Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet Of Things Security

a security and internet of things technology, applied in the field of secure data transactions, can solve problems such as fraudulent downloads, significant harm to users and/or institutions, etc., and achieve the effect of improving the security of communications networks

Inactive Publication Date: 2016-09-01
SVIGALS JEROME
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This solution enhances transaction security by making intercepted messages meaningless, preventing fraudulent activities, and ensuring that only valid transactions are processed, thereby reducing the risk of data breaches and unauthorized access.

Problems solved by technology

A lost, stolen, and / or compromised unsecured mobile communication device may result in significant harm to users and / or institutions.
If the device is lost or stolen, the security device may be successfully manipulated by a thief, the communications may be overheard by unwanted people, and fraudulent downloads may be made.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet Of Things Security
  • Internet Of Things Security
  • Internet Of Things Security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024]Embodiments of the invention are discussed below with reference to the Figures. However, those skilled in the art will readily appreciate that the detailed description given herein with respect to these Figures is for explanatory purposes only, as the invention extends far beyond these limited embodiments. For example, it should be appreciated that those skilled in the art will, in light of the teachings of the present invention, recognize a multiplicity of alternate and suitable approaches, depending upon the needs of the particular application, to implement the functionality of any given detail described herein, beyond the particular implementation choices in the following embodiments that are described and illustrated. There are numerous modifications and variations of the invention that are too numerous to be listed, but that fit within the scope of the invention.

[0025]It is to be further understood that the present invention is not limited to the particular methodology, c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Apparati, methods, and computer-readable media for improving the security of communications networks. An embodiment of the present invention is a system for enabling smart devices (1401, 1402, 1403) to communicate with each other over a network (1450) without human intervention. The system comprises at least two bidirectional smart devices (1401, 1402) adapted to send and receive messages (1460) over the network (1450). Each smart device (1401, 1402) is coupled to the network (1450) via a bidirectional intelligent chip, logic device, or smart device (1411, 1421). In message sending mode, intelligent chip, logic device, or smart device (1411) appends an identifier (1417) to each message (1460) emanating from its associated sending smart device (1401). The identifier (1417) comprises a fixed portion (1415, 1416) uniquely identifying the associated sending smart device (1401), and a variable portion (1414) containing a time having a secret random starting point. The receiving intelligent chip, logic device, or smart device (1421) invokes a module (1423) contained within each intelligent chip (1411, 1421) configured to screen incoming messages (1460), by validating both the fixed and variable portions of the identifier (1417).

Description

CROSS-REFERENCES TO RELATED PATENT APPLICATIONS[0001]This patent application is a continuation-in-part of co-pending U.S. patent application Ser. No. 14 / 938,750 filed Nov. 11, 2015 (attorney docket SVIG 0427 CP), which is a continuation-in-part of U.S. patent application Ser. No. 14 / 711,619 filed May 13, 2015 (attorney docket SVIG 0415 CP), which issued as U.S. Pat. No. 9,319,404 on Apr. 19, 2016, which is a continuation-in-part of PCT patent application PCT / US2014 / 038164 filed May 15, 2014 (attorney docket SVIG 0397 WO), which is a continuation-in-part of U.S. patent application Ser. No. 14 / 053,373 filed Oct. 14, 2013 (SVIG 0384 CP), which issued as U.S. Pat. No. 8,997,188 on Mar. 31, 2015 and is a continuation-in-part of U.S. patent application Ser. No. 13 / 895,155 filed May 15, 2013 (SVIG 0378 CP), which issued as U.S. Pat. No. 8,806,603 on Aug. 12, 2014; U.S. patent application Ser. No. 13 / 895,155 is a continuation-in-part of U.S. patent application Ser. No. 13 / 444,551 filed Apr....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L63/0861H04L63/10G06F21/31G06F21/44G09C1/00G16H10/65H04L9/3228H04L9/3231H04L9/3234H04L63/0876H04L63/101H04L63/108H04L67/12H04W4/12H04W4/70
Inventor SVIGALS, JEROME
Owner SVIGALS JEROME