![]() METHOD FOR ACTIVATING A CONNECTED OBJECT
专利摘要:
A method of activating a connected object for operation in an LPWAN network. The method comprises, when implemented by the connected object: detecting (301) a first signal transmitted by an external device; when the first signal has predefined characteristics, passing (302) the connected object from a standby mode to an active mode, only a module of the connected object for detecting the first signal being activated in the standby mode; receiving a second signal including a signature from the external device; verifying (305) that the signature conforms to a predefined signature and, when the signature conforms to the predefined signature, obtaining (3054) configuration parameters, configuring (308) the connected object according to the configuration parameters obtained and transmitting (309) a connection request message to said network. 公开号:FR3049796A1 申请号:FR1652726 申请日:2016-03-30 公开日:2017-10-06 发明作者:Henri Teboulle;Jean-Paul Lecappon 申请人:Sagemcom Energy and Telecom SAS; IPC主号:
专利说明:
The invention relates to a method for activating a connected object for operating in a long range wireless network and for low power consumption, devices and a system implementing the method. The Internet is gradually being transformed into an extensive network, called the "Internet of Things", connecting all kinds of objects that have become connectable, called "connected objects". New network requirements then emerged, including wireless network requirements with greater coverage than conventional cellular networks and limiting power consumption of connected objects. Among these long range and low power Wide Area Network (LPWAN) wireless networks in English terminology are networks based on LoRa technology ("Long Range"). English terminology) and networks based on a communication technology developed by SIGFOX, known as SIGFOX technology. The LoRa and SIGFOX technologies operate in frequency bands known as the "ISM Band" (Industry, Science and Medical) with frequency bands that can be used freely for industrial, scientific and medical applications. LoRa technology is based on a spread spectrum technology to obtain low bit rate communications with good robustness in a particularly noisy ISM band. SIGFOX technology is based on ultra-narrow band modulation (UNBM) modulation technology, also known as Very Low Sideband Keying (VMSK) modulation in terminology. Anglo-Saxon) or simply modulation with minimum sidebands ("Minimum SideBand" in English terminology). A network based on LoRa technology (called "LoRa network" thereafter) is composed of base stations or gateways ("gateways" in English terminology) generally placed on high points to cover a large geographical area. The gateways are able to detect messages sent in their area by connected objects (also called "devices" or "terminals" ("endpoints" in English terminology) and to trace them to at least one centralized server ("LoRa Network Server (LNS) "in English terminology) that will process them. In a LoRa network, a connected object is not attached to a gateway. All gateways within range of a connected object can serve as a relay between said connected object and the centralized server. If a gateway can decode a message sent by a connected object (uplink), then it retransmits it to the centralized server for processing. If a message is to be transmitted from a centralized server to said connected object (downstream), it is the centralized server that will determine which gateway must relay the message. One of the properties sought in LPWAN networks is therefore low energy consumption. This property is about gateways, but also connected objects themselves. It is not a question of compensating for a low energy consumption on the part of the gateways by a significant energy consumption on the part of the connected objects. The connected object must itself have a low power consumption. Some connected objects are autonomous and integrate their energy source, for example, in the form of batteries. For issues of reliability, resistance and sealing, some connected objects, for example intended to be outdoors, are not designed to be reloaded or a change of their energy source. Only the energy embedded in their energy source at the factory outlet can be used throughout the life of the connected object. Therefore, to maximize the lifetime of the connected object, it is preferable that, as long as the connected object is not actually inserted in the LPWAN network, it does not consume or consume at least the energy contained in its source of energy. However, as the connected object is not activated, it does not know that it is connected to the LPWAN network. One possible solution would be to introduce an activation means such as a switch on the connected object to activate it. However, it is known that the introduction of a switch on a device harms, in particular, T tightness of said device, which is incompatible with connected objects intended to be installed outdoors or immersed. In addition, a switch can be manipulated by people who are not authorized to activate or deactivate the connected object. It is desirable to overcome these disadvantages of the state of the art. In particular, it is desirable to propose a method for activating a connected object when it is inserted in the LPWAN network. In addition, the method for activating the connected object should preferably be secured to prevent unauthorized persons from activating the connected object. It is further desirable to provide a method that is simple to implement and low cost. According to a first aspect of the present invention, the present invention relates to a method of activating a connected object to operate in a long-range wireless network and for low power consumption. The method comprises, when implemented by the connected object: detecting (301) a first signal transmitted by an external device; when the first signal has predefined characteristics, passing the connected object from a standby mode to an active mode, only a module of the connected object for detecting the first signal being activated in the standby mode; receiving a second signal including a signature from the external device; verifying that the signature conforms to a predefined signature and, when the signature conforms to the predefined signature, obtaining configuration parameters, configuring the connected object according to the obtained configuration parameters and transmitting a connection request message to said network. In this way, the connected object consumes at least the energy contained in its power source as long as it is not activated by the external device. In addition, it is necessary that the first and second signals transmitted by the external device have predefined characteristics so that the connected object is activated, which prevents activation by an unauthorized person. In one embodiment, the connected object is identified by a first connected object identifier and the second signal comprises information representative of a certificate of the external device, a first fingerprint calculated from said certificate and information representative of a second connected object identifier, the signature being in accordance with the predefined signature when a second fingerprint calculated by the object connected from said certificate is equal to a third fingerprint calculated by the connected object from the first fingerprint and when the information representative of the second connected object identifier corresponds to the first connected object identifier. In one embodiment, the configuration parameters are given by an external device in the second signal, or given by a server of said network or given by the external device in the second signal and the server of said network. In one embodiment, when at least part of the configuration parameters is given by the server of said network, following the transmission of the connection request message to said network by the connected object, the connected object receives a message comprising said parameters from said server. In one embodiment, following the transmission of the connection request message to said network by the connected object and prior to receiving the message comprising said parameters, the connected object receives a network connection authorization message from the network. server share comprising information indicating that the server has configuration parameters to be transmitted to the connected object and transmits an acknowledgment message for said authorization message so as to cause the server to send the message comprising said settings. According to a second aspect of the invention, the invention relates to a method for activating a connected object intended to operate in a long-range wireless network and allowing a low power consumption. The method comprises when it is implemented by an external device able to start the connected object; transmit a first signal to the connected object for passing the connected object from a standby mode to an active mode, only a module of the connected object for detecting the first signal being activated in the Eve ; transmitting a second signal comprising a signature to said connected object and waiting for reception of a connection request message to said network from the connected object; and terminating the method when a connection request message is received. In one embodiment, after sending the second signal, the external device waits for reception of a connection request message for a predefined duration and re-transmits the first and the second signal if, at the end of the predefined duration, no connection request message is received by the external device. In one embodiment after emitting the second signal, said network is a LoRa network and each communication between the connected object and the server is via a gateway of said network. According to a third aspect of the invention, the invention relates to a connected object type device comprising means for implementing the method according to the first aspect. According to a fourth aspect of the invention, the invention relates to a device comprising means for implementing the method according to the second aspect. According to a fifth aspect of the invention, the invention relates to a system comprising a device according to the third aspect and a device according to the fourth aspect. According to a sixth aspect of the invention, the invention relates to a computer program comprising instructions for implementing, by a device, the method according to the first aspect or the method according to the second aspect, when said program is executed by a processor of said device According to a seventh aspect, the invention relates to storage means storing a computer program comprising instructions for implementing, by a device, the method according to the first aspect or the method according to the second aspect, when said program is executed. by a processor of said device The characteristics of the invention mentioned above, as well as others, will emerge more clearly on reading the following description of an exemplary embodiment, said description being given in relation to the attached drawings, among which: Fig. 1 schematically illustrates an LPWAN network in which the invention is implemented; FIG. 2A schematically illustrates a processing module included in an external device; FIG. 2B schematically illustrates a processing module included in a connected object; FIG. 3A illustrates schematically a first example of a method of activating a connected object according to the invention; FIG. 3B schematically illustrates a second example of a method of activating a connected object according to the invention; FIG. 4A schematically illustrates a LoRa message allowing a connected object to be inserted into a LoRa network; FIG. 4B schematically illustrates a LoRa message field allowing a connected object to be inserted into a LoRa network; and, - 5 schematically illustrates a LoRa message allowing a server of a Lora network to transmit configuration parameters to a connected object. The invention is described later in a LoRa network context. However, the invention applies in other contexts for all types of long-range wireless networks and for low power consumption such as a network based on SIGFOX technology. Fig. 1 schematically illustrates a LoRa 1 network in which the invention is implemented. In the example of FIG. 1, the LoRa 1 network comprises an LNS server 10, a gateway 11 and a connected object 12. The gateway 11 communicates with the LNS server 10 via a wired or wireless communication link 14. The gateway 11 communicates with the connected object 12 via a wireless communication link 13. A device 15, external to the LoRa 1 network, said external device 15, is shown. The external device 15 is manipulated by an operator and is used to activate the connected object 12 in a secure manner. To do this, the external device 15 comprises a module 151 for transmitting an activation signal able to securely activate the connected object 12. The transmission module 151 is for example a transmission module of a light signal or a module for transmitting an electromagnetic signal. The external device 15 is for example a smart phone ("Smart phone" in English terminology) or a dedicated device. The connected object 12 comprises a reception module 121 adapted to receive the activation signal transmitted by the external device 15. Furthermore, the external device 15 (respectively the connected object 12) comprises a processing module 150 (respectively 120) able to implement process steps according to the invention described in relation to FIGS. 3A and 3B. Note that the communications between the connected object 12 and the gateway 11 use messages (or frames) compatible with the LoRaWAN protocol, the messages being transmitted in multicast mode ("broadcast" in English terminology). The LoRaWAN 1.1 document ("draft LoRaWAN 1.1" in English terminology) of August 2015 defines the communications between the connected objects and the gateways of a LoRa network. Messages compatible with the LoRaWAN protocol are called LoRa messages afterwards. Fig. 2A schematically illustrates an example of hardware architecture of the processing module 150 included in the external device 15. According to the example of hardware architecture shown in FIG. 2A, the processing module 150 then comprises, connected by a communication bus 1500: a processor or CPU ("Central Processing Unit" in English) 1501; a Random Access Memory (RAM) 1502; a ROM (Read Only Memory) 1503; a storage unit such as a hard disk or a storage medium reader, such as a Secure Digital (SD) card reader 1504; at least one communication interface 1505 enabling the processing module 150 to communicate with other modules or devices. For example, the communication interface 1505 allows the processing module 150 to receive LoRa messages from the connected object 12 or the gateway 11. The processor 1501 is capable of executing instructions loaded into the RAM 1502 from the ROM 1503, an external memory (not shown), a storage medium (such as an SD card), or a communication network. When the external device 15 is turned on, the processor 1501 is able to read instructions from RAM 1502 and execute them. In one embodiment, these instructions form a computer program causing the processor 1501 to implement steps of the methods described hereinafter with reference to FIGS. 3A and 3B. The steps of the methods described in relation with FIGS. 3A and 3B implemented by the external device 15 can be implemented in software form by executing a set of instructions by a programmable machine, for example a DSP ("Digital Signal Processor" in English) or a microcontroller, or be implemented in hardware form by a machine or a dedicated component, for example an FPGA ("Field Programmable Gate Array" in English) or an ASIC ("Application-Specific Integrated Circuit" in English). Fig. 2B schematically illustrates an example of hardware architecture of the processing module 120 included in the connected object 12. According to the example of hardware architecture shown in FIG. 2B, the processing module 120 then comprises, connected by a communication bus 1200: a processor or CPU 1201; RAM RAM 1202; ROM ROM 1203; a storage unit such as a hard disk or a storage medium reader, such as an SD card reader 1204; at least one communication interface 1205 enabling the processing module 120 to communicate with other modules or devices. For example, the communication interface 1205 allows the processing module 120 to communicate with the LNS server 10 via the gateway 11 or to transmit LoRa messages to the external device 15. The processor 1201 is capable of executing instructions loaded into the RAM 1202 from the ROM 1203, an external memory (not shown), a storage medium (such as an SD card), or a communication network. When the connected object 12 switches from a sleep mode to an active mode or when the connected object is in the active mode, the processor 1201 is able to read instructions from RAM 1202 and execute them. These instructions form a computer program causing the processor 1201 to implement steps of the methods described hereinafter with reference to FIGS. 3A and 3B. The steps of the methods described in relation with FIGS. 3A and 3B implemented by the connected object 12 can be implemented in software form by executing a set of instructions by a programmable machine, for example a DSP ("Digital Signal Processor" in English) or a microcontroller, or be implemented in hardware form by a machine or a dedicated component, for example an FPGA ("Field-Programmable Gate Array" in English) or an ASIC ("Application-Specific Integrated Circuit" in English). Fig. 3A schematically illustrates a first example of a method for activating a connected object according to the invention. In the method described in connection with FIG. 3A, only the external device 15 and the connected object 12 are involved in the activation of the connected object 12. In the example of FIG. 3A, the connected object 12 is an external temperature sensor comprising a temperature measurement module and a not shown clock module. This temperature sensor is able to measure temperatures and detect abnormally high or abnormally low temperatures. A first temperature threshold below which a temperature is considered abnormally low and a second temperature threshold above which a temperature is considered abnormally high can be parameterized during the activation of the connected object 12. clock module can also be adjusted during activation of the connected object 12. The connected object 12 can operate in two modes: a sleep mode and an active mode In the standby mode, only the reception module 121 of the connected object 12 is activated so that the connected object 12 can detect a possible activation signal. The sleep mode consumes so little energy. In one embodiment, in the active mode, all the modules of the connected object 12 are activated. As long as the connected object 12 has not been activated by the external device 15, the connected object 12 is in the standby mode. When the connected object 12 is in the active mode, it is able to send LoRa messages to the LNS server 10 when abnormal temperatures are measured. These LoRa messages then comprise an abnormal temperature measured and information representative of the instant of measurement of this temperature. The connected object 12 has an identifier in the form of a MAC ("Media Access Control") address, named DevEUI, for uniquely identifying the connected object 12. The external device 15 has a private key CLE PRIVATE EXT assigned to it. The external device deduces an public key CLE PUBLIQUE EXT by applying an encryption transfer function to the private key CLE PRIVATE EXT. The encryption is for example of the elliptic curve type. The external device 15 has more than one certificate relating to a signature process that it can use to sign data from its private key CLE PRIVATE EXT. This certificate has been issued by a certificate authority that has a CLE PUBLIQUE AC public key and a private key CLE CLEVEE AC. Again, the signature process is of the elliptic curve type. Before activation of the connected object 12, the external device 15 has been parameterized, for example by an operator, so that it knows the MAC address of the connected object 12. In a step 300, the external device 15, via its module for transmitting an activation signal 151 and under the control of the processing module 150, transmits a first signal to the connected object 12 The first signal emitted by the external device 15 is intended to make the connected object 12 go from the standby mode to the active mode An activation signal capable of passing the connected object 12 from the standby mode to the active mode is by for example, a light signal having predefined characteristics such as a duration at least equal to a predefined duration D (for example of Z) = 500 ms) and a luminous intensity at least equal to a predefined light intensity value L (for example L = 5 lumen). In one embodiment, the activation signal is a magnetic signal having a duration at least equal to a predefined duration û (for example * = 500 ms) and an intensity at least equal to an intensity value B (for example B = Tesla). In a step 301, the receiving module 121 of the connected object 12 detects the first signal. When the receiving module 121 detects that the first signal has the predefined characteristics representative of an activation signal. The. for example, when a duration d of the first signal is greater than or equal to Z) and when a light intensity / of the first signal is greater than or equal to L, the reception module 121 makes the connected object 12 of the sleep mode go to active mode during a step 302. In step 302, all the modules of the connected object 12 and in particular the processing module 120, the temperature measurement module and the clock module are activated. When d <D or / <L, the receiving module 121 considers that the light signal is not an activation signal. The connected object 12 then remains in the standby mode. In a step 303, the external device 15, via its module for transmitting an activation signal 151 and under the control of the processing module 150, transmits a second signal comprising a signature. In one embodiment, the second signal is for example a light signal using a wireless communication technology based on the use of visible light called Li-Fi (abbreviation of "Light Fidelity" in English terminology). A principle of the Li-Fi technology is based on coding and sending data via an amplitude modulation of light sources (scintillations imperceptible to the eye), according to a standardized protocol. In one embodiment, the second signal is a periodic magnetic pulse train having a predefined period. Each pulse having a predefined intensity. A transmission of a pulse for a period indicating a bit at "1". A non-transmission of a pulse during a period indicating a bit at "0". The magnetic pulse train is therefore representative of a binary word capable of carrying information. The signature comprises M bytes representative of the certificate of the external device 15 and Zf bytes representative of a certificate ("Hash" in English terminology) of the certificate (SIGNED_HASH) calculated from the certificate of the external device 15. The certificate is transmitted no encrypted (ie transmitted in clear) and integrates the PUBLIC EXT CLE public key of the external device 15. The certificate imprint SIGNED HASH was calculated by the certification authority by first applying a HASH hashing function to the certificate ( SHA-256 function ("Secure Hash Algorithm" in English terminology: hash function operating on 256-bit word sizes) typically), then by encrypting the result from the private KEY CLE PRIVATE AC. The signature further comprises p bytes representative of the DevEUI MAC address of the connected object 12. In one embodiment, this DevEUI MAC address has been signed by the processing module 150 using the signature method prior to its execution. insertion in the signature. In the exemplary method described with reference to FIG. 3A, the second signal further comprises P bytes representative of configuration parameters of the connected object 12. In the example of the temperature sensor, the configuration parameters are: A parameter TEMP LOW TEMP representative of the first coded temperature threshold on one byte; • A TEMP HIGH TEMP parameter representative of the second one-byte temperature threshold; • ANNEE parameter encoded on one byte; • A MONASE parameter encoded on one byte; • A DATE parameter encoded on one byte; • A TIME parameter encoded on one byte; • A MINUTE parameter encoded on one byte; • A SECONDE parameter encoded on one byte. The parameters YEAR, MONTH, DAY, HOUR, MINUTE, SECOND serve to adjust the clock module of the connected object 12. In one embodiment, the configuration parameters have been signed by the processing module 150 using the signature process before their insertion in the signature. In a step 304, the processing module 120 of the connected object 12 receives the second signal from the external device 15 via its reception module 121. In a step 305, the processing module 120 verifies that the signature conforms to a predefined signature. To do this, in a step 3051, the processing module 120 calculates a HASH1 footprint on the M bytes representative of the certificate of the external device 15 by applying the HASH function to the certificate. Then, the processing module 120 applies the public key CLE PUBLIQUE AC to the certificate footprint SIGNED_HASH to obtain a HASH2 fingerprint. In a step 3052, the processing module 120 compares the HASH1 print with the HASH2 print. If the two prints are identical, the processing module considers that the signature comes from a certified external device and goes to a step 3053. If the two prints differ, the processing module 120 switches the connected object 12 into the standby mode in a step 306. In step 3053, the processing module 3053 retrieves the public key CLE PUBLIQUE EXT integrated in the certificate. In a step 3054, the processing module 120 uses the public key CLE PUBLIQUE EXT to check the integrity of the configuration parameters and to authenticate the external device 15 by deducing the MAC address and the configuration parameters contained in the second signal by applying a verification method corresponding to the signature method applied by the processing module 150. In a step 3055, the processing module 120 verifies that the MAC address contained in the second signal corresponds to its DevEUI MAC address. If the MAC address contained in the second signal corresponds to the MAC address DEVOTED the verification of the signature ends. The processing module 120 considers that not only the signature has been generated by an external device certified and that this signature was sent to the connected object 12. The step 3055 is then followed by a step 308. If, on the other hand, the MAC address contained in the second signal does not correspond to the DevEUI MAC address, the processing module 120 considers that the verification of the signature has failed (ie the signature received was not intended for the connected object 12). The processing module 120 then passes the connected object 12 in the standby mode during the step 306. In a step 308, the processing module 120 configures the connected object 12 with the configuration parameters obtained. In a step 309, the processing module transmits a LoRa message in multicast mode corresponding to a LoRa 1 network connection request. The message used is a JOIN REQUEST message defined by the LoRaWAN protocol. In parallel with step 305, as soon as the second signal is transmitted, the processing module 150 of the external device 15 has been waiting for a receipt of a JOIN REQUEST message for a predefined duration, equal for example to ten seconds, in a step 310. If at the end of the predefined duration, no message ΙΟΓΝ REQUEST is received by the external device 15, the processing module 150 again implements the steps 300, 303 and 310. If a JOIN REQUEST message is received for the predefined duration, the processing module 150 terminates the steps of the method described in connection with FIG. 3A implemented by the external device 15 during a step 312. It is noted that the JOIN REQUEST message is also received by the gateway 11 which retransmits it to the LNS server 10. The receipt of the JOIN REQUEST message by the LNS server 10 makes it possible to finalize the procedure for inserting the connected object 12 into the network. LoRa 1 as described in the LoRaWAN protocol. Fig. 3B schematically illustrates a second example of a method of activating a connected object according to the invention. In the method described in connection with FIG. 3B, the external device 15, the connected object 12 and the LNS server 10 (and indirectly the gateway 11) are involved in the activation of the connected object 12. In the example of FIG. 3B, the connected object 12 is an external temperature sensor identical to the temperature sensor described in connection with FIG. 3A and has the same DevEUI MAC address. The external device 15 of FIG. 3B is identical to the external device described in connection with FIG. 3A. It thus has the same private key CLE_PRIVEE_EXT, deduces the same public key CLE_PUBLIQUE_EXT by applying the same function of transfer of encryption to the private key CLE PRIVATE EXT, has the same certificate relating to the same signature process and has been parameterized with the MAC address of the connected object 12. Steps 300 to 302 of FIG. 3B are identical to the corresponding steps described in connection with FIG. 3B. In a step 403 replacing step 303, the external device 15, via its module for transmitting an activation signal 151 and under the control of the processing module 150, transmits a second signal comprising a signature . As in the case of step 303, the second signal transmitted during step 403 is for example a light signal using Li-Fi technology. The signature comprises M bytes representative of the certificate of the external device 15 and A bytes representative of a SIGNED HASH certificate fingerprint computed from the certificate of the external device 15. The certificate is transmitted unencrypted {i.e. transmitted in clear) and integrates the public key CLE PUBLIQUE EXT of the external device 15. The certificate footprint SIGNED HASH was calculated by the certification authority by first applying the HASH function to the certificate and then encrypting the result from the private key CLE CLEVEE AC. The signature further comprises p bytes representative of the DevEUI MAC address of the connected object 12. In one embodiment, this DevEUI MAC address has been signed by the processing module 150 using the signature method prior to its execution. insertion in the signature. Unlike the second signal transmitted in step 303, the second signal transmitted in step 403 does not include any configuration parameters of the connected object 12. Step 304 of FIG. 3B is identical to step 304 described in connection with FIG. 3A. In a step 405 replacing step 305, the processing module 120 verifies that the signature transmitted in step 304 conforms to a predefined signature. To do this, the processing module 120 implements the steps 3051, 3052 and 3053 described in connection with FIG. 3A. In a step 4054 replacing step 3054, the processing module 120 uses the public key CLE_PUBL1QUE_EXT to check only the DevEUI MAC address contained in the second signal by applying a verification method corresponding to the signature method applied by the module 150. Step 4054 is followed by step 3055 already described in connection with FIG. 3A. If the HASH1 fingerprint calculated in step 3051 differs from the HASH2 fingerprint or if the MAC address in the second signal differs from the DevEUI MAC address of the connected object, as in FIG. 3A, steps 3052 and 3055 are followed by step 306 during which the processing module 120 resets the connected object 12 into the standby mode. Otherwise, step 3055 is followed by step 4071. In step 4071, processing module 120 transmits a JOIN REQUEST message in multicast mode. In parallel with step 405, as soon as the second signal is transmitted, the processing module 150 of the external device 15 implements step 310 and waits for reception of a JOIN REQUEST message for a predefined duration. . If at the end of the predefined duration, no JOIN REQUEST message is received by the external device 15, the processing module 150 again implements the steps 300, 403 and 310. If a JOIN REQUEST message is received during the duration predefined, the processing module 150 implements step 312 in which it terminates the steps of the method described in relation to FIG. 3B implemented by the external device 15. In the exemplary method described with reference to FIG. 3B, the server ENS 10 plays an active role in the configuration of the connected object 12 since it provides the configuration parameters of the connected object 12. In a step 4072, the LNS server 10 receives the JOIN REQUEST message via the gateway 11. In a step 4073, in response to the JOIN REQUEST message, the LNS server 10 transmits a LoRa message allowing the connected object 12 to be inserted in the LoRa network 1. The message transmitted by the LNS server during the step 4073 is very similar to a JOIN ACCEPT message defined by the LoRaWAN protocol. We call this message LoRa message JOIN ACCEPT BIS. Fig. 4A schematically illustrates the LoRa JOIN ACCEPT BIS message allowing the connected object 12 to be inserted in the LoRa 1 network. The JOIN ACCEPT BIS message includes a three-byte, three-byte AppNonce field 41, a three-byte NetID 42 field, a four-byte DevAddr 43 field, an octet-coded RxDelay 45 field, and an optional six-byte CFList 46 field. bytes. The AppNonce 41, NetlD 42, DevAddr 43, RxDelay 45 and CFList 46 fields are identical to the fields of the same names of the JOIN ACCEPT messages described in the LoRaWAN protocol. The JOIN ACCEPT BIS message further comprises a DLSettings BIS 44 field encoded on a byte detailed in FIG. 4B. The DLSettings BIS 44 field replaces a DLSettings field present in the JOIN ACCEPT messages defined by the LoRaWAN protocol. Fig. 4B schematically illustrates the DLSettings field BIS 44 of the JOIN ACCEPT BIS message. The DLSettings BIS field 44 comprises a three-bit coded RXIDRoffset 441 field and a 4-bit coded RX2 Data Rate 442 field. The fields RXIDRoffset 441 and RX2 Data Rate are identical to the fields of the same names in the DLSettings field of the JOIN ACCEPT messages described in the LoRaWAN protocol. The DLSettings BIS field further comprises a PARAM 440 field encoded on a bit. This field replaces an FPending field of the same size as the DLSettings field. The PARAM field is used by the LNS server 10 to indicate to the connected object 12 that the LNS server 10 has configuration parameters to be transmitted to the connected object 12. When the PARAM field is at the value "1", the LNS server 10 has configuration parameters to be transmitted to the connected object 12. When the PARAM field is at the value "0", the LNS server 10 has no configuration parameter to be transmitted to the connected object 12. In step 4073, the LNS server 10 transmits a JOEM ACCEPT BIS message in which the PARAM field qsX at "1" to the connected object 12 via the gateway 11. In a step 4074, the processing module 120 receives the JOIN ACCEPT BIS message. The processing module 120 then knows that the LNS server 10 has configuration parameters to transmit to it. In a step 4075, the processing module 120 transmits to the LNS server 10 an acknowledgment for the JOIN ACCEPT BIS message. In a step 4076, the LNS server 10 transmits the acknowledgment transmitted during the step 4075. In response to this acknowledgment, the LNS server 10 transmits to the connected object 12 during a step 4077 a message LoRa configuration called sendInitReq. The sendInitReq message is used by the LNS server 10 to transmit configuration parameters to the connected object 12. Fig. 5 schematically illustrates a sendInitReq message allowing the LNS server 10 to transmit configuration parameters to the connected object 12. The sendInitReq message comprises a one-byte encoded MODE field 50, a single-byte encoded FPORT field 51, and a variable length DA TA field 52. The MODE field 50 indicates whether the sendInitReq message should be acknowledged or not by the connected object 12 using an acknowledgment. The FPORT field is the logical port number used to send messages. The field DATA 52 comprises the configuration parameters intended for the connected object 12. In the example where the connected object 12 is a temperature sensor, it makes it possible to transmit to the connected object the parameters SEUIL_TEMP_BAS, THRESHOLD TEMP HIGH, YEAR, MONTH, DAY, HOUR, MINUTE and SECOND. In a step 4078, the processing module 120 receives the sendInitReq message containing the configuration parameters. It should be noted that steps 4071 to 4078 can be considered as a global step 407 making it possible to obtain the configuration parameters. Following reception of the sendInitReq message, the processing module configures the connected object 12 according to the configuration parameters received during the step 308 already explained in relation with FIG. 3 A. If the MODE field of the sendInitReq message indicates that the sendInitReq message must be acknowledged, the processing module 120 implements the step 413 during which it transmits to the LNS server 10 via the gateway 11 an acknowledgment of receipt for the sendInitReq message. During a step 414, the LNS server 10 receives the acknowledgment transmitted during the step 413. The LNS server 10 then considers that the configuration of the connected object 12 has proceeded correctly. In one embodiment, if following the transmission of the sendInitReq message the LNS server 10 does not receive an acknowledgment (while an acknowledgment was requested in the MODE field of the sendInitReq message) at the end of a duration predefined, for example ten seconds, the LNS server 10 retransmits the sendInitReq message. In one embodiment, configuration parameters are transmitted by the external device 15 in the second signal and configuration parameters are transmitted by the LNS server 10 in a sendInitReq message. In this embodiment, steps 300 to 306, 308 and 310 to 312 are implemented by the external device 15 and the connected object 12 as described in connection with FIG. 3A, and steps 4071 to 4078, 413 and 414 are implemented by the connected object 12 and the LNS server 10 as described in connection with FIG. 3B. When the same parameter has been transmitted by both the external device 15 and the LNS server 10, the parameter transmitted by the server 10 is not taken into account during the configuration of the connected object 12. In this mode embodiment, the activation of the connected object 12 is jointly supported by the external device 15 and the LNS server 10.
权利要求:
Claims (13) [1" id="c-fr-0001] 1) A method of activating a connected object (12) intended to operate in a long-range wireless network and allowing a low power consumption (1), characterized in that the method comprises when it is set implemented by the connected object (12): detecting (301) a first signal transmitted by an external device (15); when the first signal has predefined characteristics, passing (302) the connected object (12) from a standby mode to an active mode, only a module (121) of the connected object for detecting the first signal being activated in the standby mode; receiving (304) a second signal including a signature from the external device (15); verifying (305) that the signature conforms to a predefined signature and, when the signature conforms to the predefined signature, obtaining (3054, 407) configuration parameters, configuring (308) the connected object according to the configuration parameters obtained and transmitting (309, 4071) a connection request message to said network. [0002] 2) Method according to claim 1, characterized in that the connected object (12) is identified by a first connected object identifier and in that the second signal comprises information representative of a certificate of the external device, a first imprint calculated from said certificate, and information representative of a second connected object identifier, the signature being in accordance with the predefined signature when a second calculated imprint (3051) by the connected object (12) from said certificate is equal to a third imprint calculated by the connected object from the first imprint and when the information representative of the second connected object identifier corresponds to the first connected object identifier. [0003] 3) Method according to claim 2, characterized in that the configuration parameters are given by an external device (15) in the second signal, or given by a server (10) of said network (1) or given by the external device ( 15) in the second signal and the server (10) of said network (1). [0004] 4) Method according to claim 3, characterized in that, when at least a portion of the configuration parameters is given by the server (10) of said network (1), following the transmission (4071) of the connection request message network audit (1) by the connected object (12), the connected object receives (4078) a message comprising said parameters from said server (10). [0005] 5) Method according to claim 4, characterized in that, following the transmission (4071) of the connection request message to said network (1) by the connected object (12) and prior to the receipt (4078) of the message comprising said parameters, the connected object receives (4074) a network connection authorization message (1) from the server (10) comprising information indicating that the server (10) has configuration parameters to be transmitted to the connected object (12) and transmits (4075) an acknowledgment message for said authorization message so as to cause a sending (4077) by the server of the message comprising said parameters. [0006] A method of activating a connected object (12) for operating in a long-range wireless network and for low power consumption (1), characterized in that the method comprises, when implemented implemented by an external device (15) adapted to start the connected object (12): transmitting (300) a first signal to the connected object (12) for passing the connected object (12) of a active mode sleep mode, only a module (121) of the connected object (12) for detecting the first signal being activated in the standby mode; transmit (303, 403) a second signal comprising a signature to said connected object (12) and wait (310) for a reception (311) of a connection request message to said network (1) from the connected object (12); and terminating (312) the process when a connection request message is received. [0007] 7) Method according to claim 6, characterized in that, after having emitted (303, 403) the second signal, the external device (15) goes on standby (310) of a reception of a connection request message for a predefined duration and re-transmits the first and the second signal if, at the end of the predefined duration, no connection request message is received by the external device (15). [0008] 8) Method according to any one of the preceding claims characterized in that said network (1) is a LoRa network and each communication between the connected object and the server is via a gateway (11) of said network (1). [0009] 9) Device (12) of connected object type comprising means for implementing the method according to any one of claims 1 to 5. [0010] 10) Device (15) comprising means for implementing the method according to any one of claims 6 to 7. [0011] 11) System comprising a device according to claim 9 and a device according to claim 10. [0012] 12) Computer program, characterized in that it comprises instructions for implementing, by a device (150, 120), the method according to any one of claims 1 to 5 or the method according to any one of claims 6 to 7, when said program is executed by a processor of said device (150, 120). [0013] 13) Storage means, characterized in that they store a computer program comprising instructions for implementing, by a device (150, 120), the method according to any one of claims 1 to 5 or the method according to any one of claims 6 to 7, when said program is executed by a processor of said device (150, 120).
类似技术:
公开号 | 公开日 | 专利标题 EP3437255B1|2020-10-21|Method for activating a connected object US10178579B2|2019-01-08|Internet of things | system and method for selecting a secondary communication channel US20190250899A1|2019-08-15|System and method for service-initiated internet of things | device updates US10343649B2|2019-07-09|Wireless key system and method US10146978B2|2018-12-04|Apparatus and method for accurate barcode scanning using dynamic timing feedback FR3044198A1|2017-05-26|METHOD FOR CONFIGURING A GATEWAY US9626543B1|2017-04-18|Apparatus and method for accurate barcode scanning using dynamic timing feedback EP3174241B1|2018-01-03|Method for establishing secure end-to-end communication between a user terminal and a connected object EP2959656B1|2018-08-01|Technique of pairing in a wireless network WO2016102833A1|2016-06-30|Secure electronic entity, electronic apparatus and method for verifying the integrity of data stored in such a secure electronic entity US10924920B2|2021-02-16|System and method for internet of things | device validation EP3613186B1|2021-01-06|Communication system and method WO2016034573A1|2016-03-10|Devices and methods for the transfer of information relating to accreditation and access to a network CN113056759A|2021-06-29|Method and system for network devices to obtain a trusted status representation of the status of a distributed ledger technology network WO2014076121A1|2014-05-22|Device and method for transmitting data in an encrypted form US11217049B2|2022-01-04|Secure wireless key system and method with dynamically adjustable modulation EP1677486A1|2006-07-05|Terminal authentication method US20210125143A1|2021-04-29|Apparatus and method for secure transport using internet of things | devices EP3229399B1|2021-06-02|Method for shared-key encryption between a server and a smart meter EP3840324A1|2021-06-23|Secure asynchronous series link WO2018211026A1|2018-11-22|Method for securing communication without management of states FR3024253A1|2016-01-29|AUTOMATIC METHOD FOR REMOTELY UPDATING SOFTWARE CONTAINED IN AN AUTONOMOUS RADIO TRANSMITTER DEVICE OF THE BEACON TYPE. WO2020114994A1|2020-06-11|Method for automatically configuring a wireless device by audio channel FR3085491A1|2020-03-06|DATA LOCATION METHOD, CONTROL SYSTEM, TRANSMITTER DEVICE WO2017202743A1|2017-11-30|Method of exchanging data between a connected object and a central server
同族专利:
公开号 | 公开日 WO2017167721A1|2017-10-05| US20190104472A1|2019-04-04| EP3437255A1|2019-02-06| CN108886526A|2018-11-23| EP3437255B1|2020-10-21| FR3049796B1|2018-04-27| US10716065B2|2020-07-14| CN108886526B|2021-03-09|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US20030081579A1|2001-10-29|2003-05-01|Sierra Wireless, Inc., A Canadian Corporation|Apparatus and method for coupling a network data device to a digital network| EP2573948A1|2011-09-23|2013-03-27|Nxp B.V.|System and method for commissioning devices| US20160050566A1|2013-04-28|2016-02-18|Huawei Device Co., Ltd.|Wireless Terminal Configuration Method, Device, and System| US7035856B1|2000-09-28|2006-04-25|Nobuyoshi Morimoto|System and method for tracking and routing shipped items| US20070118530A1|2005-11-18|2007-05-24|Microsoft Corporation|Scheduling of software updates| US9188969B2|2007-05-18|2015-11-17|Siemens Industry, Inc.|Arrangement and method for accessing data of a building automation system component| US9717074B2|2010-04-01|2017-07-25|Hon Hai Precision Industry Co., Ltd.|Relay user equipment device and status announcement method thereof| CN103635130A|2011-04-15|2014-03-12|信息生物股份有限公司|Remote data monitoring and collection system with multi-tiered analysis| WO2015054272A2|2013-10-07|2015-04-16|Google Inc.|Automated crowdsourced power outage identification and staggering of hvac system restarts| US9565633B2|2014-07-03|2017-02-07|Alcatel Lucent|Opportunistic information forwarding using wireless terminals in the internet-of-things| FI20145859A|2014-10-02|2016-04-03|Perunamestarit Oy|Sensor for monitoring environmental conditions| EP3243172A1|2015-01-09|2017-11-15|Honeywell International Inc.|System for custom configuring personal protection equipment| CN105246096B|2015-09-08|2018-12-11|三维通信股份有限公司|A kind of fast access method of low-power consumption internet of things equipment|US10383060B2|2017-08-29|2019-08-13|Comcast Cable Communications, Llc|Systems and methods for using a mobile gateway in a low power wide area network| DE102017011543A1|2017-12-13|2019-06-13|Giesecke+Devrient Mobile Security Gmbh|OTA re-encryption with update server| CN111356210A|2018-12-20|2020-06-30|阿里巴巴集团控股有限公司|Downlink base station selection method, device, equipment and storage medium| FR3096201B1|2019-05-13|2021-05-07|Sagemcom Energy & Telecom|FRAME ACKNOWLEDGMENT PROCESS|
法律状态:
2017-02-22| PLFP| Fee payment|Year of fee payment: 2 | 2017-10-06| PLSC| Search report ready|Effective date: 20171006 | 2018-02-20| PLFP| Fee payment|Year of fee payment: 3 | 2020-02-20| PLFP| Fee payment|Year of fee payment: 5 | 2021-02-19| PLFP| Fee payment|Year of fee payment: 6 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 FR1652726A|FR3049796B1|2016-03-30|2016-03-30|METHOD FOR ACTIVATING A CONNECTED OBJECT| FR1652726|2016-03-30|FR1652726A| FR3049796B1|2016-03-30|2016-03-30|METHOD FOR ACTIVATING A CONNECTED OBJECT| EP17713679.3A| EP3437255B1|2016-03-30|2017-03-28|Method for activating a connected object| US16/085,646| US10716065B2|2016-03-30|2017-03-28|Method for activating a connected object| CN201780020964.4A| CN108886526B|2016-03-30|2017-03-28|Method for activating a connection object| PCT/EP2017/057263| WO2017167721A1|2016-03-30|2017-03-28|Method for activating a connected object| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|