IoT and M2M Technologies, LLC

IoT and M2M Technologies, LLCIoT and M2M Technologies, LLCIoT and M2M Technologies, LLC

IoT and M2M Technologies, LLC

IoT and M2M Technologies, LLCIoT and M2M Technologies, LLCIoT and M2M Technologies, LLC
  • Home
  • Authenticated ECDHE
  • Patents
  • About Us
  • More
    • Home
    • Authenticated ECDHE
    • Patents
    • About Us
  • Home
  • Authenticated ECDHE
  • Patents
  • About Us

CONFIGURATION SYSTEMS AND METHODS FOR SECURE OPERATION OF NETWORKED TRANSDUCERS

  • U.S. Provisional Patent Application No.:   62/644,195 ,   Filed:  March 16, 2018 

  

  • PCT Patent Application No.  PCT/US2019/022184 ,  Filed:  March 15,  2019


  • European Patent No: 3,766,222


  • European Divisional Application No: 22208913.8


  • U.S. Patent No: 11,621,832


  • U.S. Continuation Application No: 18/111,307


  • Canada Patent Application No. 3,090,703

DEVICE DEFAULT WIFI CREDENTIALS FOR SIMPLIFIED AND SECURE CONFIGURATION OF NETWORKED TRANSDUCERS

  • U.S. Provisional Patent Application No.:    62/653,785  ,   Filed:  April 6, 2018 

  

  • U.S. Patent Application No.   16/376,998,  Filed:  April 5,  2019


ECDHE KEY EXCHANGE FOR SERVER AUTHENTICATION AND A KEY SERVER

  • U.S. Provisional Patent Application No.:     62/687,411 ,   Filed:  June 20, 2018 

  

  • PCT Patent Application No.   PCT/US19/37911 ,  Filed:  June 19,  2019


  • U.S. Patent Application No.: 17/253,111, Filed December 16, 2020


A summary is provided here.

ECDHE KEY EXCHANGE FOR MUTUAL AUTHENTICATION USING A KEY SERVER

  • U.S. Provisional Patent Application No.:      62/691,255 ,   Filed:  June 28, 2018 

  

  • PCT Patent Application No.    PCT/US19/39380 ,  Filed:  June 27,  2019


  • U.S. Patent No.: 11,316,672


  • U.S. Patent No.: 11,626,979 Issuing April 11, 2023


  • U.S. Continuation Application No: 18/125,953


A summary is provided here.

MUTUALLY AUTHENTICATED ECDHE KEY EXCHANGE FOR A DEVICE AND A NETWORK USING MULTIPLE PKI KEY PAIRS

  • U.S. Provisional Patent Application No.:      62/769,671  ,   Filed:  November 20, 2018

 

  • U.S. Patent No.:   11,228,448, Issued January 18, 2022


  • U.S. Patent No.:  11,438,176, 


  • U.S. Continuation Application No:  17/882,554 


A summary is provided here.

STORAGE MEMORY UNIT WITH A SHARED NONVOLATILE MEMORY INTERFACE FOR A RADIO

  • U.S. Provisional Patent Application No.:       62/732,930 ,   Filed:  September 18, 2018


  •  PCT Patent Application No.    PCT/US19/51481 ,  Filed:  Sept. 18,  2019


  • U.S. Patent 11,399,055


  • U.S. Continuation Application No:  17/871,701 



 Radio modules and modems for communications devices have standardized on the AT command set for the past ~40 years. The AT command set and related APIs require a processor and a radio module to be awake and communicate via a data bus, which requires both the processor and the radio module to be in active states and consequently consume power. This patent application of ~125 pages and ~20 figures provides a shared nonvolatile memory interface to allow completely independent sleep states for a processor and a radio module. This architecture supports a common industry goal for IoT applications to support a 5-10 year battery life .


SECURE FIRMWARE TRANSFER FROM A SERVER TO A PRIMARY PLATFORM

  • U.S. Provisional Patent Application No.:       62/767, 585  Filed:  November 15, 2018 


  • U.S. Patent Application No:  17/481,599 


The "Smart Secure Platform" depends on the secure delivery of firmware from a server to the Primary Platform.  The associated Global Platform  standard for Open Firmware Loader depends on ECC certificates remaining secure for significantly longer than the coming decade.  Quantum computers can feasibly break existing cryptography within  several years, creating significant security risks for the SSP.  This patent application solves the problem of authenticated and secure firmware transfer to a primary platform without requiring traditional X.509 certificates.  Thus, security is provided  against quantum computers, while leveraging existing ECC algorithms.

SECURE IDS CERTIFICATE VERIFICATION FOR A PRIMARY PLATFORM

  • U..S. Provisional Patent Application No.:       62/779,791   Filed:  December 14, 2018 


  • PCT Patent Application No.  PCT/US19/66257 , Filed: Dec. 13, 2019


  • U.S. Patent Application No.:  17/413,681 Filed: June 14, 2021


This patent application solves the significant problem for a “Smart Secure Platform” (SSP) to securely determine certificate revocation for firmware download.  Global Platform's standard for the Open Firmware Loader v 1.3 was silent regarding determining certificate revocation.  Current certificate chain validity checks are not straightforward for a SSP because a tamper resistant element (TRE) is relatively isolated and normally cannot independently and securely keep track of date/time.  But, current date/time is required to properly verify certificates and keep the system secured.


PUBLIC KEY EXCHANGE WITH AUTHENTICATED ECDHE AND SECURITY AGAINST QUANTUM COMPUTERS

  • U.S. Patent No.: 11,343,084


  • U.S. Continuation Application No: 17/748,706


 Elliptic Curve Cryptography (ECC) can provide security against quantum computers, if public keys are pre-shared and not transmitted as plaintext.  A server communicating with a device can store and use PKI keys comprising server private key ss, device public key Sd, and device ephemeral public key Ed. The device can store and use the corresponding PKI keys, such as server public key Ss. The key use can support all of (i) mutual authentication, (ii) forward secrecy, and (iii) shared secret key exchange. The server and the device can conduct an ECDHE key exchange with the PKI keys to mutually derive a symmetric ciphering key K1. The device can encrypt a post-quantum cryptography (PQC) device public key PK-PQC.Device with K1 and send to the server as a first ciphertext. The server can encrypt a PQC server public key PK-PQC.Network with at least K1 and send to the device as a second ciphertext. The device and server can then use the PQC public keys to conduct a key encapsulation mechanism (KEM) to exchange shared secrets. The overall security matches at least the stronger of the ECDH and the PQC KEM, such that if one of the PKI cryptographic systems is broken, security is maintained by the other algorithm 

Copyright © 2023 IoT and M2M Technologies, LLC - All Rights Reserved.