Siemens Aktiengesellschaft (20240333495). System and Method for Subscription-Based IOT Communication Security simplified abstract

From WikiPatents
Revision as of 11:57, 8 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

System and Method for Subscription-Based IOT Communication Security

Organization Name

Siemens Aktiengesellschaft

Inventor(s)

Daniel Bovensiepen of Beijing (CN)

System and Method for Subscription-Based IOT Communication Security - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240333495 titled 'System and Method for Subscription-Based IOT Communication Security

Simplified Explanation

The patent application describes a method for subscription-based IoT communication security in industrial Internet of Things (IIoT) devices. This method involves generating keys, deploying them to devices, encrypting messages, and decrypting them based on usage constraints.

  • Receiving a subscription request for a service from an edge device
  • Generating master key and key parameters for the subscription request
  • Deploying key parameters to the IIoT device
  • Generating a private key with constraints based on the master key, key parameters, device ID information, and usage constraint parameter
  • Encrypting messages at the device based on key parameters, device ID, and current usage parameter
  • Decrypting messages using the private key with constraints when the current usage parameter is valid for the usage constraint parameter

Key Features and Innovation

  • Subscription-based IoT communication security method
  • Generation and deployment of keys for secure communication
  • Encryption and decryption of messages based on usage constraints

Potential Applications

This technology can be applied in various industries utilizing IoT devices, such as manufacturing, healthcare, transportation, and smart cities.

Problems Solved

This technology addresses the need for secure communication in IoT devices to prevent unauthorized access and data breaches.

Benefits

  • Enhanced security for IoT communication
  • Protection of sensitive data
  • Secure transmission of information between devices

Commercial Applications

  • Secure IoT communication solutions for industries
  • Potential for integration into IoT devices and systems for enhanced security measures

Questions about IoT Communication Security

How does this method improve the security of IoT communication?

This method enhances security by generating keys, deploying them securely, and encrypting messages based on usage constraints, ensuring secure communication between devices.

What are the potential implications of this technology in the IoT industry?

The technology can revolutionize IoT security by providing a subscription-based approach to communication security, offering a new level of protection for sensitive data transmitted between devices.


Original Abstract Submitted

various embodiments of the teachings include a method for subscription-based iot communication security. an example method includes: receiving a subscription request for a service of an industrial internet of things (iiot) device from an edge device; generating a master key and key parameters for the subscription request; deploying the key parameters to the iiot device; generating a private key with constraint based on the master key, the key parameters, identifier (id) information of the iiot device, and a usage constraint parameter for subscription range, and sending the private key with constraint to the edge device; encrypting, at the device, a message based on the key parameters, the id information of the device, and a current usage parameter, and sending an encrypted message to the edge device; and decrypting it using the private key with constraint when the current usage parameter of the message is valid for the usage constraint parameter.