Browse Prior Art Database

Domestic Network Secure Pairing Mechanism Disclosure Number: IPCOM000238435D
Publication Date: 2014-Aug-26
Document File: 4 page(s) / 44K

Publishing Venue

The Prior Art Database


Disclosed is a mechanism for Automatic Network Secure Pairing & Connection Management Mechanism using Light, Sound or Power Signatures with Anti-Theft Protection and asset management

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 36% of the total text.

Page 01 of 4

Domestic Network Secure Pairing Mechanism


Currently there is a trend (sometimes called "The Internet of Devices") to install, connect and use inter-connected devices almost everywhere. The interconnected devices in this context can be classical computers (laptops, tablets, smart phones, etc.),

wearable devices (smart watches, heartbeat monitors, tracking devices, etc.), entertainment devices (TV, video, photo, audio, etc.) or home automation devices (smart meters, appliances, switches, etc.). In the context of network connectivity these devices are also called nodes.

To interconnect the nodes (i.e. the network-capable entities or network-capable parts of a device), a network connection has to be set up and managed securely. Currently multiple wireless network technologies (Zigbee, Wifi, ANT, DECT, etc.) and multiple

wireline technologies (Ethernet, Power Line Communications, etc.) can be used for that purpose.

However the secure setup (i.e. the secure pairing of a node with another node or with a central controller) and management causes usability, asset management and connection management problems.

Main Idea

To overcome these problems we propose an "Automatic Network Secure Pairing & Connection Management Mechanism using Light, Sound or Power Signatures" in order to securely connect and manage node which includes an automatic theft protection.

Figure: Network Channel and independent channels

The main idea of this mechanism is the use one or more independent channels (i.e. light, sound or power signatures) to authorize the pairing of nodes in the network channel and to manage the nodes (see figure). Based on the required security policies a combination of processes takes place for secure pairing. As part of a secure connection management process we implement regular revalidation and - if triggered by theft - termination processes. Additionally we use the information collected by the


Page 02 of 4

pairing process for asset management.

Application Scenario

In a typical scenario we have multiple domestic networks in one building or adjacent buildings. Each of these domestic networks typically belongs to another room, another apartment, another company or another user in the same proximity. The domestic networks therefore overlap.

Overlapping domestic networks however cause usability problems and potential security holes: If a new device needs to pair with an existing domestic network, we need to ensure, that the device is connected securely to the right domestic network. So typically the network has to be selected manually and keys have to be entered manually. Alternatively a "pairing button" has to be pressed on the device and on the domestic network controller at the same time. Both solutions have some usability problems. Ideal usability would allow a secure pairing without any additional user interaction, but with several levels of security, predefined by a given security policy.

Automatic Network Secure Pairing Pro...