compact electronic representation of the first electronic work with the first electronic data using a sub-linear search of the first electronic data; determining the action information corresponding to the matching reference electronic work based on the second electronic data; and associating the determined action information with the first electronic work.
Abstract translation: 一种计算机系统,包括一个或多个处理器和与其可操作地连接的计算机可读介质,其上存储有用于执行以下步骤的指令:保持包括第一电子数据的一个或多个数据库,所述第一电子数据包括数字创建的参考小型电子表示, 参考电子作品和与参考电子作品相关的第二电子数据,并与其对应的动作信息相关; 获得包括第一电子作品的一个或多个提取的特征向量的第一数字创建的紧凑电子表示; 通过使用第一电子数据的子线性搜索将第一电子作品的第一数字创建的紧凑电子表示与第一电子数据进行比较来识别匹配的参考电子作品; 基于所述第二电子数据确定与所述匹配参考电子作品相对应的动作信息; 以及将所确定的动作信息与所述第一电子作品相关联。
-
公开(公告)号:US11736283B2
公开(公告)日:2023-08-22
申请号:US17304922
申请日:2021-06-28
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
IPC: H04L9/08 , H04W4/70 , H04W76/27 , H04W12/04 , H04W52/02 , H04L9/32 , H04W40/00 , H04W12/06 , H04L9/40 , H04J11/00 , H04L9/00 , G06F21/35 , H04W80/04 , H04L67/04 , H04L9/30 , H04L9/14 , H04W8/08 , H04L12/28 , H04W12/02 , H04L9/06 , G06F21/33 , H04W12/03 , H04W12/041 , H04W84/12 , H04W88/12
CPC classification number: H04L9/0861 , G06F21/33 , G06F21/35 , H04J11/00 , H04L9/006 , H04L9/0662 , H04L9/085 , H04L9/088 , H04L9/0816 , H04L9/0841 , H04L9/0844 , H04L9/0891 , H04L9/0894 , H04L9/14 , H04L9/30 , H04L9/3066 , H04L9/32 , H04L9/321 , H04L9/3239 , H04L9/3247 , H04L9/3249 , H04L9/3263 , H04L12/2854 , H04L63/0272 , H04L63/045 , H04L63/0435 , H04L63/0442 , H04L63/06 , H04L63/061 , H04L63/0807 , H04L63/123 , H04L63/166 , H04L67/04 , H04W4/70 , H04W8/082 , H04W12/02 , H04W12/03 , H04W12/04 , H04W12/041 , H04W12/06 , H04W40/005 , H04W52/0216 , H04W52/0235 , H04W52/0277 , H04W76/27 , H04W80/04 , G06F2221/2105 , G06F2221/2107 , G06F2221/2115 , H04L63/0464 , H04L2209/24 , H04L2209/56 , H04L2209/72 , H04L2209/80 , H04L2209/805 , H04W84/12 , H04W88/12 , Y02D30/70
Abstract: A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.
-
公开(公告)号:US11606204B2
公开(公告)日:2023-03-14
申请号:US17647812
申请日:2022-01-12
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
IPC: H04L9/08 , H04W52/02 , H04W12/04 , H04W4/70 , H04W76/27 , H04L9/40 , G06F21/35 , H04W12/033 , G06F21/44 , H04W12/40 , H04W12/069 , H04L9/32 , H04W12/06 , H04W12/02 , H04L9/14 , H04L9/30 , H04J11/00 , H04L12/28 , H04W8/08 , H04W40/00 , H04W80/04 , H04L9/00 , H04L67/04 , H04W84/12 , H04W88/12
Abstract: Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.
-
公开(公告)号:US20210351923A1
公开(公告)日:2021-11-11
申请号:US17304922
申请日:2021-06-28
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
IPC: H04L9/08 , H04W4/70 , H04W76/27 , H04W12/04 , H04W52/02 , H04L9/32 , H04W40/00 , H04W12/06 , H04L29/06 , H04J11/00 , H04L9/00 , G06F21/35 , H04W80/04 , H04L29/08 , H04L9/30 , H04L9/14 , H04W8/08 , H04L12/28 , H04W12/02 , H04L9/06 , G06F21/33 , H04W12/03 , H04W12/041
Abstract: A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.
-
-
-
-
-
-
-
-
-