Network-1 Technologies, Inc.

United States of America

Back to Profile

1-30 of 30 for Network-1 Technologies, Inc. Sort by
Query
Aggregations
Jurisdiction
        United States 28
        Canada 2
Date
2023 2
2022 2
2021 2
2020 4
2019 5
See more
IPC Class
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system 29
H04L 9/08 - Key distribution 28
H04W 12/06 - Authentication 27
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC] 24
H04L 29/06 - Communication control; Communication processing characterised by a protocol 23
See more
Status
Pending 3
Registered / In Force 27
Found results for  patents

1.

Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card

      
Application Number 18229907
Status Pending
Filing Date 2023-08-03
First Publication Date 2023-11-23
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 52/02 - Power saving arrangements
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 12/06 - Authentication
  • H04L 9/40 - Network security protocols
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04L 67/04 - Protocols specially adapted for terminal portability
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04W 8/08 - Mobility data transfer
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06F 21/33 - User authentication using certificates
  • H04W 12/03 - Protecting confidentiality, e.g. by encryption
  • H04W 12/041 - Key generation or derivation

2.

Systems and Methods for "Machine-to-Machine" (M2M) Communications Between Modules, Servers, and an Application using Public Key Infrastructure (PKI)

      
Application Number 18111669
Status Pending
Filing Date 2023-02-20
First Publication Date 2023-06-29
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04W 12/069 - Authentication using certificates or pre-shared keys
  • H04W 52/02 - Power saving arrangements
  • H04W 40/00 - Communication routing or communication path finding
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04W 12/40 - Security arrangements using identity modules
  • H04W 12/06 - Authentication
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 8/08 - Mobility data transfer
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 67/04 - Protocols specially adapted for terminal portability
  • H04W 12/033 - Protecting confidentiality, e.g. by encryption of the user plane, e.g. user’s traffic
  • G06F 21/44 - Program or device authentication
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

3.

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)

      
Application Number 17647812
Grant Number 11606204
Status In Force
Filing Date 2022-01-12
First Publication Date 2022-05-05
Grant Date 2023-03-14
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04W 52/02 - Power saving arrangements
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04L 9/40 - Network security protocols
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04W 12/033 - Protecting confidentiality, e.g. by encryption of the user plane, e.g. user’s traffic
  • G06F 21/44 - Program or device authentication
  • H04W 12/40 - Security arrangements using identity modules
  • H04W 12/069 - Authentication using certificates or pre-shared keys
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/06 - Authentication
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 8/08 - Mobility data transfer
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 67/04 - Protocols specially adapted for terminal portability
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

4.

Embedded universal integrated circuit card supporting two-factor authentication

      
Application Number 17547990
Grant Number 11916893
Status In Force
Filing Date 2021-12-10
First Publication Date 2022-03-31
Grant Date 2024-02-27
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 12/30 - Security of mobile devices; Security of mobile applications
  • H04W 12/06 - Authentication
  • H04B 1/3816 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving with connectors for programming identification devices

5.

Key derivation for a module using an embedded universal integrated circuit card

      
Application Number 17304922
Grant Number 11736283
Status In Force
Filing Date 2021-06-28
First Publication Date 2021-11-11
Grant Date 2023-08-22
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 52/02 - Power saving arrangements
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 12/06 - Authentication
  • H04L 9/40 - Network security protocols
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04L 67/04 - Protocols specially adapted for terminal portability
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04W 8/08 - Mobility data transfer
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06F 21/33 - User authentication using certificates
  • H04W 12/03 - Protecting confidentiality, e.g. by encryption
  • H04W 12/041 - Key generation or derivation
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

6.

Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure

      
Application Number 17249242
Status Pending
Filing Date 2021-02-24
First Publication Date 2021-06-17
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04W 52/02 - Power saving arrangements
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04W 12/033 - Protecting confidentiality, e.g. by encryption of the user plane, e.g. user’s traffic
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/06 - Authentication
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 8/08 - Mobility data transfer
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

7.

Key derivation for a module using an embedded universal integrated circuit card

      
Application Number 16879325
Grant Number 11082218
Status In Force
Filing Date 2020-05-20
First Publication Date 2020-09-03
Grant Date 2021-08-03
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 52/02 - Power saving arrangements
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 12/06 - Authentication
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04W 8/08 - Mobility data transfer
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06F 21/33 - User authentication using certificates
  • H04W 12/03 - Protecting confidentiality, e.g. by encryption
  • H04W 12/041 - Key generation or derivation
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

8.

Set of servers for “machine-to-machine” communications using public key infrastructure

      
Application Number 16843107
Grant Number 11283603
Status In Force
Filing Date 2020-04-08
First Publication Date 2020-07-23
Grant Date 2022-03-22
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04W 52/02 - Power saving arrangements
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04W 12/033 - Protecting confidentiality, e.g. by encryption of the user plane, e.g. user’s traffic
  • G06F 21/44 - Program or device authentication
  • H04W 12/40 - Security arrangements using identity modules
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/06 - Authentication
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 8/08 - Mobility data transfer
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 67/04 - Protocols specially adapted for terminal portability
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

9.

Network supporting two-factor authentication for modules with embedded universal integrated circuit cards

      
Application Number 16721153
Grant Number 11539681
Status In Force
Filing Date 2019-12-19
First Publication Date 2020-04-23
Grant Date 2022-12-27
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC). The network can send a first network module identity, a first key K, and an encrypted second key K for an eUICC profile to an eUICC subscription manager. The second key K can be encrypted with a symmetric key. The module can receive and activate the eUICC profile, and the network can authenticate the module using the first network module identity and the first key K. The network can (i) authenticate the user of the module using a second factor, and then (ii) send the symmetric key to the module. The module can decrypt the encrypted second key K using the symmetric key. The network can authenticate the module using the second key K. The module can comprise a mobile phone.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 12/30 - Security of mobile devices; Security of mobile applications
  • H04W 12/06 - Authentication
  • H04B 1/3816 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving with connectors for programming identification devices

10.

Systems and methods for “Machine-to-Machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)

      
Application Number 16593561
Grant Number 11258595
Status In Force
Filing Date 2019-10-04
First Publication Date 2020-01-30
Grant Date 2022-02-22
Owner NETWORK-1 TECHNOLOGIES, INC. (USA)
Inventor Nix, John A.

Abstract

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04W 52/02 - Power saving arrangements
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04W 12/033 - Protecting confidentiality, e.g. by encryption of the user plane, e.g. user’s traffic
  • G06F 21/44 - Program or device authentication
  • H04W 12/40 - Security arrangements using identity modules
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/06 - Authentication
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 8/08 - Mobility data transfer
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 67/04 - Protocols specially adapted for terminal portability
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

11.

Embedded universal integrated circuit card supporting two-factor authentication

      
Application Number 16453682
Grant Number 11233780
Status In Force
Filing Date 2019-06-26
First Publication Date 2019-10-17
Grant Date 2022-01-25
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 12/30 - Security of mobile devices; Security of mobile applications
  • H04W 12/06 - Authentication
  • H04B 1/3816 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving with connectors for programming identification devices

12.

Power management and security for wireless modules in “machine-to-machine” communications

      
Application Number 16271428
Grant Number 10523432
Status In Force
Filing Date 2019-02-08
First Publication Date 2019-06-06
Grant Date 2019-12-31
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state. Messages between the wireless module and server can be transmitted according to the UDP or UDP Lite protocol with channel coding in the datagram body for efficiency while providing robustness to bit errors. The wireless module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The wireless module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The communication system between the wireless module and the server can conserve battery life in the wireless module while providing a system that is secure, scalable, and robust.

IPC Classes  ?

  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 9/08 - Key distribution
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 12/06 - Authentication
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 52/02 - Power saving arrangements
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04W 8/08 - Mobility data transfer
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

13.

Network supporting two-factor authentication for modules with embedded universal integrated circuit cards

      
Application Number 16271455
Grant Number 10594679
Status In Force
Filing Date 2019-02-08
First Publication Date 2019-06-06
Grant Date 2020-03-17
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC). The network can send a first network module identity, a first key K, and an encrypted second key K for an eUICC profile to an eUICC subscription manager. The second key K can be encrypted with a symmetric key. The module can receive and activate the eUICC profile, and the network can authenticate the module using the first network module identity and the first key K. The network can (i) authenticate the user of the module using a second factor, and then (ii) send the symmetric key to the module. The module can decrypt the encrypted second key K using the symmetric key. The network can authenticate the module using the second key K. The module can comprise a mobile phone.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
  • H04W 12/06 - Authentication
  • H04B 1/3816 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving with connectors for programming identification devices

14.

Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys

      
Application Number 16200118
Grant Number 10498530
Status In Force
Filing Date 2018-11-26
First Publication Date 2019-03-28
Grant Date 2019-12-03
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module can include a sensor and/or actuator. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private/public keys using cryptographic algorithms and a set of parameters. A server can use a shared secret key to authenticate the submission of derived public keys with an associated module identity. For the very first submission of a public key derived the module, the shared secret key can comprise a pre-shared secret key which can be loaded into the module using a pre-shared secret key code.

IPC Classes  ?

  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 52/02 - Power saving arrangements
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 12/06 - Authentication
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04W 8/08 - Mobility data transfer
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

15.

Key derivation for a module using an embedded universal integrated circuit card

      
Application Number 16201401
Grant Number 10700856
Status In Force
Filing Date 2018-11-27
First Publication Date 2019-03-28
Grant Date 2020-06-30
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 52/02 - Power saving arrangements
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 12/06 - Authentication
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04W 8/08 - Mobility data transfer
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • G06F 21/33 - User authentication using certificates
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

16.

Embedded universal integrated circuit card supporting two-factor authentication

      
Application Number 16110804
Grant Number 10382422
Status In Force
Filing Date 2018-08-23
First Publication Date 2018-12-20
Grant Date 2019-08-13
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/06 - Authentication
  • H04B 1/3816 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving with connectors for programming identification devices

17.

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)

      
Application Number 16036506
Grant Number 10530575
Status In Force
Filing Date 2018-07-16
First Publication Date 2018-11-29
Grant Date 2020-01-07
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04W 52/02 - Power saving arrangements
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/06 - Authentication
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 8/08 - Mobility data transfer
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

18.

Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys

      
Application Number 15983957
Grant Number 10177911
Status In Force
Filing Date 2018-05-18
First Publication Date 2018-09-20
Grant Date 2019-01-08
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module can include a sensor and/or actuator. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private/public keys using cryptographic algorithms and a set of parameters. A server can use a shared secret key to authenticate the submission of derived public keys with an associated module identity. For the very first submission of a public key derived the module, the shared secret key can comprise a pre-shared secret key which can be loaded into the module using a pre-shared secret key code.

IPC Classes  ?

  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04W 8/08 - Mobility data transfer
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 52/02 - Power saving arrangements
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04W 12/06 - Authentication
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 88/12 - Access point controller devices
  • H04W 84/12 - WLAN [Wireless Local Area Networks]

19.

Set of servers for “machine-to-machine” communications using public key infrastructure

      
Application Number 15972914
Grant Number 10652017
Status In Force
Filing Date 2018-05-07
First Publication Date 2018-09-13
Grant Date 2020-05-12
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04W 52/02 - Power saving arrangements
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/06 - Authentication
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 8/08 - Mobility data transfer
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

20.

Power management and security for wireless modules in “machine-to-machine” communications

      
Application Number 15973012
Grant Number 10250386
Status In Force
Filing Date 2018-05-07
First Publication Date 2018-09-06
Grant Date 2019-04-02
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state. Messages between the wireless module and server can be transmitted according to the UDP or UDP Lite protocol with channel coding in the datagram body for efficiency while providing robustness to bit errors. The wireless module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The wireless module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The communication system between the wireless module and the server can conserve battery life in the wireless module while providing a system that is secure, scalable, and robust.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 9/08 - Key distribution
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 8/08 - Mobility data transfer
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 12/06 - Authentication
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 52/02 - Power saving arrangements
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

21.

Embedded universal integrated circuit card supporting two-factor authentication

      
Application Number 15928848
Grant Number 10084768
Status In Force
Filing Date 2018-03-22
First Publication Date 2018-07-26
Grant Date 2018-09-25
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04B 1/38 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
  • H04W 4/00 - Services specially adapted for wireless communication networks; Facilities therefor
  • H04B 1/3816 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving with connectors for programming identification devices
  • H04W 12/06 - Authentication
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]

22.

Key derivation for a module using an embedded universal integrated circuit card

      
Application Number 15680758
Grant Number 10187206
Status In Force
Filing Date 2017-08-18
First Publication Date 2017-12-28
Grant Date 2019-01-22
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04W 52/02 - Power saving arrangements
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/06 - Authentication
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 8/08 - Mobility data transfer
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

23.

Power management and security for wireless modules in “machine-to-machine” communications

      
Application Number 15642088
Grant Number 10003461
Status In Force
Filing Date 2017-07-05
First Publication Date 2017-10-19
Grant Date 2018-06-19
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state. Messages between the wireless module and server can be transmitted according to the UDP or UDP Lite protocol with channel coding in the datagram body for efficiency while providing robustness to bit errors. The wireless module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The wireless module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The communication system between the wireless module and the server can conserve battery life in the wireless module while providing a system that is secure, scalable, and robust.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04W 88/12 - Access point controller devices
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 52/02 - Power saving arrangements
  • H04L 9/08 - Key distribution
  • H04W 4/00 - Services specially adapted for wireless communication networks; Facilities therefor
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/06 - Authentication
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04W 76/04 - Connection manipulation
  • H04W 40/00 - Communication routing or communication path finding
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04J 11/00 - Orthogonal multiplex systems
  • H04W 8/08 - Mobility data transfer

24.

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)

      
Application Number 15583968
Grant Number 10057059
Status In Force
Filing Date 2017-05-01
First Publication Date 2017-08-17
Grant Date 2018-08-21
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04W 52/02 - Power saving arrangements
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 76/27 - Transitions between radio resource control [RRC] states
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/06 - Authentication
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 8/08 - Mobility data transfer
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

25.

Set of servers for “machine-to-machine” communications using public key infrastructure

      
Application Number 15457700
Grant Number 09998281
Status In Force
Filing Date 2017-03-13
First Publication Date 2017-06-29
Grant Date 2018-06-12
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols

26.

Network supporting two-factor authentication for modules with embedded universal integrated circuit cards

      
Application Number 15162292
Grant Number 10362012
Status In Force
Filing Date 2016-05-23
First Publication Date 2016-09-15
Grant Date 2019-07-23
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC). The network can send a first network module identity, a first key K, and an encrypted second key K for an eUICC profile to an eUICC subscription manager. The second key K can be encrypted with a symmetric key. The module can receive and activate the eUICC profile, and the network can authenticate the module using the first network module identity and the first key K. The network can (i) authenticate the user of the module using a second factor, and then (ii) send the symmetric key to the module. The module can decrypt the encrypted second key K using the symmetric key. The network can authenticate the module using the second key K. The module can comprise a mobile phone.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/06 - Authentication
  • H04B 1/3816 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving with connectors for programming identification devices

27.

Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys

      
Application Number 15043293
Grant Number 09998280
Status In Force
Filing Date 2016-02-12
First Publication Date 2016-06-09
Grant Date 2018-06-12
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module can include a sensor and/or actuator. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private/public keys using cryptographic algorithms and a set of parameters. A server can use a shared secret key to authenticate the submission of derived public keys with an associated module identity. For the very first submission of a public key derived the module, the shared secret key can comprise a pre-shared secret key which can be loaded into the module using a pre-shared secret key code.

IPC Classes  ?

  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04W 52/02 - Power saving arrangements
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 4/00 - Services specially adapted for wireless communication networks; Facilities therefor
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/06 - Authentication
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04J 11/00 - Orthogonal multiplex systems
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04W 8/08 - Mobility data transfer
  • H04W 40/00 - Communication routing or communication path finding
  • H04W 76/04 - Connection manipulation
  • H04W 80/04 - Network layer protocols, e.g. mobile IP [Internet Protocol]
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04W 88/12 - Access point controller devices

28.

Embedded universal integrated circuit card supporting two-factor authentication

      
Application Number 14751119
Grant Number 09961060
Status In Force
Filing Date 2015-06-25
First Publication Date 2015-10-15
Grant Date 2018-05-01
Owner Network-1 Technologies, Inc. (USA)
Inventor Nix, John A.

Abstract

A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04B 1/38 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
  • H04W 4/00 - Services specially adapted for wireless communication networks; Facilities therefor
  • H04W 12/06 - Authentication
  • H04B 1/3816 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving with connectors for programming identification devices

29.

AN EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD SUPPORTING TWO-FACTOR AUTHENTICATION

      
Document Number 02969829
Status In Force
Filing Date 2014-12-04
Open to Public Date 2015-06-11
Grant Date 2023-10-24
Owner NETWORK-1 TECHNOLOGIES, INC. (USA)
Inventor Nix, John A.

Abstract

A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a wireless network. The first shared secret key K can be encrypted with a first key, and the second shared secret key K can be encrypted with a second key. The module can (i) receive the first key, (ii) decrypt the first shared secret key K with the first key, and (iii) subsequently authenticate with the wireless network using the plaintext first shared secret key K. The wireless network can authenticate the user of the module using a second factor. The module can then (i) receive the second key, (ii) decrypt the second shared secret key K, and (iii) authenticate with the wireless network using the second shared secret key K. The module can comprise a mobile phone.

IPC Classes  ?

  • H04W 12/0431 - Key distribution or pre-distribution; Key agreement
  • H04W 12/041 - Key generation or derivation
  • H04W 12/069 - Authentication using certificates or pre-shared keys

30.

A SET OF SERVERS FOR "MACHINE-TO-MACHINE" COMMUNICATIONS USING PUBLIC KEY INFRASTRUCTURE

      
Document Number 02965119
Status In Force
Filing Date 2014-10-27
Open to Public Date 2015-05-07
Grant Date 2023-04-04
Owner NETWORK-1 TECHNOLOGIES, INC. (USA)
Inventor Nix, John A.

Abstract

A set of servers can support secure and efficient "Machine to Machine" communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system