发明名称 Secured transactions in internet of things embedded systems networks
摘要 A secure network enabled device has a distinct security module and lacks a human user input interface. The security module is formed in an integrated circuit. The security module is initialized. Data is electronically communicated to and from the secure network enabled device via at least one transceiver. The security module is configured to test the integrity of a subset of the data communicated to the secure network enabled device, and the security module is configured to test the integrity of a transaction protocol, which governs the stream of data bits of the data communicated to the secure network enabled device.
申请公布号 US9510195(B2) 申请公布日期 2016.11.29
申请号 US201414176832 申请日期 2014.02.10
申请人 STMICROELECTRONICS INTERNATIONAL N.V. 发明人 Perier Laurent
分类号 H04L29/06;H04W12/06;H04W4/00;H04W12/02 主分类号 H04L29/06
代理机构 Seed IP Law Group LLP 代理人 Seed IP Law Group LLP
主权项 1. A secure network enabled device, comprising: a functional logic module, the functional logic module arranged as a utility meter to measure consumption of a resource; at least one bidirectional transceiver, the at least one bidirectional transceiver providing the only communication to pass electronic data associated with the consumption of the resource to and from the secure network enabled device; a first memory; a second memory; a third memory, the third memory being a one-time programmable memory; a microcontroller embedded in an integrated circuit, the microcontroller arranged to execute instructions stored in the first memory, the microcontroller incapable of reading from the second memory and the third memory; and a security module embedded in the integrated circuit, the security module arranged to access all of the electronic data passed to and from the secure network enabled device and to analyze at least some of the electronic data passed to and from the secure network enabled device, wherein analyzing at least some of the electronic data includes comparing data in a first data location of the second memory to data stored in a redundant data location in the second memory, the redundant data location in the second memory dedicated to storage of redundant data, the security module arranged to communicate data to and from the second memory, the security module arranged to communicate electronic signature data to and from the third memory.
地址 Amsterdam NL