System, method and apparata for secure communications using an electrical grid network
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-029/06
H04L-009/32
출원번호
US-0539359
(2014-11-12)
등록번호
US-9246691
(2016-01-26)
발명자
/ 주소
Phatak, Dhananjay S.
출원인 / 주소
Phatak, Dhananjay S.
대리인 / 주소
Whitham Curtis Christofferson & Cook, PC
인용정보
피인용 횟수 :
0인용 특허 :
15
초록▼
A secure communications and location authorization system using a power line or a potion thereof as a side-channel that mitigates man-in-the-middle attacks on communications networks and devices connected to those networks. The system includes a power grid server associated with a substation, or cur
A secure communications and location authorization system using a power line or a potion thereof as a side-channel that mitigates man-in-the-middle attacks on communications networks and devices connected to those networks. The system includes a power grid server associated with a substation, or curb-side distribution structure such as a transformer, an electric meter associated with a structure having electric service and able to communicate with the power grid server, a human authorization detector input device connected to the electric meter and the power grid server. The human authorization detector is able to receive an input from a user physically located at the structure and capable of communicating with the power grid server via the electric meter. The user's physical input into the device causing a request to be sent to the power grid server that then generates a location certificate for the user. Without the location certificate, access to the communications network and devices connected to those networks can be denied.
대표청구항▼
1. A method for tracking the location of any device that runs on electricity; comprising the steps of: whenever the device is powered ON, automatically generating and sending a message to a Location Tracking Server (LTS), via the electric power plug, to the power meter that monitors the electricity
1. A method for tracking the location of any device that runs on electricity; comprising the steps of: whenever the device is powered ON, automatically generating and sending a message to a Location Tracking Server (LTS), via the electric power plug, to the power meter that monitors the electricity usage from the plug to which the device is connected; The message including timestamps, device identifiers, tracking server identifiers and cryptographic authentication challenge/nonce values;the power meter appending its own location identifiers along with all the necessary cryptographic authentication tokens, timestamps, state-indicators to the message and sending the combined message over an out-of-band communication channel that spans at least a portion of the electric grid which is connected to the said electric power meter on the upstream side; to a Location Tracking Server;at the Location Tracking Server, verifying all the timestamps and cryptographic tokens and determining whether the location reported by the meter is a pre-designated safe location where the device normally operates or whether the device is at an unexpected location and potentially stolen;the Location Tracking Server preparing a reply message (referred to as a “blessing”) including a recommendation or directive to the device being tracked, indicating what level of functionality the device should operate in; along with cryptographic tokens, nonces and timestamps;the Location Tracking Server sending its blessing back in the reverse direction over the forward path including the at least some portion of the electric grid connected to the electric power meter on the upstream side;the electric power meter relaying the message to the device being tracked via the power plug;the device being tracked receiving the blessing message, decrypting it if required and verifying the cryptographic credentials and/or responses from the Location Tracking Server and learning the state it is expected to go into, and entering that state. 2. The method of claim 1, wherein the state can be anything from “safe location, provide full functionality, you are blessed to run freely” on one extreme, to “wipe out all non-volatile storage, including discs or semiconductor memories, RAM, all bios values/keys if any and shut yourself down” on the extreme; depending upon whether the device is at its usual location or it is stolen and is therefore at a strange location; and upon the sensitivity/importance of data if any that resides on that device. 3. The method of claim 1, wherein each individual message sent includes new cryptographic challenges and responses to previous cryptographic challenges from the peer. 4. The method of claim 1, wherein the device being tracked optionally sends an acknowledgement informing the LTS that it is entering the state indicated in the blessing message before entering that state. 5. The method of claim 1, wherein the device being tracked enters a pre-designated safe state if it cannot communicate with the LTS via the electric plug for a duration exceeding a timeout-interval. 6. The method of claim 1, wherein, the attempt to communicate with a Location Tracking Server is made optionally at every 2nd or 3rd or nth powering-ONN or in general every kth time the device is powered-ONN, where “k” is dynamically determined via some algorithm. 7. The method of claim 1, wherein the electronic device is or is not part of a computer. 8. The method of claim 1, wherein the device is part of an electric vehicle or car and is used to identify and track the location of the vehicle. 9. The method of claim 1, wherein the device optionally sends an alarm signal after it is connected to an unauthorized portion of the electric grid. 10. The method of claim 1 further comprising: optional execution of more authentication and/or theft identification and reporting procedures if the LTS does not get a message from the device being tracked for a time period exceeding a dynamically adaptable timeout-threshold interval. 11. The method of claim 1, applied to tracking the location where licensed software is run and verifying compliance with DRM (Digital Rights Management) and license controls. 12. The method of claim 1, wherein the device is a part of Voting Machines and is used to verify compliance with all election rules and procedures. 13. The method of claim 1, wherein the device is installed within shipping containers and is used to enforce “verifiable custody chains”. 14. A system for tracking the location of any device that runs on electricity; comprising: a Location Tracking Server (LTS);a power meter;a device that runs on electricity configured so that whenever the device is powered ON, the device automatically generates and sends a message to the Location Tracking Server (LTS), via an electric power plug, to the power meter that monitors the electricity usage from the plug to which the device is connected; the message including timestamps, device identifiers, tracking server identifiers and cryptographic authentication challenge/nonce values;wherein the power meter is configured to append its own location identifiers along with all the necessary cryptographic authentication tokens, timestamps, state-indicators to the message and sends the combined message over an out-of-band communication channel that spans at least a portion of the electric grid which is connected to the power meter on the upstream side; to the Location Tracking Server;wherein the Location Tracking Server is configured to perform steps including at the Location Tracking Server, verifying all the timestamps and cryptographic tokens and determining whether the location reported by the power meter is a pre-designated safe location where the device normally operates or whether the device is at an unexpected location and potentially stolen;preparing a reply message (referred to as a “blessing”) including a recommendation or directive to the device being tracked, indicating what level of functionality the device should operate in; along with cryptographic tokens, nonces and timestamps;sending its blessing back in the reverse direction over the forward path including the at least some portion of the electric grid connected to the power meter on the upstream side;wherein the power meter is configured to relay the blessing to the device being tracked via the power plug; andwherein the device being tracked is configured to receive the blessing, decrypting it if required and verifying the cryptographic credentials and/or responses from the Location Tracking Server and learning the state it is expected to go into, and enter that state. 15. The system of claim 14, wherein the state can be anything from “safe location, provide full functionality, you are blessed to run freely” on one extreme, to “wipe out all non-volatile storage, including discs or semiconductor memories, RAM, all bios values/keys if any and shut yourself down” on the other extreme; depending upon whether the device is at its usual location or it is stolen and is therefore at a strange location; and upon the sensitivity/importance of data if any that resides on that device. 16. The system of claim 14, wherein each individual message sent includes new cryptographic challenges and responses to previous cryptographic challenges from the peer. 17. The system of claim 14, wherein the device being tracked optionally sends an acknowledgement informing the LTS that it is entering the state indicated in the blessing before entering that state. 18. The system of claim 14, wherein the device being tracked enters a pre-designated safe state if it cannot communicate with the LTS via the electric plug for a duration exceeding a timeout-interval. 19. The system of claim 14, wherein, the attempt to communicate with a Location Tracking Server is made optionally at every 2nd or 3rd or nth powering-ONN or in general every kth time the device is powered-ONN, where “k” is dynamically determined via some algorithm. 20. The system of claim 14, wherein the device is or is not part of a computer. 21. The system of claim 14, wherein the device is part of an electric vehicle or car and is used to identify and track the location of the electric vehicle or car. 22. The system of claim 14, wherein the device optionally sends an alarm signal after it is connected to an unauthorized portion of the electric grid. 23. The system of claim 14, further comprising: optional sub-systems that perform more authentication checks and/or theft identification and reporting if the LTS does not get a message from the device being tracked for a time period exceeding a dynamically adaptable timeout-threshold interval. 24. The system of claim 14, applied to tracking the location where licensed software is run and verifying compliance with DRM (Digital Rights Management) and license controls. 25. The system of claim 14, wherein the device is a part of Voting Machines and is used to verify compliance with all election rules and procedures. 26. The system of claim 14, wherein the device is installed within shipping containers and is used to enforce “verifiable custody chains”.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (15)
Trzeciak,Andrzej; Roberto,Benjamin G.; Swiatek,Janusz; Lacey,Kevin; Padgitt,David G.; Odlyzko,Paul; Schulz,Gary D., Broadband over low voltage power lines communications system and method.
Hunt, Philip G.; Riley, Paul M.; Kopp, Lowell E., Communications system for providing broadband communications using a medium voltage cable of a power system.
Davenport, David; Hoctor, Ralph; Kishore, Kuna; Soni, Mukesh, Method and system for modulating a carrier frequency to support nondestructive bitwise arbitration of a communication medium.
Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
Woodhill, James R., System and method of using the public switched telephone network in providing authentication or authorization for online transactions.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.