Abstract:
A wireless device presents a predetermined identifier and at least one code comprising connection data. A terminal communicates over a short range radio-frequency link, with a wireless device. The terminal has a camera and a display screen. The terminal detects, through the camera, an identifier relating to a wireless device in a vicinity of the terminal. The terminal presents, through the display screen, at least one object for each detected identifier, the object being associated with a wireless device. A terminal user selects, through the display screen, one object amongst the presented objects. The terminal reads or extracts the connection data comprised within the selected code associated with the corresponding selected wireless device. And the terminal establishes, a connection, over the short range radio-frequency link, to the corresponding selected wireless device.
Abstract:
This invention concerns the implementation of end-to-end security for the communication between objects in the domain of the Internet of Things (or Internet of Objects). The purpose of the patent is dealing with the setup of secure authorized information channel between data source (M2M device) and data consumers (consumer entity). According to the present invention, the access to a M2M device by a consumer entity (consumer application) is controlled by a M2M authorization server. The M2M authorization server is the entity in charge of managing access rights for the M2M device and makes the decision regarding the access to the resource by the consumer entity (consumer application). The M2M server is an entity that enforces the decision and enables the access to the M2M device. When a consumer application needs to communicate with a M2M device, the present invention proposes a method for authorizing a consumer application to access a M2M device and for encrypting the communication between the consumer application and the M2M device. The M2M authorization server computes security credentials which are sent to the consumer application.
Abstract:
A wireless device presents a predetermined identifier and at least one code comprising connection data. A terminal communicates over a short range radio-frequency link, with a wireless device. The terminal has a camera and a display screen. The terminal detects, through the camera, an identifier relating to a wireless device in a vicinity of the terminal. The terminal presents, through the display screen, at least one object for each detected identifier, the object being associated with a wireless device. A terminal user selects, through the display screen, one object amongst the presented objects. The terminal reads or extracts the connection data comprised within the selected code associated with the corresponding selected wireless device. And the terminal establishes, a connection, over the short range radio-frequency link, to the corresponding selected wireless device.
Abstract:
The invention is a method of communicating between a caller device and an executor device wherein the executor device comprises a memory having a layout which defines formats and addresses used for storing data in the memory. The executor device comprises an application including a service and the method comprises the steps of: providing the caller device with the layout and an indicator reflecting the service during the handshake phase, sending to the executor device a data block corresponding to a command targeting the service, wherein the data block complies with the layout and is devoid of metadata, sending to the caller device a response block which complies with the layout and which corresponds to a result generated by execution of the command.
Abstract:
To access a service, each user device stores one first key. The user device is connected to a first server. A terminal sends to a second server a connection request. The second server responds with first data relating to a transaction identifier and an associated challenge. The terminal determines a first result depending upon the first data and the first key. The terminal sends to the first server the first result and user device data. The first server identifies a user device based upon the user device data and sends to the device the first result. The device determines the challenge and the transaction identifier based upon the first result and the first key and sends to the second server the challenge and the transaction identifier. The second server verifies whether the data received from the device matches the first data and, if so, authorizes the terminal to connect.