Hosted device provisioning protocol with servers and a networked initiator

ABSTRACT

A network can operate a WiFi access point with credentials. An unconfigured device can (i) support a Device Provisioning Protocol (DPP), (ii) record responder bootstrap public and private keys, and (iii) be marked with a tag. The network can record initiator bootstrap public and private keys, as well as derived initiator ephemeral public and private keys. An initiator can (i) operate a DPP application, (ii) read the tag, (iii) establish a secure and mutually authenticated connection with the network, and (iv) send the network data within the tag. The network can record the responder bootstrap public key and derive an encryption key with the (i) recorded responder bootstrap public key and (ii) derived initiator ephemeral private key. The network can encrypt credentials using the derived encryption key and send the encrypted credentials to the initiator, which can forward the encrypted credentials to the device, thereby supporting a device configuration.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application claims priority to U.S. Provisional Patent Application No. 62/664,057, filed Apr. 27, 2018, which is herewith incorporated by reference in entirety into the present application

BACKGROUND Technical Field

The present systems and methods relate to authentication and configuration of WiFi radios, and more particularly, to using a Device Provisioning Protocol with a networked initiator and a set of servers that record PKI keys, in order securely transfer a set of credentials to a device.

Description of Related Art

The ability to connect transducers such as sensors and actuators with a network is a growing field with many economical applications. As the costs for both electronic hardware and bandwidth continue to decrease, the use of networked transducers is expected to continue increasing over the coming decades. Connecting transducers to a network can be referred to as “machine-to-machine (M2M) communications” or “the Internet of Things (IoT).” Among many potential benefits, IoT technologies allow automated monitoring and/or control of assets, equipment, personnel, or a physical location where manual monitoring may not be economical. Many applications for the “Internet of Things” significantly reduce costs by using automated monitoring instead of manual techniques. Prominent examples of IoT applications today include monitoring and control for building heating/air-conditioning, automobiles, alarm systems, and tracking devices. Fast growing markets for IoT applications today include health applications such as the remote monitoring of a person's fitness activity, heartbeat, or glucose levels, monitoring of industrial equipment deployed remotely in the field, and also security systems.

Many IoT applications can leverage wireless networking technologies, in addition to wired technologies such as Ethernet. Wireless technologies such as wireless local area networks and wireless wide area networks have proliferated around the world over the past 30 years, and usage of these wireless networks is also expected to continue to grow. Wireless local area network (LAN) technologies include WiFi based on the series of 802.11 standards from the Institute of Electrical and Electronics Engineers (IEEE). The many options to connect a transducer device to a wireless network creates opportunities for new products and services, but also creates several classes of problems that need to be solved. Many of these problems or needs in the art pertain to securely and efficiently configuring the transducer devices. A need exists in the art to allow a user or a network to securely and easily upload to the device a set of network access credentials for a wireless network.

Manually configuring devices to (i) use different security keys, (ii) apply new network access credentials to connect with the owner's selected wireless network, and/or (iii) update running firmware can be time consuming and difficult for users. Entering network access credentials is also prone to errors and especially difficult for devices with limited user interfaces, where a limited user interface is common for many devices supporting applications for the “Internet of Things”. Loading credentials and network configuration into a device in order to obtain connectivity to a network can also be known as device provisioning or device configuration. In an attempt to address these needs to simplify or automate device provisioning, the WiFi Alliance™ released a Device Provisioning Protocol (DPP) specification on Apr. 9, 2018 as version 1.0 (DPPv1.0). Although the DPPv1.0 defines a series of messages between an initiator and a responder in order to support a device configuration, several unmet needs remain in the art in order to securely and easily deploy a Device Provisioning Protocol at wide scale with potentially billions of devices over many years.

To highlight one example unmet need by a DPPv1.0, WiFi capable devices currently being designed and deployed may have an expected life of more than a decade. During that timeframe, the device may need to undergo a configuration or device provisioning step more than one time. Reasons could include either (i) the device undergoes a “factory reset”, or (ii) the device needs to be provisioned a second time, such as if the device owner changes or the device is moved to a different network, and other reasons exist as well. But, as stated in DPPv1.0, “threats against this bootstrapping method are possible if public keys and/or codes are reused.” A need exists in the art to support a Device Provisioning Protocol in a manner where bootstrapping public keys can be securely reused. A need exists in the art for bootstrapping PKI keys to be securely updated after a first instance of conducting a DPP, such that the updated bootstrapping PKI keys can be subsequently used at a later time for a second instance of conducting a DPP.

In order to securely provision a device, a device may prefer to conduct mutual authentication with an initiator that records and operates with initiator PKI keys. The device could be a high value piece of equipment, such as an automobile, health monitoring equipment in a hospital, or industrial equipment, etc. that could be targets for potential hackers seeking to “provision” the devices to a network under their control or a network providing the hackers access to the device. In these cases, an owner or user of a device may prefer that a device provisioning protocol use mutual authentication. The DPPv1.0 supports mutual authentication in order to securely authenticate a device and an initiator before transferring network access credentials to the device, but creates a new and shifted problem of both (i) securely providing an initiator bootstrap private key to an initiator and (ii) the corresponding initiator bootstrap public key to a target device for configuration. In other words, recording an initiator bootstrap public key in a device can be difficult if there is no pre-existing relationship or communication between a device and an initiator before the start of a device provisioning protocol. In addition, an insecure initiator may have no pre-existing relationship with a target network to provide connectivity to the device, yet the network may need to securely transfer credentials to the device through the insecure initiator. A need exists in the art to securely and readily enable an initiator to have access to an initiator bootstrap private key while also enabling a device to have access to the corresponding initiator bootstrap public key A need exists in the art for a network to securely transfer credentials to a device though an insecure initiator.

With the widespread deployment of WiFi access points, a device may have access to potentially a plurality of different access points associated with potentially different networks. Although DPPv1.0 supports configuration of a device, DPPv1.0 does not suggest (i) which of a possible plurality of potential different access points should be selected, nor (ii) how credentials for a selected access point could be obtained by an initiator. Need exists in the art for an initiator to automatically determine a list of available networks and to automatically and securely receive a set of credentials for a preferred network for the device. A need exists in the art for the credentials to be encrypted in a manner such that the initiator cannot feasibly read the credentials, but the device can receive the encrypted credentials and convert the encrypted credentials into plaintext form in order for the device to load and use the plaintext credentials.

A network can use DPPv1.0 in order to connect devices to the network using an initiator. The security for conducting a device provisioning protocol according to DPPv1.0 depends on the security of an initiator, since as envisioned by DPPv1.0 the initiator (i) records an initiator bootstrap private key and (ii) conducts key exchanges with the initiator bootstrap private key. However, an initiator for conducting a DPP may be outside the control of a network and may also be an insecure device. An initiator could be a “rooted” mobile phone operated by a hacker, as one example. Or, the initiator could simply be a mobile device that is insecure or operates with security policies that do not meet the standards of the network. A need exists in the art for an insecure initiator to conduct a device provisioning protocol that is compatible with DPPv1.0, while simultaneously keeping (i) the initiator bootstrap private key and (ii) cryptographic operations with the initiator bootstrap private key under the control or within the security policies of a network.

The secure use of a device provisioning protocol can depend on an initiator having access to a responder bootstrap public key. Access to the responder bootstrap public key for the initiator is described in DPPv1.0 as supported in an “out of band” operation. The security of a device provisioning protocol can depend on the security of the steps for an initiator to gain access to the responder bootstrap public key. The initiator could also comprise an insecure device, as described in the paragraph above. If the responder bootstrap public key is externally readable by an initiator, such as contained in a QR code, then potentially many different initiators could read the responder bootstrap public key and attempt a DPP with a device. Although this ease may be preferred for some devices and applications, many devices may require a higher level of security such that a responder bootstrap public key can only be accessed by an authorized initiator. A need exists in the art for an initiator to have access to a responder bootstrap public key, while simultaneously keeping the responder bootstrap public key secured.

Many other examples exist as well for needs in the art to support efficient yet secure device configuration or provisioning, and the above are examples are just a few and intended to be illustrative instead of limiting.

SUMMARY

Methods and systems are provided for a networked initiator to conduct a device provisioning protocol (DPP) with a responder operating in a device. The device provisioning protocol can support the Device Provisioning Protocol specification version 1.0 and subsequent versions from the WiFi Alliance™. Conducting a DPP with a device can transfer a set of network credentials to the device, in order for the device to connect with a network using the network credentials. The set of network credentials can also include a network configuration, where the network configuration includes settings to use with a WiFi radio in the device, in order for the WiFi radio to communicate with other nodes with the credentials, including an access point which can provide connectivity to an IP network for the device.

A device can operate a responder, which listens for an authentication request from an initiator. The responder can record and operate an initiator configuration, specifying a frequency band to utilize, a WiFi networking technology to implement (e.g. 802.11 ac, 802.11ah, etc.) and a channel list. When the device is awake or powered on, the responder can listen for incoming authentication requests using a WiFi radio for the device. The responder can record a responder bootstrap public key, a responder bootstrap private key, and, when supporting mutual authentication with an initiator, an initiator bootstrap public key. The PKI keys can be associated with a selected set of cryptographic parameters, where the parameters specify settings to use for cryptographic operations with the PKI keys by a responder. The responder can also include a random number generator, a PKI key pair generation algorithm, a secure hash algorithm, an elliptic curve Diffie Hellman (ECDH) key exchange algorithm, and a symmetric ciphering algorithm. The device with the responder can be marked with a tag, such that the tag records an identity for the device and a uniform resource locator (URL) for a server or a file on a server.

A network can operate an access point, where the access point operates with a set of credentials. The credentials can include an identifier for the network such a service set identifier (SSID), a pairwise master key (PMK) or a preshared key (PSK), a pairwise master key identifier (PMKID), and also a configuration. The access point can support wireless networking standards in the series of 802.11 standards. A network can also operate a plurality of access points. The network can operate or be associated with a Device Provisioning Protocol (DPP) server, a device database, an authentication server, and a discovery server. The network can be connected to an IP network, which can comprise the globally routable public Internet. Different servers within a network can be connected using an Intranet, a virtual private network (VPN), Internet Protocol Security (IPSEC), or similar techniques to secure communication between the servers.

The network can operate or communicate with the device database. The DPP server in the network can also communicate with the device database. The device database can record information for a plurality of devices before responders in the devices conduct the device provisioning protocol with the initiator or a plurality of initiators. The device database can record the device identity, a responder identity, which could be in the form of a responder medium access control (MAC) address, an initiator configuration, and a key table. The key table in a device database can record for each device a responder bootstrap public key, an initiator bootstrap public key, and an initiator bootstrap private key. Recorded data within a device database can be obtained by a network (i) upon device manufacturing from a device manufacturer, or (ii) before distribution of a device to the location of the network's access point.

The DPP server for a network can operate a server database, where the server database records information for a plurality of devices connecting with the network. The server database can record the device identity, medium access control (MAC) addresses for devices and initiators, an initiator mode, a selected set of cryptographic parameters for each device, an initiator bootstrap private key, the initiator bootstrap public key, the responder bootstrap public key, an initiator ephemeral public key, and initiator ephemeral private key, an initiator bootstrap key sequence number to identify and track the initiator bootstrap PKI keys, a public key exchange (PKEX) key, a first, second, and third derived shared secret key for a responder. Depending on the initiator mode, (a) not all PKI keys and secret shared keys may be recorded in the server database, and (b) some PKI keys and shared secret keys may be recorded within an initiator instead. The DPP server can also include a set cryptographic algorithms, where the cryptographic algorithms can include a random number generator, a PKI key pair generation algorithm, a secure hash algorithm, an elliptic curve Diffie Hellman key exchange algorithm, a symmetric ciphering algorithm, and a digital signature algorithm. The cryptographic algorithms within a DPP server can be compatible with the equivalent set of cryptographic algorithms in the responder and also the initiator.

An initiator can be a computing device that includes a WiFi radio and can be associated with an initiator user. The initiator can operate the WiFi radio with an initiator configuration in order for the initiator to send and receive messages with the responder. The initiator is located in sufficient proximity with the responder so that the WiFi radio for the initiator and the WiFi radio for the responder can communicate using 802.11 standards. The initiator can operate a DPP application, where the DPP application can also include the set of cryptographic algorithms, which are compatible with cryptographic algorithms in both the responder and the DPP server. The initiator can use an access network in order to communicate with the network with the DPP server via an IP network. The initiator can record a user configuration for the WiFi radio, where the user configuration can be temporarily replaced with the initiator configuration in order to conduct the device provisioning protocol (DPP) session with the responder. After the DPP session, the initiator configuration can be replaced with the user configuration, such that the initiator is restored to its previous state before the DPP session.

The discovery server for a network can operate a discovery server database. The discovery server can receive requests from initiators, where the requests include a device identity from the tag of the device. The discover server database can record configuration provisioning data for the device with the device identity, and a URL for an authentication server for use by the initiator in order for the initiator to (i) authenticate with the network before conducting the device provisioning protocol and (ii) receive information from the DPP server. The initiator can send a request to the discovery server with the device identity, where the device operates a responder. The discovery server can query the discovery server database with the device identity in order to reply to the initiator with the configuration provisioning data for the initiator, where the configuration provisioning data includes the URL for the authentication server.

The initiator can call the URL for the authentication server and conduct an authentication step with the authentication server. After authentication of the initiator, the authentication server can query the device database in order to obtain information for the initiator to use in order to conduct a device provisioning protocol. The information for the initiator can include a URL for the DPP server, an initiator configuration, and optionally the initiator bootstrap public key and the responder bootstrap public key, where the optional information can depend on the initiator mode for a DPP selected by the network.

The initiator can call the URL for the DPP server and setup a secure session via TLS or similar standards. The initiator can then use the WiFi radio and wireless WAN radio to conduct a radio frequency scan in order to collect a networks available list. The networks available list can include identities broadcast by wireless networks and available at the physical location of the initiator near the device. The initiator can send the networks available list to the DPP server. The DPP server can use the networks available list to select a primary access network for the device and obtain credentials for the primary access network for the device with the responder to use. The DPP server can also select an initiator mode, which can specify the subsequent series of steps for the initiator and DPP server to take in order to conduct a DPP session with the responder. The DPP server can send the initiator the initiator mode, where a DPP application operating in the initiator implements the mode. The DPP server can obtain the initiator bootstrap PKI keys and the responder public key from the device database, as well as a selected set of cryptographic parameters in order to use the PKI keys.

In a first initiator mode, the DPP server can then conduct a series of steps in order to generate data for a Device Provisioning Protocol (DPP) authorization request. The DPP server can derive an initiator ephemeral PKI key pair. The DPP server can conduct a first initiator ECDH key exchange with the responder bootstrap public key and the derived initiator private key to derive a key k1. The initiator can derive an initiator nonce and encrypt the initiator nonce using the derived key k1, where the encrypted initiator nonce can comprise a first ciphertext. The initiator can send (i) secure hash values for the initiator bootstrap public key and the responder bootstrap public key, the (ii) derived initiator ephemeral public key, and (iii) the first ciphertext to the initiator. The initiator can send a DPP authentication request to the responder. For embodiments without use of authentication of the initiator (e.g. a “responder-only” authentication), then the use of an initiator bootstrap public key can be omitted.

The responder can receive and process with DPP authentication request. The responder can record a plurality of initiator bootstrap public keys, where the plurality of initiator bootstrap public keys could be recorded during manufacturing or distribution of the device with the responder before the device was placed in the physical proximity of the network access point. At least one of the recorded initiator bootstrap public keys can be selected based on the hash value for the initiator bootstrap public key received in the DPP authentication request. The responder can generate a responder ephemeral PKI key pair. The responder can conduct a first responder key exchange using the recorded responder bootstrap private key and the received initiator ephemeral public key in order to derive the key k1. The responder can conduct a second responder key exchange using the derived responder ephemeral private key and the received initiator ephemeral public key in order to derive a key k2. The responder can conduct a third key exchange using the selected initiator bootstrap public key and a combination of (i) the responder ephemeral private key and the responder bootstrap private key in order to derive a key ke. The responder can decrypt the first ciphertext using the key k1 and read the plaintext initiator nonce. The responder can calculate a responder authentication value using the initiator nonce and encrypt the value using the key ke, creating a second ciphertext. The responder can generate a responder nonce and encrypt both the responder nonce and the second ciphertext using the key k2, creating a third ciphertext. The responder can send a DPP authentication response to the initiator, where the response includes the third ciphertext and the derived responder ephemeral public key.

The initiator can receive the DPP authentication response from the responder. The initiator can send the third ciphertext and the responder ephemeral public key to the DPP server, along with an identity for the device. The DPP server can conduct a second initiator key exchange using the responder ephemeral public key and the initiator ephemeral private key in order to derive the key k2. The DPP server can conduct a third initiator key exchange using (i) a combination of the responder bootstrap public key and the responder ephemeral public key and (ii) the initiator bootstrap private key in order to derive the key ke. The combination of the responder bootstrap public key and the responder ephemeral public key can be calculated by an ECC point addition operation. The DPP server can decrypt the third ciphertext using the derived key k2. The DPP server can read the plaintext responder nonce and the second ciphertext. The DPP server can decrypt the second ciphertext using the derived key ke. The DPP server can read the plaintext responder authentication value from the second ciphertext. The DPP server can calculate the responder authentication value, and if the received responder authentication value from the second ciphertext matches the calculated responder authentication value, then the responder is authenticated.

The DPP server can calculate an initiator authentication value using the received responder nonce. The DPP server can encrypt the initiator authentication value using the key ke, thereby creating a fourth ciphertext. The DPP server can send the fourth ciphertext to the initiator. The initiator can send a DPP authentication confirm message to the responder with the fourth ciphertext. The responder can decrypt the fourth ciphertext using the derived key ke and read the plaintext initiator authentication value. The responder can calculate the same initiator authentication value, and if the received authentication value matches the calculated authentication value then the initiator is authenticated with the responder.

After the mutual authentication, the responder can take the roll of an enrollee and the initiator can take the roll of a configurator. The responder can generate an enrollee nonce and also a configuration attribute, where the configuration attribute describes WiFi capabilities for the device. The responder can create a fifth ciphertext by encrypting the enrollee nonce and the configuration attribute with the derived key ke. The responder can send a DPP configuration request to the initiator, where the DPP configuration request can include the fifth ciphertext. The initiator can send the fifth ciphertext to the DPP server.

The DPP server can receive the fifth ciphertext from the initiator and decrypt the fifth ciphertext using the derived key ke, in order to read the plaintext enrollee nonce and the configuration attribute. Using the selected primary network from above and the configuration attribute, the DPP server can process the selected network credentials using the received configuration attribute. The selected network credentials were described above and can be obtained by a DPP server using the networks available list from the initiator. The DPP server can encrypt the received enrollee nonce and the network credentials using the derived key ke, creating a sixth ciphertext. The DPP server can send the sixth ciphertext to the initiator. The initiator can forward the sixth ciphertext to the responder in a DPP configuration response message.

The responder can receive the DPP configuration response message and decrypt the sixth ciphertext using the derived key ke in order to read the plaintext network credentials. The responder can pass the network credentials to the device, which can apply the credentials with the WiFi radio for the device. The device can subsequently connect with the network access point using the received network credentials. The network access point can provide connectivity to an IP network for the device. The device can establish a secure session with the DPP server using the network access point. The DPP server can derive a new initiator bootstrap PKI key pair and send the new initiator bootstrap public key to the device via the secure session. The device can record the new initiator bootstrap public key for use in a subsequent DPP session, if necessary, for a later time. The DPP server can send the device database the new initiator bootstrap PKI keys along with an identity for the new initiator bootstrap PKI keys comprising a sequence number. The DPP server and the device can record that the DPP session is successfully completed.

These as well as other aspects and advantages will become apparent to those of ordinary skill in the art by reading the following detailed description, with reference where appropriate to the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

Various exemplary embodiments are described herein with reference to the following drawings, wherein like numerals denote like entities.

FIG. 1a is a graphical illustration of an exemplary system, where an initiator communicates with a network and a responder in a device, in order to conduct a device provisioning protocol, in accordance with exemplary embodiments;

FIG. 1b is a graphical illustration of a device provisioning protocol for authentication and configuration of a responder, in accordance with conventional technology;

FIG. 1c is a graphical illustration of a device provisioning protocol for (i) authentication and configuration of a responder and (ii) authentication of an initiator, in accordance with conventional technology;

FIG. 1d is a graphical illustration of hardware, firmware, and software components for an initiator, including an initiator configuration step, in accordance with exemplary embodiments;

FIG. 2a is a simplified message flow diagram illustrating an exemplary system with exemplary data sent and received by an initiator, in accordance with exemplary embodiments;

FIG. 2b is an illustration of an exemplary device database, with tables for a device database recording exemplary data, in accordance with exemplary embodiments;

FIG. 3a is a simplified message flow diagram illustrating an exemplary system with exemplary data sent and received by a device database, a DPP server, an initiator proxy, and a responder, in accordance with exemplary embodiments;

FIG. 3b is an illustration of an exemplary server database, with tables for a server database recording exemplary data, in accordance with exemplary embodiments;

FIG. 4a is a flow chart illustrating exemplary steps for conducting a key exchange using PKI keys in order to derive a shared secret key, and for using the derived shared secret key to encrypt and decrypt data, in accordance with exemplary embodiments;

FIG. 4b is a flow chart illustrating exemplary steps for conducting a key exchange using PKI keys in order to derive a shared secret key, and for using the derived shared secret key to encrypt and decrypt data, in accordance with exemplary embodiments;

FIG. 4c is a flow chart illustrating exemplary steps for conducting a key exchange using PKI keys in order to derive a shared secret key, and for using the derived shared secret key to encrypt and decrypt data, in accordance with exemplary embodiments;

FIG. 5a is a simplified message flow diagram illustrating an exemplary system with exemplary data sent and received by a device database, a DPP server, an initiator proxy, and a responder, in accordance with exemplary embodiments;

FIG. 5b is a simplified message flow diagram illustrating an exemplary system with exemplary data sent and received by a device database, a DPP server, an initiator proxy, and a responder, in accordance with exemplary embodiments;

FIG. 6a is a simplified message flow diagram illustrating an exemplary system with exemplary data sent and received by a device database, a DPP server, a WiFi access point, and a device, in accordance with exemplary embodiments;

FIG. 6b is a graphical illustration of an exemplary system, where a responder records a plurality of initiator bootstrap public keys and the responder selects and uses an initiator bootstrap public key, in accordance with exemplary embodiments;

FIG. 7 is a graphical illustration of an exemplary system, where an access point conducts a configuration step for a device using a hosted device provisioning protocol, in accordance with exemplary embodiments; and,

FIG. 8 is a graphical illustration of an exemplary system, where an access point operates as an initiator for a device with a responder, in order transfer a set of network credentials to the device, in accordance with exemplary embodiments.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS OF THE INVENTION

FIG. 1a

FIG. 1a is a graphical illustration of an exemplary system, where an initiator communicates with a network and a responder in a device, in order to conduct a device provisioning protocol, in accordance with exemplary embodiments. The system 100 can include an initiator 102, a device 101, a network 107, and a discovery server 110. In exemplary embodiments, initiator 102 can communicate with network 107 and discovery server 110 through an access network 112, which provides communication to an Internet Protocol (IP) network 113. Initiator 102 can also be associated with an initiator user 102 u, which could be an end user, group of people, or business entity controlling or operating initiator 102. Initiator 102 could comprise a computing device that operates a radio and processor in order to transmit and receive wireless data. Additional details for electrical and hardware components within an initiator 102 are provided below in FIG. 1d . In some exemplary embodiments, initiator 102 could comprise a mobile phone or “smart phone” with an operating system such as Android® from Google® or IOS® from Apple®. In other exemplary embodiments, an initiator 102 could comprise a portable device, such as laptop, tablet, wearable device such as a smart watch, a USB device including a “USB memory stick”, etc. In exemplary embodiments, the function of initiator 102 could be combined with network WiFi access point 105 (such as depicted and described in connection with FIG. 8 below), and a separate physical unit for initiator 102 could be omitted for some embodiments of a system 100

Initiator 102 could operate as an initiator proxy 102 and send and receive messages with device 101 according to a device provisioning protocol (DPP) 191 as specified in the “Device Provisioning Protocol Specification version 1.0” from the WiFi Alliance™ (DPPv1.0), which is hereby incorporated by reference in its entirety. Subsequent and related versions of a DPP 191 could be supported as well by device 101 and an initiator 102. A summary of the message flows between initiator 102 and device 101 according to the DPP 191 are depicted and described in connection with FIG. 1b and FIG. 1c below, as well as subsequent figures herein. The message flows for a DPP 191 between initiator 102 and device 101 could be via a WiFi data link 192, where the WiFi data link 192 can use a configuration 130 (not shown in FIG. 1a , but shown in FIG. 1d below). Initiator proxy 102 could operate a camera 102 z and a WiFi radio as depicted, where the WiFi radio could record a medium access control (MAC) address MAC.I 102 n. MAC.I 102 n for initiator 102 could comprise a string of octets to identify initiator 102 with any of a WiFi access point 105, device 101, network 107, and discovery server 110. In order to acquire the data to function as an initiator according to a DPP 191 and/or DPPv1.0, initiator 102 in FIG. 1a can communicate and transmit/receive data from network 107 via access network 112. Additional details regarding the electrical components within an initiator 102 are depicted and described in connection with FIG. 1d below.

Embodiments of the present invention contemplate both (i) some of the functionality of an initiator in the DPP specification DPPv1.0 operates within initiator proxy 102 depicted in FIG. 1a , and (ii) other functionality of an initiator according to the DPP protocol in DPPv1.0 resides within network 107. Depictions and descriptions below in the present invention may utilize the term “initiator 102”, which can also comprise an “initiator proxy 102” depicted in FIG. 1a . In other words, (x) from the perspective of device 101, initiator proxy 102 can operate as an initiator according to the DPP Specification DPPv1.0, but (y) in the present invention some of the functionality and data for an initiator as contemplated by the DPP Specification remains in the network 107. This configuration of operating an initiator proxy 102 in a system 100 (along with proper operation of a network 107) can address and solve the needs in the art described above. Initiator proxy 102 can communicate with network 107 via access network 112.

Access network 112 could be either a Local Area Network (LAN) or a Wide Area Network (WAN), or potentially a combination of both. Access network 112 could comprise a network supporting either IEEE 802.11 (WiFi) standards. Initiator 102 and access network 112 could also utilize a variety of WAN wireless technologies to communicate, including Low Power Wide Area (LPWA) technology, 3rd Generation Partnership Project (3GPP) technology such as, but not limited to, 3G, 4G Long-Term Evolution (LTE), or 4G LTE Advanced, NarrowBand-Internet of Things (NB-IoT), LTE Cat M, proposed 5G networks, and other examples exist as well. A wired initiator 102 can connect to the access network 112 via a wired connection such as, but not limited to, an Ethernet, a fiber optic, or a Universal Serial Bus (USB) connection (not shown). In some exemplary embodiments, access network 112 for initiator proxy 102 can be provided by access point 105, where initiator proxy 102 may also record a compatible set of network credentials 109.

IP network 113 could be a public or private network supporting Internet Engineering Task Force (IETF) standards such as, but not limited to, such as, RFC 786 (User Datagram Protocol), RFC 793 (Transmission Control Protocol), and related protocols including IPv6 or IPv4. A public IP network 113 could utilize globally routable IP addresses, and a private IP network 113 could utilize private IP addresses which could also be referred to as an Intranet. Other possibilities for IP Network 113 exist as well without departing from the scope of the invention. Although not depicted in FIG. 1a , elements within a system 100 could each operate or be associated with a firewall, such that packets from IP network 113 are filtered or restricted in order to secure the communication between the nodes.

Device 101 can comprise a computing device with a WiFi radio for transmitting and receiving data such as via WiFi data link 192. Device 101 can include a tag 101 c and a WiFi radio 101 h. WiFi radio 101 h can operate with a medium access control (MAC) address MAC.R 101 d. The tag 101 c can record an identity for the device 101, which can be ID-token.device 206 as described in FIG. 2a below. For the system depicted in FIG. 1a , device 101 operating a responder 101 x can have a roll of an enrollee, and initiator proxy 102 can operate with a roll of a configurator. Device 101 can operate a responder 101 x and, after a configuration step 106, also operate a set of network WiFi credentials 109 that are compatible with an access point 105. Device 101 could be powered via any of (i) traditional “wall power” potentially with an AD/DC adapter, (ii) a battery which may be periodically recharged or replaced, (iii) power over a wired LAN connection such as “power over Ethernet”, and other possibilities exist as well. A device 101 can record a certificate cert.device 101 m, which can record a device public key, which can be associated with a device private key also recorded in device 101, but not shown in FIG. 1 a.

The responder 101 x in device 101 can record a responder bootstrap public key Br 101 a, a responder bootstrap private key br 101 b, an initiator bootstrap public key Bi 104 a, a set of cryptographic parameters 199 a for the PKI keys, and optionally (i) an initiator bootstrap public key sequence number 197, and (ii) a public key exchange protocol (PKEX) shared secret key 198. The responder 101 x in device 101 can comprise a process operated by a processor and recorded in memory for device 101. Although not depicted in FIG. 1a , a responder 101 x can also include a random number generator, a PKI key pair generation algorithm, a secure hash algorithm, an elliptic curve Diffie Hellman key exchange algorithm, a symmetric ciphering algorithm, and a digital signature algorithm.

A network 107 can operate an access point 105, where the access point operates with a set of credentials 109. The credentials 109 can include an identifier for the network such an SSID.network-AP 109 a, a pairwise master key (PMK) PMK.network-AP 109 b or a preshared key (PSK), a pairwise master key identifier (PMKID) (not shown), and also a configuration Config.network-AP 109 c. The access point can support wireless networking standards in the series of 802.11 standards, as well as subsequent or related versions of wireless networking standards. A network 107 can also operate a plurality of access points 105. In addition, access point 105 can comprise a plurality of different WiFi radios to collectively function as one access point 105, such as with “mesh” WiFi networks. Or, access point 105 can operate as a single WiFi router. The network 107 can include or be associated with a Device Provisioning Protocol (DPP) server 103, a device database 104, an authentication server 111, and a discovery server 110. Different servers within the network 107 can be connected using an Intranet, a virtual private network (VPN), Internet Protocol Security (IPSEC), or similar techniques to secure communication between the servers.

The network 107 can operate or communicate with the device database 104. The DPP server 103 in the network 107 can also communicate with the device database 104. The device database 104 can record information for a plurality of devices 101 before responders 101 x for the device 101 conducts the device provisioning protocol 191 with the initiator 102. The device database 104 can record the device identity 206, a responder identity 101 d, which could be in the form of a responder medium access control (MAC) address MAC.R 101 d, an initiator configuration 130, and a key table. The key table in a device database 104 can record for each device 101 a responder bootstrap public key Br 101 a, an initiator bootstrap public key Bi 104 a, and an initiator bootstrap private key bi 104 b. Recorded data within a device database 104 can be obtained by a network from either (i) upon manufacturing from a device manufacturer, or (ii) before distribution of a device to the location of the network's access point. Some data in a device database 104 could also be acquired by an initiator 102 prior to the start of a DPP 191.

The DPP server 103 for a network 107 can operate a server database 103 a, where the server database 103 a records information for a plurality of devices 101 connecting with the network 107. The server database 103 a can record a medium access control (MAC) address MAC.R 101 d in the device 101 a set of cryptographic parameters 199 a for each device, an initiator bootstrap private key bi 104 b, the initiator bootstrap public key Bi 104 a, and the responder bootstrap public key Br 101 a. A server database can also record additional data for responders 101 x in devices 101, as depicted and described in connection with FIG. 3b below. Depending on an initiator mode 306 a in FIG. 3 below, not all PKI keys and secret shared keys may be recorded in the server database 103 a. The DPP server 103 can also include a set cryptographic algorithms, where the cryptographic algorithms can include a random number generator, a PKI key pair generation algorithm, a secure hash algorithm, an elliptic curve Diffie Hellman key exchange algorithm, and a symmetric ciphering algorithm. The cryptographic algorithms within a DPP server 103 can be compatible with the equivalent set of cryptographic algorithms in the responder 101 x and also the initiator proxy 102.

Note that the security of communications between a device 101 and an access point 105 may generally depend on the security of a configuration step 106, which in turn may rely on a device provisioning protocol 191. Further, a manufactured device 101 may not have the credentials 109 or configuration in order to communicate with an access point 105 without successfully completing a DPP 191 and a configuration step 106 in order for device 101 to secure receive and use network credentials 109. After a DPP 191 and a configuration step 106 described in the present invention and in multiple figures below, device 101 can communicate with access point 105 using credentials 109.

FIG. 1b

FIG. 1b is a graphical illustration of a device provisioning protocol for authentication and configuration of a responder, in accordance with conventional technology. FIG. 1b depicts a summary of the WiFi Device Provisioning Protocol (DPP) specification, version 1.0 which was published on Apr. 9, 2018. The summary depicted in FIG. 1b highlights recorded bootstrap PKI keys, derived ephemeral PKI keys, and messages transmitted and received between an initiator 102* and a responder 101 x. The use of keys and messages for a DPP 191 can accomplish both (i) authenticating the responder 101 x and (ii) transfer a configuration object to responder 101 x, where the configuration object could comprise a set of network access credentials 109 from FIG. 1a . Initiator 102* is depicted with a “*” and has several differences than an initiator proxy 102 depicted in FIG. 1a and subsequent figures below, although some functionality is shared. Both initiator 102* and initiator proxy 102 (from FIG. 1a and other Figures below) can send and receive the full and complete set of a DPP messages for a Device Provisioning Protocol 191.

In other words, initiator 102* and an initiator proxy 102 can send equivalent messages such that a responder 101 x would process the messages in the same manner and would not normally be able to detect to discern whether a initiator proxy 102* or an initiator 102 was transmitting and receiving messages for the Device Provisioning Protocol 191. In the present invention, initiatory proxy 102* can operate as an initiator according to the DPP Specification 1.0. Initiator proxy 102* or an initiator 102 can be (x) a process, program, firmware, or software application operating in a computing device with a WiFi compatible radio, in order to (y) communicate with a responder 101 x via a WiFi data link 192 (in FIG. 1a ). Exemplary additional configurations for an initiator 102 and a responder 101 x within computing devices is depicted and described in connection with FIGS. 7 and 8 below, and other possibilities exist as well without departing from the scope of the present invention.

Other differences between an initiator 102* and an initiator proxy 102 can exist in the present invention. For a system 100 with an initiator proxy 102 in FIG. 1a and Figures below, the recordation of PKI keys, PKI key derivation, and cryptographic processes such as symmetric encryption and decryption can be distributed between an initiator proxy 102 and a DPP server 103, while an initiator 102* can internally record the keys necessary for symmetric key exchange, key derivation, and symmetric encryption and decryption. The distributed storage and operation with PKI keys for a system that includes an initiator proxy 102 is depicted and described in connection with FIG. 3, FIG. 5a , FIG. 5b , and FIG. 6a below. Additional details for internal components, memory structures, values, and operation of an initiator proxy 102 in order to provide equivalent functionality as initiator 102* for a responder 101 x are described in Figures below.

Initiator 102* can record bootstrap keys, ephemeral keys, and derive symmetric encryption keys in order to authenticate the responder 101 x and transfer the network access credentials 109 according to a Device Provisioning Protocol 191. For a system with responder authentication 141, an initiator proxy 102* can record a medium access control (MAC) address MAC.I 102 n. MAC.I 102 n can be associated with a WiFi radio within Initiator proxy 102* and comprise a string of octets in order to uniquely identify initiator 102* within a wireless network. With current, convention technology, MAC.I 102 n can comprise a string of 6 octets, although other possibilities exist as well for a MAC.I 102 n. Initiator 102* can also operate a key pair generation function 102 y in order to derive ephemeral PKI keys such as an initiator ephemeral public key Pi 102 a and an initiator ephemeral private key pi 102 b. As contemplated herein, an ephemeral PKI key can also be referred to as a “protocol” key. In other words, key Pi 102 a can be referred to as initiator protocol public key Pi 102 a or initiator ephemeral public key Pi 102 a, which can both represent the same numeric value, number, or sequence of digits.

Although not depicted in FIG. 1b , a key pair generation function 102 y could use (i) a random number generator in order to derive the PKI private key and (ii) a selected set of cryptographic parameters 199 a (depicted in FIG. 2b below) in order to specify an elliptic curve cryptography (ECC) curve name, key length, key formatting, etc. As contemplated herein, the algorithms used with ECC PKI keys in the present invention can be compatible and substantially conform with ECC algorithms and keys as specified in (i) the IETF Request for Comments (RFC) 6090 titled “Fundamental Elliptic Curve Cryptography Algorithms”, and (ii) IETF RFC 5915 titled “Elliptic Curve Private Key Structure”, and also subsequent and related versions of these standards. With a random number generated by initiator 102* or an initiator proxy 102, a key pair generation function 102 y, a derived ephemeral initiator private key pi 102 b can be used to derive a corresponding ephemeral initiator public key Pi 102 a. The two derived PKI keys can be used in conjunction for subsequent operations such as an Elliptic Curve Diffie Hellman key exchange. As contemplated in the present invention, the use of a capital letter as the first character for a PKI key can represent a public key, the use of a lower case letter as the first character for a PKI key can represent a private key, and the second letter for a PKI key can represent the entity the key is associated with or belongs to. Further, the letter “B” or “b” as the first character for a PKI key can represent a recorded bootstrap key, which could be static or relatively static over the lifetime of a responder or initiator, and the letter “P” or “p” the first character for a PKI key can represent an ephemeral key.

Responder 101 x in FIG. 1b , FIG. 1c , and other Figures below can include functionality to operate as a responder according to the DPP Specification version 1.0. As depicted in FIG. 1a , responder 101 x could operate within a device 101, although other possibilities exist as well for the location or equipment operating a responder 101 x without departing from the scope of the present invention. For a DPP 191, a responder 101 x can record a responder bootstrap public key Br 101 a, a responder bootstrap private key br 101 b, a MAC address MAC.R 101 d, and also operate a key pair generation algorithm 101 y. Responder bootstrap public key Br 101 a and responder bootstrap private key br 101 b could comprise an ECC key pair selected and formatted according to a selected set of parameters 199 a (in FIG. 1a above).

Ephemeral bootstrap PKI keys for responder 101 x could also be formatted and selected with a compatible set of cryptographic parameters 199 a as Pr 101 e and pr 101 f. Bootstrap PKI keys for responder 101 x could be recorded in responder 101 x or nonvolatile memory for a device 101 operating a responder 101 x. The bootstrap PKI keys could be recorded in responder 101 x during manufacturing or a configuration of responder 101 x before delivery of a device 101 to the location of an access point 105 from FIG. 1a . MAC address MAC.R 101 d can comprise an identity of responder 101 x or a device 101 on a WiFi network, and can be similar to MAC.I 102 d for an initiator 102* as described above. Key pair generation algorithm 101 y can be equivalent to key pair generation algorithm 102 y described above for initiator proxy 102*. Key pair generation algorithm 101 y can derive ephemeral PKI keys for responder 101 x comprising public key Pr 101 e and private key pr 101 f, which could also be derived using a compatible set of parameters 199 a for Br 101 a, br 101 b, Pi 102 a and pi 102 b.

An initiator 102* and a responder 101 x can conduct a Device Provisioning Protocol (DPP) 191. Again, as contemplated herein, an exemplary Device Provisioning Protocol 191 according to conventional technology could comprise the “Device Provisioning Protocol Specification” version 1.0 as published by the WiFi Alliance™. In message 121, an initiator 102* can receive the bootstrap public key Br 101 a for responder 101 x. The “out of band” transfer of Br 101 a in message 121 could comprise several different possible methods for initiator 102* to receive Br 101 a, which are also described in the DPP specification 1.0, such as via reading a QR code, reading a near-field communications tag, using a Bluetooth wireless connection to read Br 101 a from responder 101 x, and other possibilities exist as well. A DPP 191 also contemplates that associated information for responder 101 x could be transferred in message 121, such as a device identity for device 101, MAC.R 101 d, in addition to Br 101 a and possible parameters 199 a.

Initiator 102* can receive Br 101 a and derive PKI keys Pi 102 a and pi 102 b. Initiator 102* can conduct an Elliptic Curve Diffie Hellman key exchange algorithm 401 a as depicted and described below in key exchange 314 step for FIG. 4a in order to derive a shared secret key with responder 101 x. Initiator 102* can derive a random number comprising an initiator nonce and also determine a set of capabilities for the initiator, such as a configurator or enrollee as specified in DPP specification version 1.0. Initiator 102* can encrypt the initiator nonce and the initiator capabilities using the derived shared secret key as depicted and described in connection with an encryption step 315 in FIG. 4a below. Initiator 102* can send the derived public key Pi 102 a and a ciphertext with the encrypted data in a message 122. Although not depicted in FIG. 1b , initiator 102* can also send a hashed value of Br 101 a in message 122.

As specified in DPP specification version 1.0, message 122 could also include a hashed value for initiator bootstrap public key Bi 104 a, but for a responder authentication 141 the value of Bi 104 a may be omitted or may not be used (since responder 101 x may not record the corresponding initiator bootstrap public key Bi 104 a for a responder authentication 141 as depicted in FIG. 1b ). The hash algorithm on a bootstrap public key could comprise the SHA-256 hash algorithm according to IETF RFC 5754 titled “Using SHA2 Algorithms with Cryptographic Message Syntax”. Other hash algorithms could be used as well and specified in a selected set of cryptographic parameters 199 as depicted and described in connection with FIG. 2b below, such as SHA-3, SHA-384, etc. Message 122 can comprise a Device Provisioning Protocol Authentication Request according to DPP specification version 1.0. Additional details for a message 122 are provided in section 6.2.2 of DPP specification version 1.0.

Responder 101 x can receive message 122 and follow the steps for a responder according to the section 6.2.3 of DPP specification version 1.0, in order to generate a Device Provisioning Protocol Authentication Response, which could comprise message 123. Responder 101 x can conduct an Elliptic Curve Diffie Hellman key exchange algorithm 401 a as depicted and described below in key exchange 319 step for FIG. 4a in order to mutually derive a first shared secret key with initiator 102*. Responder 101 x could decrypt the initiator nonce and the initiator capabilities using the derived shared secret key as depicted and described in connection with an decryption step 320 in FIG. 4a below. Responder 101 x can use the key pair generation algorithm 101 y in order to derive an ephemeral responder public key Pr 101 e and a corresponding ephemeral private key pr 101 f. Responder 101 x can use the derived responder ephemeral private key pr 101 f and the received initiator ephemeral public key Pi 102 a in order to conduct a key exchange algorithm 314 b as depicted below in FIG. 4b and derive a second secret shared key. The first mutually derived symmetric key can comprise k1 and the second mutually derived symmetric key can comprise k2 according to the DPP specification version 1.0. Responder 101 x can derive a random number comprising a responder nonce and also determine a set of capabilities for the responder, such as a configurator or enrollee as specified in DPP specification version 1.0.

Responder 101 x could also generate a responder authentication value, which could comprise a hash value over the initiator nonce received in message 122 and the generated responder nonce. Responder 101 x could use the first shared secret key and the second shared secret key in order to derive a third shared secret key. Responder 101 x could encrypt the responder authentication value with the third shared secret key and also then include the encrypted responder authentication value with the responder nonce and responder capabilities in a ciphertext. The ciphertext could be encrypted with the second symmetric key, as depicted and described in connection with an encryption step 315 b in FIG. 4b below. Responder 101 x could send the derived ephemeral responder public key Pr 101 e and the ciphertext in a message 123.

Initiator 102* can receive message 123 and record the received ephemeral responder public key Pr 101 e. Initiator 102* can follow the steps in section 6.2.4 of DPP specification version 1.0 in order to process message 123 and confirm the authentication response from responder 101 x in message 123. Initiator 102* can mutually derive the second symmetric key using the received ephemeral responder public key Pr 101 e and the derived initiator ephemeral private key pi 102 b, using a key exchange algorithm 319 a as depicted in FIG. 4b . Initiator 102* can decrypt the ciphertext in message 123 using the second mutually derived symmetric key and a decryption step 320 b in FIG. 4b . Initiator 102* can derive a third symmetric key using at least the first mutually derived symmetric key and the second mutually derived symmetric key, Initiator 102* can use the third symmetric key to decrypt the encrypted responder authentication value using a decryption step 328 in FIG. 4c . Initiator 102* can calculate a value for the responder authentication, and if the calculated value for the responder authentication matches the received value for the responder authentication, then responder 101 x can be considered authenticated.

Although not depicted in FIG. 1b , after authenticating responder 101 x, initiator 102* can send an authentication confirm message, which could comprise a DPP authentication confirm message according to section 6.2.4 of the DPP specification version 1.0. The authentication confirm message can also include an initiator authentication value, which could be encrypted with the third symmetric key. The responder 101 x can receive the encrypted authentication confirm value and decrypt the value and also internally calculate the initiator authentication value. If the received initiator authentication value and the calculated authentication confirm values are equal, then the initiator is authenticated with the responder 101 x. Note that for a responder authentication 141 in FIG. 1b , the authentication of initiator 102* by responder 101 x is weak and only comprises verifying that initiator 102* records the bootstrap public key Br 101 a for responder 101 x. Also, although not depicted in FIG. 1b , responder 101 x could have the capabilities of an enrollee and send a DPP configuration request message to initiator 102*, which could take the role of a configurator. The DPP configuration request message can be according to section 6.3.2 of the DPP specification version 1.0, and can include an enrollee nonce, which could be a random number generated by the enrollee.

As depicted in FIG. 1b , initiator 102* can then send a configuration object in a ciphertext in message 124. Message 124 could comprise a DPP configuration response message according to section 6.3.3 of the DPP specification version 1.0. Initiator 102* can record the configuration object before sending message 124. In the present invention, the configuration object comprises the network credentials 109 depicted in FIG. 1a above. In other words, a configuration object can be configuration information for a device 101 with responder 101 x to use in order to connect with other devices via a wireless network. Configuration object could contain a list of network identifiers, device identifiers, RF band and channel information, configuration parameters, pre-share keys, PKI keys, names, passwords, group temporal keys, a shared secret 198 for a PKEX key exchange, etc. An exemplary list of possible values for a configuration object is depicted in table 14 of DPP specification version 1.0. In message 124, the network credentials 109 as a configuration object can be sent in a ciphertext using the third mutually derived symmetric key. As depicted in FIG. 1b , the ciphertext can include both the enrollee nonce and the network credentials. Responder 101 x can receive message 124, decrypt the ciphertext using the third mutually derived symmetric key, and record the network credentials 109. Device 101 can then apply the network credentials 109 and communicate with access point 105.

FIG. 1c

FIG. 1c is a graphical illustration of a device provisioning protocol for (i) authentication and configuration of a responder and (ii) authentication of an initiator, in accordance with conventional technology. FIG. 1c depicts a summary of the WiFi Device Provisioning Protocol (DPP) specification, version 1.0 which was published on Apr. 9, 2018, supporting a mutual authentication 142 by both initiator 102* and responder 101 x. The summary depicted in FIG. 1c highlights recorded bootstrap PKI keys, derived ephemeral PKI keys, and messages transmitted and received between an initiator 102* and a responder 101 x. Many of (i) the PKI keys for initiator 102* and responder 101 x, and (ii) the messages transmitted between the nodes are equivalent to those depicted and described in connection with FIG. 1b . This description of FIG. 1c herein focuses upon the differences from FIG. 1b in order for initiator 102* and responder 101 x to mutually authenticate.

In order to support a mutual authentication between initiator 102* and responder 101 x, initiator 102* can record an initiator bootstrap public key Bi 104 a and an initiator bootstrap private key bi 104 b. Although bootstrap public key Bi 104 a is depicted within initiator 102*, another entity besides initiator 102* could record the public key and make it available to other nodes such as a responder 101 x. As contemplated by the DPP Specification, the initiator bootstrap keys can be recorded with initiator 102* before conducting a DPP 191 authentication and configuration with responder 101 x. For example, the bootstrap PKI keys for the initiator could be recorded during manufacturing of the initiator, or loaded by an initiator user 102 u before conducting the depicted communications with responder 101 x. Bootstrap public keys for the initiator can support a selected set of cryptographic parameters 199 a, where the selected set of cryptographic parameters 199 a can match the parameters used by keys in responder 101 x. The DPP specification version 1.0 identifies the minimal set of cryptographic parameters in order to ensure compatibility, which can comprise the “set A” for a set of cryptographic parameters 199 depicted in FIG. 2b below.

In order to conduct a mutual authentication 142 in addition to the responder authentication 141 depicted in FIG. 1c , a responder 101 x should have access to the initiator bootstrap public key Bi 104 a and also record the initiator bootstrap public key Bi 104 a. In message 126, a responder 101 x can receive the initiator bootstrap public key Bi 104 a for initiator 102*. The “out of band” transfer of Bi 104 a in message 126 could comprise several different possible methods for responder 101 x to receive Bi 104 a, which are also described in the DPP specification 1.0, such as via reading a QR code, reading a near-field communications tag, using a Bluetooth wireless connection to read Bi 104 a from initiator 102*, and other possibilities exist as well, including using WiFi direct to first establish a “peer-to-peer” WiFi connection. A DPP 191 also contemplates that associated information for responder initiator 102* could be transferred in message 126, such as a device identity for initiator 102*, MAC.I 102 n, in addition to Bi 104 a. As depicted in FIG. 1c , the responder 101 x can also record the initiator bootstrap public key Bi 104 a, which can be used to authenticate the initiator 102* as described below.

For a mutual authentication 142 between device 102* and responder 101 x, the two nodes can exchange the same or equivalent messages as message 122 and message 123, which were also described above in connection with FIG. 1b . For mutual authentication, the third shared encryption key ke in DPP specification version 1.0 can be derived by a responder 101 x using a key exchange step 321 and the received initiator bootstrap public key Bi 104 a as depicted and described in connection with FIG. 4 c below. The use of public key Bi 104 a for the key exchange step 321 is described in section 6.2.3 of the DPP Specification version 1.0. The difference between the third mutually derived symmetric key ke for a mutual authentication 142 and a responder authentication 141 is the inclusion of initiator bootstrap public key Bi 104 a in the key exchange algorithm 401 c and key derivation function 402 c in FIG. 4c . The first mutually derived symmetric key can comprise k1 and the second mutually derived symmetric key can comprise k2. The third mutually derived symmetric key ke is used by the responder 101 x to encrypt the responder authentication value as depicted in an encryption step 322 in FIG. 4c . The responder authentication value can include a random number “initiator nonce” or 1-nonce from the initiator 102* in message 122. The responder authentication value can comprise the value “R-auth” in step 3 of section 6.2.3 of DPP specification version 1.0.

Initiator 102* can also mutually derive the third symmetric encryption key ke using the initiator bootstrap private key bi 104 b and key exchange step 327 depicted and described below in connection with FIG. 4c . Initiator 102* can subsequently decrypt the responder authentication value using the mutually derived third symmetric encryption key ke and a decryption step 328 as depicted and described in connection with FIG. 4c below. Initiator 102* can calculate the same value for the responder authentication value as described in section 6.2.4 of DPP specification version 1.0 If the received, decrypted responder authentication value matches the calculated responder authentication value, then the responder 101 x is authenticated. The initiator 102* can calculate an initiator authentication value using the received responder nonce in message 123 and encrypt the initiator authentication value using the mutually derived third symmetric key ke (from a key exchange step 327) and send the initiator authentication value in a message (not shown in FIG. 1c ). The responder 101 x can (i) decrypt the encrypted initiator authentication value using the third mutually derived symmetric key ke (from a key exchange step 321) and (ii) also calculate the initiator authentication value. If the calculated initiator authentication value by the responder 101 x matches the received, decrypted initiator authentication value then the initiator 102* is authenticated with the responder 101 x for a mutual authentication. The responder 101 x can then receive a configuration object in a message 124. Message 124 can include network credentials 109 encrypted with the third mutually derived symmetric key ke. The responder 101 x can pass the decrypted network credentials 109 to device 101, which can then apply the network credentials 109 in order to communicate with network access point 105.

FIG. 1 d

FIG. 1d is a graphical illustration of hardware, firmware, and software components for an initiator, including an initiator configuration step, in accordance with exemplary embodiments. FIG. 1d is illustrated to include several components that can be common within an initiator 102. Initiator 102 may consist of multiple electrical components in order to both (i) communicate with a network 107 and (ii) transmit and receive messages with a responder 101 x according to a device provisioning protocol 191. Initiator 102 can undergo an initiator configuration step 127 in order to configure the components in an initiator 102 to function as the enhanced initiator or initiator proxy as contemplated herein, such that an initiator bootstrap private key bi 104 b can remain recorded with a network 107 as depicted in FIG. 1a above. As mentioned above in FIGS. 1b and 1c , initiator 102 and initiator 102′ can be different than an initiator 102* since neither initiator 102 nor initiator 102′ may not record or operate with the initiator bootstrap private key bi 104 b.

In exemplary embodiments and as depicted in FIG. 1d , initiator 102 can include an initiator identity 102 i, a processor 102 c (depicted as “CPU 102 c”), random access memory (RAM) 102 d, an operating system (OS) 102 e, storage memory 102 f (depicted as “nonvolatile memory 102 f”), a WiFi radio 102 w, a system bus 102 j, and a wireless wide area network (WAN) radio 102 h. FIG. 1d depicts initiator 102 as both a default initiator 102 and a configured initiator 102′. The default initiator 102 can comprise the state of initiator 102 before a configuration step 127 and initiator 102′ can comprise the state of initiator 102′ after the configuration step 127. As depicted, both a default initiator 102 and a configured initiator 102′ can contain the same hardware components such as CPU 102 c, RAM 102 d, etc., where a difference between initiator 102 and 102′ can be in both (i) data recorded in storage memory 102 f and (ii) the configuration of WiFi radio 102 w.

Initiator identity 102 i could comprise a preferably unique alpha-numeric or hexadecimal identifier for initiator 102, such as an Ethernet MAC address, an International Mobile Equipment Identity (IMEI), an owner interface identifier in an IPv6 network, a serial number, or other sequence of digits to uniquely identify each of the many different possible units for initiator 102. A system 100 depicted in FIG. 1a could operate with a plurality of different initiators 102. Initiator identity 102 i can preferably be recorded in a non-volatile memory or written directly to hardware in initiator 102 by (i) an initiator manufacturer upon device manufacturing, or (ii) a pre-configuration step for initiator 102, The CPU 102 c can comprise a general purpose processor appropriate for typically low power consumption requirements for a initiator 102, and may also function as a microcontroller. CPU 102 c can comprise a processor for initiator 102 such as an ARM® based processor or an Intel® based processor such as belonging to the Atom or MIPS family of processors, and other possibilities exist as well. CPU 102 c can utilize bus 102 j to fetch instructions from RAM 102 d and operate on the instruction. CPU 102 c can include components such as registers, accumulators, and logic elements to add, subtract, multiply, and divide numerical values and record the results in RAM 102 d or storage memory 102 f, and also write the values to an external interface such as WiFi radio 102 w.

RAM 102 d may comprise a random access memory for initiator 102. RAM 102 d can be a volatile memory providing rapid read/write memory access to CPU 102 c. RAM 102 d could be located on a separate integrated circuit in initiator 102 or located within CPU 102 c. The RAM 102 d can include data recorded in initiator 102′ for the operation when collecting and communicating DPP messages 122 through 124 with responder 101 x depicted in FIG. 1b and FIG. 1c above. The system bus 102 j may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures including a data bus. System bus 102 j connects components within initiator 102 as illustrated in FIG. 1d , such as transferring electrical signals between the components illustrated. Initiator 102 can include multiple different versions of bus 102 j to connect different components, including a first memory bus 102 j between CPU 102 c and RAM 102 d, and a second system bus 102 j between CPU 102 c and WiFi radio 102 w, which could be an I2C bus, an SPI bus, PCIe bus, or similar data busses.

The operating system (OS) 102 e can include Internet protocol stacks such as a User Datagram Protocol (UDP) stack, Transmission Control Protocol (TCP) stack, a domain name system (DNS) stack, a TLS stack, a datagram transport layer security (DTLS) stack, etc. The operating system 101 e may include timers and schedulers for managing the access of software to hardware resources within initiator 102, including CPU 102 c and WiFi radio 102 w. The operating system shown of 102 e can be appropriate for a low-power device with more limited memory and CPU resources (compared to a server such as DPP server 103, discovery server 110, etc.). Example operating systems 102 e for a initiator 102 includes Linux, Android® from Google®, IOS from Apple®, Windows® 10 IoT Core, or Open AT® from Sierra Wireless®. Additional example operating systems 102 e for an initiator 102 include eCos, uC/OS, LiteOs, Contiki, OpenWRT, Raspbian, and other possibilities exist as well without departing from the scope of the present invention. Although depicted as a separate element within initiator 102 in FIG. 1d , OS 102 e may reside in RAM 102 d and/or storage memory 102 f during operation of initiator 102.

Storage memory 102 f (or “nonvolatile memory 102 f”) within initiator 102 can comprise a nonvolatile memory for storage of data when initiator 102 is powered off. Memory 102 f may be a NAND flash memory or a NOR flash memory, and other possibilities exist as well without departing from the scope of the present invention. Memory 102 f can record firmware for initiator 102. Memory 102 f can record long-term and non-volatile storage of data or files for initiator 102. In an exemplary embodiment, OS 102 e is recorded in memory 102 f when initiator 102 is powered off, and portions of memory 102 f are copied by CPU 102 c into RAM 102 d when initiator 102 powers on. Memory 102 f (i) can be integrated with CPU 102 c into a single integrated circuit (potentially as a “system on a chip”), or (ii) operate as a separate integrated circuit or a removable card or device, such as a removable SD card. Memory 101 f may also be referred to as “device storage” and can include exemplary file systems of FAT16, FAT 32, NTFS, ext3, ext4, UDF, or similar file systems.

As depicted in FIG. 1d , nonvolatile memory 101 f for a default initiator 102 may also contain a secret key SK0.initiator 102 s, a certificate cert0.initiator 102 m, and a certificate cert.CA.root 102 r. A secret key SK0.initiator 102 s in a nonvolatile memory 102 f could comprise the private key for a PKI key pair, where the corresponding public key could be recorded in a certificate cert0.initiator 102 m. A secret key SK0.initiator 102 s and the corresponding public key in a certificate 102 m could comprise values to use with asymmetric public key infrastructure (PKI) cryptography, and could utilize exemplary algorithms based on either Rivest Shamir Adleman (RSA) or elliptic curve cryptography (ECC). For use of ECC algorithms, parameters within certificate 102 m (and other certificates herein) can specify elliptic curve names (e.g. NIST P-256, sect283k1, sect283r1, sect409k1, sect409r1, etc.). The same or equivalent ECC parameters can be used with bootstrap PKI keys in the form of parameters 199 a. Further, elliptic curves that do not depend on parameters specified by NIST could be utilized as well for keys recorded in nonvolatile memory 101 f, such as Curve22519, curve448, or FourQ, etc. For use of RSA algorithms, parameters within certificate 102 m can specify a modulus and other associated values for using an RSA PKI key pair. For either asymmetric algorithms RSA or ECC for a PKI key pair herein, parameters in a certificate such as cert0.initiator 102 m can specify key lengths, a duration for key validity, uses of the PKI key pair such as for key derivation or signatures, encoding rules, message digest algorithms, etc. Parameters in certificate 102 m (and other certificates herein) may also include identifying information associated with the PKI key pair such as a sequence number, a serial number, a certificate revocation list or URL, a domain name of the server associated with the PKI key pair.

Certificate cert.CA.root 102 r can comprise a root certificate for initiator 102 to authenticate a server certificate received from DPP server 103, authentication server 111, or discovery server 110, where these servers are depicted and described in connection with FIG. 1a , FIG. 2a , and FIG. 3, and other Figures below. Certificate cert.CA.root 102 r can also be used to authenticate other servers or nodes or access points in a network 107 as well. After authenticating a server certificate received with cert.CA.root 102 r, initiator 102 can conduct additional authentication steps contemplated by secure protocol standards such as Transport Layer Security (TLS), Datagram Transport Layer Security (DTLS), IPSec, etc. Root certificate cert.CA root 102 r can comprise the list or a subset of the list of included root certificates from the Mozilla Foundation with Mozilla projects, where the aggregate list of community approved root certificates and associated parameters is in the widely distributed file certdata.txt from the Mozilla web site.

Initiator 102 and 102′ can include a WiFi radio 102 w to communicate wirelessly with networks such as AP 105, access network 112, and device 101 depicted and described in FIG. 1a above, including via WiFi data link 192. In exemplary embodiments, access network 112 can comprise all available wireless WAN and LAN networks in the range of initiator 102, such as the exemplary networks listed in a networks available list 304 c depicted in FIG. 3a below. WiFi access point 105 can comprise a member of the set of all access networks 112 for initiator 102. WiFi radio 102 w could connect with an antenna in order to transmit and receive radio frequency signals.

As depicted in FIG. 1d , a WiFi radio 102 w in a configured initiator 102′ can record or operate with an initiator configuration 130. The values for initiator configuration 130 could also specify a version of the 802.11 standards to utilize, such as, but not limited to, 802.11n, 802.11ac, 802.11ah, 802.11ax, or related and subsequent versions of these standards. The initiator configuration 130 can be compatible with the configuration of a target WiFi device 101 with responder 101 x. The initiator configuration 130 could be obtained during an authentication step for initiator 102, such as depicted below in FIG. 2a , although initiator configuration 130 could be obtained at other times as well, such as possibly directly from reading a tag 101 c on device 101 or from a DPP server 103. Initiator configuration 130 could also be obtained from a message 121 depicted and described in connection with FIG. 1b and FIG. 1 c.

The initiator configuration 130 can include a device identity ID-token.device 206 (or alternatively ID.device 101 i), a MAC address for responder 101 x comprising MAC.R 101 d, a device operating class 130 a which can be selected from the plurality of potential global WiFi operating classes in table E-4 of IEEE standard specification 802.11ac, which is incorporated by reference herein. Recording a device identity 206 and MAC.R 101 d with initiator configuration 130 can be used by an initiator 102′ to select which set of initiator configuration 130 is associated with which devices 101. In other words, the present invention contemplates that an initiator 102′ communicates with multiple responders 101 x either concurrently, or over time. MAC.R 101 d can be required for initiator 102′ to send message DDP Authentication Request 122 as a unicast frame to responder 101 x, such that a device 101 with responder 101 x could receive message 122 by listening in a unicast mode for messages that include the device's MAC.R 101 d. The device operating class 130 could specify if device 101 operates at 2.4 Ghz, 5 Ghz, UFH (ultra-high frequency), etc.

The initiator configuration 130 can also include Device DPP Channel Authentication List 130 b, which can comprise a list of channels for initiator 102′ to send DPP authentication request 122 messages in order to establish initial connectivity with device 101 and responder 101 x. In exemplary embodiments, initiator configuration 130 for initiator 102′ provides data for an initiator 102′ to send data such as message 122 to responder 101 x, where responder 101 x may operate with different possible values for operating classes, listening channels, or MAC addresses MAC.R 101 d used by a particular responder 101 x in a particular device 101. In other words, without initiator configuration 130, an initiator 102′ may not normally be able to (i) select the proper WiFi operating channel, and (ii) send unicast data to responder 101 x. For embodiments where a Device DPP Channel Authentication List 130 b is unknown or not available, then initiator 102′ can periodically send DPP 122 messages over time on all available channels for a radio 102 w. Note that in exemplary embodiments, the initiator configuration 130 is recorded in a configured device 102′ with a WiFi radio 102 w communicating with device 101 and responder 101 x.

WiFi radio 102 w can include standard radio components such as RF filters, RF amplifiers, a clock, and phased loop logic (PLL). WiFi radio 102 w can support protocols and specifications according to the IEEE 802.11 family of standards. For example, if WiFi radio 102 w operates according to 802.11n standards, WiFi radio 102 w could operate at a radio frequency of 2.4 or 5 Ghz. In other embodiments where WiFi radio 102 w supports 802.11ac standards, then WiFi radio 102 w could also support radio frequencies of 0.054 through 0.79 Ghz in order to operate in “white space” spectrum. Other possibilities exist as well for WiFi radio to support wireless LAN standards or 802.11 standards and radio frequencies, without departing from the scope of the present invention. WiFi radio 102 w can access a nonvolatile memory 102 f in order to record the depicted configuration values of user configuration 131 where the nonvolatile memory could be within WiFi radio 102 w, or WiFi radio 102 w could access memory 102 f via bus 102 j in order to record and read the values. User configuration 131 can include credentials for an initiator 102 with initiator user 102 u, such as a list of SSIDs, identities, and passwords for operation of the initiator 102 with other networks besides network AP 105. For example, user configuration 131 may include a user operating class 131 a, which could correspond to the WiFi global operating class, bands, and channel numbers for initiator 102 to communicate with other WiFi nodes besides device 101, such as a different access point for user 102 u than access point 105

As depicted in FIG. 1d , a WiFi configured initiator 102′ can include configuration data resulting from a configuration step 127, in order for initiator 102′ to conduct a device provisioning protocol 191 with a device 101. A nonvolatile memory 102 f for a WiFi configured initiator 102′ can include data recorded for a default initiator 102, with the addition of recording a DPP application 102 g and configuration parameters 151, and optionally shared secret key 198 for a PKEX key exchange, if bootstrap public keys between configured initiator 102′ and device 101 are shared “in band” (e.g. via a radio link 192). The contents and source of DPP application 102 g and configuration parameters 151 for initiator 102 will be further described in connection with FIG. 2a below, where the steps and message flows in FIG. 2a below also conclude with initiator 102 completing a configuration step 127 in order to transition to a configured initiator 102′.

Initiator 102 may also optionally include user interface 102 k which may include one or more devices for receiving inputs and/or one or more devices for conveying outputs. User interfaces are known in the art and may be simple for many devices such as a few LED lights or and LCD display, and thus user interfaces are not described in detail here. User interface 102 k could comprise a touch screen if initiator 102 has sophisticated interaction with user 102 u. Initiator 102 can optionally omit a user interface 102 k, if no user input or display is required for conducting a device provisioning protocol 191 between initiator 102′ and device 101 with responder 101 x. Although not depicted in FIG. 1d , initiator 102 and configured initiator 102′ can include other components to support operation, such as a clock, power source or connection, antennas, etc. Other possibilities exist as well without departing from the scope of the present invention.

In exemplary embodiments, initiator 102 can also include a wide area network radio 102 h. WAN radio 102 h could support 4G LTE, 5G, and subsequent or related standards for use of devices with licensed radio spectrum operating potentially as public land mobile networks (PLMN). WAN radio 102 h could also support wide area narrow-band technologies such as NB-IoT or LPWAN, and other examples exist as well. WAN radio 101 h can provide connectivity through an access network 112 in order for initiator 102 or configured initiator 102′ to communicate with network 107, DPP server 103, and discovery server 110 as depicted and described in connection with FIG. 1a . In other words, in the present invention, WAN radio 102 h can provide a radio connection to an access network 112, which provides connectivity to an IP network 113 in order for initiator 102 and configured initiator 102′ to communicate with remote servers in order to conduct a device provisioning protocol as contemplated herein. WAN radio 102 h can include a MAC address MAC.N 102 q, although the use of a MAC address for WAN radio 102 h is not required. Further, WAN radio 102 h can be omitted or not utilized by an initiator 102′, in embodiments where initiator 102′ can communicate with network 107 via network AP 105. For these embodiments, WAN radio 102 h or WiFi radio 102 w for initiator 102′ can also record or utilize a first set of network credentials 109 in order to obtain access to network 107 while conducting a device provisioning protocol and the configuration object in message 124 from FIG. 1b and FIG. 1c can include a second set of network credentials 109 for responder 101 x. Other possibilities exist as well for a configured initiator 102′ to have access to network 107 while conducting a device provisioning protocol 191 without departing from the scope of the present invention.

Although not depicted in FIG. 1d , the various servers shown above in FIG. 1a such as DPP server 103, authentication server 111, and discovery server 110 and other servers as well can include equivalent internal electrical components depicted for an initiator 102 in order to operate as servers. The servers in FIG. 1a could include a processor similar to CPU 102 c, with primary differences for the processor in a server being increased speed, increased memory cache, an increased number and size of registers, with the use of a 64 bits for datapath widths, integer sizes, and memory address widths, etc., In contrast, an exemplary 32 bit datapaths could be used for CPU 102 c in initiator 102 (although CPU 102 c could also use 64 bit wide datapath widths if initiator 102 comprises a mobile phone such as a smart phone). For embodiments where initiator 102 comprises a home WiFi router, then a CPU 102 c in initiator 102 could comprise an exemplary 32 bit processor, although other possibilities exist as well. A processor for a DPP server 103 similar to CPU 102 c could include a hardware-based encryption accelerator function, in order to conduct and speed symmetric ciphering operations such as with a symmetric encryption algorithm 405 a and a symmetric decryption algorithm 405 b depicted in FIGS. 4a, 4b , and 4 c.

Similarly, RAM in a server could be a RAM similar to RAM 102 d in initiator 102, except the RAM in a server could have more memory cells such as supporting exemplary values greater than an exemplary 8 gigabytes, while RAM 102 d in initiator 102 could support fewer memory cells such as less than an exemplary 4 gigabtyes. Non-volatile memory for storage in a server in FIG. 1a could comprise disk storage, “solid state drives” (SSDs) or “storage area networks” (SAN) for a server. Instead of a radio 102 w, in exemplary embodiments, a server in FIG. 1a could use a physical, wired LAN interface such as a high-speed Ethernet or fiber optic connection. The LAN interface for a server such as DPP server 103 could send and receive messages and data with initiator 102′ as depicted in FIG. 3a , FIG. 5a , FIG. 5b , and subsequent Figures below. The LAN interface for a server such as DPP server 103 could also be used to setup secure sessions with initiator 102′, such as sending and receiving messages according to a TLS protocol, VPN, SSH, IPSec, or similar standards.

FIG. 2a

FIG. 2a is a simplified message flow diagram illustrating an exemplary system with exemplary data sent and received by an initiator, in accordance with exemplary embodiments. System 200 can include an initiator 102, device 101, a discovery server 110 and authentication server 111. Initiator 102 can communicate with discovery server 110 and authentication server 111 via IP network 113, where access to IP network 113 can be provided via access network 112 for initiator 102 as depicted and described in FIG. 1a and FIG. 1d . Initiator 102 can comprise a smart phone such as, but not limited to, a phone based on an Android operating system from Google® or IOS from Apple®, and other possibilities exist as well. In addition, a mobile computing device with both a wireless WAN and wireless LAN connectivity could be used for an initiator 102 in system 200, such as a tablet, laptop computer, e-reader, etc. The present invention also contemplates that a fixed station initiator 102 could be utilized instead of a mobile unit in order to conduct the device provisioning protocol 191 and configuration step 106 with device 101. In exemplary embodiments, a fixed station initiator 102 could comprise a WiFi access point operated by a device owner, initiator user 102 u, or network 107 in order to configure a plurality of device 101 in nearby physical proximity in order for the plurality of devices 101 to receive a plurality of sets of network access credentials 109.

Initiator 102 can include a battery, radio, and touch screen, as well as a camera 102 z. Initiator 102 can connect with access network 112 in order to communicate with discovery server 110 and authentication server 111, as depicted in FIG. 1a above. The access network 112 used in a system 200 can be a different access network than access point 105 used by device 101 in FIG. 1a , although access network 112 for initiator 102 could also be through access point 105. For example, if device 101 is an access point to be configured, then initiator 102 could use WAN radio 102 h in order to connect with network 107 via access network 112. If (i) an access point 105 is already operating with network access credentials 109, and (ii) a device 101 is to be configured to connect with access point 105, then initiator 102 could also use access point 105 for an access network 112 using a set of compatible network access credentials 109. In exemplary embodiments, access network 112 can comprise a wireless WAN such as 4G LTE, 5G, etc, which can comprise a primary access network for initiator 102 and backup network for device 101 (where the primary network for device 101 can comprise a wireless LAN through network access point 105).

Device 101 in system 200 can comprise a device 101 depicted in FIG. 1a and device 101 can also include a tag 101 c. Tag 101 c can comprise a recorded image on device 101 or packaging of device 101 and could be a bar code, QR code, or a serial number for device 101. Tag 101 c can provide a unique identifier for device 101. In exemplary embodiments, if device 101 is a medical device, then tag 101 c can include a Unique Device Identification (UDI). Although a device 101 could include a plurality of different tags 101 c or markings for different purposes (such as shipping, inventory, a distributor code, etc.), for the purposes of conducting (i) a device provisioning protocol 191 and (ii) a read step 203 below by an initiator 102, the tag 101 c as contemplated herein for device 101 could include distinct markings for an initiator user 102 u to identify as the proper code to read for conducting a configuration step 127 of initiator 102. The distinct markings could comprise a pictogram or icon for a mobile phone or a wireless network next to the tag 101 c, an outline around the tag 101 c in a bright paint or distinguished color, and other possibilities exist as well for a device 101 to distinguish a tag 101 c for a initiator user 102 u from other markings, codes, serial numbers, etc. that may exist on a device 101.

In another embodiment for FIG. 2a , tag 101 c could comprise a “near field communications” NFC tag such as a tag compatible with the NFC Forum standards for type 1 through type 5 tags (and subsequent or related standards). The NFC technology could also be NFC-A, NFC-B, or NFC-V, or subsequent standards. For these exemplary embodiments where tag 101 c comprises an NFC tag, then initiator 102 could use an NFC reader instead of camera 102 z, and the NFC reader could operate a NFC radio. Initiator 102 could utilize an NFC chip and antenna, where the NFC chip operates in read mode with tag 101 c for device 101 as an NFC tag. In exemplary embodiments, discovery server 110 can include or be associated with a discover server database 110 a. Database 110 a could record information about a plurality of devices 101, such as ID.device 101 i, and ID-token.device 206, and a dataset config-provisioning.ID.device 212, which will be described in further detail below for FIG. 2 a.

At step 201 in FIG. 2a , device 101 can be in a powered off state. For a step 201 device 101 could be shipped from a manufacturer to a distributor and then to a device user or an initiator user 102 u. A device 101 could also be taken to the physical proximity (e.g. WiFi RF range) of network access point 105 in a step 201. In some embodiments, device 101 could be powered on at step 201, although power for device 101 is not required for embodiments with the steps and message flows outlined in FIG. 2a . At step 202, initiator 102 could be powered on and placed in proximity of device 101. Initiator 102 could be operated by an initiator user 102 u at step 202. At step 203, initiator user 102 u could use camera 101 z in initiator 102 to conduct a “read” step 203, where initiator 102 can (i) take a picture of a tag 101 c for device 101, or (ii) read a bar code, QR code, printed serial number, or similar code or markings on device 101. As mentioned above, tag 101 c could comprise a bar code, QR code, or other encoding of data for device 101, including a serial number. For the alternative embodiment where (i) initiator 102 uses an NFC reader and (i) tag 101 c comprises an NFC tag, the initiator 102 could conduct an NFC read of tag 101 c for step 203 and step 204.

At step 204, initiator 102 can receive data from tag 101 c, such as a response, where the response can consist of a uniform resource locator (URL) for discovery server 110, URL-DS 205, an ID-token.device 206, and a tag value 101 w. The response at step 204 could be recorded in the tag 101 c. URL-DS 205 could include a domain name for discovery server 110 and parameters such as the use of HTTP or HTTPS and a destination TCP or UDP port number for initiator 102 to send packets to discovery server 110. ID-token.device 206 can be an identifier for device 101 and/or responder 101 x and could be a token for ID.device 101 i, or a value or unique pseudo-random number associated with device 101 and/or ID.device 101 i. ID-token.device 206 could be a value that obfuscates ID.device 101 i but can preferably uniquely map to ID.device 101 i in a system 100 or 200 with a plurality of devices 101. Through the use of ID-token.device 206 that is readable by initiator 102, then a normal operating value for ID.device 101 i with a network 107 can remain confidential at step 204. Or, in some exemplary embodiments an ID.device 101 i can be the same as ID-token.device 206.

Tag value 101 w in response 204 can include data associated with tag 101 c and device 101, such as versions of software supported, product validity or expiration dates, a responder bootstrap public key Br 101 a, cryptographic parameters 199 supported (e.g. RSA or ECC), a curve name utilized for an ECC cryptographic algorithm, a name or URL for Certificate Authority 107 used by manufactured device 101, a certificate for device cert0.device 101 m (equivalent to cert0.initiator 102 m in FIG. 1d ), or a subset of the values in config-provisioning.ID.device 212. In an exemplary embodiment, tag value 101 w could comprise some values of config-provisioning.ID.device 212 upon manufacturing of device 101, which could be subsequently updated at a later date in discovery server DB 110 a before installation or operation of device 101 with AP 105 and/or network 107. For exemplary embodiments where tag 101 c comprises a bar code or QR code or similar markings, then tag value 101 w can be limited to fewer bytes such as listing URL-DS 205 and ID-token.device 206. For exemplary embodiments where tag 101 c comprises an NFC tag capable of storing an exemplary few thousand bytes, then tag value 101 w could include more values and data listed in the first sentence of this paragraph.

In other exemplary embodiments where a lower level of security can be required in order to have simplified functionality, tag value 101 w can comprise MAC.R 101 d, responder bootstrap public key Br 101 a, a parameter set 199 a, configuration 130, and/or a version number 212 a. For these simplified embodiments, initiator 102 can (i) read tag value 101 w, load a DPP application 102 g compatible with version number 212 a and parameter set 199 a, (iii) optionally send Br 101 a to a DSS server 103, and (iii) load configuration 130 for WiFi radio 102 w, and thereby skip the remaining steps and message flows depicted in FIG. 2a . In other exemplary embodiments where a higher level of security is desired and a system 100 or 200 could comprise millions of devices, or high-value devices, and thousands or more initiators 102, then the full set of steps and message flows depicted in FIG. 2a may be preferred.

At step 207, initiator 102 could process the data received in response 204. For embodiments where tag 101 c is an image such as a bar code or QR code, at step 207 initiator 102 could process the image and extract the data or values for ID-token.device 206, URL-DS 205, and tag value 101 w. Continuing at step 207, initiator 102 could connect with an access network 112 in order to call the URL in URL-DS 205, which could be an HTTPS/TLS session in exemplary embodiments. In exemplary embodiments, URL-DS 205 is combined with ID-token.device 206, such that the HTTPS session is a unique request to discovery server 110 for each different device 101. In exemplary embodiments, the value ID-token.device 206 can have enough information entropy or pseudo randomness that it cannot be easily guessed, such as (i) appearing to be an exemplary 32 byte random number, and (ii) not related to a value ID-token.device 206 for another device 101 in any externally observable manner such as in sequence, or sharing similar common factors, etc. By combining a URL-DS 205 with a unique and a sufficiently randomized ID-token.device 206, only an initiator 102 physically in the presence of device 101 (or by reading tag 101 c) could feasibly query discovery server 110 with a fully and properly formed query/URL to fetch the subsequent data from discovery server 110. At step 207, initiator 102 could perform additional checks and steps in preparation for communication with device 101, such as verifying data in tag value 101 w is compatible with software or settings in initiator 102, including DPP application 102 g (if DPP application 102 g is already installed in initiator 102).

In message flow 208, initiator 102 can establish a secure HTTPS session with discovery server 110 using the URL-DS 205, and the secure session could comprise a transport layer security (TLS) session such as TLS version 1.2, TLS version 1.3, or similar and subsequent standards. As part of the setup of message flow 208, initiator 102 can receive a certificate cert.DS 110 c from discovery server 110. Cert.DS 110 c could comprise an X.509 certificate and include a signed public key for discovery server 110. In exemplary embodiments, initiator 102 verifies the certificate cert.DS 110 c and parent certificates through root certificate cert.CA.root 102 r. The verification of signatures using public keys in certificates can use the signature verification steps as specified in the US National Institute of Standards and Technology (NIST) FIPS 186-4 titled “Digital Signature Standard” and subsequent or related versions. Note that a secure session 208 is not required for some exemplary embodiments, and confidentiality and/or data integrity could be acquired via other means besides HTTPS and/or TLS or DTLS, including embodiments were data flow from discovery server 110 to initiator 102 be signed. Other possibilities exist as well for a message flow 208 to be adequately secured.

In exemplary embodiments initiator 102 can also authenticate with discovery server 110, such as an initiator user 102 u associated with initiator 102 entering user credentials in a web site for discovery server 110. Or initiator 102 could send discovery server 110 a certificate for initiator 102 cert.initiator 102 m, which the discovery server 110 could verify using a signature verification step. As contemplated herein, a message flow 208 and all subsequent message flows depicted and described can comprise a series of parts or sub-messages, where the collection of sub-messages or parts can comprise the message. In other words, a message depicted with multiple elements for sets of data within the message does not require that all data be transferred together or in a single flow of TCP or UDP data. Transferring the message could comprise sending exemplary data within the message in parts, where upon conclusion of the message, (i) exemplary data depicted and described could be transferred in parts or portions and (ii) the collection of sending different parts or portions for the message could comprise sending the message, such as a message 208.

In message 209 and after the secure HTTPS/TLS session setup in message flow 208, initiator 102 can send discovery server 110 ID-token.device 206 and data from tag value 101 w. Or, the value for ID-token.device 206 could be included in the URL called by initiator 102 when accessing discovery server 110, and in this manner a value ID-token.device 206 does not need to be sent again in a separate message 209. Initiator 102 could alternatively send discovery server 110 a subset of the data for ID-token.device 206 and/or tag value 101 w.

At step 210, discovery server 110 can use data in ID-token.device 206 and message 209 to query discovery server database 110 a for the values or data sets ID.device 101 i and config-provisioning.ID.device 212. Discovery server database 110 a may comprise a database with tables to track configuration information for a plurality of devices 101 and record values for config-provisioning.ID.device 212 for each device 101 in a system 200. A device manufacturer or device owner could send initial data for a device 101 to discovery server 110 and discovery server database 110 a. In exemplary embodiments, config-provisioning.ID.device 212 contains data used by initiator 102 for the configuration of device 101, including conducting a device provisioning protocol 191. Exemplary data depicted for config-provisioning.ID.device 212 in FIG. 2a includes DPP application 102 g, configuration parameters 151, version number 212 a, ID.Authentication Server 111 a, URL-authentication Server 111 b, cert.AS 111 c, auth. parameters 111 d. Additional or other data for initiator 102 and device 101 could be included in discovery server database 110 a and values for config-provisioning.ID.device 212. The data for config-provisioning.ID.device 212 can comprise a set of values or a table of data for initiator 102 and/or a DPP application 102 g to use in order to conduct a configuration step 106 with device 101, where a specific device 101 can be identified by either ID-token.device 206 or ID.device 101 i.

DPP application 102 g in a config-provisioning.ID.device 212 can specify the name or URL of a software application for initiator 102 to utilize (e.g. a field with less than a few hundred bytes), instead of comprising the full software package for DPP application 102 g in exemplary embodiments (where the full DPP application 102 g could comprise several megabytes or more). For these exemplary embodiments, initiator 102 could utilize the name or URL to fetch the software for DPP application 102 g. DPP application 102 g could be a public or private application for the operating system 102 e of initiator 102. For embodiments where initiator 102 utilizes an Android-based operating system, DPP application 102 g could be downloaded from the Google Play store or a private web site associated with network 107. For embodiments where initiator 102 utilizes an Apple®/IOS-based operating system, DPP application 102 g could be distributed through a developer enterprise program or downloaded through an “App Store” or iTunes®. Other possibilities exist as well without departing from the scope of the present invention for an initiator 102 to download a DPP application 102 g, where the name of DPP application 102 g is received from a discovery server 110, after initiator 102 sends a message 209 with an identity for device 101 to a discovery server 110.

As depicted in FIG. 2a , values for config-provisioning.ID.device 212 sent to initiator 102 and received by initiator 102 may also include configuration parameters 151 and version number 212 a. Configuration parameters 151 may include values and data for initiator 102 to utilize with configuration application 102 g and communicate with device 101 using a WiFi radio 102 w. Exemplary uses of parameters 151 with initiator 102 conducting a configuration step 106 can comprise (i) cryptographic algorithms to utilize, (ii) ECC curve names and key lengths and associated data, (iii) selection and parameters for a WiFi radio 102 w in initiator 102 to communicate with device 101, including the selection of one of multiple possible radios in initiator 102, (iv) addresses, names, and port numbers to utilize with IP network 113 including IP version number such as IP4 or IP6, (v) timers and retry counts for communication with device 101 or DPP server 113 or authentication server 111, (vi) parameters for network 107 including a certificate authority, RSA PKI keys, selected cryptographic algorithms, etc, and (vii) parameters for communicating with device 101, etc.

Version number 212 a for config-provisioning.ID.device 212 may specify a version number of DPP application 102 g to utilize, or a list or dataset of version numbers of standards supported, such as IP version of IP network 113, WiFi radio 101 h type such as 802.11ac or 802.11ax, TLS or DLTS version supported by device 101, etc. In exemplary embodiments, not all of the values depicted for config-provisioning.ID.device 212 are sent from a discovery server 110 to an initiator 102, and only a subset of the depicted values are sent instead. In an exemplary embodiment, similar but different to that depicted in FIG. 2a , the data within config-provisioning.ID.device 212 and a message 211 can include all the data for a message 220 below, and in these embodiments an initiator 102 could use config-provisioning.ID.device 212 to conduct a configuration step 127 for initiator 102 and then proceed to step 301 in FIG. 3a , thereby omitting the subsequent steps depicted in FIG. 2 a.

As depicted in FIG. 2a , config-provisioning.ID.device 212 sent to initiator 102 may also include ID.authentication Server 111 a, URL-authentication Server 111 b, cert.AS 111 c, auth. parameters 111 d. ID.Authentication Server 111 a could comprise an identity or name for authentication server 111, such as a domain name or multiple domain names for multiple servers. URL-Authentication Server 111 b could comprise a URL for configuration application 102 g to call in order to authenticate with authentication server 111. In some exemplary embodiments, URL-authentication server 111 b includes either ID.Device 101 i or ID-token.Device 206, so that when initiator 102 using DPP application 102 g calls URL-authentication Server 111 b, the URL includes a unique string that identifies device 101. Or, in another exemplary embodiment, initiator 102 can (a) call URL-authentication server 111 b without an identity for device 101, and subsequently (b) send either ID.Device 101 i or ID-token.Device 206. Cert.AS 111 c could comprise a certificate for authentication server 111 where cert.AS 111 c could include (i) a public key for authentication server 111 and (ii) a signature of a certificate authority. Authentication parameters 111 d can include parameters for DPP application 102 g to utilize with authentication server 111, such as, but not limited to, hash or message digest algorithms, digital signature algorithms, padding schemes, key lengths, nonce or challenge lengths, timers, and retry counts, encoding rules, TLS or DTLS versions supported, cipher modes supported (e.g. AES-CBC, AES-CTR), etc.

Message 211 from discovery server 110 to initiator 102 can communicate the above fields and values described for config-provisioning.ID.device 212 and ID.device 101 i, as depicted in FIG. 2a . In an exemplary embodiment, discovery server 110 can send initiator 102 the full DPP application 102 g with the response 211 (e.g. several megabytes or more) instead of a name or URL for DPP application 102 g (e.g. less than a few hundred bytes), if the current, updated DPP application 102 g is not already downloaded by initiator 102. In another exemplary embodiment, initiator 102 can download DPP application 102 g in a step 213 as depicted in FIG. 2a , if initiator 102 has not already installed the software for DPP application 102 g after receiving message 211. For example, response or message 211 could include a version number 212 a that is higher or different than initially utilized by initiator 102 and/or an initial DPP application 102 g, and consequently the higher version number 212 a could indicate to initiator 102 that a different DPP application 102 g would be required in order to communicate with device 101 operating responder 101 x. In exemplary embodiments, DPP application 102 g downloaded in a step 213 can include a hash signature that can be verified by initiator 102 before using the software for a DPP 191 with device 101.

Step 213 may comprise initiator 102 loading and launching the DPP application 102 g and applying a subset of configuration parameters 151 or tag-value 101 w. If any of the steps depicted in FIG. 2a fail, error codes or messages could be displayed through initiator 102 to initiator user 102 u. After successful launch of DPP application 102 g, initiator 102 can connect with authentication server 111. The subsequent steps shown performed by an initiator 102 after a step 213 in FIG. 2a could be performed by a DPP application 102 g using data within config-provisioning.ID.device 212. In exemplary embodiments, DPP application 102 g could be included with the operating system 102 e for initiator 102, and in this case a separate download of DPP application 102 g may not be required.

Secure session setup 214 could comprise a secure HTTPS session with authentication server 111 using the URL-authentication server 111 b, and the secure session could comprise a transport layer security (TLS) session such as TLS version 1.2, TLS version 1.3, or similar and subsequent standards. Other networking standards besides HTTPS and TLS could be utilized as well for secure session setup 214, such as an IPSec tunnel. As part of the setup of secure session setup 214, initiator 102 can receive a certificate cert.AS 111 c from authentication server 111, if initiator 102 had not already received cert.AS 111 c from discovery server 110. Initiator 102 could verify cert.AS 111 c after receiving the certificate, such as verifying a signature from a certificate authority and parent certificates of cert.AS 111 c as well all the way to recorded cert.CA.root 102 r, which is depicted above in FIG. 1d . In other words, a secure session setup 214 can mutually authenticate both authentication server 111 and initiator 102, such as using certificates from both sides with TLS. An additional layer of authentication can be performed by an initiator user 102 u, although authentication for all of authentication server 111, initiator 102, and initiator user 102 u is not required for some embodiments.

In message 215, initiator 102 transmits authentication information to authentication server 111, and authentication server 111 verifies the authentication information in a step 217. The authentication information transmitted in a message 215 could comprise information to authenticate (i) initiator user 102 u, (ii) initiator 102, or (iii) both initiator user 102 u and initiator 102. The authentication information in message 215 may comprise an initiator user 102 u entering identification and credential information in a touch screen of initiator 102, and the information is passed to authentication server 111 (possibly in an encrypted or hashed form). In exemplary embodiments, initiator user 102 u provides biometric data such as a fingerprint, an image of the user's face, or similar data, where initiator 102 transmits confirmation or signatures for the data through secure session setup 214 to authentication server 111, and the authentication server 111 verifies the biometric data or signatures of the biometric data is associated to initiator user 102 u. In some exemplary embodiments, a separate authentication of an initiator user 102 u can be omitted from a message 215, and authentication and/or authorization of initiator 102 can be accomplished from other steps and messages without departing from the scope of the present invention.

Message 215 may also request the verification of initiator 102 with authentication server 111. In exemplary embodiments, initiator 102 records a certificate Cert0.initiator 102 m for initiator 102. The certificate for initiator 102 includes a public key for the initiator 102 and a signature by a certificate authority. In an authentication step 217, authentication server can use the information in message 215 to verify the identity of an initiator user 102 u and/or initiator 102. In embodiments where initiator 102 uses a device certificate for initiator 102 (which could be a Cert0.initiator 102 m), authentication server 111 could verify that initiator 102 also records the private key SK0.initiator 102 s, by (i) sending a challenge/random nonce and (ii) verifying a signature for the challenge/nonce from initiator 102 using the private key 102 s for cert0.initiator 102 m. Authentication server 111 can verify the signature using the public key for initiator 102 from Cert0.initiator 102 m. Message 215 and authentication 217 could be conducted using authentication parameters 111 d, which could be previously included in Config-provisioning.ID.device 212. A network 107 can require that an authentication step 217 is successfully completed for initiator 102 and/or initiator user 102 u before sending a message 220 below.

In step 216 a of FIG. 2a , initiator 102 may also authenticate authentication server 111, using cert.AS 111 c. In step 216 b, initiator user 102 u can enter device owner information into initiator 102, such as an owner name, a DNS name associated with owner, or a code or other value to identify a device owner. Device owner information could be automatically recorded for DPP application 102 g or initiator 102 before a configuration step 106 from FIG. 1a . For example, initiator 102 with DPP application 102 g may operate on a mobile phone, and the owner of device 101 can be associated with or specified by the initiator user 102 u. For example, if a home owner with a mobile phone wishes to configure a plurality of devices 101 for his or her home, an owner identity 152 can be selected based on the user of a mobile phone which could be the initiator user 102 u. An owner identity 152 or device owner information could comprise a telephone number for initiator user 102 u, an email address, or a user name. Other possibilities exist as well without departing from the scope of the invention. The value identifying a device owner could be ID.owner 152, although the use of ID.owner 152 could be optionally omitted.

In some embodiments, the value of ID.owner 152 could be recorded in a tag 101 c, such as if device 101 comprises leased equipment that is owned by a different entity than an initiator user 102 u. Note that a tag 101 c could also comprise a collection of different tags, such that a first tag could specify a URL-DS 205 (which could be a label or sticker applied by a manufacturer), and a second tag could specify ID.owner 152 (which could be a label or sticker or mark applied to device 101 by an owner). A step 216 b can function to associate (i) device 101 with device owner for (ii) a network 107. In exemplary embodiments, millions of devices 101 could be distributed out to millions of device owners. Network 107 may prefer to know which devices 101 are associated with which device owners by using a value of ID.owner 152. In an exemplary embodiment, the value ID.owner 152 could be included in a set of Config-provisioning.ID.device 212 for cases where device owner can register the ID.device 101 i with discovery server 110 before initiator 102 sends message 209 to discovery server 110.

In message 218, initiator 102 can send a first set of identities to authentication server 111 through the secure session setup in 214, and also send authentication parameters 111 d. Note that in some embodiments the set of authentication parameters 111 d can be sent from authentication server 111 to an initiator 102 in a response to message 218. The list of identities in a message 218 can include an ID.device 101 i (or ID-token.device 206), ID.initiator 102 bi, and ID.owner 152, as depicted in FIG. 2 a.

In step 219 a, authentication server 111 can process the first set of identities received in message 218. A step 219 a could comprise authentication server 111 verifying that initiator 102 with initiator user 102 u is authorized to configure or provision device 101. In other words, the prior step 217 could be an initial step to verify or authenticate identities, and then the subsequent step 219 a could be verifying that the authenticated identities for initiator 102 have privileges or authorization to conduct a configuration step 106 or a DPP 191 with device 101. For a step 219 a, authentication server 111 may communicate with a device database 104 in order to confirm that initiator 102 with an initiator user 102 u is authorized to conduct configuration step 106 and a DPP 191 with device 101 identified by ID.device 101 i or ID-token.device 206. Authentication server 111 can utilize any or all of the identities received in message 218 in order to identify and communicate with the correct device database 104 and determine authorization for initiator 102 and/or initiator user 102 u. In exemplary embodiments, an identity for a device or initiator such as ID.device 101 i or ID.initiator 102 i includes a domain name (e.g. 12345.example.com), and an entity receiving the identity can locate a home network and/or servers associated with the identity using the domain name portion of the identity using DNS security (DNS SEC).

Although not depicted in FIG. 2a , authentication server 111 could utilize a mutually authenticated secure channel such as TLS v1.3 with a device database 104 in a step 219 a. In some exemplary embodiments, a step 219 a could be optionally omitted, for example if a device owner is also an initiator user 102 u, such as a home owner using initiator 102 and installing a device 101 in their home. In these embodiments, an authentication step 217 may be sufficient to allow/authorize initiator 102 to conduct the DPP 191 and configuration step 106. Other possibilities exist as well for an authentication server 111 use a step 219 a to authorize that an authenticated initiator 102 and/or initiator user 102 u can conduct a DPP 191 and configuration step 106 without departing from the scope of the present invention.

After the authorization step 219 a for initiator 102, authentication server 111 can query device database 104 for (i) initiator configuration 130 for device 101 using ID.device 101 i or ID-token.device 206, and (ii) a DPP server URL 103 b for initiator 102 to utilize in order to conduct a device provisioning protocol 191 and configuration step 106 with device 101, (iii) MAC address for responder 101 x of MAC.R 101 d, and (iv) optionally, responder public bootstrap keys Bi 104 a and Br 101 a or a PKEX key 198 for conducting a public key exchange protocol. The optional sending of bootstrap public keys and MAC address for responder 101 x can depend on the selected operation of initiator 102 for conducting a DPP 191, which is also referred to as initiator mode 306 a below including FIG. 3a . For embodiments depicted in FIG. 3a below, the bootstrap public keys Bi 104 a and Br 101 a can remain in DPP server 103, and in these embodiments and initiator modes 306 a, then the query to device database 104 after step 219 a can query for (i) through (iii) in the first sentence of this paragraph. In other words, for the embodiments depicted in FIGS. 3a and 5b , the public bootstrap keys Bi 104 a and Br 101 a, may optionally not be queried and sent back to authentication server 111 and initiator 102, but remain in a network 107 for enhanced security purposes.

For embodiments depicted in FIG. 5a , the public bootstrap keys Bi 104 a and Br 101 a, may optionally be queried and sent back to authentication server 111 and initiator 102, in order for initiator 102 and DPP server 103 to conduct the steps and message flows depicted and described in connection with FIG. 5a . Other possibilities exist as well for a query and communication of data between an authentication server 111 and a device database 104 after an authorization step 219 a without departing from the scope of the present invention. Note that in exemplary embodiments, initiator bootstrap private key bi 104 b can continue to reside within device database 104 and/or network 107 and may optionally not be sent back to initiator 102. By not sending key bi 104 b to initiator 102, the secure operation of a DPP 191 can be enhanced using the combined operation of an initiator 102 and DPP server 103 as depicted in FIG. 3a , FIG. 5a , and FIG. 6 a.

A device database 104 in FIG. 2c can comprise a database for a plurality of devices 101, and device database 104 was depicted in FIG. 1a above and also FIG. 2b below. Device database 104 can record data for the plurality of devices 101 in a system 100, including data for device identities, responder MAC addresses 101 d, device public bootstrap keys Br 101 a, initiator bootstrap PKI keys, PKEX keys 198, and initiator configuration 130, and other data as well in order to support the operation of a DPP 191 using an initiator 102 with DPP server 103. A device database 104 could also record additional data pertaining to device 101 with ID.device 101 i, such as (i) a DPP server 103 to use with device 101 and/or initiator 102, where the location or identity of DPP server 103 could be in the form of a DPP server URL 103 b (depicted as URL-DPPS 103 b), and also (ii) a certificate for DPP server 103 comprising cert.DPPS 103 c. In a step 219 b. device database 104 can use the identities received from authentication server 111 in order to query for data such as (i) through (iv) described in two paragraphs above.

For a step 219 b, if device database 104 does not record or have the device 101 identity ID.device 101 i or ID-token.device 206, or initiator configuration 130, and/or URL-DPPS 103 b, then for step 219 b device database 104 could point authentication server 111 to another server or location for the exemplary queried data (i) through (iv) described in three paragraphs above and depicted in FIG. 2a . The other server or location for queried data (i) through (iv) could be recorded possibly by a device manufacturer which could also record a second device database 104. Note that a device manufacturer could record some of the data for a device database 104, since the data such as MAC address, public bootstrap keys, etc. could be recorded upon manufacturing, although other possibilities exist as well.

Recording URL-DPPS 130 b in a database 104 can provide greater flexibility for conducting a DPP 191 and configuration step 106 with a device 101 since an initiator user 102 u or device owner may prefer that a DPP 191 or configuration step 106 be performed using a particular DPP server 103. However, that the DPP server 103 may not be known by a device manufacturer at the time of manufacturing of device 101. In other words, (a) a device manufacturer cannot write a value for a URL-DPPS 103 b to memory of device 101 (or on a tag 101 c) if (b) the device manufacturer does not know the value before the device 101 is shipped away from the device manufacturer facilities. Further, an initiator 102 may not know which of a plurality of possible DPP servers 103 to utilize when conducting a DPP 191 with a device 101 without receiving the data for a URL-DPPS 130 b via IP network 113 such as from a network 107 or authentication server 111. Thus, URL-DPPS 130 b can be queried or selected in a step 219 b after initiator 102 sends network 107 an identity for device 101 in a message 218 along with an identity for initiator 102.

At step 219 c, authentication server 111 could receive and process data from device database 104. The received data could comprise (i) initiator configuration 130 for ID.device 101 i or ID-token.device 206, and (ii) a DPP server URL 103 b for initiator 102 to utilize in order to conduct a device provisioning protocol 191 and configuration step 106 with device 101 (possibly with a certificate cert.DPPS 103 c), (iii) MAC address for responder 101 x of MAC.R 101 d, and (iv) optionally, public bootstrap keys Bi 104 a and Br 101 a or a PKEX key 198 for conducting a public key exchange protocol. Although not depicted, an identity for device 101 or initiator 102 could also be returned in the data received for step 219 c, since authentication server 111 may process data for a plurality of different initiators 102 and devices 101. In another exemplary embodiment, authentication server 111 could record a device database 104 for a plurality of devices 101 in a system 100 and system 200 and in this embodiment then step 219 c could represent querying a locally stored or locally accessible device database 104 for authentication server 111 to obtain the depicted data. Further, in exemplary embodiments where initiator 102 can operate as an initiator 102* depicted in FIG. 1b (and not as an initiator proxy 102′ depicted in FIG. 3a , FIG. 5a , and FIG. 5b below), then the present invention also contemplates that initiator bootstrap private key bi 104 b could also be received by authentication server 111 and subsequently sent in a message 220 to initiator 102.

As depicted in FIG. 2a , authentication server 111 can send initiator 102 a message 220 through secure connection 214, where message 220 can include a device 101 identity such as ID-token.device 206 (since initiator 102 may communicate with a plurality of devices 101), (i) initiator configuration 130 for ID.device 101 i or ID-token.device 206, and (ii) a DPP server URL of URL-DPPS 103 b for initiator 102 to utilize in order to conduct a device provisioning protocol 191 and configuration step 106 with device 101 (possibly with a certificate cert.DPPS 103 c), (iii) MAC address for responder 101 x of MAC.R 101 d, and (iv) optionally, public responder bootstrap keys Bi 104 a and Br 101 a or a PKEX key 198 for conducting a public key exchange protocol. For embodiments where public bootstrap keys Bi 104 a and Br 101 a are sent in message 220, then also associated data for the keys could be sent such as a selected set of parameters 199 a, such that an initiator 102 could determine which cryptographic parameters are associated with the keys (such as an ECC curve name, key lengths, hash algorithms, etc.) An authentication server 111 could receive a selected set of cryptographic parameters 199 a for bootstrap keys from device database 104.

Initiator 102 could receive message 220 and read and record the data received. ID-token.device 206 can be useful in a message 220 for initiator 102, because initiator 102 could communicate with a plurality of devices 101 over time and thus keep track of which message 220 is for which device 101. Note that ID.device 101 i could be sent instead of or in addition to ID-token.device 206.

At step 221, initiator 102 could process data received in message 220. Initiator 102 could determine if data for initiator configuration 130 is supported by initiator 102, such as if a WiFi radio 102 w supports a specified operating class 130 a. For example, responder 101 x may operate on WiFi at 60 Ghz and WiFi radio 102 w may not support 60 Ghz, and in this case initiator 102 could in step 221 abort attempts to conduct a device provisioning protocol 191 with responder 101 x. At step 221, initiator 102 could also determine if other data received in message 220 is supported by initiator 102, such as if key lengths or associated parameter sets 199 a for any keys received in message 220 are supported by initiator 102 and potentially DPP application 102 g. For example, if a bootstrap public key Br 101 a is received in message 220 with a selected set of cryptographic parameters 199 a that are not supported by DPP application 102 g (such as a curve name not supported by initiator 102 with DPP application 102 g), then initiator 102 could terminate further attempts at conducting a DPP 191 and also notify initiator user 101 a.

Note that as contemplated herein, the transfer of a PKI key in a message can also be with the transfer of a corresponding selected set of cryptographic parameters 199 a. If a message is depicted in FIG. 2a (and other figures below), as transferring a PKI key, such as, but not limited to, Br 101 a, then a selected set of cryptographic parameters 199 a can be sent with the key as well. If parameters 199 a are not received by a node when receiving a PKI key, or the parameters are otherwise unknown (such as the parameters not being previously selected and sent/received), then initiator 102 can operate with the assumption the PKI keys are for set “A” in a set of parameters 199 below in FIG. 2b , which would also comprise the basic set of parameters for device interoperability as specified by cryptographic suite 1 in section 3.2.3 of DPP specification version 1.0.

At step 222, initiator 102 could determine an initiator mode 306 a (from FIG. 3a below) for conducting a device provisioning protocol 191 and configuration step 106, using data received in a message 220. If the key comprising Br 101 a, with possibly parameters 199 a is received in message 220 along with a command for initiator 102 to conduct responder only authentication 141, then initiator 102 could operate as an initiator 102* depicted in FIG. 1b . If the keys comprising Br 101 a, Bi 104 a, bi 104 b are received in a message 220 along with a command for initiator 102 to conduct a mutual authentication 142, then initiator 102 could operate as an initiator 102* depicted in FIG. 1c . If no bootstrap PKI keys are received by initiator 102 in a message 220 (but other data is valid such as initiator configuration 130), then initiator 102 can begin operating as an initiator proxy 102′ as depicted in FIG. 3a . If only bootstrap PKI keys Br 101 a and Bi 104 a are received in a message 220, then initiator 102 could proceed with a configuration mode to support subsequent DPP 191 and configuration step 106 as depicted in FIG. 5a below. Other possibilities exist as well for an initiator 102 to select the steps for conducting a device provisioning protocol 191 using data or commands in a message 220 without departing from the scope of the present invention. In another exemplary embodiment, a DPP server 103 sends initiator 102′ the initiator mode 306 a (in FIG. 3a ) for initiator 102′ to use for a DPP 191 with DPP server 103. Note that as contemplated herein, steps or actions that are described as initiator 102 or initiator 102′ performing the action could also be performed by (i) a DPP application 102 g or (ii) the computing device operating initiator 102, such as a mobile phone, smart phone, tablet, or even (iii) a WiFi access point 105 operating an initiator 102′ as depicted in FIG. 8 below.

Initiator 102 could then conduct configuration step 127, which was depicted and described in connection with FIG. 1d above. In summary, initiator 102 could backup or record any previously active user configuration 131 operating for a WiFi radio 102 w in initiator 102, such as (a) recording user operating class 131 a in a nonvolatile memory 102 f in order to (b) restore the configuration 131 at a later time. In exemplary embodiments, a step 127 comprises initiator 102 reading the initiator configuration 130 and activating them with WiFi radio 102 w in order to transmit DPP message 122 to responder 101 x, optionally using MAC.R 101 d in order to send unicast messages to responder 101 x. As depicted and described in connection with FIG. 1d above, a configuration step 127 can convert the initiator 102 from an unconfigured state (for purposes of a DPP 191) to an initiator 102′. Initiator 102′ can also be referred to as an initiator proxy 102′. Thus, subsequent figures such as FIG. 3a , FIG. 5a , etc. depict a configured initiator 102′ instead of the unconfigured initiator 102 in FIG. 2 a.

In an alternative exemplary embodiment to that depicted in FIG. 2a , discovery server 110 could be optionally omitted, and data within tag 101 c or tag value 101 w could specify authentication server 111 as well as data for Config-provisioning.ID.device 212. However, the use of a discovery server 110 can be preferred for some exemplary embodiments since a discovery server 110 could provide increased flexibility over the lifetime of device 101, which could be a decade or longer, since parameters Config-provisioning.ID.device 212 and related data could change over time. Including all data for config-provisioning.ID.device 212 in tag value 101 w or tag 101 c may reduce flexibility for changing or updating the data over time, such as specifying (i) an updated DPP application 102 g (where app versions for smartphones may be updated relatively frequently such as more than once a year), or other (ii) updated data for network 107 over time. Further, the use of a discovery server 110 can support potentially millions of devices communicating potentially with many different authentication servers 111 and DPP servers 103.

For another alternative exemplary embodiment to that depicted in FIG. 2a , although message 220 with data for initiator 102 is depicted as flowing from authentication server 111 to initiator 102, other possibilities exist as well for a initiator 102 to receive the data within message 220 without departing from the scope of the present invention. In some embodiments, data within message 220 could be obtained by initiator 102 from a DPP server 103 directly, and for these embodiments, a mutually authenticated secure session similar to secure session 214 could be set up between initiator 102 and DPP server 103. Further, the functionality for different servers in FIG. 2a could be combined, such that an authentication server 111 also operates as a discovery server 110. In another embodiment, a DPP server 103 could operate as all of a discovery server 110 and authentication sever 111, and other possibilities exist as well without departing from the scope of the present invention.

FIG. 2 b

FIG. 2b is an illustration of an exemplary device database, with tables for a device database recording exemplary data, in accordance with exemplary embodiments. A device database 104 depicted and described above in connection with FIG. 1a and FIG. 2a can record data for (i) an unconfigured initiator 102 or (ii) a configured initiator 102′ and a DPP server 103 to conduct a device provisioning protocol 191 with a device 101 operating a responder 101 x. A database 104 could record a plurality of tables for a plurality of devices 101 and/or responders 101 x, such as the depicted values for a key table 104 k, a cryptographic parameters table 104 p, and a device table 104 d, Other possibilities exist as well for the organization, tables, and recorded data within a device database 104 without departing from the scope of the present invention. Data within device database 104 could be encrypted using a symmetric key. As depicted in FIG. 1a , a network 107 could operate and record a device database 104, although another entity besides network 107 could also operate and record the device database 104, such as a device manufacturer or a device owner.

Device database 104 can record sets of ID-token.device 206, ID.device 101 i, MAC.R 101 d for the MAC address of the responder 101 d, global operating class 130 a, channel list 130 b, cryptographic parameters 199, and a secret shared key 198 for a public key exchange protocol (PKEX). These values within a device database 104 could be recorded in a device 101 and/or responder 101 x upon manufacturing of a device 101. The exemplary data in device database 104 could be obtained from the manufacturer. For embodiments where some data is not previously recorded in a device database 104 before an initiator 102′ conducts a step 301 as depicted below in FIG. 3a , then a network 107 operating device database 104 could query the device 101 manufacturer or a device 101 distributor in order to receive and record values for a device database 104, and other possibilities exist as well for the source of device 101 data within a device database 104.

In device database 104, ID-token.device 206 can comprise a unique, obfuscated identity for device 101, such as the identity read from a tag 101 c on device 101. ID.device 101 i can comprise an identity for device 101 i that is not obfuscated, and could be a serial number for device 101. Although FIG. 2a above depicts a tag 101 c as recording ID-token.device 206, the tag 101 c could alternatively record ID.device 101 i and send the non-obfuscated identity to initiator 102 in FIG. 2a . The two identity values shown for a device 101 in a device database 104 allows a DPP server 103 to map between ID-token.device 206 and ID.device 101 i, and also convert one value into another. MAC.R 101 d can comprise the MAC address used by a responder for conducting a device provisioning protocol 191. In other words, MAC.R 101 d can be the MAC address used by responder 101 x in order to listen for DPP authentication request 122 messages from an initiator 102′. In other words, MAC.R 101 d can be used by an initiator 102′ in order to send a unicast message. In some exemplary embodiments, MAC.R 101 d can be omitted from a device database 104 or otherwise not available to a network 107, and in this case an initiator 102′ can send a DPP authentication request message 122 as a broadcast message on a WiFi radio link 192 to responder 101 x.

Global operating class 130 a and channel list 130 b can specify the settings a device 101 WiFi radio 101 h will use with responder 101 x, where responder 101 x periodically listens or monitor for DPP authentication request messages 122 over time as using different RF frequencies or channel numbers within ISM band RF radio spectrum. As depicted in FIG. 2b , an initiator configuration 130 can include channel list 130 b and cryptographic parameters 199. An initiator configuration 130 could also include the global operating class 130 a and other information could be included as well in an initiator configuration, such as timer values for retry of sending DPP 191 messages, timer values for timeouts for sending and receiving messages, as well as counters for a maximum number of retries on sending messages.

Although not depicted in FIG. 2b , an initiator configuration 130 in a device database 104 could also specify an initiator mode 306 a (in FIG. 3a and FIG. 3b below) for initiator 102′ to operate with responder 101 x, where different modes could comprise (i) DPP server 103 records and operates on all boostrap PKI keys for initiator 102′, or (ii) initiator 102′ records and operates on bootstrap public keys and derived ephemeral keys, but not initiator bootstrap private key bi 104 b (e.g. as depicted in FIG. 5a ), and other possibilities exist as well. Sets of cryptographic parameters 199 in device database can represent different sets of cryptographic parameters supported by responder 101 x in order to conduct a device provisioning protocol 191. For example, some devices 101 may use a first set of cryptographic parameters with PKI keys such as bootstrap and ephemeral keys, and other devices may use a second set of cryptographic parameters, which could be specified by cryptographic parameters 199. Note that devices 101 can optionally support more than one set of cryptographic parameters, as depicted.

Device database 104 can record a key table 104 k, which could comprise exemplary keys as depicted. A key table 104 k can include a secret shared PKEX key 198, responder bootstrap public key Br 101 a, initiator bootstrap public key Bi 104 a and initiator bootstrap private key bi 104 b. PKEX key 198 could be used with a public key exchange protocol as specified in IETF draft document “Public Key Exchange”, which is hereby incorporated by reference in its entirety. In some exemplary embodiments, a PKEX key 198 can be omitted, such as for the example data depicted with an “NA” in FIG. 2b . The values depicted of X1, X2, etc. for a PKEX key 198 could comprise the secret key for each device 101 identified by ID-token.device 206 or MAC.R 101 d. For the exemplary database 104 depicted in FIG. 2a and other tables herein, a numeric value following a constant name can depict a subsequent or different instance or numeric value for the constant. In other words, “X1” and “X2” for a PKEX key 198 can represent different values of “X” for the PKEX. Similarly, values of “Br−1” and “Br−2” depict different values for a responder bootstrap public key Br 101 a, but exemplary values of “Br1” and then a second “Br1” can depict that the same value or number may be used for two different responders 101 x.

Responder bootstrap public key Br 101 a in a device database 104 can represent the bootstrap public key for responder 101 x. Br 101 a was depicted and described above in connection with FIG. 1a and FIG. 1b above. In exemplary embodiments, a device database 104 can record a plurality of different responder bootstrap public keys Br 101 a, where each key can be associated with different responders 101 x. Although not depicted in FIG. 2b , for some embodiments different responders 101 x could also share the same numeric value for a responder bootstrap public key Br 101 a. Different responder bootstrap public keys Br 101 a can be associated with a different selected set of parameters 199 a. The manufacturer or entity configuring responder 101 x in device 101 may not know which of a plurality of different possible sets of cryptographic parameters 199 may be utilized by an initiator 102 for conducting a DPP 191. For example, DPP specification version 1.0 identifies several possible sets of cryptographic parameters 199 for bootstrap keys that could be utilized in a DPP 191, such as the different values for cryptographic parameters shown in Appendix A of DPP specification version 1.0. As depicted in FIG. 2b , a responder bootstrap public key Br 101 a of “Br−3 (A)” can represent a third instance or number for Br 101 a which uses the selected set “A” of cryptographic parameters 199 (e.g. curve p256 with SHA-256), while responder bootstrap public key Br 101 a of “Br−3 (B)” can represent a third instance of Br 101 a which uses the selected set “B” of cryptographic parameters 199 (e.g. curve p384 with SHA-384).

Initiator bootstrap public key Bi 104 a and corresponding initiator bootstrap private key bi 104 b in a device database 104 can represent the bootstrap public key and the bootstrap private key for initiator 102′. Bi 104 a and bi 104 b were depicted and described above in connection with FIG. 1a and FIG. 1b above. In exemplary embodiments, a device provisioning protocol 191 using an initiator 102′ and a DPP server 103 can utilize a plurality of different initiator bootstrap PKI keys, and different values for the initiator bootstrap PKI keys Bi 104 a and bi 104 b can be associated with different responders 101 x. As discussed above in connection with FIGS. 1a and 1b , a responder 101 x could optionally record an initiator bootstrap public key Bi 104 a, and subsequently the value recorded for the responder 101 x could also be stored in a device database 104. The initiator bootstrap public key Bi 104 a and corresponding initiator bootstrap private key bi 104 b could be stored by a device database 104 concurrently with the responder bootstrap public key Br 101 a, where the responder bootstrap key could be received from a device manufacturer or device distributor. Or, in exemplary embodiments a device manufacturer or a device distributor could operate a device database 104 and subsequently record the exemplary keys and values depicted for a responder 101 x in a device database 104 in FIG. 2a . As depicted in FIG. 2b , some responders 101 x could share a common initiator bootstrap public key Bi 104 a, which could be associated with a common initiator bootstrap private key bi 104 b.

The sharing of initiator bootstrap public keys Bi 104 a among multiple responders 101 x can simplify the manufacturing and distribution of devices by using a common initiator bootstrap public key Bi 104 a for some embodiments. For the present invention, the potential tradeoff of greater simplicity for reduced security (by reusing an initiator bootstrap public key Bi 104 a in multiple devices 101) can be avoided, since the initiator bootstrap private key bi 104 b may optionally not be sent to the initiator 102′. Yet, with the present invention, the full set of device provisioning protocol messages 191 can be sent and received with a responder 101 x using mutual authentication 142. Embodiments for the present invention depict and describe the initiator bootstrap private key bi 104 b as residing within a DPP server 103 when an initiator 102′ conducts a DPP 191 (as depicted and described in connection with FIG. 3a , FIG. 5a , and FIG. 5b below). Consequently, (i) the initiator bootstrap private key bi 104 b does not need to be recorded by an initiator 102* (as in FIG. 1c ), and (ii) an initiator bootstrap public key Bi 104 a can be commonly shared between multiple responders 101 x.

Thus, the present invention resolves the potential tradeoff of security versus simplification by supporting manufacturing and distribution of devices 101 with responders 101 x with commonly shared initiator bootstrap public key Bi 104 a (depicted in FIG. 2b as “shared keys”). Additional details for maintaining security will be provided in FIG. 3a , FIG. 5a , and FIG. 5b below. The initiator bootstrap private key bi 104 b can be recorded in a device database 104 and subsequently sent to a DPP server 103, but preferably not sent to initiator 102′, and initiator 102′ can still conduct a device provisioning protocol 191 with mutual authentication 142 in the manner depicted in FIG. 1c , where responder 101 x would not “know” or be aware that intiator 102′ does not record or calculate with the initiator bootstrap private key bi 104 b. In exemplary embodiments, only an initiator bootstrap public key Bi 104 a is recorded inside an initiator 102, while a device database 104 can record both the initiator bootstrap public key Bi 104 a and the initiator bootstrap private key bi 104 b.

Cryptographic parameters 199 can specify sets of cryptographic parameters that are supported by responder 101 x when using bootstrap PKI keys. Cryptographic parameters 199 can be recorded in a device database 104 as a parameters table 104 p. Cryptographic parameters 199 can record a collection of cryptographic algorithms or specifications such as a set identifier 199 a, a key length 199 b, an ECC curve name 199 c, a hash algorithm 199 e, a key length for a symmetric ciphering algorithm 199 f, and a nonce length 199 g. As contemplated herein, when a selected set of cryptographic parameters such as using the words or description “parameters 199 a” or “cryptographic parameters 199 a” can specify a row of parameters or values in a set of cryptographic parameters 199, such that the collection of values in the row can be used with a device provisioning protocol 191. Set identifier 199 a can be an identity for a row or set of values for cryptographic parameters 199. For example, set “A” can comprise cryptographic suite 1 as specified in section 3.2.3 of DPP specification version 1.0. Key length 199 b can be the length of keys in bits for PKI keys used with a device provisioning protocol with a responder 101 x. ECC Curve name 199 b can be a name for an ECC curve used with PKI keys for a device provisioning protocol with a responder 101 x.

Hash algorithm 199 e in cryptographic parameters 199 can be the name of a secure hash algorithm, such as the exemplary SHA-256 algorithm depicted, which may also be referred to as “SHA-2”. Hash algorithm 199 e can be used in a key derivation function and also to generate a signature based on a received nonce. A key length for a symmetric ciphering algorithm 199 f can specify the length of a symmetric key in bits to use with a symmetric ciphering algorithm. The depicted algorithm in FIG. 2b for algorithm 199 f is “AES-SIV”, although other symmetric ciphering algorithms could be specified in a set of cryptographic parameters as well. In other words, an additional, different column in cryptographic parameters 199, such as an exemplary “symmetric algorithm” 199 z (not depicted) could specify the symmetric ciphering algorithm to utilize with a responder for a device provisioning protocol. Nonce length 199 g can specify the length in bits for nonces or random numbers generated by both initiator 102′ and responder 101 x, where the nonces can be used for generating signatures and encryption keys.

As depicted in FIG. 2b , a device database 104 can also record a device table 104 d. Device table 104 d can record a plurality of different PKI keys for the same responder 101 x. Device table 104 d can include ID-device 206, initiator bootstrap keys sequence number 197, secret shared PKEX key 198, responder bootstrap public key Br 101 a, initiator bootstrap public key Bi 104 a and initiator bootstrap private key bi 104 b. Devices 101 may be designed to be utilized for a decade or longer, and during that time it may be desirable for a device 101 with responder 101 x to undergo more than one instance of a device provisioning protocol. As one of many possible examples, a device 101 could have performed a “factory reset” or equivalent clearing of nonvolatile memory, such that device 101 is restored to an unconfigured state. Or, device 101 may be sold or transferred to a different owner, where the new owner wishes to conduct a device provisioning protocol 191 with the same device 101 a second time. These are just a few of the many possible reasons why a device 101 could undergo more than one instance of a device provisioning protocol 191 during the lifetime of device 101, and other examples are possible as well. Through the use of a device table 104 d, different values for an initiator bootstrap PKI keys could be utilized with the same device 101 with responder 101 x over time, where the different values for PKI keys used with responder 101 x could be identified by initiator bootstrap keys sequence number 197. Note that a PKEX key 198 could also change for a device 101 over time, and initiator bootstrap keys sequence number 197 could also identify a new or different PKEX key 198.

In a device table 104 d, a responder public bootstrap key Br 101 a can remain relatively static over time, such as the depicted same numeric value for key Br 101 a of “Br−1” used for each sequence of initiator bootstrap keys. In other words, although a device 101 may undergo a factory reset or similar second instance of a device provisioning protocol, in exemplary embodiments the same responder key Br 101 a can be reused. If the responder bootstrap public key Br 101 a is changed for some reason (such as a device user reprograms device 101), then a second, new responder bootstrap public key Br 101 a could be recorded in device table 104 d with a designation “Br−2” for the same device with a new value for sequence number 197.

In device table 104 d, different values for initiator bootstrap public key Bi 104 a and initiator bootstrap private key bi 104 b could be utilized over time, represented by increasing numbers for sequence number 197 for the same device 101 identified by ID-token.device 206. A device table 104 d could also identify devices by ID.device 101 i instead. For a first sequence number 197 with a value of “1”, initiator bootstrap public key Bi 104 a could record a value represented as “Bi-1a”. For a second sequence number 197 with a value of “2”, initiator bootstrap public key Bi 104 a could record a value represented as “Bi-1b”, etc. In other words, the depicted number plus letter represents a different key for the same device. A different device could have initiator bootstrap public keys of “Bi-2a” for a first sequence number “1” and then a key “Bi-2b” for the second sequence number 197. Similar designations and tracking or mapping of keys could be utilized for an initiator bootstrap private key bi 104 b as well.

In exemplary embodiments, the initiator bootstrap public key Bi 104 a within a responder 101 x can be updated by a DPP server 103, as depicted in FIG. 6a below. One benefit for updating key Bi 104 a is that although (i) multiple manufactured devices 101 with responders 101 x could initially share a common initiator bootstrap public key Bi 104 a (e.g. Bi-1a) in order to conduct a mutual authentication 142 (depicted with key table 104 k in FIG. 2b as “shared keys”), (ii) a DPP server 103 or network 107 could subsequently update a device 101 with a different, new initiator bootstrap public key Bi 104 a (e.g. Bi-1b). The tracking of (a) which initiator bootstrap public key Bi 104 a (identified by a sequence number 197) is used with which responder 101 x can be accomplished by (b) using a device table 104 d. Alternatively, a device table could be omitted, and a device database 104 could record both (a) initial keys 104 a and 104 b for a manufactured responder 101 x (for initial use or a “factory reset”) and then (b) the subsequent, current keys 104 a and 104 b, and in this case a sequence number 197 could be optionally omitted.

In another embodiment keys 104 a and 104 b could be omitted from a device database 104, and only the responder bootstrap public key Br 101 a is recorded. For these embodiments, key Br 101 a may preferably not be sent to an initiator 102′ using the embodiment depicted and described in connection with FIG. 3 below. Responder 101 x and device 101 could be designed for use where all of (i) tag 101 c does not record the responder bootstrap public key Br 101 a, (ii) the entity recording key Br 101 a is not designed to send or transfer the key Br 101 a outside of a database 104 and a DPP server 103, and (iii) access to data, calculations, or algorithm output where key Br 101 a is used as input would only be provided to an authenticated initiator 102′. Subsequently, responder 101 x can know that any initiator 102′ that has access to the responder bootstrap public key Br 101 a (indirectly via DPP server 103) can then be mutually authenticated. In this manner, each of PXEX key 198, and initiator bootstrap PKI keys could also be omitted and still responder 101 x can trust data from initiator 102′, such as a configuration object 109. In other words, in the present invention a system 100 can (i) operate without a mutual authentication 142 from DPP Specification version 1.0 shown in FIG. 1c , and (ii) without an initiator 102′ receiving the responder bootstrap public key Br 101 a, and (iii) with DPP server 103 operating on the key and securely storing the key such that no other entities unnecessarily receive the responder bootstrap public key Br 101 a, and in this manner a responder 101 x can strongly mutually authenticate the initiator 102′ (to a sufficient level to receive and use credentials 109), since only an initiator 102′ that is authenticated with DPP server 103 could successful send and receive DPP message 191 with responder 101 x.

FIG. 3a

FIG. 3a is a simplified message flow diagram illustrating an exemplary system with exemplary data sent and received by a device database, a DPP server, an initiator proxy, and a responder, in accordance with exemplary embodiments. Before starting steps and message flows depicted in FIG. 3a , the initiator proxy 102′ and device database depicted for system 300 in FIG. 3a may previously complete exemplary message flows and steps depicted in FIG. 2a above. System 300 can include a device database 104, DPP server 103, initiator proxy 102′, and responder 101 x operating in device 101. Initiator proxy 102′ can communicate with DPP server 103 via IP network 113 using an access network 112, as depicted in FIG. 2a . As contemplated herein, an initiator proxy 102′ depicted in FIG. 3a may also be referred to as initiator 102′, and an initiator 102′ and initiator proxy 102′ may be equivalent. In other words, an initiator 102′ may operate as an initiator with some functions and operations by proxy with DPP server 103 and network 107.

Initiator 102′ can be different than initiator 102* in FIG. 1b and FIG. 1c , since (a) some PKI and cryptographic computations (plus recording of PKI keys) that would normally be performed by an initiator 102* as contemplated by DPP specification version 1.0 can (b) be performed by DPP server 103 and thus initiator 102′ is different than an initiator 102*. For system 300, DPP server 103 and device database 104 may establish a secure session setup 302 a, which could comprise establishing a secure communications link between the two servers using protocols such as TLS, IPSec, a virtual private network (VPN), a secure shell (SSH), or similar networking, transport, or application layer technologies in order to establish secure communications between DPP server 103 and database 104. Secure session setup 302 a can be (i) equivalent or similar to secure session setup 214 depicted in FIG. 2a above, and (ii) utilize certificates cert.DPPS 103 c for DPP server 103 and a certificate for database 104 in order to provide mutual authentication and mutual key derivation for a symmetric encryption key for secure session 302 a.

Initiator 102′ in system 300 can operate a running DPP application 102 g and WiFi radio 102 w operating with initiator configuration 130 from FIG. 2a and FIG. 1d , in order to communicate with a WiFi radio 101 h operating in device 101 with responder 101 x, where the communications can use a WiFI data link 192. DPP application 102 g may previously be downloaded in a step 213 as depicted in FIG. 2a and subsequently launched or activated for operation in a system 300. In exemplary embodiments, DPP application 102 g may be (i) included or distributed along with an operating system 102 e running on initiator 102′ or (ii) acquired at a different time than a step 213, and thus from a separate download of DPP application 102 g. In exemplary embodiments, WiFi radio 102 w operating in initiator 102′ can send either broadcast or unicast messages or datagrams to device 101 with responder 101 x when using initiator configuration 130. In exemplary embodiments, responder 101 x listens for incoming messages using the same initiator configuration 130.

DPP server 103 and initiator 102′ can establish a secure session 302 b, where secure session 302 b could comprise a session using TLS, DTLS, IPSec, a VPN, and other possibilities exist as well. Initiator 102′ can previously record the URL to reach DPP server 103 based on the value URL-DPPS 103 b received in a message 220 in FIG. 2a . Initiator 102′ can also use the certificate for DPP server 103 comprising cert.DPPS 103 c also previously received in a message 220. As depicted in FIG. 3a , secure session 302 b could also comprise DPP server 103 receiving and using an initiator certificate cert0.initiator 102 m in order to authenticate initiator 102′. In exemplary embodiments where initiator 102′ is operated by a DPP application 102 g, such as an application on a mobile phone, setup of secure session 302 b can include or comprise authentication of DPP application 102 g with DPP server 103, and also mutual authentication between DPP application 102 g and DPP server 103. Alternatively, DPP server 103 could authenticate an initiator user 103 a via a user ID and password entered by user 102 u into a user interface 102 k for initiator 102′. In some exemplary embodiments, authentication of an initiator 102′ or an initiator user 102 u could be omitted, such as if an initiator certificate cert0.initiator 102 m is not present in initiator 102.

At step 302 c in FIG. 3, device 101 may power on from an unpowered or “deep sleep” state. Power could be provided from a battery or converted “wall power”. Device 101 could (i) load the equivalent or responder version of information contained in initiator configuration 130 using a bootloader program and (ii) power on WiFi radio 101 h. Responder 101 using WiFi radio 101 h in device 101 could periodically cycle through a channels list 130 b in order to listen for incoming DPP authentication request messages 122. In exemplary embodiments, before initiator 102′ has conducted a step 127 to load initiator configuration 130, a device 101 can periodically power up and attempt to listen for incoming messages 122. In other words, device 101 can use equivalent information for initiator configuration 130 as the default state or condition, even without initiator 102′ being present or configured, since device 101 may not know the time or place where initiator 102′ with initiator configuration 130 may be present. Responder 101 x could also read the values for responder bootstrap public key Br 101 a and initiator bootstrap public key Bi 104 a, if present, in a step 302 c.

As depicted in FIG. 3a , initiator 102′ using DPP application 102 g can conduct a step 303 a to collect an identity list 304, where identity list 304 comprises a list of identities for elements of systems 100, 200, and 300 around or nearby to device 101 during installation and/or operation. Identity list 304 can include a networks available list 304 c. In order to conduct a step 303 a, initiator 102′ may need to temporarily disconnect from an access network 112, such as a mobile phone network, in order to perform a full frequency scan of all available mobile network operators and network access technologies around device 101 in order to collect a networks available list 304 a. For embodiments where initiator 102′ temporarily disconnects from an access network 112 or other cases where secure session 302 b may be dropped, initiator 102′ and DPP server 103 can pause secure session 302 b and then restore the session when connectivity for initiator 102′ through access network 112 is restored.

The networks available list 304 c can be useful for DPP server 103 to select the best or a preferred access point 105 from the networks available list 304 c for device 101. As depicted in FIG. 3a , a networks available list 304 c can also include the access technology available from a plurality of access networks 112 and access points 105 around device 101, such as 2G, 3G, 4G LTE, 5G, WiFi, NB-IoT, LoRaWAN, LPWAN, etc. Identification of all available wireless networks around device 101 can support DPP server 103 or network 107 in a later step 308 b below to receive or determine a working set of credentials 109 for device 101 to utilize in order to obtain network connectivity via the access network 112. In exemplary embodiments, the networks available list 304 c of surrounding wireless networks also includes an associated RF signal strength for each, such as RSSI as well as a frequency band, frequency list in Mhz, or RF channel for each surrounding wireless network. In exemplary embodiments, initiator 102′ can observe WiFi broadcast packets from network Wifi Access Point 105 depicted in FIG. 1a using SSID.Network-AP 109 a and include the value in the networks available list 304 c.

A step 303 a may also comprise initiator 102′ collecting a list of identities for a monitored unit associated with a device 101, and include the identities in the identity list 304. In exemplary embodiments, a step 303 a in FIG. 3a may comprise initiator 102′ using a camera 102 z to scan for a bar code or QR code on a surrounding monitored unit in order to collect a monitored unit identity 304 b. In exemplary embodiments, device 101 can include sensors and transducers for monitoring and controlling external devices or equipment. A monitored unit for a device 101 could comprise exemplary values of industrial equipment, health care equipment, security systems, etc. A step 303 a could also comprise initiator 102′ obtaining physical location 304 a for device 101, which could comprise a room number, zone in a building or floor, shelf number, rack number, etc. Physical location 304 a could also comprise a set of geographical coordinates for a value of physical location 304 a or (ii) estimated geographical coordinates or similar physical location of device 101. In exemplary embodiments, initiator 102′ can comprise a mobile phone or smart phone and can have a GPS or similar receiver for outdoor location, or use WiFi or Bluetooth for approximate indoor locations, and record the location in a physical location 304 a.

Although step 303 a to collect an identity list 304 for device 101 is depicted as after secure session setup 302 a (confirming mutual authentication between initiator 102′ and DPP server 103 in session 302 a), step 303 a to collect an identity list 304 could be conducted at other times, such as before FIG. 3a or after a initiator user 102 u takes initiator 102 to the approximate physical location for installation or configuration of device 101, including possibly during a step 202 above in FIG. 2a . Or, in other exemplary embodiments the use of an identity list 304 can optionally be omitted, if initiator 102′ and DPP server 103 can record the set of credentials 109 for a selected network access point 105, where the selected network access point 105 can be recorded without an identity list 304 (such as if the correct or preferred network access point 105 is known to DPP server 103 before a read step 202 in FIG. 2a ). As depicted in FIG. 3a , initiator 102′ can then send DPP server 103 a message 305 through secure session 302 a, where message 305 can include ID-token.device 206 (from message 204 in FIG. 2a above) and the identity list 304. DPP server 103 can receive message 305 and record the data received in a server database 103 a. The values of Physical Location 304 a and Monitored Unit ID 304 b can be recorded for support of subsequent operation of device 101 after a configuration step 106, and DPP server 103 could also send the values to another server supporting device 101 during operation such as a reporting server (not shown). DPP Server 103 can then send ID-token.device 206 through secure session 302 a to device database 104 in a message 306.

A step 302 d for DPP server 103 can also comprise DPP server 103 querying a server database 103 a for an initiator bootstrap keys sequence number 197 for device 101 using ID-token.device 206 (or ID.device 101 i). In exemplary embodiments, a device 101 with responder 101 x could use multiple different initiator bootstrap public keys Bi 104 a over time, such as updating the initiator bootstrap public key Bi 104 a using the steps depicted and described in connection with FIG. 6a below after a DPP 191 and configuration step 106 has been previously completed. The multiple possible reasons and benefits for updating and initiator bootstrap public keys Bi 104 a are discussed with a step 608 in FIG. 6a below. A server database 103 a could record a value initiator bootstrap keys sequence number 197 in order to track which initiator bootstrap public key Bi 104 a is currently recorded in responder 101 x for device 101. For other embodiments, a responder 101 x in device 101 could also record a plurality of different initiator bootstrap public keys Bi 104 a concurrently, such as a first initiator bootstrap public key Bi 104 a for a first network 107 and a second initiator bootstrap public key Bi 104 a for a second network 107. Responder 101 x could use the multiple different, concurrently available initiator bootstrap public keys Bi 104 a to concurrently listen for a DPP authentication request message 122 from different possible networks 107. In a step 302 d, A DPP server 103 could use an initiator bootstrap keys sequence number 197 to select the current, preferred initiator bootstrap public key Bi 104 a for conducting a DPP 191 by an initiator 102′. DPP server 103 can send a database 104 a message 307 with an identity for device 101 of ID-token.device 206 (or identity ID.device 101 i), and the selected initiator bootstrap keys sequence number 197.

At step 306, DPP server 103 can select the mode of operation for initiator 102′ to conduct a DPP 191 with device 101. The selected mode of operation for initiator 102′ can comprise a mode 306 a or an initiator mode 306 a, which could be recorded in a server database 103 a as depicted and described in connection with FIG. 3b below. The selected mode 306 a can specify the distribution of PKI keys between DPP server 103 and initiator 102′. The selected mode 306 a can determine the subsequent series of steps and message flows between DPP server 103 and initiator 102′. A first mode 306 a could (a) specify that DPP server 103 records all public and private bootstrap and ephemerals keys for initiator 102′, plus the public keys Br 101 a and Pr 101 e for responder 101 x such that (b) resulting cryptographic operations and ECDH key exchanges and symmetric ciphering reside within DPP server 103 and results from symmetric ciphering are transmitted in messages to initiator 102′. This first mode 306 a could represent the message flows and steps in FIG. 3a . A second mode 306 a could specify that (i.a) initiator bootstrap PKI keys 104 a and 104 b reside within DPP server 103 and (i.b) responder bootstrap and ephemeral public keys for responder 101 x reside within initiator 102′, such that (ii) resulting cryptographic operations and key exchanges are shared between DPP server 103 and initiator 102′. This second mode 306 a could represent the message flows and steps depicted in FIG. 5 a.

A third mode 306 a selected in a step 306 for DPP server 103 could specify the same recording of bootstrap and ephemeral keys as the second mode, with the addition that DPP server 103 receives and uses the initiator ephemeral private key pi 102 b, also with resulting cryptographic operations and key exchanges are shared between DPP server 103 and initiator 102′ (but with a different allocation than the second mode). This third mode 306 a could represent the message flows and steps depicted in FIG. 5b . In exemplary embodiments, all of the first, second, and third modes operate with initiator bootstrap private key bi 104 b residing within DPP server 103 and not shared with initiator 102′. By not sharing initiator bootstrap private key bi 104 b with initiator 102′ (which could be a device with much less security than DPP server 103), the initiator bootstrap private key bi 104 b can remain secured within network 107. These embodiments where initiator bootstrap private key bi 104 b remains in network 107 (e.g. in DPP server 103 and device database 104) support securely sharing the same initiator bootstrap public key Bi 104 a potentially across a plurality of device 101 with responders 101 x. Sharing the same initiator bootstrap public key Bi 104 a across multiple devices supports recording the key Bi 104 a in a device 101 during manufacturing. This simplifies and enables the use of a device provisioning protocol 191 across multiple devices 101 with mutual authentication, where the initiator 102′ does not need to receive or be provisioned with the initiator bootstrap private key bi 104 b.

In other words, without the technology described in the present invention, a device provisioning protocol with mutual authentication can essentially shift the problem of (a) securely mutually authenticating a device and providing credentials 109 to a device 101 to a new, but related problem of (b) securely providing an initiator bootstrap private key bi 104 b to an initiator 102*. The first, second, and third modes 306 a can solve this shifted/new problem since the initiator bootstrap private key bi 104 b can permanently reside in a network 107 and does not need to be sent to the initiator 102′ or an initiator 102*. However, with the technology in the present invention, the initiator 102′ can still transmit and receive the full set of a device provisioning protocol 191 messages with a responder 101 x as specified in DPP specification version 1.0.

A fourth mode 306 a could specify that initiator 102′ records all of the initiator bootstrap and ephemeral PKI keys, as well as the responder 101 x public keys, such that resulting cryptographic operations and key exchanges reside in initiator 102′. This fourth mode 306 a could represent the message flows and steps depicted in FIG. 1b or FIG. 1c , and in this case initiator 102′ could comprise an initiator 102*. Other possibilities exist as well without departing from the scope of the present invention. Additional details for the different modes 306 a selected in a step 306, with the resulting different allocation or recording of PKI keys are described below in FIG. 3b for a server database 103 a.

At step 308 a, DPP server 103 can process data received in message 304 and the received identity list 304. DPP server 103 can use the values in a networks available list 304 c in order to select an access network 112 for device 101. A step 308 a could comprise DPP server 103 selecting a primary access network 308 aa and a backup access network 308 ab for a device 101, as depicted and described in connection with FIG. 3b below. The selected access networks 308 aa and 308 ab for device 101 in a step 308 a could be based on criteria such as bandwidth cost, expected energy or power requirements (i.e. 3G/4G may use more power than LPWAN), signal strength or RSSI measurements recorded with a networks available list 304 c, and commercial terms such as agreements between a (i) device owner for device 101 and (ii) networks in a networks available list 304 c. DPP server 103 could also query other servers not depicted in FIG. 3a to select an access network 112 from the networks available list 304 c. In other words, a preferred access network 112 in the form of a primary access network 308 aa for device 101 may need to be selected by DPP server 103 in a step 308 a before the credentials 109 for the access network (or network access point 105) can be obtained. Although FIG. 3a depicts DPP server 103 as conducting a step 308 a in order to select a primary access network 308 aa and backup access network 308 ab, in exemplary embodiments a different server than DPP server 103 in a network 107 could (i) securely receive the networks available list 304 c and (ii) select the primary access network 308 aa and backup access network 308 ab.

After the selection of a primary access network 112 (308 aa) and a backup access network 112 (308 ab) in a step 308 a, DPP server 103 could perform a step 308 b depicted in order to obtain a set of network credentials 109 for both the selected primary access network 308 aa and the selected backup access network 308 ab. For embodiments where (a) a network 107 operating DPP server 103 comprises a selected access network 308 ab or 308 ab, then (b) the credentials 109 for device 101 can be obtained from another server in a network 107 from FIG. 1a and recorded in DPP server 103. For example, if a network access point 105 for network 107 is selected as an access network 112 for device 101, then network 107 would normally already record the set of credentials 109 for access point 105. For embodiments where a selected access network 112 (e.g. selected primary access network 308 aa) for device 101 other than network 107 operates the access point 105, then for a step 308 b DPP server 103 could query the access network 112 for the equivalent of credentials 109. Additional details regarding embodiments where a different network than network 107 provide credentials for device 101 are depicted and described in connection with FIG. 3b and FIG. 6b below.

Note that in exemplary embodiments, a DPP server 103 can preferably conduct a step 308 a to select an access network 112 and a step 308 b to obtain credentials 109 for the selected access network 112 before continuing with a device provisioning protocol 191. The reason is that if either (i) a network cannot be selected potential from a networks available list 304 c or (ii) credentials 109 cannot be obtained for the selected network, then there may be no reason to continue with a device provisioning protocol 191 since DPP server 103 may not have credentials 109 to send to device 101. In FIG. 3a , although a step 308 a and step 308 b are depicted as taking place after DPP server 103 sends message 307 with a query for PKI keys to device database 104, in some embodiments a step 308 a and step 308 b could take place before DPP server 103 sends message 307 to device database 104.

Further, in some exemplary embodiments where initiator 102′ uses network access point 105 with SSID.network-AP 109 a with a preshared secret key (PSK) or similar authentication (as an access network 112 for initiator 102′), then a message 305 could comprise initiator 102′ sending DPP server 103 the set of network credentials 109 used by initiator 102′. DPP server 103 could then (i) record the credentials 109 in a server database 103 a further described below in FIG. 3b , (ii) use the value SSID.network-AP 109 a as a selected primary access network 308 aa, and (ii) use the received credentials 109 from initiator 102′ in a message 305 as the credentials 109 for device 101. Other possibilities regarding the source of credentials 109 exist without departing from the scope of the present invention.

Device database 104 can receive message 307 with ID-token.device 206 (or similarly ID.device 101 i) and initiator bootstrap keys sequence number 197. Device database in step 309 can conduct a query of device database 104 for data associated with ID-token.device 206 and initiator bootstrap keys sequence number 197. In exemplary embodiments, a query in a step 309 can select an initiator boostrap private key bi 104 b and an initiator bootstrap public key Bi 104 a using the initiator bootstrap keys sequence number 197 from a device table 104 d for device 101. In this manner, for embodiments where initiator bootstrap PKI keys for device 101 are updated over time (e.g. such as depicted and described in connection with FIG. 6a ), then the most recently updated initiator bootstrap PKI keys can be selected by a database query in a step 309. The query in step 309 can return values for a message 310 from device database 104 to DPP server 103. The values in a message 310 can comprise data for ID-token.device 206 and the values can include responder bootstrap public key Br 101 a, initiator bootstrap public key Bi 104 a, initiator bootstrap private key bi 104 b, a device identity ID.device 101 i, a selected set of cryptographic parameters 199 a for the PKI keys, and optionally PKEX key 198. Although not depicted in FIG. 3a , message 310 could also include ID-token.device 206 so that DPP server 103 can track which of a possible plurality of initiators 102′ and devices 101 that message 310 is associated with. In some embodiments, a step 302 d and the use of a sequence number 197 can be omitted, and a query in step 309 and message 310 can return the most recently updated or recorded values for responder bootstrap public key Br 101 a, initiator bootstrap public key Bi 104 a, and initiator bootstrap private key bi 104 b. Note that in some exemplary embodiments, the device identity ID-token.device 206 can comprise the secure hash 199 e value for the responder bootstrap public key Br 101 a, which can be depicted in FIG. 3a as “H(Br)”. However, in some embodiments a responder bootstrap public key Br 101 a could be shared across multiple devices 101 (for embodiments where Br 101 a can remain in a network 107 such as with FIG. 5b ), and for these embodiments then device identity ID-token.device 206 can comprise a different value than a secure hash 199 e value for the responder bootstrap public key Br 101 a.

For embodiments where (A) a DPP session 191 between initiator 102′ and device 101 fails due to a possible mismatch between (i) initiator bootstrap PKI keys selected in a query for step 309 and (ii) the actual initiator bootstrap public key Bi 104 a recorded and used by a responder 101 x in device 101 (such as the case where device 101 has undergone a “factory reset” to restore previously recorded initiator bootstrap public key Bi 104 a), then (B) DPP server 103 could send a second message 307 with a request to use the oldest recorded initiator bootstrap PKI keys from a device table 104 d (such as possibly the lowest or first recorded sequence number 197 for device 101 in device table 104 d). For these embodiments where (A) a DPP session 191 between initiator 102′ and device 101 fails due to a possible mismatch between (i) initiator bootstrap PKI keys selected in a query for step 309 and (ii) the actual initiator bootstrap public key Bi 104 a recorded and used by a responder 101 x in device 101, then (B) a query in step 309 can be for the oldest recorded initiator bootstrap PKI keys from a device table 104 d. In other exemplary embodiments, DPP server 103 could send message 307 with a specific initiator bootstrap keys sequence number 197, and a query in a step 309 could be for a specific set of responder bootstrap public key Br 101 a, initiator bootstrap public key Bi 104 a, initiator bootstrap private key bi 104 b designated by the initiator bootstrap keys sequence number 197 in a device table 104 d. Further, a key table 104 k in a device database 104 can record the most recently updated values and keys for a device 101, while a device table 104 d can record the historical values and PKI keys for a device 101 used over time, where the historical different values or PKI keys can be tracked, queried, or selected using an initiator bootstrap keys sequence number 197.

DPP server 103 can receive the message 310 and record the data received in a server database 103 a. As depicted in FIG. 3a , DPP server 103 can then send message 311 to initiator 102′, where message 311 can include (i) the selected mode 306 a of operation for initiator 102′ and DPP server 103 for conducting a DPP 191 with responder 101 x, (ii) a selected set of cryptographic parameters 199 a for use with PKI keys and a device provisioning protocol, and (iii) optionally a PKEX key 198 for conducting a public key exchange with responder 101 x. Message 311 can also optionally include device identity ID-token.device 206 in order to associate the data in message 311 with a particular responder 101 x, since initiator 102′ could potentially communicate with a plurality of different devices 101 over time.

At step 303 b initiator 102′ can receive and process the message 311. Initiator 102′ and DPP server 103 can begin operating in the selected mode 306 a for conducting a device provisioning protocol 191. Initiator 102′ and DPP server 103 can apply and begin using the selected set of cryptographic parameters 199 a. For a step 308 b, if a PKEX key 198 is present in a message 311, then initiator 102′ can conduct a public key exchange protocol with responder 101 x in order to obtain responder bootstrap public key Br 101 a via WiFi radio 102 w and “in band”. The public key exchange protocol is specified in the DPP specification version 1.0 section 5.6. If PKEX is optionally used between responder 101 x and initiator 102′, then initiator 102′ could receive the responder bootstrap public key Br 101 a and send the key Br 101 a to DPP server 103 (and in this case DPP server 103 or database 104 may not have previously recorded responder bootstrap public key Br 101 a). The use of a PKEX protocol and key 198 can also be optionally omitted in some embodiments, if responder bootstrap public key Br 101 a can be recorded by a network 107 prior to a step 303 b.

As depicted in FIG. 3a , the collection of steps and messages before a step 313 can be grouped together into a step 301. Step 301 with the collective group of sub-steps and messages depicted for a step 301 can also be performed in other embodiments depicted in FIG. 5a and FIG. 5b below. Subsequent messages and steps depicted in FIG. 3a starting after step 301 can represent a first mode 306 a for DPP server 103 and initiator 102′, where the allocation of recording PKI keys and symmetric keys from key exchanges for the first mode 306 a are depicted below in FIG. 3b . In other words, for a first mode 306 a depicted in FIG. 3a , DPP server 103 can record and conduct cryptographic calculations with the initiator bootstrap private key bi 104 b, the initiator ephemeral private key pi 102 b, and the responder bootstrap public key Br 101 a.

A step 313 can comprise deriving an initiator ephemeral private key pi 102 b and an initiator ephemeral public key Pi 102 a, and in FIG. 3a the DPP server 103 is depicted as conducting the step 313 to derive the initiator ephemeral PKI keys. Step 313 can use a random number generator to produce a random number, which could be input into a key pair generation algorithm using the set of cryptographic parameters 199 a. The resulting PKI key values from conducting a step 313 can comprise the initiator ephemeral private key pi 102 b and the initiator ephemeral public key Pi 102 a. The resulting PKI key values from conducting a step 313, if conducted by a DPP server 103, can be recorded in a server database 103 a, as depicted in FIG. 3b below. Other embodiments depicted below contemplate a step 313 to derive initiator ephemeral PKI keys being conducted by an initiator 102′. In summary, some steps depicted as conducted by a DPP server 103 in FIG. 3a could be conducted instead by an initiator 102′ for other embodiments such as those depicted in FIG. 5a and FIG. 5b , with a corresponding change in supporting message flows between DPP server 103 and initiator 102′. The ephemeral PKI key derivation by DPP server 103 in a step 313 can be equivalent to a PKI key derivation step 102 y depicted and described in connection with FIG. 1b and FIG. 1c by an initiator 102*.

Step 314 can comprise DPP server 103 conducting a first initiator key exchange step 314 using an Elliptic Curve Diffie Hellman (ECDH) key exchange 401 a, as depicted and described in connection with FIG. 4a below. Data input for a step 314 can comprise the initiator ephemeral private key pi 102 b and the recorded responder bootstrap public key Br 101 a. Data output from a step 314 can comprise a key k1 as described in FIG. 4a below. Step 314 can comprise the key exchange and symmetric key derivation step in DPP specification version 1.0 section 6.2.2 in order to for an initiator to obtain key k1.

At step 315, DPP server 103 can generate a random number for an initiator nonce 317 a using parameters 199 a. As used herein and throughout the present invention, the words “random number” can also mean a pseudo random number, since random numbers generated by nodes may not be truly random. However, their “randomness” may be sufficient in order to securely conduct the cryptographic operations contemplated herein. DPP server 103 can also determine the initiator capabilities, which could comprise a configurator for the initiator as depicted in FIG. 3a (where responder 101 x would be the enrollee). In other embodiments, the initiator 102′ could have initiator capabilities as an enrollee (where the responder 101 x could be the configurator). A step 315 can comprise encrypting the initiator nonce 317 a and initiator capabilities using the derived key k1 from step 314 in order to create a ciphertext 315 a. An encryption step 315 step is further depicted and described in connection with FIG. 4a below.

At step 316, DPP server 103 can calculate secure hash values for initiator bootstrap public key Bi 104 a and responder bootstrap public key Br 101 a, using a secure hash algorithm 199 e. The values are depicted in FIG. 3a as “H(Bi)” and “H(Br)”, respectively. For embodiments that conduct a responder authentication 141 as depicted and described in connection with FIG. 1b , then the calculation of a secure hash value for initiator bootstrap public key Bi 104 a can be omitted and a null value for H(Bi) can be transmitted in a subsequent DPP authentication request message 122. DPP server 103 can then send initiator 102′ message 317, which can include the hash value for the initiator bootstrap public key Bi 104 a and the responder bootstrap public key Br 101 a, the derived initiator ephemeral public key Pi 102 a, and ciphertext 315 a, where ciphertext 315 a is encrypted with key k1 and includes an initiator nonce 317 a and the initiator capabilities. Initiator 102′ can receive message 317 via the secure session 302 b.

For a step 316 a (not depicted in FIG. 3a , but conducted by initiator 102′ after receipt of message 317 and also depicted in FIG. 5a below), initiator 102′ can then send DPP Authentication Request message 122 to responder 101 x, using WiFi radio 102 w with initiator configuration 130. In exemplary embodiments, initiator 102′ sends message 122 as a unicast message to responder 101 x using MAC.R 101 d as the destination/recipient, and initiator 102′ received MAC.R 101 d in a previous message such as message 220. Alternatively, initiator 102′ sends message 122 as a broadcast message (and MAC.R 101 d would not normally be required for broadcast). However, unicast for WiFi can be preferred, since unicast messages are acknowledged at the data link layer. In a step 316 a, initiator 102′ may need to repeat message 122 multiple times on several different channels in a channel list 130 b from initiator configuration 130, since (i) responder 101 x may be periodically sleeping in order to conserve battery power, and (ii) responder 101 x may also be cycling through a channel list 130 b in order to listen for message 122 on different channels (and the cycling by initiator 102′ and responder 101 x may not be synchronized). As depicted in FIG. 3a , message 122 sent by initiator 102′ can include hash values for the public keys 101 a and 104 a, the initiator ephemeral public key Pi 102 a, and the ciphertext 315 a.

In addition, DPP authentication request message 122 in FIG. 3a can have some differences than message 122 in FIG. 1b and FIG. 1c . Message 122 in FIG. 3a can originate from an initiator proxy 102′ (where initiator proxy 102′ may not record an initiator bootstrap private key bi 104 b for responder 101 x), while message 122 in FIG. 1c can be from an initiator 102*, where initiator 102* can record and operate on the initiator bootstrap private key bi 104 b. In other words, from the perspective of a responder 101 x message 122 in FIG. 1c and FIG. 3a could be identical, but the initiator 102* and 102′ can be different, depending on the recording and processing of PKI keys and shared secret keys. Further, although a message 122, message 123, etc. as depicted herein shows key values of “k1”, “ke”, etc., the depiction of the keys is to illustrate that ciphertext is encrypted with the corresponding key by the use of brackets. In other words, although the key values are shown with the messages, the actual key values are not transmitted inside or with the message in exemplary embodiments. The equivalent syntax is used in DPP specification version 1.0.

Responder 101 x can receive message 122 and perform a series of steps to process the message and respond to the initiator 102′. Responder 101 x in device 101 can compare (i) hash values received in message 122 with (ii) the calculated hash values for bootstrap public keys from a step 302 c. If (a) the hash values match or are equal, then responder 101 x can proceed to subsequent steps, and otherwise (b) continue to cycle through a channel list 130 b in order to listen for incoming messages 122. At step 318, responder 101 x can also generate two random numbers using a random number generator. The first random number can be used as a responder ephemeral private key pr 101 f. The responder ephemeral private key pr 101 f can be input into an ECC key pair generation algorithm in order to output a responder ephemeral public key Pr 101 e. The set of cryptographic parameters 199 a used for the responder ephemeral PKI key pair can match the recorded parameters 199 a used with the bootstrap public keys such as responder bootstrap public key Br 101 a. The second random number generated by responder 101 x can be used as a responder nonce 318 b. Responder 101 x can also determine responder capabilities 319 b, which could comprise the capabilities for an enrollee.

Responder 101 x can conduct a first responder key exchange step 319, where the details for a key exchange step 319 are depicted in FIG. 4a below. In summary, the received initiator ephemeral public key Pi 102 a (from message 122) and the responder bootstrap private key br 101 b can be input into an ECDH key exchange in order to mutually derive a shared secret key M 410. The shared secret key M 410 can be input into a key derivation function 402 a in order for responder 101 x to derive mutually shared key k1 314 a. A responder 101 x can then conduct a decryption step 320 as depicted in FIG. 4a below. Responder can input the received ciphertext 315 a into a symmetric ciphering algorithm 405 b and key k1 314 a using parameter 199 f in order to read the plaintext 403, which could comprise the initiator nonce 317 a and the initiator capabilities. In exemplary embodiments, the initiator 102′ can have capabilities of a configurator, and responder 101 x can select responder capabilities or an enrollee in a step 320. Steps 319 and steps 320 can also comprise the first four paragraphs of section 6.2.3 of DPP specification version 1.0.

Responder 101 x can then conduct a second responder key exchange step 314 b, where the details for a key exchange step 314 b are depicted and described in connection with FIG. 4b below. In summary, the initiator ephemeral public key Pi 102 a received in message 122 can be input into an ECDH key exchange algorithm 401 a along with the responder ephemeral private key pr 101 f derived in a step 318 above in order to output a secret shared key N 411. The value for shared secret key N 411 can be recorded and used in the derivation of a key ke 327 a in a third key exchange step 321 below. For a step 314 b, the value for the shared secret key N 411 can be input into a key derivation function 402 b in order to derive a mutually shared symmetric key k2 314 c.

Responder 101 x can conduct a third responder key exchange step 321, where the details for a key exchange step 321 are depicted in FIG. 4c below. In summary, both (i) the derived responder ephemeral private key pr 101 f from a step 318 with the recorded responder bootstrap private key br 101 b, and (ii) the recorded initiator bootstrap public key Bi 104 a can be input into an ECDH key exchange algorithm 401 c in order to output a secret shared key L 412. For embodiments where a DPP responder authentication 141 is conducted by responder 101 x without the use of an initiator bootstrap public key Bi 104 a, then calculation of a secret shared key L 412 can be optionally omitted in a step 321. Step 321 for responder 101 x can then comprise a key derivation function 402 c using the mutually derived secret shared keys M 410, N 411, and optionally L 412 in order to mutually derive secret shared key ke 327. An example for a key exchange step 321 is described in point 2 of section 6.2.3 of DPP specification version 1.0 on page 48.

Responder 101 x can then conduct an encryption step 322, where the details for an encryption step 322 are depicted and described in connection with FIG. 4c below. Step 322 can also comprise responder 101 x creating or calculation a value R-auth 404, where R-auth 404 can comprise a secure hash value of the initiator nonce 317 a (decrypted from ciphertext 315 a), the second random number R-nonce 318 b from a step 318 above, and public PKI keys. The value for R-auth 404 in a step 322 can comprise the value in point 3 of section 6.2.3 of DPP specification version 1.0. An encryption step 322 can comprise responder 101 x encrypting the value for R-auth 404 using the mutually derived key key 327 from the third key exchange step 321 above, where the output of encryption step 322 can comprise ciphertext 322 a.

Responder 101 x can then conduct an encryption step 315 b, where the details for an encryption step 315 b are depicted and described in connection with FIG. 4b below. Ciphertext 322 a from an encryption step 322 in the paragraph above can also be encrypted again for an encryption step 315 b. The symmetric ciphering key for encryption step 315 b can comprise symmetric key k2 314 c. Encryption step 315 b, encryption step 322, and decryption step 320 can use a common symmetric ciphering algorithm 405 a, which could comprise the Advanced Encryption Standard with Synthetic Initialization Vectors (AES-SIV) (and deciphering algorithm) also with a common set of symmetric ciphering parameters 199 f. Symmetric ciphering parameters 199 f can also specify the use of a block chaining mode such as cipher block chaining (CBC), counter mode (CTR), or Galois/Counter mode (GCM) and other possibilities exist as well. In addition, symmetric ciphering parameters 199 f could specify a mode for message authentication, which could comprise a CMAC mode as specified in NIST publication SP-800-38B. In exemplary embodiments, a symmetric ciphering algorithm 405 a can comprise the AES-SIV algorithm as specified in IETF RFC 5297. The output from an encryption step 315 b can be ciphertext 315 c, as depicted in FIG. 4b below. As depicted in FIG. 3a , the collection of steps for responder 101 x comprising steps 318, 319, etc. through step 315 b can comprise a step 325. In summary, a responder 101 x can use a step 325 in order to receive a DPP authentication request message 122 and send a DPP authentication response message 123.

Responder 101 x can then send an DPP Authentication Response message 123, where message 123 can include hash values of the bootstrap public keys H(Br 101 a), H(Bi 104 a), the responder ephemeral public key Pr 101 e, and the ciphertext 315 c. The ciphertext 315 c can have encrypted values for (i) R-nonce 318 b, (ii) 1-nonce 317 a, (iii) R-capabilities 318 c, and (iv) ciphertext 322 a. The ciphertext 315 c can be encrypted with mutually derived symmetric encryption key k2 314 c as shown for an encryption step 315 b in FIG. 4b . Ciphertext 322 a can be encrypted with the mutually derived symmetric key ke 327 a and can include a plaintext value for R-auth 404. As described above, R-auth 404 can comprise a hash value over an initiator nonce 317 a received and the responder nonce 318 b.

As depicted in FIG. 3a , initiator 102′ can receive DPP Authentication Response message 123. In exemplary embodiments, initiator 102′ can conduct a step 323 to process the received responder ephemeral public key Pr 101 e, such as evaluating that the received key in message 123 uses the parameters 199 b specified in cryptographic parameters 199 a. In addition, a step 323 can comprise initiator 102′ can conduct public key validation step to ensure that received responder ephemeral public key Pr 101 e is properly formatted and does not contain weak or compromising cryptographic data. For example, a step 323 could comprise initiator 102′ performing the steps for an ECC Full Public-Key Validation Routine in section 5.6.2.3.2 of FIPS publication SP 800-56A (revision 2). Alternatively, step 323 can comprise initiator 102′ performing the steps ECC Partial Public-Key Validation Routine in section 5.6.2.3.3 of the same FIPS publication. Other example steps within a public key validation step 323 can comprise (i) optionally verifying the public key is not at the “point of infinity”, and (ii) verifying the coordinates of the point for the public key are in the range [0, p−1], where p is the prime defining the finite field. Other possibilities exist as well for evaluating and validating a received public key is cryptographically secure in a public key validation step 323, without departing from the scope of the present invention. As contemplated in the present invention, an initiator 102′, a DPP server 103, or a responder 101 x can conduct a public key validation step 323 each time a public key is received.

In exemplary embodiments, initiator 102′ can send DPP server 103 a message 324 using secure session 302 b. Message 324 can include the ID-token.device 206 (or alternatively ID.device 101 b), and the ciphertext 315 c. Hash values for public bootstrap keys can be useful over link 192 between responder 101 x and initiator 102′ in order to confirm identities, but the hash values can be substituted with an identity for device 101 in message 324 between initiator 102′ and DPP server 103. The ciphertext 315 c in message 324 can be the same as ciphertext 315 c in message 123 in FIG. 3a . In other embodiments, the hash values for the public bootstrap keys of initiator 102 and responder 101 x can be included in a message 324, thereby increasing the message size by at least 64 bytes.

DPP server 103 can receive message 324 from initiator 102′ and conduct a series of steps in order to process the message and reply to the initiator 102′. In exemplary embodiments, DPP server 103 can also perform a public key validation step 323 on the received responder ephemeral public key Pr 101 e. Although a step 323 by DPP server 103 may appear redundant with a step 323 by initiator 102′, DPP server 103 may trust its own computation for a step 323 with a higher level than relying solely on a step 323 performed by initiator 102′. Initiator 102′ as operating in FIG. 3a could also comprise a device with a lower level of security than DP server 103. After a step 323, DPP server 103 can record the validated, received responder ephemeral public key Pr 101 e in a server database 103 a, as depicted in FIG. 3b below.

At step 319 a, DPP server 103 can conduct a second initiator key exchange step 319 a, where DPP server 103 can input the received, validated responder ephemeral public key Pr 101 e and the derived initiator ephemeral private key pi 102 b into an ECDH key exchange algorithm 401 b in order to calculate a shared secret key N 411. The second initiator key exchange step 319 a is also depicted and described in connection with FIG. 4b below. Shared secret key N 411 can also be used by DPP server 103 in a step 327 below. DPP server 103 can input shared secret key N 411 into a key derivation function 402 b in order to mutually derived the symmetric encryption key k2 314 c.

At step 320 b, DPP server 103 can use the derived key k2 314 c from a step 319 a in order to conduct a decryption step 320 b on received ciphertext 315 c. A decryption step 320 b on received ciphertext 315 c using key k2 314 c is depicted an described in connection with FIG. 4b below. DPP server 103 can read the plaintext 403 b values from decryption step 320 b of ciphertext 315 c. The plaintext values 403 b can include the initiator nonce 317 a from a message 317 and message 122 above. The plaintext values 403 b can also include a second ciphertext 322 a (e.g. ciphertext 322 a can be inside ciphertext 315 c). DPP server 103 verifies that the initiator nonce 317 a received in message 123 and decrypted in step 320 b is equal to the initiator nonce 317 a value sent in message 122 above. If the two initiator nonce 317 a values are not equal, then DPP server 103 can abort the DPP procedure and subsequent steps.

At step 327, DPP server 103 can conduct a third initiator key exchange step 327, where DPP server 103 can determine the secret shared key L 412 by inputting (i) the combination of the responder bootstrap public key Br 101 a and the responder ephemeral public key Pr 101 e (which could comprise an ECC point addition operation), and (ii) the initiator bootstrap private key bi 104 b into an ECDH key exchange algorithm 401 c. A third server key exchange step 327 is depicted and described in connection with FIG. 4c below. The shared secret key L 412 along with shared secret keys M 410 and N 411 can be used with a key derivation function 402 c in order to output the mutually derived symmetric ciphering key ke 327 a.

At step 328, DPP server 103 can conduct a decryption step 328 on the ciphertext 322 a using the key ke 327 a. A decryption step 328 is depicted and described in connection with FIG. 4c below. DPP server 103 can use the decryption step 328 in order to read the plaintext value of R-auth 404. R-auth 404 can comprise a hash 199 e value over the combination of initiator nonce 317 a and the responder nonce 318 b, plus PKI public keys. At step 328, DPP server 103 can then also internally calculate the same value for R-auth 404, and if the internally calculated value and the received, decrypted value are equal, then the responder 101 x can be consider authenticated with DPP server 103. In other words, at step 328 DPP server 103 can determine that the calculated value for R-auth 404 and the received, decrypted value for R-auth 404 are equal before proceeding with additional steps in FIG. 3a . If the calculated value for R-auth 404 and the received value for R-auth are not equal, then DPP server can end the DPP 191 session without sending network credentials 109. The calculation of R-auth 404 by DPP server 103 can be according to section 6.2.3 of DPP specification version 1.0.

DPP server 103 can then conduct a step 322 b, where step 322 b can comprise calculating an initiator authentication value I-auth 404 a and encrypting the value I-auth 404 a. Initiator authentication value 404 a can be similar to responder authentication value R-auth 404, except the values of initiator nonce 317 a can be sequenced before a responder nonce 318 b inside a hash 199 e calculation over the two nonces. A DPP server 103 can then encrypt the initiator authentication value 404 a using an encryption step 322 using key ke 327 a, as depicted in FIG. 4c below. In other words, an encryption step 322 in FIG. 4c depicts the encryption of R-auth 404, and encryption step 322 b can comprise a DPP server 103 encrypting the initiator authentication value I-auth 404 a using the key ke 327 a derived in a step 327. The encrypted ciphertext for the initiator authentication value I-auth 404 a using the key key 327 a can comprise a ciphertext 349.

DPP server 103 can then send initiator 102′ a message 329, where message 329 can include (i) an identity for device 101, such as ID-token.device 206, although ID.device 101 i could be used instead, and (ii) the encrypted initiator authentication value I-auth 404 a comprising the ciphertext 349. Initiator 102′ can receive message 329 over secure session 302 b. In an exemplary embodiment, the value MAC.R 101 d could also be within message 329, such that initiator 102′ can use the MAC.R 101 d to send data in message 329 to responder 101 x using the MAC.R 101 d. Initiator 102′ can determine which of a plurality of responders 101 x is directed towards based on the value of ID-token.device 206 or MAC.R 101 d. Initiator 102′ can previously record the hash 199 e values for the initiator and responder bootstrap public keys. Initiator 102 can take the recorded hash 199 e values for the initiator and responder bootstrap public keys and append to them the encrypted value for I-auth 404 a received in message 329. Initiator 102′ can send responder 101 x a DPP authentication confirm message 123 a, as depicted in FIG. 3a . The data and steps to determine and calculate an DPP authentication confirm message 123 a can be according to section 6.2.4 of DPP specification version 1.0.

Note that although the DPP authentication confirm message 123 a can be equivalent to the DPP authentication confirm message from section 6.2.4 of DPP specification version 1.0, an important difference can be the operation of initiator 102′ in FIG. 3a versus an initiator as contemplated by DPP specification version 1.0. In the embodiment of the present invention as depicted in FIG. 3a , initiator 102′ can record neither the responder bootstrap public key Br 101 a, nor the initiator bootstrap private key bi 104 b. So, using the technology depicted in FIG. 3a , an initiator 102′ can (i) send and receive messages that are fully compatible with a DPP protocol 191, but (ii) DPP server 103 can record keys 101 a and 104 b. In other words, a responder 101 x may not “know” that an initiator operates as either (i) an initiator 102* from FIG. 1b or FIG. 1c , or an initiator 102′ from FIG. 3a since the messages transmitted by initiator 102′ and received by the responder 101 x can be fully compatible with a DPP 191.

Responder 101 x can receive the DPP authentication confirm message 123 a and process the message. Responder 101 x can listen for either (i) a broadcast message with the hash 199 e values for the bootstrap public keys 101 a and 104 a, or (ii) for a unicast message to MAC.R 101 d. Responder 101 x can first conduct a decryption step 328 b, where decryption step 328 b can use the same steps as a decryption step 328 as depicted in FIG. 4c below, with a difference being decryption step 328 b operates on the initiator authentication value I-auth 404 a instead of the R-auth 404 value.

In step 331, responder 101 x can compare the decrypted value for I-auth 404 a with a calculated value for I-auth 404 a and if the two values match then data from the initiator 102′ can be considered by responder 101 x to be authenticated. After an authentication step 331, in step 332, responder 101 x can take on a roll of enrollee, such that responder 101 x can prepare to send a configuration attribute 330. Configuration attribute 330 can be used to specify that responder 101 x can take the roll of enrollee and is expecting a set of network credentials 109 from initiator 102′. A configuration attribute 330 can be formatted and contain data fields according to section 6.3.4 of DPP specification version 1.0. For the exemplary embodiment depicted in FIG. 1a , device 101 with responder 101 x would prefer a role of WiFi client (or “sta”) for a configuration attribute 330, but other possibilities exist as well. For the exemplary embodiment depicted in FIG. 7 below a responder 101 x operating within an access point 105 would prefer a role of WiFi access point (or “ap”) for a configuration attribute 330.

In step 332, responder 101 x can also generate a third responder random number, where the third responder random number can comprise an enrollee nonce E-nonce 332 a. E-nonce 332 a and other nonce values in FIG. 3a such as the initiator nonce I-nonce 317 a and responder nonce R-nonce 318 b can be processed using nonce parameters 199 g. Responder 101 x can then conduct an encryption step 322 c, where encryption step 322 c can comprise (i) an encryption step 322 using key ke 327 a, and (ii) the plaintext to be encrypted can be the E-nonce 332 a and the configuration attribute 330. The output of an encryption step 322 c can be a ciphertext 322 d. As depicted in FIG. 3a , the collection of steps comprising 328 b through 322 c for responder 101 x can comprise a step 339, where a responder 101 x processes both message 123 a and message 123 b in a step 339. Responder 101 x can then send or transmit to initiator 102′ a DPP Configuration Request message 123 b, where the configuration request 123 b can include the ciphertext 322 d, where the plaintext in ciphertext 322 d can include E-nonce 332 a and the configuration object 330. DPP Configuration Request message 123 b can be processed by responder 101 x according to section 6.3.3 of DPP specification version 1.0.

Initiator 102′ can receive DPP Configuration Request message 123 b via connection 192 and using DPP application 102 g. As contemplated herein, a DPP application 102 g can perform the steps for initiator 102′ depicted in FIG. 3a , such as transmitting/receiving DPP 191 messages using a first MAC.I 102 n for connection 192 and transmitting/receiving messages with DPP server 103 using MAC.N 102 q via access network 112. Although not depicted in FIG. 3a , DPP application 102 g could also perform the depicted steps 323 to validate the received responder ephemeral public key Pr 101 e from message 123 b. For embodiments where initiator 102′ uses a WAN radio 102 h to connect with access network 112 and DPP server 103, then DPP application 102 g could also use a different identity than MAC.N 102 q to identify the physical interface of WAN radio 102 h, such as an IMEI, device identity ID.device 102 i, or other possibilities exist as well. For other embodiments where initiator 102′ uses network access point 105 for an access network 112 to connect with DPP server 103, then MAC.I 102 n could also potentially be the same as MAC.N 102 q. Other possibilities exist as well without departing from the scope of the present invention for an identity used by initiator 102′ to send messages to DPP server 103.

Initiator 102′ can send DPP server 103 a message 334 via secure connection 302 b, where message 334 can include the ciphertext 322 d. Although not depicted in FIG. 3a , message 334 can also include an identity for device 101, such as, but not limited to, ID-token.device 206 or ID.device 101 b, since both DPP server 103 and initiator 102′ can communicate with a plurality of different devices 101 over time, and DPP server 103 may prefer to know which ciphertext 322 d is associated with which device 101 in order to process the ciphertext 322 d. As depicted in FIG. 3a , message 334 can include the encrypted values for E-nonce 332 a and configuration attribute 330 in ciphertext 322 d.

DPP server 103 can receive message 334 and process the message 334. DPP server 103 can conduct a decryption step 328 c using decryption step 328 depicted in FIG. 4c below. A difference between decryption step 328 and decryption step 328 c is that decryption step 328 c uses the ciphertext 322 d as input into the symmetric decryption algorithm 405 b. DPP server 103 can use the previously calculated key ke 327 a in order to read the plaintext within ciphertext 322 d. DPP server 103 can record the plaintext E-nonce 332 a and configuration attribute 330.

In step 335, DPP server 103 can process the received configuration attribute 330. For the exemplary embodiment depicted in FIG. 1a , configuration attribute 330 can specify that device 101 with responder 101 x may have a role of WiFi client. In exemplary embodiments, DPP server 103 can previously select a primary access network 308 aa in a step 308 a above, using the received networks available list 304 c from initiator 102′. Also, in a step 308 b above, DPP server 103 could receive or record the set of network credentials 109 associated with the selected primary access network 308 aa for device 101 using device identity ID-token.device 206 (or ID.device 101 i) and server database 103 a and credentials table 340 in FIG. 3b below. In step 335, DPP server can process the set of network credentials 109 for primary access network 308 aa into a configuration object. The configuration object with network credentials 109 can comprise a connector or configuration object as specified in section 6.3.5 and 6.3.6 of DPP specification version 1.0. The configuration object with network credentials 109 can be signed using the recorded initiator ephemeral private key pi 102 b, corresponding to public key Pi 102 a sent in message 317 and 122 above. Or, in another embodiment the configuration object with network credentials 109 can be signed using the recorded initiator bootstrap private key bi 104 b. The steps to create and verify a signature with ECC PKI keys can be according to FIPS publication 186-4, and other possibilities exist as well.

In a step 335, DPP server 103 can process a configuration object for network credentials 109, and the configuration object can include an SSID value of SSID.network-AP 109 a, a pairwise master key value of PMK.network-AP 109 b, and configuration values of config.network-AP 109 c. The value of PMK.network-AP 109 b can also include a value for PMKID (e.g. PMK identifier), such that PMK.network-AP 109 b is used by each of a client and an access point with the PMKID value. The configuration values of config.network-AP 109 c in a configuration object could also specify required supporting data for operation of device 101 with an access point 105 after a configuration step 106, such as an operating class 130 a, channel list 130 b, an authentication mode for device 101 to operate, which could be PSK, PMK, SAE, EAP, also with any required supporting data and/or identities. The configuration values of config.network-AP 109 c in a configuration object could also include a passphrase or pre-shared key values of PSK for legacy WPA2 networks. As contemplated herein, a set of network credentials 109 can include either (i) network credentials 109 for a selected primary access network 308 aa, or (ii) network credentials 109 for both a selected primary access network 308 aa and a selected backup access network 308 ab. Or, in another exemplary embodiment, although a single configuration object of network credentials 109 is depicted in FIG. 3a , DPP server 103 could process (i) a first set of network credentials 109 for selected primary access network 308 aa into a first configuration object and then (ii) s second set of network access credentials 109 for selected backup access network 308 ab into a second configuration object.

At step 322 e, DPP server 103 can conduct an encryption step 322 e using an encryption step 322 depicted and described in connection with FIG. 4c below. Encryption step 322 e can be performed using key ke 327 a for device 101. For encryption step 322 e, the plaintext values of (i) the E-nonce 332 a and (ii) the configuration object comprising network credentials 109 can be input into a symmetric encryption algorithm 405 a in order to generate a ciphertext 322 f. DPP server 103 can then send initiator 102′ a message 338, where message 338 includes the ciphertext 322 f. Message 338 can also optionally include an identity for device 101 such as ID-token.device 206 or ID.device 101 i. Message 338 can be sent via secure connection 302 b, as depicted in FIG. 3a . Message 338 can also include a digital signature over at least the configuration object comprising network credentials 109, where the digital signature is created by DPP server 103 using the initiator ephemeral private key pi 102 b or the initiator bootstrap private key 104 b. Note that in some exemplary embodiments, message 338 can include an asymmetrically encrypted set of network access credentials 109′ (instead of plaintext network access credentials 109), where the asymmetrically encrypted network access credentials 109′ are depicted and described in connection with a step 336 and a message 515 in FIG. 5a below.

Initiator 102′ using DPP application 102 g can receive message 338 via secure connection 302 b. Initiator 102′ can use an optional identity for device 101 in a message 338 in order to determine which of a potential plurality of devices 101 associated with ciphertext 332 f in order to forward the data. Initiator 102′ can then send responder 101 x a DPP configuration response message 124 via connection 192, where message 124 can include the ciphertext 322 f, and the ciphertext 322 f can include the encrypted E-nonce 332 a and (i) the encrypted, signed network credentials 109 or (ii) the encrypted and also asymmetrically encrypted network access credentials 109′ as depicted and described in a step 336 below in FIG. 5 a.

Responder 101 x can receive message 124 from initiator 102′ with ciphertext 322 f. Responder 101 x can conduct a decryption step 328 d using decryption step 328 depicted in FIG. 4c below. A difference between decryption step 328 and decryption step 328 d is that decryption step 328 d uses the ciphertext 322 f as input into the symmetric decryption algorithm 405 b. Responder 101 x can use the previously calculated key ke 327 a (from key exchange step 321) in order to read the plaintext within ciphertext 322 f. Responder 101 x can confirm that plaintext in ciphertext 322 f includes the previously send E-nonce 332 a. Responder 101 x can read (i) the plaintext values for credentials 109 or (ii) the plaintext ciphertext value for asymmetrically encrypted network access credentials 109′. In other words, ciphertext 322 f could include “double encrypted” ciphertext 109′, and the first level of encryption with key ke 327 a could be removed by a decryption step 328 d. Note that credentials 109 may be previously signed by DPP server 103 using a private key initiator ephemeral private key pi 102 b for the initiator 102′ (or initiator bootstrap private key bi 104 b), where the private key corresponds to public key Pi 102 a. The responder could also verify a signature for the credentials 109 using the ephemeral public key for the initiator Pi 102 a recorded with the responder 101 x, such as the initiator ephemeral public key Pi 102 a or the initiator bootstrap public key Bi 104 a. The selection of PKI keys for signing and verifying a signature for credentials 109 could be specified in a set of parameters 199 a.

After reading the network credentials 109 and optionally verifying a signature using a recorded public key 102 a or 104 a, device 101 can complete the configuration step 106 by loading the network credentials 109 and begin operating a WiFi radio 101 h with the network credentials 109, as depicted in FIG. 1a . In this manner, device 101 can obtain connectivity to network access point 105. Note that for some exemplary embodiments, network credentials 109 could be applied to other radios besides a WiFi radio 101 h in device 101 (equivalent to WiFi radio 102 w in initiator 102), such as using the received network credentials 109 with a WAN radio for a 5G or 6G wireless WAN network for device 101. In exemplary embodiments, the initiator 102′ can conduct the initiator restore step 129 depicted and described in connection with FIG. 1d above, such that initiator 102′ can be returned to the previous state where WiFi radio 102 w operates with a user configuration 131, thus minimizing impacts of the prior initiator configuration step 127 for an initiator user 102 u.

FIG. 3b

FIG. 3b is an illustration of an exemplary server database, with tables for a server database recording exemplary data, in accordance with exemplary embodiments. A server database 103 a depicted and described above in connection with FIG. 1a and FIG. 3a can record data for a DPP server 103 to work or operate with an initiator 102′ in order for the initiator 102′ to conduct a device provisioning protocol 191 with a device 101 operating a responder 101 x. A server database 103 a could record a plurality of tables for a plurality of devices 101 and a plurality of initiators 102′, including the depicted device credentials table 340. Other possibilities exist as well for the organization, tables, and recorded data within a device database 103 a without departing from the scope of the present invention. Data within server database 103 a could be encrypted using a symmetric key. As depicted in FIG. 1a , a DPP server 103 operating in a network 107 could operate and record a server database 103 a.

Server database 103 a can record a device identity of ID-token.device 206, a responder MAC address MAC. R 101 d, an initiator MAC address MAC. I 102 n (or MAC.I 102 q), a mode of operation for the DPP server 103 and initiator 102′ comprising initiator mode 306 a, a selected set of Cryptographic Parameters 199 a, an Initiator Ephemeral Public Key 102 a, an Initiator Ephemeral Private Key 102 b, a Responder Ephemeral Public Key 101 e, Bootstrap keys 399, an optional PKEX Key 198, a Shared Secret k1 314 a, a Shared Secret k2 314 c, and a Shared Secret ke 327 a. For exemplary embodiments, not all depicted values may be recorded in a server database 103 a, as shown by the depicted value of “-”, which can mean that the value is not recorded in a server database 103 a. An initiator 102′ could record the value depicted as “-” for a server database 103 a in FIG. 3b for some initiator modes 306 a, as depicted. For example, with the row in server database 103 a depicted with a mode “FIG. 5a ”, the initiator 102′ could derive, record, and operate on the initiator ephemeral private key pr 102 b and initiator ephemeral public key Pr 102 a, and DPP server 103 may not need or record the keys. Similarly, with the row in server database 103 a depicted in FIG. 3b as a mode of “FIG. 5b ”, the initiator 102′ could derive shared secret keys k2 314 c and ke 327 e, while server database 103 a could derive and record key k1 314 a. Note that in alternative exemplary embodiments, a server database 103 a could record the values M 410, N 411, and L 412 respectively instead of key k1 314 a, k2 314 c, and/or ke 327 e, and either DPP server 103 or initiator 102′ could use the key derivation function 402 a, 402 b, and/or 402 c, respectively in order to convert the values into keys. In exemplary embodiments, the time that a device shared secret key or a derived ephemeral PKI key, or a bootstrap key is recorded in a server database 103 a can be minimized to the minimum time necessary to conduct a DPP 191. For example, shared secret keys and ephemeral PKI keys recorded in a server database 103 a can be deleted once a configuration step 106 has been completed for a device 101, such as at the time DPP server 103 receives a report 605 aa from device 101 in FIG. 6a below.

Initiator mode 306 a can specify an operating mode for initiator 102 and DPP server 103, such that a sequence of steps and transmitting/receiving PKI and/or shared secret keys can be specified by the initiator mode 306 a. An initiator mode 306 a could also be referred to as a “server mode” 306 a, since the mode specifies the operation of a DPP server 103. Or, initiator mode 306 a could be referred to as a “mode 306 a”, since both steps for initiator 102′ and DPP server 103 are affected by the mode. FIG. 3a above also described a first, second, third, and fourth operating initiator modes 306 a. The first, second, third, and fourth modes for initiator 102′ and DPP server 103 further described below in this FIG. 3b can also correspond to the same first, second, third, and fourth modes for initiator 102′ and DPP server 103 as depicted and described for a step 306 in FIG. 3 a.

A first mode is depicted as “FIG. 3a ” in FIG. 3b and can comprise the mode 306 a depicted in FIG. 3a . Note that all depicted ephemeral PKI keys and bootstrap PKI keys, as well as all depicted shared secret keys are recorded in a server database 103 a for a device 101 (except responder private keys 101 b and 101 f) for the first mode. In other words, when conducting a DPP 191, initiator 102′ and DPP server 103 would have all the depicted keys recorded in a server database 103 a for the first mode. This first mode for an initiator mode 306 a can be preferred for embodiments where (i) initiator 102′ may have a lower level of trust with network 107, or (ii) initiator 102′ could have a lower level of processing resources, or (iii) an owner for device 101 or a network 107 may prefer that responder bootstrap public key Br 101 a is not shared externally from network 107, or (iv) regulatory requirements where device 101 could comprise a high value or sensitive piece of equipment. Other possibilities exist as well for the reasons different modes 306 a may be used in a server database 103 a to specify the steps for an initiator 102′ and DPP server 103 to conduct a DPP 191 with device 101.

A second mode is depicted as “FIG. 5a ” in FIG. 3b , where the steps and message flows in FIG. 5a for initiator 102′ and DPP server 103 can comprise the second mode. Note that all relevant bootstrap PKI keys 399 are recorded in a server database 103 a for the mode depicted in FIG. 5a . The mode 306 a can also have (i) the responder ephemeral public key Pr 101 e and (ii) the shared secret key k1 314 a recorded in a server database 103 a. Note that initiator ephemeral PKI keys and secret shared keys can optionally not be recorded in a server database 103 a for the second mode depicted in FIG. 5a . This exemplary embodiment may be preferred for cases where (i) initiator 102′ can handle more of the cryptographic operations (e.g. reducing DPP server 103 processing load), but (ii) a network 107 and initiator user 102 u could prefer that the initiator bootstrap private key bi 104 b is not transmitted to or recorded in initiator 102′. An exemplary reason the second mode of “FIG. 5a ” could be preferred may be embodiments where multiple different devices 101 record the same initiator bootstrap public key Bi 104 a, and for these embodiments a network 107 may prefer to keep the initiator bootstrap private key bi 104 b recorded in a server database 103 a. This embodiment was also discussed above with the devices designated with “shared keys” in FIG. 2b . As depicted in FIG. 3b , devices 101 with the same recorded value or number for an initiator bootstrap public key Bi 104 a could also record different responder bootstrap public keys Br 101 a.

A third mode 306 a is depicted as “FIG. 5b ” in FIG. 3b , where the steps and message flows in FIG. 5b for initiator 102′ and DPP server 103 can comprise the third mode. Note that all relevant bootstrap PKI keys 399 are recorded in a server database 103 a for the third mode depicted in FIG. 5b . The third mode 306 a can be a mix between the first mode of “FIG. 3a ” and the second mode of “FIG. 5a ”. In other words, the third mode 306 a of “FIG. 5b ” can have the same data recorded for operation of the mode in “FIG. 5a ”, except the addition of recording the initiator ephemeral private key pi 102 b and secret key k1 314 a in server database 103 a. Thus some additional computation resources are shifted from the initiator 102′ to DPP server 103 from using a mode of “FIG. 5a ” to the mode of “FIG. 5b ”. One reason to use the third mode of FIG. 5b could be a desire or requirement by DPP server 103 or initiator user 102 u or a device 101 owner to have the cryptographic operations of a DPP 191 more evenly shared between an initiator 102′ and a DPP server 103. In other words, a mode depicted in FIG. 3a could comprise a mode that is mostly on DPP server 103, a mode depicted in FIG. 5a could comprise a mode that is mostly on initiator 102′, and a mode depicted in FIG. 5b could comprise a balanced mode where a mix of the keys and cryptographic operations are more evenly shared between DPP server 103 and initiator 102′.

A fourth mode 306 a in FIG. 3b can comprise initiator 102′ operating as an initiator 102* depicted in FIG. 1b and FIG. 1c , and in this case initiator 102* can record the keys shown for the fourth mode 306 a in FIG. 3b . A DPP server 103 can still provide the bootstrap keys 399 shown to initiator 102* in this fourth mode of operation, or the initiator 102* could obtain the bootstrap keys 399 from other means, such as “out of band” messages 121 and 126 in FIG. 1c . In addition, an initiator 102* could obtain the bootstrap keys “in band” (e.g. via WiFi link 192) using PKEX key 198.

Bootstrap keys 399 in a server database 103 a can record the bootstrap keys depicted in FIG. 3b , which could comprise a responder bootstrap public key Br 101 a, an initiator bootstrap public key Bi 104 a, and an initiator bootstrap private key 104 b. For embodiments where a device 101 can support multiple different sets of cryptographic parameters 199 a, a server database 103 a can record the selected set of cryptographic parameters 199 a for communication between an initiator 102′ and device 101 with responder 101 x. The keys for “bootstrap keys 399” can be according to the selected set of cryptographic parameters 199 a. In other words, a device database 104 in FIG. 2b above can record all versions of the bootstrap PKI keys for all supported cryptographic parameters 199 a for a device 101. However, since a set of cryptographic parameters 199 a will need to be selected for a DPP 191 (e.g. one of the responder bootstrap public keys Br 101 a selected), then the bootstrap keys 399 for that selected set of cryptographic parameters 199 a can be recorded in a server database 103 a.

A server database 103 a can also record a preshared PKEX key 198, if PKEX is optionally supported by responder 101 x. PKEX key 198 can be used by initiator 102′ to securely transfer bootstrap public keys in band (i.e. via connection 192 in FIG. 1a and FIG. 3a ). The use of a PKEX protocol to exchange the public keys is described in section 5.6 of DPP specification version 1.0. For embodiments where initiator 102′ uses PKEX key 198 with responder 101 x, the initiator bootstrap private key bi 104 b preferably continues to reside within a network 107 and can be in a server database 103 a. PKEX key 198 can be used with responder 101 x MAC address MAC.R 101 d. Embodiments can omit the use of PKEX key 198, as depicted with the value of “NA” for the key in FIG. 3b . Derived, shared secret keys with responder 101 x can also be recorded in a server database 103 a. The derived shared secret keys could comprise key k1 314 a, key k2 314 c, and key ke 327 e. The steps to derive and use these keys are depicted and described below in FIG. 4a , FIG. 4b , and FIG. 4c , respectively. As discussed above, some keys may reside in server database 103 a, and other keys may reside within an initiator 102′ (depicted with a “-”), depending on the mode 306 a.

The present invention contemplates other implementations of a device provisioning protocol besides the DPP specification version 1.0. These other implementations could have different mutually derived shared secret keys than those depicted in FIG. 3b , and the different mutually derived shared secret keys could be recorded in a server database as well. For example, a different key derivation function 402 could be used to derive a secret shared key than that specified in DPP specification version 1.0. In addition, other or different PKI keys for a responder 101 x and/or initiator 102′ could be recorded in a server database 103 a. For example, the DPP specification version 1.0 could be extended to explicitly include a DPP server 103 public and private key, in order to extend support with a DPP server 103, and in these embodiments the DPP server 103 public and private keys could be included in a server database 103 a. Other possibilities exist as well for (i) a server database 103 a to record PKI keys and shared secret keys to support (ii) a device provisioning protocol without departing from the scope of the present invention.

A server database 103 a could also record a device credentials table 340. Device credentials table 340 can record a device identity ID-token.device 206 (or ID.device 101 i), a selected primary network 308 aa, a selected backup network 308 ab, a set of primary network credentials 109, and a set of backup network credentials 109. The selected primary network 308 aa and selected backup network 308 ab could be determined in a step 308 a in FIG. 3a by DPP server 103 or network 107. The set of primary network credentials 109 can comprise the set of credentials (plus configuration) for a device 101 to use with the selected primary network 308 aa. The set of backup network credentials 109 can comprise the set of credentials (plus configuration) for a device 101 to use with the selected backup network 308 ab. The credentials 109 in a device credentials table 340 could be obtained from during a step 308 b as depicted and described above in connection with FIG. 3 b.

For example, with the first device depicted in a device credentials table 340, device 101 could record a selected primary network 308 aa for network access point 105 in FIG. 1a . The value recorded for 308 aa could be SSID.network-AP 109 a. The credentials in device table for the first device could comprise the credentials 109 depicted in FIG. 1a . The depicted designation of “109 a-1” means the first instance of a value of SSID.network-AP 109 a. The device in the second row can use the same value for SSID.network-AP 109 a. The device in the last depicted row can use a different value for a selected primary network 308 aa of “109 a-3” which could be the third distinct value in device credentials table 340. Values of “304 c-1” for selected primary network 308 aa can mean a first value from a networks identity list 304 c from FIG. 3a , values of “304 c-2” can mean a second value from a networks available list 304 c, etc.

For embodiments where a network other than network 107 is selected for device 101 to be configured with credentials, the credentials in a device credentials table 340 are depicted as “from . . . ”, where “ . . . ” can be the depicted, selected network from a networks available list 304 c. In exemplary embodiments, the credentials for networks external to network 107 can be encrypted by the external network using Elgamal encryption and either (i) the responder bootstrap public key Br 101 a or (ii) the responder ephemeral public key Pr 101 e. The DPP server 103 could send either (i) the responder bootstrap public key Br 101 a or (ii) the responder ephemeral public key Pr 101 e to the external network for the external network to encrypt the credentials using the public key for the responder 101 x and an Elgamal asymmetric encryption algorithm, which was also described above. Thus, the credentials are stored as ciphertext in a server database 103 a and only the device 101 with responder 101 x could feasibly decrypt the ciphertext in order to read the credentials for networks external to network 107. Additional details for receiving credentials from an external network, and recording the encrypted credentials in a server database 103 a are depicted and described below in connection with a step 415 in FIG. 5a , depicted as credentials 109′. In other words, for embodiments where a network other than network 107 is selected for device 101 to be configured with credentials, the credentials in a device credentials table 340 depicted as “from . . . ” can comprise an asymmetrically encrypted set of credentials 109′.

Note the present invention contemplates that (a) a selected access network 112 for device 101 in a step 308 a above in FIG. 3a by a DPP server 103 or network 107 could (b) utilize wireless networking technology other than WiFi or 802.11 based technology. For example, surrounding wireless networks for device 101 could use exemplary potential use of 5G wireless technology or LPWAN networking technology depicted in a networks available list 304 c in FIG. 3a above for potential access networks 112 for device 101. For these embodiments where a selected access network for device 101 from a step 308 b comprises a network based on standards other than WiFi or 802.11, the credentials could comprise values equivalent or similar to (i) an SSID (such as mobile network codes transmitted by base stations or gNb), (ii) a PMK (such as a key K or other key for key derivation), and configuration (such as network configuration parameters). Or, a WiFi access point could also be selected by a DPP server 103 or a network 107 for device 101 in step 308 a above in FIG. 3a using the networks available list 304 c.

For the exemplary embodiment depicted in FIG. 3a and also FIG. 1a above, the exemplary network access point 105 can be selected in a step 308 a using SSID.network-AP 109 a from FIG. 1a , although different networks in a networks available list 304 c could be selected instead, based on exemplary criteria listed for a step 308 a above in FIG. 3a . In addition, a network access point 105 in FIG. 1a can comprise a form of an access network 112 as contemplated herein, such that device 101 obtains access to IP network 113 or the globally routable Internet via an exemplary network access point 105. A selected access network 112 for device 101 in a step 308 a does not need to belong to network 107 from FIG. 1a , and could belong to a different network (so long as network 107 could obtain or point to credentials 109 for the access network 112 in order to conduct the configuration step 106 from FIG. 1a ). Further, a step 308 a could comprise the selection of both a primary access network 112 (identified in table 340 as selected primary network 308 aa) for device 101 and a second, backup access network 112 (identified in table 340 as selected backup network 308 ab) for device 101. The use of a primary and backup network for device 101 can provide increased reliability for the operation of device 101, such that if the primary access network 112 is not available then device 101 could use the selected backup network in order for device 101 to maintain connectivity to an IP network 113. In other words, a DPP 191 could be conducted by an initiator 102′ and a responder 101 x in order for the responder 101 x to receive credentials 109 for both a primary network and a backup network, where the primary network and the backup network are selected in a step 308 a in FIG. 3 a.

FIG. 4a

FIG. 4a is a flow chart illustrating exemplary steps for conducting a key exchange using PKI keys in order to derive a shared secret key, and for using the derived shared secret key to encrypt and decrypt data, in accordance with exemplary embodiments. Exemplary steps for an initiator 102′ and a responder 101 x to mutually derive keys can comprise (i) a key exchange 314 step for DPP server 103 or initiator 102′ (depending on the mode 306 a) to derive a symmetric encryption key k1 314 a and (ii) a key exchange 319 step for a responder 101 x to derive the same symmetric encryption key k1 314 a. Exemplary steps for a responder 101 x to decrypt data and initiator 102′ for DPP server 103 (depending on a mode 306 a) to encrypt data can comprise (a) an encryption step 315 for initiator 102′ or DPP server 103 (depending on a mode 306 a) to utilize the symmetric encryption key k1 314 a to convert plaintext to ciphertext, and (b) a decryption 320 step for responder 101 x to utilize the symmetric encryption key k1 314 a to convert the ciphertext received from initiator 102′ into plaintext. The use of the steps for a key exchange 314, a key exchange 319, encryption 315, and decryption 320 were also depicted and described in connection with FIG. 3a above. Additional detail regarding the use of these steps will be provided herein with FIG. 4a . Further, although the steps are depicted specifically for the use of particular keys and plaintext/ciphertext combinations in FIG. 4a , the steps illustrated can be used with different keys and plaintext/ciphertext combinations. For example, FIG. 4b below depicts the same functionality used by the nodes as in FIG. 4a , but with (i) different PKI keys input to mutually derive a different symmetric encryption key, (ii) a different key derivation function and (iii) different plaintext encrypted and different ciphertext decrypted.

The processes and operations, described below with respect to all of the logic flow diagrams and flow charts may include the manipulation of signals by a processor and the maintenance of these signals within data structures resident in one or more memory storage devices. For the purposes of this discussion, a process can be generally conceived to be a sequence of computer-executed steps leading to a desired result.

These steps usually require physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical, magnetic, or optical signals capable of being stored, transferred, combined, compared, or otherwise manipulated. It is convention for those skilled in the art to refer to representations of these signals as bits, bytes, words, information, elements, symbols, characters, numbers, points, data, entries, objects, images, files, or the like. It should be kept in mind, however, that these and similar terms are associated with appropriate physical quantities for computer operations, and that these terms are merely conventional labels applied to physical quantities that exist within and during operation of the computer.

It should also be understood that manipulations within the computer are often referred to in terms such as listing, creating, adding, calculating, comparing, moving, receiving, determining, configuring, identifying, populating, loading, performing, executing, storing etc. that are often associated with manual operations performed by a human operator. The operations described herein can be machine operations performed in conjunction with various input provided by a human operator or user that interacts with the device, wherein one function of the device can be a computer.

In addition, it should be understood that the programs, processes, methods, etc. described herein are not related or limited to any particular computer or apparatus. Rather, various types of general purpose machines may be used with the following process in accordance with the teachings described herein.

The present invention may comprise a computer program or hardware or a combination thereof which embodies the functions described herein and illustrated in the appended flow charts. However, it should be apparent that there could be many different ways of implementing the invention in computer programming or hardware design, and the invention should not be construed as limited to any one set of computer program instructions.

Further, a skilled programmer would be able to write such a computer program or identify the appropriate hardware circuits to implement the disclosed invention without difficulty based on the flow charts and associated description in the application text, for example. Therefore, disclosure of a particular set of program code instructions or detailed hardware devices is not considered necessary for an adequate understanding of how to make and use the invention. The inventive functionality of the claimed computer implemented processes will be explained in more detail in the following description in conjunction with the remaining Figures illustrating other process flows.

Further, certain steps in the processes or process flow described in all of the logic flow diagrams below must naturally precede others for the present invention to function as described. However, the present invention is not limited to the order of the steps described if such order or sequence does not alter the functionality of the present invention. That is, it is recognized that some steps may be performed before, after, or in parallel other steps without departing from the scope and spirit of the present invention.

The processes, operations, and steps performed by the hardware and software described in this document usually include the manipulation of signals by a CPU or remote server and the maintenance of these signals within data structures resident in one or more of the local or remote memory storage devices. Such data structures impose a physical organization upon the collection of data stored within a memory storage device and represent specific electrical or magnetic elements. These symbolic representations are the means used by those skilled in the art of computer programming and computer construction to most effectively convey teachings and discoveries to others skilled in the art.

A key exchange 314 step for initiator 102′ or DPP server 103 (depending on a mode 306 a) to derive a symmetric encryption key 314 a can utilize a selected set of cryptographic parameters 199 a as depicted and described in connection with FIG. 2b above. As depicted in FIG. 4a , a key exchange algorithm 401 a can receive input both of a responder bootstrap public key Br 101 a and an initiator ephemeral private key pi 102 b. The key exchange algorithm 401 a could comprise a Diffie Hellman key exchange (DH), an Elliptic Curve Diffie Hellman key exchange (ECDH), and other possibilities exist as well without departing from the scope of the present invention. A key exchange algorithm 401 a can support either PKI keys based on elliptic curves or RSA algorithms, although support of elliptic curves may be preferred in some exemplary embodiments due to their shorter key lengths and lower processing requirements.

A summary of ECDH as a key exchange algorithm 401 a is included in the Wikipedia article titled “Elliptic Curve Diffie-Hellman” from Mar. 9, 2018, which is herein incorporated by reference. An exemplary embodiment of key exchange algorithm 401 a could comprise a “One-Pass Diffie-Hellman, C(1, 1, ECC CDH)” algorithm as described in section 6.2.2.2 on page 99 of the National Institute of Standards and Technology (NIST) document “NIST SP 800-56A Revision 3, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography” from April, 2018 which is hereby incorporated by reference its entirety. Other key exchange algorithms in NIST SP 800-56A could be utilized as well for a key exchange algorithm 401 a in FIG. 4a , FIG. 4b , and FIG. 4c without departing from the scope of the present invention. Example calculations for an ECDH key exchange for a key exchange algorithm 401 a are shown on pages 88 and 89 of DPP specification version 1.0, where a selected set of parameters 199 a can use the ECC curve P-256 with PKI key lengths of 256 bits.

Other algorithms to derive a shared symmetric encryption key using public keys and private keys may also be utilized in a key exchange algorithm 401 a (and 401 b in FIGS. 4b and 401c in FIG. 4c ), such as, but not limited to, the American National Standards Institute (ANSI) standard X-9.63. Cryptographic parameters 199 a can also include information for using a key exchange algorithm 401 a and a key derivation function 402 a in order to derive a commonly shared symmetric encryption key k1 314 a. As contemplated herein, the terms “selected set of cryptographic parameters 199 a” and “cryptographic parameters 199 a”, and “parameters 199 a” can be equivalent. Parameters 199 a input into a key exchange algorithm 401 a can include a time-to-live for a key k1 314 a that is derived, a supported point formats extension, where the supported point formats extension could comprise uncompressed, compressed prime, or “compressed char2” formats, as specified in ANSI X-9.62. In other words, an ECC keys input into a key exchange algorithm 401 a may have several different formats and a set of parameters 199 a can be useful to specify the format.

As depicted in FIG. 4a , the output of a key exchange algorithm 401 a, such as an ECDH key exchange, can comprise a secret shared key M 410. The secret shared key M 410 can be input into both (i) a first key derivation function 402 a in order to calculate the key k1 314 a and (ii) a second key derivation function 402 c in order to calculate a symmetric encryption key ke 327 a as depicted in FIG. 4c below. Key derivation function 402 a could use a hash algorithm 199 e from parameters 199 a, where an input into the hash algorithm 199 e can comprise the value M 410 along with other text data mutually shared between initiator 102′ and responder 101 x. As contemplated herein, a secret shared key can also be referred to as a value, since the secret shared key can be a numeric value or a number in the form of a sequence of digits. In DPP specification version 1.0 a key derivation function 402 a to determine key k1 314 a is depicted on the fourth line of page 48. Other possibilities exist as well for a key derivation function 402 a without departing from the scope of the present invention. For example, with other embodiments besides those within DPP specification version 1.0, the output of a key derivation function 402 a can be both a symmetric encryption key k1 314 a and a message authentication code (MAC) key, where a MAC key can function to verify message integrity of ciphertexts generated with the symmetric encryption key 314 a.

As depicted in FIG. 4a , an encryption 315 step could be utilized with the derived symmetric encryption key k1 314 a in order to convert plaintext 403 b into ciphertext 315 a. An encryption 315 step can utilize a symmetric encryption algorithm 405 a, where symmetric encryption algorithm 405 a could comprise an algorithm according to the Advanced Encryption Standard (AES), Blowfish, and Triple Data Encryption Standard (3DES), and other possibilities exist as well. As depicted in FIG. 4a , a symmetric encryption algorithm 405 a can comprise the AES-SIV algorithm as specified in IETF RFC 5297. Parameters 199 f could specify settings for a symmetric ciphering algorithm 405 a as well, such as key length and a block cipher modes such as, but not limited to, ECB, CBC, OFB, and CFB. Parameters 199 f may also specify an authenticated encryption mode such as CCM (NIST SP800-38C), GCM (NIST SP800-38D), and other examples exist as well.

Symmetric encryption algorithm 405 a can accept input of (i) plaintext 403 b, (ii) symmetric encryption key k1 314 a, (iii) parameters 199 f, and (iv) optionally an initialization vector (not shown in FIG. 4a ), and output ciphertext 315 a. Although not depicted in FIG. 4a , and encryption 405 a step can output a message authentication code (MAC), where the MAC can be calculated with a MAC key from a key derivation function 402 a. In exemplary embodiments the use of a MAC and MAC key, as well as an initialization vector can be optionally omitted. The exemplary listed values for plaintext and ciphertext in step 315 were described in connection with depicted step 315 in FIG. 3 a.

Key exchange 319 step can be conducted by responder 101 x in order to mutually derive the same value or number for the symmetric ciphering key k1 314 a that was derived in a step 314 above. Key exchange 319 step can comprise inputting or using the initiator ephemeral Public key Pi 102 a (from message 122) and the responder bootstrap private key br 101 b into key exchange algorithm 401 a, which can comprise the same or equivalent key exchange algorithm 401 a depicted and described in connection with key exchange step 314 described above. Other elements or algorithms within a key exchange step 319 can be equivalent to a key exchange step 314 above, including the use of shared parameters 199 a. In this manner, initiator 102′ or DPP server 103 (depending on a mode 306 a) and responder 101 x can securely derive the same symmetric encryption key k1 314 a as depicted in FIG. 4 a.

A decryption 320 step allows responder 101 x to convert the ciphertext 315 a received in a message 122 from FIG. 3a into plaintext 403 a. Decryption 320 step can utilize a symmetric decryption algorithm 405 b, which could comprise the same algorithm used in symmetric encryption algorithm 405 a except the algorithm being used for decryption instead of encryption. For example, if symmetric encryption algorithm 405 a in FIG. 4a comprises an AES-SIV encryption, then symmetric decryption algorithm 405 b can comprise an AES-SIV decryption. Note that the same values are input into symmetric decryption algorithm 405 b as symmetric encryption algorithm 405 a, such as symmetric encryption key k1 314 a and parameters 199 f in order to convert ciphertext 315 a back into plaintext 403 a. Responder 101 x can the read and process plaintext 403 a after a decryption 320 step.

For embodiments where a MAC code is received with ciphertext 315 a, responder 101 x can also verify the MAC code using a MAC key from a key derivation function 402 a in a step 319 in order to verify the integrity of ciphertext 315 a. Note that AES-SIV and similar symmetric ciphering algorithms can have a message integrity check built into the algorithm, and thus a separate MAC code and MAC key can be optionally omitted in some exemplary embodiments. In exemplary embodiments, the successful decryption of a ciphertext into a plaintext using decryption algorithms 405 b supports mutual authentication between the two nodes, since successful decryption can only take place when the two nodes record the depicted private keys used for the depicted key exchanges 314 and 319.

FIG. 4b

FIG. 4b is a flow chart illustrating exemplary steps for conducting a key exchange using PKI keys in order to derive a shared secret key, and for using the derived shared secret key to encrypt and decrypt data, in accordance with exemplary embodiments. Exemplary steps for (i) an initiator 102′ or a DPP server 103 (depending on the mode 306 a) and (ii) a responder 102 x to mutually derive keys can comprise (a) a key exchange 319 a step for DPP server 103 or initiator 102′ (depending on the mode 306 a) to derive a symmetric encryption key k2 314 c and (b) a key exchange 314 b step for a responder 101 x to derive the same symmetric encryption key k2 314 c. Exemplary steps for a responder 101 x to encrypt data and initiator 102′ to decrypt data can comprise (i) an encryption 315 b step for responder 101 x to utilize the symmetric encryption key k2 314 c to convert plaintext to ciphertext, and (ii) a decryption 320 b step for either initiator 102′ or DPP server 103 (depending on the mode 306 a) to utilize the symmetric encryption key k2 314 c to convert the ciphertext received from responder 101 x into plaintext. The use of the steps for a key exchange 314 a, a key exchange 319 a, encryption 315 b, and decryption 320 b were also depicted and described in connection with FIG. 3a above.

Note that steps in FIG. 4b and the steps in FIG. 4a can share some algorithms and values, and the descriptions for the algorithms and values in FIG. 4a can be applicable for FIG. 4b . For example, a same key exchange algorithm 401 a depicted and described in FIG. 4a can also be used in FIG. 4b . The key exchange algorithm 401 a can comprise an ECDH key exchange. The set of parameters 199 a depicted and described in FIG. 4a can also be used in FIG. 4b . Further, a symmetric encryption algorithm 405 a and a symmetric decryption algorithm 405 b can be the same in FIG. 4a and FIG. 4b . A set of parameters 199 f for a symmetric encryption algorithm 405 a and a symmetric decryption algorithm 405 b can be the same in FIG. 4a and FIG. 4b

A responder 101 x can conduct a key exchange step 314 b. In a key exchange step 314 b, the initiator ephemeral public key Pi 102 a received in message 122 from FIG. 3a can be input into an ECDH key exchange algorithm 401 a along with the responder ephemeral private key pr 101 f derived in a step 318 in FIG. 3a in order to output a secret shared key N 411. The value for shared secret key N 411 can be recorded and also used in the derivation of a key ke 327 a in a key exchange step 321 below in FIG. 4c . For a step 314 b, the value for the shared secret key N 411 can be input into a key derivation function 402 b in order to derive a mutually shared symmetric key k2 314 c. In exemplary embodiments which support DPP specification version 1.0, a key derivation function 402 b can comprise the key derivation function for key k2 in point 2 of section 6.2.3 of DPP specification version 1.0.

Either an initiator 102′ or a DPP server 103 can conduct a key exchange step 319 a, depending on a mode 306 a from a server database 103 a. At step 319 a, a received, validated responder ephemeral public key Pr 101 e and a derived initiator ephemeral private key pi 102 b can be input into an ECDH key exchange algorithm 401 a in order to calculate a shared secret key N 411. Shared secret key N 411 can also be used by initiator 102′ or DPP server 103 (depending on a mode 306 a) in a step 327 below. DPP server 103 can input shared secret key N 411 into a key derivation function 402 b in order to mutually derived the symmetric encryption key k2 314 c. In exemplary embodiments which support DPP specification version 1.0, a key derivation function 402 b can comprise the key derivation function for key k2 in section 6.2.4 of DPP specification version 1.0.

Responder 101 x can conduct an encryption step 315 b, where the use for an encryption step 315 b are depicted and described in connection with FIG. 3a above. Ciphertext 322 a can comprise a ciphertext from an encryption step 322 below in FIG. 4c . In other words, a responder 101 x can conduct the encryption step 322 below and also key exchange step 321 below in FIG. 4c before conducting the encryption step 315 b. As depicted in FIG. 4b , the ciphertext 322 a can also be encrypted again for an encryption step 315 b. The symmetric ciphering key for encryption step 315 b can comprise symmetric key k2 314 c from a key exchange step 314 b in the paragraph above. The output from an encryption step 315 b can be ciphertext 315 c, as depicted in FIG. 4 b.

A decryption 320 b step can be performed by either an initiator 102′ or a DPP server 103, depending on a mode 306 a recorded in a server database 103 a as depicted in FIG. 3b . A decryption 320 b step converts the ciphertext 315 c received in a message 123 from FIG. 3a into plaintext 403 b. Decryption 320 b step can utilize a symmetric decryption algorithm 405 b, which could comprise the same algorithm used in symmetric encryption algorithm 405 a except the algorithm being used for decryption instead of encryption. Note that the same values are input into symmetric decryption algorithm 405 b as symmetric encryption algorithm 405 a, such as symmetric encryption key k2 314 c and parameters 199 f in order to convert ciphertext 315 c back into plaintext 403 b. Initiator 102′ or a DPP server 103 (depending on a mode 306 a) can the read and process plaintext 403 b after a decryption 320 b step. In exemplary embodiments, the successful decryption of a ciphertext into a plaintext, including decryption of ciphertext 322 a into plaintext 403 c below in FIG. 4c , using decryption algorithms 405 b supports mutual authentication between the two nodes, since successful decryption can only take place when the two nodes record the depicted private keys used for the depicted key exchange.

FIG. 4c

FIG. 4c is a flow chart illustrating exemplary steps for conducting a key exchange using PKI keys in order to derive a shared secret key, and for using the derived shared secret key to encrypt and decrypt data, in accordance with exemplary embodiments. Exemplary steps for (i) an initiator 102′ or a DPP server 103 (depending on the mode 306 a) and (ii) a responder 102 x to mutually derive keys can comprise (a) a key exchange 327 step for DPP server 103 or initiator 102′ (depending on the mode 306 a) to derive a symmetric encryption key ke 327 a and (b) a key exchange 321 step for a responder 101 x to derive the same symmetric encryption key ke 327 a. Note that in some exemplary embodiments, such a mode 306 a depicted and described in connection with FIG. 5a and FIG. 5b below, (i) a key exchange algorithm 401 c can be processed by a DPP server 103 a key derivation function 402 c can be processed by an initiator 102′. In other words, for some embodiments the key exchange 327 step can be shared or distributed between a DPP server 103 and an initiator 102′.

Exemplary steps in FIG. 4c for a responder 101 x to encrypt data and initiator 102′ to decrypt data can comprise (i) an encryption 322 step for responder 101 x to utilize the symmetric encryption key ke 327 a to convert plaintext to ciphertext, and (ii) a decryption 328 step for either initiator 102′ or DPP server 103 (depending on the mode 306 a) to utilize the symmetric encryption key ke 327 a to convert the ciphertext received from responder 101 x into plaintext. The use of the steps for a key exchange 321, a key exchange 327, encryption 322, and decryption 328 were also depicted and described in connection with FIG. 3a above.

Note that steps in FIG. 4c and the steps in FIG. 4a can share some algorithms and values, and the descriptions for the algorithms and values in FIG. 4a can be applicable for FIG. 4c . For example, the key exchange algorithm 401 c can comprise an ECDH key exchange. The set of parameters 199 a depicted and described in FIG. 4a can also be used in FIG. 4c . Further, a symmetric encryption algorithm 405 a and a symmetric decryption algorithm 405 b can be the same in FIG. 4a and FIG. 4c . A set of parameters 199 f for a symmetric encryption algorithm 405 a and a symmetric decryption algorithm 405 b can be the same in FIG. 4a and FIG. 4 c.

A responder 101 x can conduct a key exchange step 321. In a key exchange step 321, (i) the initiator bootstrap public key Bi 104 a received in message 126 from FIG. 1c can be input into an ECDH key exchange algorithm 401 c along with (ii) both the responder ephemeral private key pr 101 f and the responder bootstrap private key br 101 b. An ECDH key exchange algorithm 401 c can use (pr 101 f+br 101 b) modulo q, as specified in DPP specification version 1.0 in point 2 of section 6.2.3, so algorithm 401 c for responder 101 x can be slightly different than algorithm 401 a for responder 101 x above in FIG. 4a and FIG. 4b . The output of key exchange algorithm 401 c can be a shared secret key L 412. Note that embodiments of the present invention which comprise a responder authentication 141 from FIG. 1b can omit the calculation of key L 412 and use of initiator bootstrap public ke Bi 104 a. For these embodiments, subsequent calculations using the key L 412 can omit the key L 412, which is also contemplated and described in DPP specification version 1.0.

The responder 101 x can then conduct a key derivation function 402 c in order to calculate a shared secret key ke 327 a. Note that for a key derivation function 402 c, the input include all of key M 410 from a step 314, key N from a step 314 b, and the derived key L 412 from step 321. As contemplated herein, a key derivation function 402 a, 402 b, and 402 c can also use other data mutually shared between (i) responder 101 x and (ii) initiator 102′ or DPP server 103 (depending on a mode 306 a). In exemplary embodiments which support DPP specification version 1.0, a key derivation function 402 c can comprise the key derivation function for key ke 327 a in point 2 of section 6.2.3 of DPP specification version 1.0.

Either an initiator 102′ or a DPP server 103 can conduct a key exchange step 327, depending on a mode 306 a from a server database 103 a and transmitted to DPP server 103 in a message 311 as depicted in FIG. 3a . At step 327, (i) a combination of a recorded responder bootstrap public key Br 101 a and received responder ephemeral public key Pr 101 e, and (ii) the recorded initiator bootstrap private key bi 104 b can be input into an ECDH key exchange algorithm 401 c in order to calculate a shared secret key L 412. Note that the combination of public keys 101 a and 101 e in step 327 can comprise an ECC point addition operation. Also note that embodiments of the present invention which comprise a responder authentication 141 from FIG. 1b can omit the calculation of key L 412 and use of initiator bootstrap private key bi 104 b. For these embodiments, subsequent calculations using the key L 412 can omit the key L 412, which is also contemplated and described in DPP specification version 1.0. Shared secret key L 412 can be input into a key derivation function 402 c, along with shared secret key M 410 from a step 319 and shared secret key N 411 from a step 319 a in order to mutually derive the symmetric encryption key ke 327 a. In exemplary embodiments which support DPP specification version 1.0, a key derivation function 402 c can comprise the key derivation function for key ke 327 e in section 6.2.4 of DPP specification version 1.0.

Responder 101 x can conduct an encryption step 322, where the use for an encryption step 322 are depicted and described in connection with FIG. 3a above and also FIG. 4b above. Plaintext 403 c in a step 322 can comprise the responder authentication value 404, where value R-auth 404 can comprise a secure hash value with input including the initiator nonce 317 a, the second random number R-nonce from a step 318 above in FIG. 3a , and public PKI keys. The value for R-auth 404 in a step 322 (also described with step 322 in FIG. 3a ) can comprise the value in point 3 of section 6.2.3 of DPP specification version 1.0. The symmetric ciphering key for encryption step 322 can comprise symmetric key ke 327 a from a key exchange step 321. The output from an encryption step 322 can be ciphertext 322 a, as depicted in FIG. 4c . Note that ciphertext 322 a in a step 322 is also encrypted again in a step 315 b above in FIG. 4b . In other words, a responder 101 x can conduct the encryption step 322 herein for FIG. 4c (along with the key exchange 321 herein in FIG. 4b ) before conducting the encryption step 315 b in FIG. 4b above.

A decryption step 328 can be performed by either an initiator 102′ or a DPP server 103, depending on a mode 306 a recorded in a server database 103 a as depicted in FIG. 3b . A decryption 328 step converts the ciphertext 322 a received in a message 123 (after decrypting a first layer of encryption of ciphertext 315 b in a step 320 b) from FIG. 3a into plaintext 403 c. Decryption 328 step can utilize a symmetric decryption algorithm 405 b, which could comprise the same algorithm used in symmetric encryption algorithm 405 a except the algorithm being used for decryption instead of encryption. Note that the same values are input into symmetric decryption algorithm 405 b as symmetric encryption algorithm 405 a in FIG. 4c , such as symmetric encryption key ke 327 a and parameters 199 f in order to convert ciphertext 322 a back into plaintext 403 c. Initiator 102′ or a DPP server 103 (depending on a mode 306 a) can the read and process plaintext 403 c after a decryption 328 step (and the prior step 302 b to remove a first layer of encryption in ciphertext 315 b). In exemplary embodiments, the successful decryption of a ciphertext into a plaintext using decryption algorithms 405 b supports mutual authentication between the two nodes, since successful decryption of ciphertext 322 a can only take place when the two nodes record the depicted private keys used for the depicted key exchange

As depicted and described in connection with FIG. 3a , a responder 101 x can also conduct both an encryption step 322 and a decryption step 328. The steps for responder 101 x to conduct a decryption step 328 can comprise step 328 b and step 328 d as depicted and described in FIG. 3a . When responder 101 x conducts decryption step 328 using symmetric encryption key ke 327 a, the ciphertext and plaintext will comprise different values than those depicted in FIG. 4c . For example, in FIG. 3a a responder 101 x can use a decryption step 328 b (e.g. step 328 but with different ciphertext than that depicted in FIG. 4c ) in order to decrypt the encrypted initiator authentication value 404 a into a plaintext authentication value 404 a. Also, in FIG. 3a a responder 101 x can use a decryption step 328 d (e.g. step 328 but with different ciphertext 322 f than that depicted in FIG. 4c ) in order to decrypt the encrypted network credentials 109.

Note that in some exemplary embodiments, the “plaintext” network credentials 109′ (for the purposes of a step 328 d in FIG. 5a ) can comprise network credentials 109′ that can also be encrypted with an asymmetric ciphering algorithm such as Elgamal using a step 336 in FIG. 5a below. In other words, network credentials 109′ can comprise credentials that are “double encrypted” with both (i) a symmetric key 327 a (which can be decrypted by responder 101 x using a decryption step 328 d, where decryption step 328 d uses the depicted decryption 328 in FIG. 4c ), and (ii) an asymmetric ciphering algorithm such as Elgamal from a step 336, (which could be decrypted by responder 101 x using a step 337 from FIG. 5a below and either (i) responder ephemeral private key pr 101 f or (ii) responder bootstrap private key br 101 b).

As depicted and described in connection with FIG. 3a , a DPP server 103 or initiator 102′ (in FIG. 5a ) can conduct both an encryption step 322 and a decryption step 328. The steps for a DPP server 103 or initiator 102′ (depending on a mode 306 a) to conduct an encryption step 322 can comprise step 322 b and step 322 e as depicted and described in FIG. 3a . When DPP server 103 or initiator 102′ conducts encryption step 322 b or 322 e using symmetric encryption key ke 327 a, the ciphertext and plaintext will comprise different values than those depicted in FIG. 4c . For example, in FIG. 3a a DPP server 103 can use an encryption step 322 b (e.g. step 322 but with different plaintext than that depicted in FIG. 4c ) in order to encrypt the initiator authentication value 404 a. In FIG. 5a , an initiator 102′ can use an encryption step 322 b (e.g. step 322 but with different plaintext than that depicted in FIG. 4c ) in order to encrypt the initiator authentication value 404 a. In FIG. 3a a DPP server 103 can use an encryption step 322 e (e.g. step 322 but with different plaintext than that depicted in FIG. 4c ) in order to encrypt the network credentials 109. In FIG. 5a , an initiator 102′ can use an encryption step 322 e (e.g. step 322 but with different plaintext than that depicted in FIG. 4c ) in order to encrypt the network credentials 109′.

FIG. 5a

FIG. 5a is a simplified message flow diagram illustrating an exemplary system with exemplary data sent and received by a device database, a DPP server, an initiator proxy, and a responder, in accordance with exemplary embodiments. Before starting steps and message flows depicted in FIG. 5a , the initiator, DPP server, and device database depicted for system 500 in FIG. 5a may previously complete exemplary message flows and steps depicted for a step 301 in FIG. 3a above. System 500 can include a device database 104, DPP server 103, initiator proxy 102′, and responder 101 x operating in device 101. Initiator proxy 102′ can communicate with DPP server 103 via IP network 113 using an access network 112, also as depicted in FIG. 3a above. As contemplated herein, an “initiator proxy 102′” depicted in FIG. 5a may also be referred to as initiator 102′, and an initiator 102′ and initiator proxy 102′ may be equivalent. A difference between system 500 in FIG. 5a and system 300 in FIG. 3a can be that (i) responder bootstrap public key Br 101 a, (ii) initiator bootstrap public key Bi 104 a, (iii) initiator ephemeral public key Pi 102 a, and (iv) initiator ephemeral private key pi 102 b are recorded and operated within an initiator 102′. In exemplary embodiments depicted in FIG. 5a the initiator bootstrap private key bi 104 b can remain recorded in a DPP server 103 and not exposed to initiator 102′ The exemplary embodiment depicted in FIG. 5a can comprise a second mode 306 a of operation for initiator 102′ and DPP server 103, as depicted in FIG. 3b above.

At step 502, DPP server 103 can select a mode 306 a for both initiator 102′ and DPP server 103. Note that the mode 306 a selected is not normally observable to a responder 101 x, since the full and complete set of DPP 191 messages between responder 101 x and initiator 102′ can be transmitted and received. In other words, (a) the different distribution of PKI and shared secret keys in a server database 103 a and initiator 102′ for a first mode 306 a in FIG. 3a and a second mode 306 a in FIG. 5a (b) would not normally be observable to a responder 101 x. The recording of PKI and shared secret keys in a server database is depicted in a server database 103 a in FIG. 3b , where the value “-” can mean that the key is recorded and/or operated by initiator 102′. Step 502 can also comprise DPP server 103 selecting an initiator bootstrap public key Bi 104 a and a responder bootstrap public key Br 101 a for device 101 using ID-token.device 206.

In exemplary embodiments, a responder 101 x for a device 101 could record a plurality of responder bootstrap public keys Br 101 a, as depicted in FIG. 2a above. Reasons could include the use of different keys Br 101 a for different purposes, such as a first key Br 101 a for a responder authentication 141 and a second key Br 101 a for a mutual authentication 142. Or, a third key Br 101 a could be recorded or mapped in a tag 101 c, while a fourth key Br 101 a in a responder 101 x could only be recorded in a network 107. Responder 101 x can designate the use of the fourth key Br 101 a with a higher level of trust, with the following exemplary results (A) and (B). For (A), device 101 could provide additional privileges for a configuration step 106 for an initiator 102′ or initiator 102* that uses the second key Br 101 a (e.g. the first key Br 101 a could be easier for potentially any initiator 102′ to obtain if the first key Br 101 a is recorded in a QR code that can be scanned from outside device 101). As one example of additional privileges, a set of credentials 109 or configuration object delivered to device 101 using the fourth key Br 101 a could allow the installation of a new certificate authority root certificate for device 101. As one example of normal or other privileges, a set of credentials 109 delivered to device 101 using the third key Br 101 a could deny the installation of a new certificate authority root certificate for device 101 as well.

In summary for a step 502, (i) a device 101 with responder 101 x can use a plurality of responder bootstrap public keys Br 101 a (including for reasons other than simply use of different sets of cryptographic parameters 199 a for the different keys), and (ii) a DPP server 103 can select the responder bootstrap public key Br 101 a in a step 502. DPP server 103 can select the responder bootstrap public key Br 101 a based on the device identity 206 received in a message 305 in a step 301 from FIG. 3a . Also, although a step 502 is depicted in FIG. 5a , a step 502 could be used in other Figures and embodiments herein, include embodiments depicted in FIG. 3a and FIG. 5b . In addition for a step 502, DPP server 103 can use an initiator bootstrap keys sequence number 197 in order to select the appropriate initiator bootstrap public key Bi 104 a. For example, if an pair of initiator bootstrap keys had be deprecated (such as depicted in FIG. 6a below), then an updated pair of initiator bootstrap keys should be selected using a device table 104 d and sequence number 197 (also selected with device ID 206).

Other possibilities exist as well for a network 107 to have access to a responder boostrap public key Br 101 a without departing from the scope of the invention. In some embodiments in order for a DPP server 103 to record a responder bootstrap public key Br 101 a, an initiator 102′ could conduct a PKEX key exchange in band via WiFi link 192 using PKEX key 198, where initiator 102′ receives the key 198 in a message 311 in a step 301 in FIG. 3a . Initiator 102′ could (i) conduct the PKEX using key 198 with responder 101 x during a step 303 b, and then send the received responder bootstrap public key Br 101 a to DPP server 103. Other embodiments depicted in FIG. 3a and FIG. 5a also could optionally use a PKEX with key 198 in order to receive the key Br 101 a “in band” via WiFi link 192, such as if device database 104 does not record key Br 101 a before a step 301 in FIG. 3 a.

DPP server 103 can then send initiator 102′ a message 503, where message 503 can include an identity 206 for device 101 (since initiator 102′ may communicate with a plurality of responders 101 x over time), the selected responder bootstrap public key Br 101 a from a step 502, the selected initiator bootstrap public key Bi 104 a, and optionally a value for the MAC address of the responder 101 x comprising MAC.R 101 d. Message 503 can be sent via the secure session 302 b setup during a step 301 depicted in FIG. 3a above.

Initiator 102′ can receive message 503 and process the data received in a step 504. A step 504 can include validating the received public keys from a message 503 using public key validation steps from FIPS publication SP 800-56A (revision 2) and subsequent and related versions. Initiator 102′ can use a step 504 in order to verify the public PKI keys received in a message 503 are consistent or comply with a selected set of cryptographic parameters 199 a. At step 505 the initiator 102′ can determine the initiator capabilities for conducting a DPP 191 with device 101 and responder 101 x. In the exemplary embodiment depicted in FIG. 5a , initiator 102′ can select and use the capabilities of the role as a configurator. In other embodiments, an initiator 102′ could select and use the capabilities of the role an enrollee for a step 504. In addition, an initiator 102′ can generate a random number for an initiator nonce I-nonce 317 a in a step 504.

Initiator 102′ can then conduct a step 313 to derive the initiator ephemeral public key Pi 102 a and the initiator ephemeral private key pi 102 b. A step 313 was previously depicted and described above in FIG. 3a . Although DPP server 103 conducted the step 313 in FIG. 3a , an initiator 102′ can also conduct the step 313 in system 500 in order to derive the initiator ephemeral PKI key pairs. Further, subsequent steps depicted in FIG. 5a that were previously depicted as conducted by a DPP server 103 can be conducted by an initiator 102′ using the embodiment depicted in FIG. 5a . For example, depicted subsequent steps such as steps 314, 315, 319 a, 320 b, 322 b, 328, etc. can be conducted, performed, or processed by initiator 102′ using a DPP application 102 g in an exemplary system 500, which could also represent a different, second mode 306 a than system 300 in FIG. 3a , which could comprise a first mode 306 a.

Initiator 102′ in step 314 can use (i) the derived initiator ephemeral private key pi 102 b from step 313, and (ii) the received responder bootstrap public key Br 101 a from a message 503 to conduct the first initiator key exchange step 314, which is also depicted in FIG. 4a above. The output or results from a step 314 can comprise a mutually derived shared secret key k1 with responder 101 x. An intermediate step within the key exchange step 314 can include calculating the value M 410 (which could also be a secret shared key). Initiator 102′ in step 315 can then conduct the encryption step 315 depicted in FIG. 4a , and also described in FIG. 3a . The plaintext input into a symmetric encryption algorithm 405 a can comprise the initiator nonce 317 a and initiator capabilities from a step 504 above. The shared secret key k1 314 a can be used with symmetric ciphering algorithm 405 a in a step 315 from FIG. 4a . The ciphertext output from an encryption step 315 can comprise ciphertext 315 a.

At step 316, initiator 102′ can calculate secure hash values for initiator bootstrap public key Bi 104 a and responder bootstrap public key Br 101 a. For embodiments that conduct a responder authentication 141 as depicted and described in connection with FIG. 1b , then the calculation of a secure hash value for initiator bootstrap public key Bi 104 a can be omitted and a null value for H(Bi) can be transmitted in a subsequent DPP authentication request message 122. The selected hash 199 e could be received by initiator 102′ in a set of selected parameters 199 a from a message 311 in a step 301. In exemplary embodiments, initiator 102′ records the full set of cryptographic parameters 199, and a message to select a set of cryptographic parameters 199 a could then specify a hash 199 e to use with the public keys. For example, a selected set of cryptographic parameters 199 a from message 311 in a step 301 could be the value “A”, which would then be used by initiator 102′ to determine that hash 199 e in a set of cryptographic parameters 199 would be “SHA-256”, as depicted in FIG. 2b . Or, a message 311 in a step 301 could specify the full set of selected cryptographic parameters 199, such as listing out the individual values of key length 199 b, curve name 199 c, hash 199 e, etc. The hash values calculated by initiator 102′ in a step 316 in FIG. 5a are depicted in FIG. 5a as “H(Bi)” and “H(Br)”, respectively.

Initiator 102′ can then conduct a step 316 a to send responder 101 x a message 122, where message 122 can include the hash values for (i) the initiator bootstrap public key Bi 104 a and (ii) the responder bootstrap public key Br 101 a, (iii) the derived initiator ephemeral public key Pi 102 a for a step 313 by initiator 102′, and ciphertext 315 a, where ciphertext 315 a is encrypted with key k1 and includes an initiator nonce 317 a and the initiator capabilities. Sending DPP authentication request message 122 was also depicted and described in connection with FIG. 1b , FIG. 1c , and FIG. 3a above.

In FIG. 5a , responder 101 x can receive message 122 and conduct the series of steps 325. The series of steps 325 for responder 101 x were depicted and described in connection with FIG. 3a above, and steps 325 can comprise the steps 318. 319. 320, 314 b, 321, 322, and 315 b. Responder 101 x can process the message 122 using steps 325 and generate a DPP authentication response 123. The steps 325 for a responder 101 x to process the received message 122 and generate the response message 123 can comprise section 6.2.2 of DPP specification version 1.0. Other possibilities exist as well without departing from the scope of the present invention. In general, responder 101 x can use the recorded bootstrap private keys and the derived ephemeral private keys in order to conduct ECDH key exchanges. Responder 101 x can also (i) derive a responder nonce 318 b, (ii) decrypt ciphertext in message 122 and (iii) encrypt ciphertext in message 123 using derived secret shared keys from the ECDH key exchanges. Responder 101 x can send initiator 102′ the DPP authentication response 123 after conducting the steps 325.

Initiator 102′ can receive the DPP authentication response 123 and process the message. Using broadcast messages over connection 192, initiator 102′ can identify the message from responder 101 x based on the hash values for the bootstrap public keys in response 123. For embodiments where message 122 and response 123 are sent as unicast messages, initiator 102′ can identify the message from responder 101 x based on the MAC.R 101 d in the response 123. Initiator 102′ can then extract and record responder ephemeral public key Pr 101 e (depicted for a response 123 in FIG. 3a ). Initiator 102′ can also a key verification step on the received key Pr 101 e according to FIPS publication SP 800-56A (revision 2).

Initiator 102′ can then send DPP server 103 a message 506 using secure connection 302 b via access network 112, where message 506 can include (i) an identity for device 101 such as ID-token.device 206 (or ID.device 101 i), and (ii) the responder ephemeral public key Pr 101 e. In an exemplary embodiment a message 506 can include the MAC address MAC.R 101 d to also identify device 101 and the associated key Pr 101 e. DPP server 103 can receive the message 506 and record the responder ephemeral public key Pr 101 e along with the device identity in a server database 103 a, as depicted in FIG. 3b above.

DPP server 103 can then conduct an ECDH key exchange step 401 c as depicted in FIG. 4c in order to determine a secret shared key L 412. As depicted in FIG. 5a and also FIG. 4c , a step 401 c can comprise DPP server 103 inputting (i) the recorded initiator bootstrap private key bi 104 b and (ii) a combination of the received responder ephemeral public key Pr 101 e and the recorded responder bootstrap public key Br 101 a into key exchange algorithm 401 c in order to (iii) calculate the secret shared key L 412. An ECDH key exchange step 401 c can combine responder public keys 101 e and 101 a using an ECC point addition operation. Secret shared key L 412 can also comprise a secret shared key L according to section 6.2.4 of DPP specification version 1.0.

As depicted in FIG. 5a , an initiator 102′ can then conduct a second key exchange step 319 a, where the second key exchange step 319 a was depicted and described above in FIG. 4b and also FIG. 3a . Although a DPP server 103 was depicted as conducting a key exchange step 319 a in FIG. 3a , for the embodiments depicted in FIG. 5a , an initiator 102′ can conduct the key exchange step 319 a. At step 319 a, initiator 102′ can input the received, validated responder ephemeral public key Pr 101 e and the derived initiator ephemeral private key pi 102 b into an ECDH key exchange algorithm 401 b in order to calculate a shared secret key N 411. Shared secret key N 411 can also be used by initiator 102′ in a key derivation function 402 c step below in FIG. 5a . For a key exchange step 319 a in FIG. 5a , initiator 102′ can input shared secret key N 411 into a key derivation function 402 b in order to mutually derived the symmetric encryption key k2 314 c. Note that secret shared key N 411 can also be used by initiator 102′ for later use in a key derivation function step 402 c, as depicted in FIG. 5 a.

As depicted in FIG. 5a , initiator 102′ can then conduct a decryption step 320 b on received ciphertext 315 c using the derived symmetric encryption key k2 314 c from a step 319 a above by initiator 102′ in FIG. 5a . The use and operation of a decryption step 320 b was also depicted and described above in connection with FIG. 4b and FIG. 3a . Initiator 102′ can read the plaintext 403 b values from decryption step 320 b. The plaintext values 403 b can include the initiator nonce 317 a from a message 122 above. The plaintext values 403 b can also include a second ciphertext 322 a (e.g. ciphertext 322 a can be inside ciphertext 315 c). Initiator 102′ verifies that the initiator nonce 317 a received in message 123 and decrypted in step 320 b is equal to the initiator nonce 317 a value sent in message 122 above. If the two initiator nonce 317 a values are not equal, then initiator 102′ can abort the DPP procedure and subsequent steps.

Initiator 102′ can then receive a message 510 from DPP server 103, where message 510 can include an identity for device 101 such as ID-token.device 206 and the value L 412, where the value or secret shared key L 412 was calculated by DPP server 103 in a step 401 c as depicted in FIG. 5a . The value L 412 can be calculated by DPP server 103 using the initiator bootstrap private key bi 104 b, and thus initiator 102′ does not need to record or receive the initiator bootstrap private key bi 104 b for embodiments depicted in FIG. 5 a.

Initiator 102′ can then conduct a key derivation function step 402 c using (i) the received value L 412 from message 510, (ii) the calculated shared secret key M 410 from a step 314, and (iii) the calculated shared secret key N 411 from a step 319 a. A key derivation function step 402 c is depicted and described in connection with FIG. 4c above. The output from a key derivation function step 402 c conducted by initiator 102′ can be a shared secret key ke 327 a, as depicted in FIG. 4 c.

At step 328, initiator 102′ can conduct a decryption step 328 on the ciphertext 322 a using the key ke 327 a from the previous step 402 c. A decryption step 328 is depicted and described in connection with FIG. 4c above. Initiator 102′ can use the decryption step 328 in order to read the plaintext value of R-auth 404 from the responder 101 x in message 123. R-auth can comprise the value R-auth 404 from FIG. 3a and FIG. 4c and also comprise a hash 199 e value that includes the combination of at least the initiator nonce 317 a and the responder nonce 318 b. At step 328, initiator 102′ can then also internally calculate the same value for R-auth 404, and if the internally calculated value for R-auth 404 and the received, decrypted value for R-auth 404 are equal, then the responder 101 x can be considered authenticated. The calculation of R-auth 404 by initiator 102′ in a step 328 can be according to section 6.2.3 of DPP specification version 1.0.

Initiator 102′ can then conduct a step 322 b, where step 322 b can comprise calculating an initiator authentication value I-auth 404 a and encrypting the value I-auth 404 a. Initiator authentication value 404 a can be similar to responder authentication value R-auth 404, except the values of initiator nonce 317 a can be sequenced before a responder nonce 318 b inside a hash 199 e calculation over the two nonces. Initiator 102′ can then encrypt the initiator authentication value 404 a using an encryption step 322 using key ke 327 a, as depicted in FIG. 4c above. In other words, an encryption step 322 in FIG. 4c depicts the encryption of R-auth 404, and encryption step 322 b can comprise initiator 102′ encrypting the initiator authentication value I-auth 404 a using the key ke 327 a derived in a step 402 c.

Initiator 102′ can previously record the hash 199 e values for the initiator and responder bootstrap public keys. Initiator 102 can take the recorded hash 199 e values for the initiator and responder bootstrap public keys and append to them the encrypted value for I-auth 404 a calculated by initiator 102 in step 322 b. Initiator 102′ can send responder 101 x a DPP authentication confirm message 123 a, as depicted in FIG. 5a . The data and steps to determine and calculate a DPP authentication confirm message 123 a can be according to section 6.2.4 of DPP specification version 1.0. As depicted in FIG. 5a , the collection of steps and messages after a message 506 through transmitting a message 123 a can collectively comprise a step 512.

Note that although the DPP authentication confirm message 123 a can be equivalent to the DPP authentication confirm message from section 6.2.4 of DPP specification version 1.0, an important difference can be the operation of initiator 102′ in FIG. 5a versus an initiator as contemplated by DPP specification version 1.0. In the present invention as depicted in FIG. 5a , initiator 102′ does not need to record the initiator bootstrap private key bi 104 b. So, using the technology depicted in FIG. 5a , an initiator 102′ can (i) send and receive messages that are fully compatible with a DPP protocol 191, but (ii) DPP server 103 can record key bi 104 b. In other words, a responder 101 x may not “know” that an initiator operates as either (i) an initiator 102* from FIG. 1b or FIG. 1c , or an initiator 102′ from FIG. 5a since the messages transmitted and received by the responder 101 x can be fully compatible with a DPP 191.

The technology depicted in FIG. 5a can enhance security since an initiator bootstrap private key bi 104 b does not need to be shared with an initiator 102′. The initiator 102′ can also not feasibly be able to determine the initiator bootstrap private key bi 104 b using value L 412. By only recording the initiator bootstrap private key bi 104 b in DPP server 103 (or also a device database 104), then a common, shared initiator bootstrap public key Bi 104 a can be more securely shared across multiple devices 101, as contemplated by key table 104 k in FIG. 2b (with the depiction of “shared keys”). In other words, a manufacturer of device 101 could record a common initiator bootstrap public key Bi 104 a across a plurality of devices 101, since a network 107 could share the initiator bootstrap public key Bi 104 a with a device manufacturer of devices 101 (or a device distributor) before the devices are deployed near network access points 105. In other embodiments besides those depicted in FIG. 5a , the initiator bootstrap private key bi 104 b can be shared with initiator 102′, such as with a fourth mode 306 a described with a step 306 in FIG. 3a and also depicted and described in connection with FIG. 3 b.

In FIG. 5a , responder 101 x can receive message 123 a and conduct the series of steps 339. The series of steps 339 for responder 101 x were depicted and described in connection with FIG. 3a above, and steps 339 can comprise the steps 328 b, 331, 332, and 322 c. Responder 101 x can process the message 123 a using steps 339 and generate a DPP configuration request 123 b. In summary, responder 101 x can decrypt the ciphertext in message 123 a, where the ciphertext can include the initiator authentication value 404 a. Responder 101 x can also internally calculate a value for the initiator authentication value 404 a and the received value 404 a, and if the two values are equal then responder 101 x can consider the initiator 102′ to be authorized. The responder 101 x can take the roll of an enrollee and process a configuration attribute 330. The responder 101 x can generate a random number comprising an enrollee nonce E-nonce 332 a. Responder 101 x can then conduct an encryption step 322 c, where encryption step 322 c can comprise (i) an encryption step 322 using key ke 327 a, and (ii) the plaintext to be encrypted can be the E-nonce 332 a and the configuration attribute 330. The output of an encryption step 322 c can be a ciphertext 322 d. Responder 101 x can then send initiator 102′ a DPP Configuration Request message 123 b, where the configuration request 123 b can include the ciphertext 322 d, where the plaintext in ciphertext 322 d can include E-nonce 332 a and the configuration object 330. DPP Configuration Request message 123 b can be processed by responder 101 x according to section 6.3.3 of DPP specification version 1.0.

Initiator 102′ can receive DPP Configuration Request message 123 b via connection 192 and using DPP application 102 g. As contemplated herein, a DPP application 102 g can perform the steps for initiator 102′ depicted in FIG. 5a , such as transmitting/receiving DPP 191 messages using a first MAC.I 102 n for connection 192 and transmitting/receiving messages with DPP server 103 using MAC.N 102 q via access network 112. A DPP application 102 g in initiator 102′ can also perform the depicted steps for an initiator 102′ in FIG. 5a such as, but not limited to, 504, 505, 313, 314, etc. Initiator 102′ can receive message 123 b and process the message. Initiator 102′ can conduct a decryption step 328 c using decryption step 328 depicted in FIG. 4c above. A difference between decryption step 328 and decryption step 328 c is that decryption step 328 c uses the ciphertext 332 d as input into the symmetric decryption algorithm 405 b. Initiator 102′ can use the previously calculated key ke 327 a from a step 402 c in FIG. 5a in order to read the plaintext within ciphertext 332 d. Initiator 102′ can record the plaintext E-nonce 332 a and configuration attribute 330.

Initiator 102 can send DPP server 103 a message 513 via secure connection 302 b from a step 301, where message 513 can include and identity for device 101 such as ID-token.device 206 and the plaintext value for the configuration attribute 330. Message 513 can be sent via secure session 302 b, so the “plaintext” would be encrypted when transmitted over secure session 302 b. In step 335, DPP server 103 can process the received configuration attribute 330 received in message 513. For the exemplary embodiment depicted in FIG. 1a and FIG. 5a , configuration attribute 330 can specify that device 101 with responder 101 x may have a role of WiFi client. In exemplary embodiments, DPP server 103 can previously select a primary access network 308 aa in a step 308 a within a step 301 depicted in FIG. 3a above, using the received networks available list 304 c from initiator 102′. Also, in a step 308 b in a step 301 in FIG. 3a above, DPP server 103 could receive or record the set of network credentials 109 associated with the selected primary access network 308 aa for device 101 using device identity ID-token.device 206 (or ID.device 101 i).

In step 335, DPP server 103 can process the set of network credentials 109 for primary access network 308 aa into a configuration object. The configuration object with network credentials 109 can comprise a connector or configuration object as specified in section 6.3.5 and 6.3.6 of DPP specification version 1.0. The configuration object with network credentials 109 can be optionally signed by DPP server 103 using the recorded initiator bootstrap private key bi 104 b. In a different embodiment, a DPP server 103 can omit a signature for network credentials 109 in a step 335, and an initiator 102′ can sign the network credentials 109 using the derived initiator ephemeral private key pi 102 b. The steps to create and verify a signature with ECC PKI keys can be according to FIPS publication 186-4, and other possibilities exist as well. In FIG. 5a , a DPP server 103 can also take the other steps described for a step 335 in FIG. 3a above.

In a step 336, DPP server 103 can optionally encrypt network credentials 109 using an asymmetric encryption algorithm and a public key from the responder comprising one of (i) the responder bootstrap public key Br 101 a or (ii) the derived responder ephemeral public key Pr 101 e (received in message 506), or (iii) the public key for a device recorded by a certificate for device 101 in cert.device 101 m. In some preferred exemplary embodiments, a step 336 can comprise encrypting network credentials 109 into credentials 109′ using (i) the public key in cert.device 101 m, and (ii) the an Elgamal asymmetric encryption algorithm. Or, a step 336 can comprise encrypting network credentials 109 into credentials 109′ using either responder public key Pr 101 e or Br 101 a, and an Elgamal asymmetric encryption algorithm. The encryption algorithm could be from using Elgamal asymmetric encryption as summarized in the Wikipedia article for ElGamal encryption from Apr. 18, 2018, which is herein incorporated by reference. A set of network credentials 109 that may be optionally encrypted using Elgamal asymmetric encryption and a responder public key is depicted as credentials 109′ in FIG. 5a . The optional Elgamal asymmetric encryption in a step 336 can use a set of parameters 199 a in order to specify values such as encoding rules, byte or bit order, padding, etc. An optional encryption step 336 could also comprise (i) deriving a symmetric key and encrypting the symmetric key with Elgamal encryption and a responder public key and then (ii) encrypting the set of credentials 109 using a symmetric ciphering algorithm 405 a and the derived symmetric key, in order to determine an encrypted set of credentials 109′.

In exemplary embodiments, an encrypted set of credentials 109′ can be sent to initiator 102′ instead of plaintext credentials 109, since an initiator 102′ can read plaintext credentials 109, but not feasibly read encrypted credentials 109′. Note that encrypted credentials 109′ can include a plaintext public key “h” or “g′” along with the credentials 109′ in order for responder 101 x to use a private key such as responder bootstrap private key br 101 b or responder ephemeral private key pr 101 f or the secret key for cert.device 101 m in FIG. 1a to decrypt the encrypted credentials 109′. A reason that a step 336 can be performed in FIG. 5a is that (i) initiator 102′ could otherwise read and operate on a plaintext network credentials 109 (since initiator 102′ uses encryption key ke 327 a to encrypt plaintext 403 c), and (ii) a DPP server 103 or a network 107 may prefer for initiator 102′ to not read plaintext network credentials 109 (since initiator 102′ may not be secured or under the full control of a network 107). In other embodiments, an encryption step 336 can be optionally omitted and plaintext credentials 109 can be sent to an initiator 102′ via the secure session 302 b via message 514.

In another embodiment, the asymmetric encryption step 336 can be performed by an external network, such that the external network generates the asymmetrically encrypted credentials 109′, and the asymmetrically encrypted credentials 109′ could be stored in a device credentials table 340 from FIG. 3b . For example, credentials 109′ could comprise the exemplary depicted credentials in table 340 of “from . . . ”, where “ . . . ” was an external network in a networks available list 304 c. In other words, a DPP server 103 may not be able to read the plaintext credentials 109 within an asymmetrically encrypted credentials 109′, since an external network could encrypt the credentials using a step 336 before providing the credentials to network 107 and DPP server 103. Again, as noted above, a step 336 could comprise asymmetrically encrypting a symmetric ciphering key using Elgamal asymmetric encryption and a public key for responder 101 x or device 101, and then encrypting the plaintext credentials 109 into credentials 109′ with the symmetric ciphering key.

DPP server 103 can then send initiator 102′ a message 514, where the message 514 can include an identity for device 101 such as ID-token.device 206 and the network credentials 109′ (plus the asymmetrically encrypted symmetric ciphering key for embodiments where credentials 109′ are encrypted with the symmetric ciphering key), where the network credentials 109′ can be in the form of a configuration object and optionally encrypted using an Elgamal asymmetric encryption algorithm. Although a single value for network credentials 109′ in message 514 are depicted, network credentials 109′ could provide credentials for device 101 to connect with both a selected primary network 308 aa and a selected backup network 308 ab (with different credentials for each). Or, two sets of configuration objects with two sets of network credentials 109′ could be sent in a message 514. Other possibilities exist as well without departing from the scope of the present invention.

Initiator 102′ can receive message 514 and process the received credentials. At step 322 e, initiator 102 can conduct an encryption step 322 e using an encryption step 322 depicted and described in connection with FIG. 4c above. Encryption step 322 e can be performed using key ke 327 a for device 101. For encryption step 322 e, the plaintext value for the E-nonce 332 a and the configuration object comprising network credentials 109′ (where network credentials 109′ may be optionally asymmetrically encrypted) can be input into a symmetric encryption algorithm 405 a in order to generate a ciphertext 322 f. Note that the use of asymmetrically encrypted credentials 109′ can be optionally omitted, and an initiator 102′ in a step 322 e can input plaintext credentials 109 into a symmetric ciphering algorithm 405 a. Initiator 102′ can then send responder 101 x a DPP configuration response message 124 via connection 192, where message 124 can include the ciphertext 322 f, and the ciphertext 322 f can include the encrypted E-nonce 332 a and the encrypted network credentials 109′

Responder 101 x can receive message 124 from initiator 102′ with ciphertext 322 f. Responder 101 x can conduct a decryption step 328 d using decryption step 328 depicted in FIG. 4c below. A difference between decryption step 328 and decryption step 328 d is that decryption step 328 d uses the ciphertext 322 f as input into the symmetric decryption algorithm 405 b. Responder 101 x can use the previously calculated key ke 327 a in order to read the plaintext within ciphertext 322 f. Note that the plaintext within ciphertext 322 f can include an encrypted network credentials 109′. In other words, and as depicted in FIG. 5a , credentials 109′ in message 124 received by responder 101 x can be “double decrypted”, and the first layer of encryption using key ke 327 a can be removed using step 328 d. Responder 101 x can confirm that plaintext in ciphertext 322 f includes the previously sent E-nonce 332 a.

For embodiments that use an optional encryption step 336 on network credentials 109 by DPP server 103 in step 336 (or an external network) in order to create asymmetrically encrypted network credentials 109′, a responder 101 x can use an asymmetric decryption step 337 in order to convert the encrypted network credentials 109′ into plaintext network credentials 109. Responder 101 x could use an Elgamal asymmetric decryption algorithm and either a recorded (i) responder bootstrap private key bi 101 b or (ii) responder ephemeral private key pr 101 f. Note that device 101 could decrypt credentials 109′ using a private key for the public key in a certificate cert.device 101 m, and in this case responder 101 x could pass the received asymmetrically encrypted credentials 109′ to device 101. Note that when using Elgamal asymmetric decryption, the responder 101 x or device 101 uses the private key that corresponds to the public key used with asymmetric encryption of the credentials 109 in a step 336. Responder 101 x could also use a selected set of cryptographic parameters 199 a in order to conduct the Elgamal asymmetric decryption.

Note that encrypted network credentials 109′ could include the public key “h” or “g′” in order to conduct the Elgamal asymmetric decryption. For embodiments (a) without an optional encryption step 336 on network credentials 109 to create encrypted credentials 109′, then (b) responder 101 x can read the plaintext network credentials 109 in a step 337. Note that credentials 109 may be previously signed by DPP server 103 or initiator 102′ using a private key for the initiator 102′. The responder could also verify a signature for the credentials 109 using a public key for the initiator, such as the initiator ephemeral public key Pi 102 a or the initiator bootstrap public key Bi 104 a. For embodiments where (i) a symmetric key is asymmetrically encrypted using Elgamal, and (ii) the credentials 109′ are symmetrically encrypted with the symmetric key, then (x) message 124 can include the asymmetrically encrypted symmetric key with the symmetrically encrypted credentials 109′ and (y) a step 337 by responder 101 x can include asymmetrically decrypting the symmetric key and then using the plaintext symmetric key to decrypt the credentials 109′

After reading the plaintext network credentials 109 and optionally verifying a signature for th credentials 109 using a recorded public key 102 a or 104 a, device 101 can complete the configuration step 106 by loading the network credentials 109 and begin operating a WiFi radio 101 h with the network credentials 109, as depicted in FIG. 1a . In this manner, device 101 can obtain connectivity to network access point 105. In exemplary embodiments, the initiator 102′ can conduct the initiator restore step 129 depicted and described in connection with FIG. 1d above, such that initiator 102′ can be returned to the previous state where WiFi radio 102 w operates with a user configuration 131, thus minimizing impacts of the prior initiator configuration step 127 for an initiator user 102 u. As depicted in FIG. 5a , the collection of steps beginning with step 339 for responder 101 x through step 106 for responder 101 x can comprise a step 513.

FIG. 5b

FIG. 5b is a simplified message flow diagram illustrating an exemplary system with exemplary data sent and received by a device database, a DPP server, an initiator proxy, and a responder, in accordance with exemplary embodiments. Before starting steps and message flows depicted in FIG. 5b , the initiator, DPP server, and device database depicted for system 501 in FIG. 5b may previously complete exemplary message flows and steps depicted for a step 301 in FIG. 3a above. System 501 can include a device database 104, DPP server 103, initiator proxy 102′, and responder 101 x operating in device 101. Initiator proxy 102′ can communicate with DPP server 103 via IP network 113 using an access network 112, also as depicted in FIG. 3a above. As contemplated herein, an “initiator proxy 102′” depicted in FIG. 5b may also be referred to as initiator 102′, and an initiator 102′ and initiator proxy 102′ may be equivalent herein. A difference between system 501 in FIG. 5b and system 300 in FIG. 3a can be that the exemplary secret shared keys comprising key k2 314 c and ke 327 a are recorded and operated within an initiator 102′. In other words, a DPP server 103 does not need access to these keys for the embodiment depicted in FIG. 5b . In exemplary embodiments depicted in FIG. 5b , both (i) the initiator bootstrap private key bi 104 b and (ii) the responder bootstrap public key Br 101 a can remain recorded in a DPP server 103 and not exposed to initiator 102′. The exemplary embodiment depicted in FIG. 5 ba can comprise a third mode 306 a of operation for initiator 102′ and DPP server 103, as depicted in FIG. 3b above. Note that a difference between the third mode 306 a in FIG. 5b and the second mode 306 a in FIG. 5a is that (a) the responder bootstrap public key Br 101 a can remain recorded in a DPP server 103 and not exposed to or shared with initiator 102′ for the third mode 306 a in FIG. 5b , while (b) the responder bootstrap public key Br 101 a is shared with initiator 102′ in the second mode 306 a in FIG. 5 a.

After a step 301 from FIG. 3a , DPP server 103 can conduct a step 502 in order to select a responder bootstrap public key Br 101 a for device 101 using an identity ID-token.device 206. The value ID-token.device 206 could be received within step 301 in message 305 as depicted in FIG. 3a . The responder bootstrap public key Br 101 a could be recorded in a device database 104 or received from a device manufacturer for a device 101. As mentioned for a step 502 in FIG. 5a , a responder 101 x could record a plurality of responder bootstrap public keys Br 101 a, and the key 101 a can be selected in a step 502. A MAC address for MAC.R 101 d for device 101 using ID-token.device 206 can also be selected from a server database 103 a in a step 502.

Initiator 102′ can then conduct a step 313 to derive the initiator ephemeral public key Pi 102 a and the initiator ephemeral private key pi 102 b. A step 313 was previously depicted and described above in FIG. 3a . Although DPP server 103 conducted the step 313 in FIG. 3a , an initiator 102′ can also conduct the step 313 in order to derive the ephemeral PKI key pairs. For example, initiator 102′ also derives the initiator ephemeral PKI keys in a step 313 in FIG. 5a . Initiator 102′ can then send DPP server 103 the derived initiator ephemeral private key pi 102 b in a message 521. Message 521 could be securely send to DPP server 103 via secure session 302 b. Message 521 can also include device identity ID-token.device 206 (or ID.device 101 i) in order for DPP server 103 to track the device 101 and initiator 102′ associated with the key pi 102 b. DPP server 103 can record the data received in message 521 in a server database 103 a, as depicted in FIG. 3 b.

DPP server 103 for a step 314 z can comprise DPP server 103 conducting a first initiator key exchange step 314 using an Elliptic Curve Diffie Hellman (ECDH) key exchange 401 a, as depicted and described in connection with FIG. 4a below. Data input for a step 314 z can comprise the initiator ephemeral private key pi 102 b and the recorded responder bootstrap public key Br 101 a. Data output from a step 314 z can comprise the secret shared key M 410 as described in FIG. 4a above. In other words, the difference between a step 314 z and a step 314 is the a step 314 z can terminate before the key derivation function 401 a and the output of a step 314 z can comprise the secret shared key M 410. In an alternative embodiment for system 501 in FIG. 5b , DPP server 103 can also calculate key k1 using the full set of steps for a key exchange 314 (but key k1 may not be needed by DPP server 103 for the embodiment depicted in FIG. 5b ).

At step 316, DPP server 103 can calculate secure hash values for initiator bootstrap public key Bi 104 a and responder bootstrap public key Br 101 a, using a secure hash algorithm 199 e. The values are depicted in FIG. 3a as “H(Bi)” and “H(Br)”, respectively. DPP server 103 can then send initiator 102′ a message 522, where message 522 can include an identity for device 101 ID-token.device 206 (or ID.device 101 i), the hash values for the initiator bootstrap public key Bi 104 a and the responder bootstrap public key Br 101 a, the shared secret key M 410 from a step 401 a in key exchange step 314 z, and the MAC address for the responder 101 x comprising MAC.R 101 d. Message 522 can be sent through secure session 302 b and received and recorded by initiator 102′.

Initiator 102′ can receive message 522 and conduct a series of steps in order to create and process a DPP authentication request message 123. Initiator 102′ can input the received value M 410 from a message 522 into a key derivation function 402 a in order to derive a secret shared key k1 314 a, depicted as a step 402 a for initiator 102′ in FIG. 5b . At step 504 the initiator 102′ can determine the initiator capabilities for conducting a DPP 191 with device 101 and responder 101 x. In the exemplary embodiment depicted in FIG. 5b , initiator 102′ can select and use the capabilities of the role as a configurator. In other embodiments, an initiator 102′ could select and use the capabilities of the role an enrollee for a step 504. In addition, an initiator 102′ can generate a random number for an initiator nonce I-nonce 317 a in a step 504. A step 504 can also take place before a step 402 a in some exemplary embodiments.

Initiator 102′ in step 315 can then conduct the encryption step 315 depicted in FIG. 4a , and also described in FIG. 3a and FIG. 5a . The plaintext input into a symmetric encryption algorithm 405 a can comprise the initiator nonce 317 a and initiator capabilities from a step 504 above. The shared secret key k1 314 a from key derivation function 402 a by initiator 102′ can be used with symmetric ciphering algorithm 405 a in a step 315. The ciphertext output from an encryption step 315 can comprise ciphertext 315 a.

Initiator 102′ can then conduct a step 316 a to send responder 101 x a message 122, where message 122 can include the hash values for (i) the initiator bootstrap public key Bi 104 a and (ii) the responder bootstrap public key Br 101 a, the derived initiator ephemeral public key Pi 102 a (from a step 313 above), and ciphertext 315 a, where ciphertext 315 a is encrypted with key k1 and includes an initiator nonce 317 a and the initiator capabilities. Sending DPP authentication request message 122 was also depicted and described in connection with FIG. 1b , FIG. 1c , FIG. 3a , and FIG. 5a above.

In FIG. 5b , responder 101 x can receive message 122 and conduct the series of steps 325. The series of steps 325 for responder 101 x were depicted and described in connection with FIG. 3a above, and steps 325 can comprise the steps 318. 319. 320, 321, 314 b, 322, and 315 b. Responder 101 x can process the message 122 using steps 325 and generate a DPP authentication response 123. The steps 325 for a responder 101 x to process the received message 122 and generate the response message 123 can comprise section 6.2.2 of DPP specification version 1.0. Other possibilities exist as well without departing from the scope of the present invention. In general, responder 101 x can use the recorded bootstrap private keys and the derived ephemeral private keys in order to conduct ECDH key exchanges. Responder 101 x can also (i) derive a responder nonce 318 b, (ii) decrypt ciphertext in message 122 and (iii) encrypt ciphertext in message 123 using derived secret shared keys from the ECDH key exchanges. Responder 101 x can send initiator 102′ the DPP authentication response 123 after conducting the steps 325.

Initiator 102′ can receive the DPP authentication response 123 and process the message. Using broadcast messages over connection 192, initiator 102′ can identify the message from responder 101 x based on the hash values for the bootstrap public keys in response 123. For embodiments where message 122 and response 123 are sent as unicast messages, initiator 102′ can identify the message from responder 101 x based on the MAC.R 101 d in the response 123. Initiator 102′ can then extract and record responder ephemeral public key Pr 101 e (depicted for a response 123 in FIG. 3a ). Initiator 102′ can also a key verification step on the received key Pr 101 e according to FIPS publication SP 800-56A (revision 2).

Initiator 102′ can then send DPP server 103 a message 506 using secure connection 302 b via access network 112, where message 506 can include (i) an identity for device 101 such as ID-token.device 206 (or ID.device 101 i), and (ii) the responder ephemeral public key Pr 101 e. In an exemplary embodiment a message 506 can include the MAC address MAC.R 101 d to also identify device 101 and the associated key Pr 101 e. DPP server 103 can receive the message 506 and record the responder ephemeral public key Pr 101 e along with the device identity in a server database 103 a, as depicted in FIG. 3b above.

As depicted in FIG. 5b , initiator 102′, DPP server 103, and responder 101 x can then conduct a step 512. A step 512 can comprise the series of steps and message depicted and described in connection with FIG. 5a above. In summary, initiator 102′ can conduct a key exchange step 319 a to derive the key k2 314 c and then decrypt the ciphertext from message 123 into plaintext using a step 320 b. Key exchange step 319 a can also calculate a shared secret key N 411 as depicted in FIG. 4b . The plaintext from a step 320 b can comprise a second ciphertext 322 a encrypted with a key ke 327 a. DPP server 103 can (i) conduct a key exchange step 401 c in order to derive shared secret key L 412. DPP server 103 can send initiator 102′ the shared secret key L 412. Initiator 102′ can conduct a key derivation function step 402 c from FIG. 4c using the values M 410 (from message 522), N 411 (from a step 319 a), and L 412 (from DPP server 103 in a message 510 in a step 512) in order to derive key ke 327 a, as depicted in FIG. 4c . Initiator 102′ can decrypt the second ciphertext 322 a in message 123 into plaintext with a decryption step 328 using the derived key ke 327 a and read the value R-auth 404. Initiator 102′ can also use a step 328 to compare the received, decrypted value for R-auth 404 with an internally calculated value for R-auth (e.g. a derived value for R-auth), and responder 101 x can be authenticated if the two values for R-auth 404 are equal. Initiator 102′ can calculate a value for I-auth 404 a and encrypt the value with key ke 327 a in a step 322 b. Initiator 102′ can then send responder 101 x a DPP authentication confirm message 123 a in a step 512, as depicted in FIG. 5a and FIG. 5 b.

As depicted in FIG. 5b , initiator 102′, DPP server 103, and responder 101 x can then conduct a step 513. A step 513 can comprise the series of steps and message depicted and described in connection with FIG. 5a above. In summary, responder 101 x can use a step 339 to receive and process the DPP authentication confirm message 123 a. Responder 101 can decrypt the I-auth value 404 a in a step 331. Responder 101 x can calculate the value for I-auth 404, and if the received and calculated values for I-auth 404 a are equal, then initiator 102′ can be authenticated with responder 101 x. Responder 101 x can send a DPP configuration request 123 b message, which can include a ciphertext 322 d an E-nonce 332 a and a configuration attribute 330. Initiator 102′ can decrypt the ciphertext 322 d and send DPP server 103 the configuration attribute 330. DPP server 103 can send initiator 102′ a set of network credentials 109. The set of credentials 109 may optionally be encrypted with an asymmetric encryption algorithm using a public key for the responder, and for these embodiments the set of credentials 109 can be designated an encrypted set of credentials 109′. The public key for the responder with an optional asymmetric encryption for the credentials 109′ could be (i) the responder bootstrap public key Br 101 a, or (ii) the responder ephemeral public key, or (iii) a private key for the device public key in cert.device 101 m (e.g. step 337 in FIG. 5a ). Credentials 109 or credentials 109′ can also be signed by either (i) the DPP server 103 using the recorded initiator bootstrap private key bi 104 b, or (ii) using the derived initiator ephemeral private key pi 102 b.

Continuing with a step 513 in FIG. 5b , the credentials 109 or credentials 109′ could be signed by both the DPP server 103 and the initiator 102 in a step 513. The initiator 102′ can receive the signed network credentials 109′ or 109 and encrypt the credentials and the E-nonce 332 a using the derived key ke 327 a. The initiator 102′ can send responder 101 x a DPP configuration response 124 message with the encrypted and signed credentials for device 101. Responder 101 can verify the signature and decrypt the credentials 109 or asymmetrically encrypted credentials 109′. Device 101 can apply the credentials 109 and connect with another node using the credentials 109, and the other node could be network access point 105. The other node could also be a WiFi peer-to-peer (P2P) connection. In another embodiment, device 101 could operate as an access point 105 for other WiFi clients, and in this embodiment the credentials 109 received in a message 124 could be for device 101 to operate as a WiFi access point using the credentials 109. Other possibilities exist as well for a responder 101 x to receive a set of credentials 109 from an initiator 102′ without departing from the scope of the present invention.

System 501 as depicted in FIG. 5b can provide several benefits for conducting a device provisioning protocol, compared to the conventional technology depicted in FIG. 1b and FIG. 1c . First, an initiator bootstrap private key bi 104 b can remain recorded in a network 107 and does not need to be shared with an initiator 102′. The operating environment and security for an initiator 102′ or initiator 102* in FIG. 1b and FIG. 1c may be outside the control of a network 107 or a device 101 with responder 101 x. If an initiator bootstrap private key bi 104 b is sent to initiator 102′ or initiator 102*, then the initiator bootstrap private key bi 104 b cannot be securely reused (since initiator 102′ or initiator 102* could then share the key bi 104 b or attempt to reuse it with other devices 101 recording the same initiator bootstrap public key Bi 104 a). Further, recording the same, shared initiator bootstrap public key Bi 104 a across a plurality of devices 101 (such as during device manufacturing or before distribution) can provide benefits for scalability and ease of deployment, especially if the initiators 102′ or initiators 102* are not known to a network 107 before distribution of devices 101. Note that recording the same, shared initiator bootstrap public key Bi 104 a across a plurality of devices 101 is depicted with “shared keys” for a key table 104 k in device database 104 in FIG. 2 b.

In other words, recording a same initiator bootstrap public key Bi 104 a across a plurality of devices may not be securely feasible if the initiator bootstrap private key bi 104 b needs to be used by multiple, insecure initiators 102′ or initiators 102*. In addition, the responder bootstrap public key Br 101 a can remain securely recorded in a network 107 and not exposed to an initiator 102′ for a system 501 in FIG. 5b (where Br 101 a can be recorded in a device database 104 instead of being received by an initiator 102′ from a message 503 in FIG. 5a ). During the lifetime of a device 101 that could be a decade or longer, a device owner or device user may prefer the device 101 to conduct a device provisioning protocol multiple times, such as after a “factory reset” for device 101. Keeping or recording the responder bootstrap public key Br 101 a and initiator bootstrap private key bi 102 b in a network 107 can support the steps for a device provisioning protocol to be securely reused for the same device 101.

Yet another benefit of a system 300, system 500, and system 501 is that an overall trust level by responder 101 x for conducting a device provisioning protocol can be enhanced or increased, since both an initiator 102′ and a DPP server 103 must work in conjunction in order to successfully compete a DPP 191. In other words, for a system 300, system 500, and system 501, security risks for an insecure initiator 102′ can be compensated by likely a higher overall level of security for a DPP server 103. These are just a few of the exemplary benefits for a systems 300, 500, and 501 compared to conventional technology for conducting a device provisioning protocol, and other benefits will be available as well for those of ordinary skill in the art.

FIG. 6a

FIG. 6a is a simplified message flow diagram illustrating an exemplary system with exemplary data sent and received by a device database, a DPP server, a WiFi access point, and a device, in accordance with exemplary embodiments. Before starting steps and message flows depicted in FIG. 6a , a device 101 with responder 101 x could have completed the exemplary configuration step 106 as depicted in FIGS. 1a, 3a, 5a, and 5b above in order for device 101 to receive and load a set of network access credentials 109. System 600 can include a device database 104, a DPP server 103, a WiFi access point 105, and a device 101. WiFi access point 105 can broadcast an SSID with a value of SSID.network-AP 109 a, which also could have been observed by an initiator 102′ in a step 303 a to collect a networks available list 304 c. A DPP server 103 (or another server within a network 107) could (i) conduct a step 308 a to select WiFi access point 105 from the networks available list 304 c and then (ii) obtained the credentials 109 using a step 308 b, and then sent the credentials 109 through initiator 102′ in a DPP message 124.

Configuration data for device 101 to utilize with WiFi access point 105 could be included in data and values for network credentials 109 for device 101. For embodiments where a selected access network 308 aa for device 101 is not a WiFi access point 105 (such as possibly a 5G wireless WAN connection), then network credentials 109 could comprise a profile for an embedded universal integrated circuit card (eUICC) as specified in GSMA standards SGP.22 and SGP.02. For embodiments where credentials 109 comprise an eUICC profile, then the credentials 109 may preferably be asymmetrically encrypted into credentials 109′ using a step 336 from FIG. 5a by an external network recording the eUICC profile, and then asymmetrically decrypted by responder 101 x or device 101 using a step 337 from FIG. 5a . DPP server 103 would record the eUICC profile as credentials 109′ (or “from . . . ” in FIG. 3b ). For embodiments where asymmetrically encrypted credentials 109′ comprising an eUICC profile are received by responder 101 x in a DPP Configuration Response 124 message, then device 101 can also operate an eUICC as specified in as specified in GSMA standards SGP.22 and SGP.02.

Values or data in credentials 109 could comprise frequencies or channels to utilize, a service set identifier (SSID) or network name, user identities and passwords, and/or public certificates for device 101, public certificates for a certificate authority, etc. As contemplated herein, a set of credentials 109 can include supporting data to use the credentials 109 and/or connect with an access network 112 or network 107, such as configuration data for a WiFi radio 101 h in device 101. The supporting data could comprise Config.network-AP 109 c as depicted and described in connection with FIG. 1a . Data collected for a set of credentials 109 was also described in a step 335 in FIG. 3a Device 101 and access point 105 can conduct a WiFi session setup 602 using the WiFi radio 101 i with credentials 109. WiFi connection setup 602 can utilize standard WiFi security protocols such as, but not limited to, WPA2, WPA3, or subsequent and related standards. In exemplary embodiments, WiFi connection setup 602 utilizes PMK and a PMKID, where PMK and PMKID can be uniquely associated with device 101. Or WiFi connection setup 602 could use a preshared secret key (PSK) in credentials 109. At step 603, device 101 can select the DPP server 103 and a URL for DPP server 103. A URL for DPP server 103 could be included with credentials 109, or otherwise fetched by device 101 from an IP network 113 after session setup 602. A step 603 can also comprise device 101 confirming expected connectivity to an IP network 113 is provided via access point 105, such as performing domain name server (DNS) requests and downloading data via HTTP or HTTPS/TLS from an IP network 113.

Device 101 and DPP server 103 can then conduct a secure session setup 604. Secure session setup 604 could comprise a session using TLS, IPSec, VPN, SSH, or similar secure networking technologies to establish secure sessions. In exemplary embodiments, DPP server 103 uses the responder bootstrap public key Br 101 a as a public key for device 101 in secure session 603 and device 101 uses the initiator bootstrap public key Bi 104 a as a public key for DPP server 103 in secure session 603. In other words, (i) DPP server 103 uses the initiator bootstrap private key bi 104 b as the private key for DPP server 103 in secure session 603, and (ii) device 101 uses the responder bootstrap private key br 101 b as the private key for device 101 in secure session 603. In exemplary embodiments, the public keys responder bootstrap public key Br 101 a and the initiator bootstrap public key Bi 104 a are not transmitted between the nodes in a secure session setup 603, but rather the public keys are selected for use since they are already recorded by the two nodes. In this manner, security of secure session 603 can be enhanced, because the public keys are not transmitted or received in a plaintext form, but rather are already previously recorded by the two nodes. In an exemplary embodiment, secure session setup 603 could designate or identify the initiator bootstrap public key Bi 104 a (and corresponding private key) for device 101, which could be selected by DPP server 103 sending an initiator bootstrap keys sequence number 197 in a secure session setup 603, for embodiments where device 101 can record a plurality of initiator bootstrap PKI keys, as depicted in device table 104 d in FIG. 2b . Note that a secure session setup 604 could also use different public keys than those depicted in FIG. 6a , such as a certificate for DPP server 103 cert.DPPS 103 c and a certificate for device 101 cert.device 101 m.

At step 605 a, device 101 can download and install a configuration package for device 101 using WiFi session 602 in FIG. 6a . The configuration package can be downloaded from network 107, and also potentially from DPP server 103 using secure session 604. Configuration package for device 101 can comprise an updated operating configuration for device 101. Configuration package for device 101 could be downloaded from a network 107. Configuration package for device 101 could include updated software or firmware for device 101, different credentials for device 101 to use when connecting with servers within a network 107, such as potentially a reporting server or a monitoring server within a network 107, timers for device 101 to use with servers in a network 107, and other data as well for the ongoing operation of device 101 with a network 107. After internally recording or loading the files for a configuration package in a step 605 a, device 101 can perform a reboot, so that device 101 restarts with the new files from the configuration package. Upon a reboot in a step 605 a, connections 602 and 603 may temporarily terminate with the reboot, but device 101 can re-establish connections 602 and 603 after reboot. A step 605 a can then also comprise device 101 creating a report 605 aa, where report 605 aa includes a status code with success or errors for each file in a configuration package. In other words, report 605 aa can record the success or errors of applying each of the files in a configuration package, which may be useful for network 107 in system 100 to know the configured state of device 101 after a step 605 a. Note that step 605 a can take place before a secure session setup 604.

At step 605 b device 101 can perform an RF frequency scan or sweep all available mobile network operators and network access technologies around device 101 in order to collect a second networks available list 304 a. The second networks available list 304 c can be useful for DPP server 103 or network 107 to confirm that a selected primary access network 308 aa for device 101 is in fact a preferred network. An exemplary first networks available list 304 c was depicted in FIG. 3a above (for initiator 102′). Although initiator 102′ also collected a first networks available list 304 c, device 101 can operate with a different antenna and set of radios 101 h with different capabilities than initiator 102′. For example, RSSI or RF signal strength measurements by initiator 102′ in a step 303 a may be different than for a device 101. As another example, device 101 may operate at a different location (such as an exemplary tens of meters away) from the location of initiator 102′ in a step 303 a, and thus a preferred access network 112 for device 101 may be different using the second networks available list 304 a from device 101 in step 605 b than a first networks available list 304 a from initiator 102′. In other words, a network selection step 308 a may provide an initial estimate for a preferred access network 112 (identified by selected primary network 308 aa in FIG. 3b ), but the actual/updated preferred access network 112 for device 101 using the criteria from a step 308 a could be selected in a step 605 b using the second networks available list 304 c from device 101. A step 605 b for device 101 can include the actions for an initiator 102′ in a step 303 a to collect a first networks available list 304 a for initiator 102′.

Device 101 can send DPP server 103 a message 606, where message 606 can include a device identity ID-token.device 206, the second networks available list 304 c collected by device 101 in a step 605 b, an initiator bootstrap sequence number 197 for the most recent initiator bootstrap public key Bi 104 a used by device 101, and a report 605 aa, which could comprise the report generated in a step 605 a. As depicted in FIG. 6a , message 606 can be sent via (i) access point 105 and then (ii) access network 112 for access point 105. Although a DPP server 103 is depicted in FIG. 6a as communicating with device 101 and receiving message 606, another server in a network 107 or associated with network 107 could receive the message 606 (using a secure session similar to secure session 604 depicted in FIG. 6a ). Note that message 606 could also include the most recent initiator bootstrap public key Bi 104 a recorded by device 101.

A DPP server 103 could then conduct a step 308 a using the second networks available list 304 c from device 101, in order to select an updated, selected primary access network 308 aa. A step 308 a was depicted and described above in connection with FIG. 3a . For embodiments where a step 308 a by DPP server 103 selects a different, second primary access network 308 aa for device 101 in FIG. 6a (e.g. different than a first primary access network 308 aa in FIG. 3a ), a DPP server 103 could then conduct a step 308 b in order to receive an updated, second set of credentials 109 for the second primary access network 308 aa. Note that the credentials 109 received and recorded in a step 308 b by DPP server 103 can comprise an asymmetrically encrypted credentials 109′, where a server functioning as the source of asymmetrically encrypted credentials 109′ could perform a step 336 depicted and described in connection with FIG. 5a . In exemplary embodiments, only device 101 could feasibly read the plaintext credentials 109 for an asymmetrically encrypted credentials 109′, where device 101 would use a recorded private key (e.g. key 101 b, 101 f, or the private key for cert.device 101 m) in order to perform an Elgamal asymmetric decryption on the credentials 109′

A DPP server 103 could conduct a step 607, where DPP server 103 can process the received report 605 aa in order to confirm a configuration package for device 101 was successfully applied in a step 605 a. DPP server 103 could also forward report 605 aa to other servers in a network 107 in a step 607. If errors or problems are detected in report 605 aa in a step 607, then DPP server 103 can send a command to device 101 to back out the configuration package (e.g. uninstall) or restore a previous state for device 101.

At step 608, DPP server 103 can determine if recorded initiator bootstrap public key Bi 104 a for device 101 should be updated. There could be many reasons both device 101 and network 107 may prefer to update initiator bootstrap public key Bi 104 a for a responder 101 x operating in device 101. A device 101 may have a lifetime of a decade or longer, and increased key security, use of different cryptographic algorithms, or different cryptographic parameters 199 may be preferred over time. Another reason could be that device 101 or network 107, after (a) a first configuration step 106 via a first session of a device provisioning protocol, may prefer (b) to support a second configuration step 106 via a second session of a device provisioning protocol, where the second session could use a different initiator bootstrap PKI key pair. Another reason could be that a first device 101 used the same key (e.g. same numeric value) for an initiator bootstrap public key Bi 104 a as second device 101 (or possibly multiple other devices 101), which is also depicted for “shared keys” in a key table 104 k in a device database 104 in FIG. 2b . Security could be increased for the first device 101 by changing the recorded initiator bootstrap public key Bi 104 a after the key has been used. Other reasons for a device 101, DPP server 103, or network 107 may exist for a DPP server 103 to determine key Bi 104 a should be updated for device 101, without departing from the scope of the present invention. FIG. 6 depicts an embodiment where DPP server 103 selects to update the initiator bootstrap public key Bi 104 a for device 101 in a step 608.

At step 609, DPP server 103 can derive a new, updated initiator bootstrap public key Bi 104 a and a corresponding new, updated initiator bootstrap private key bi 104 b. The DPP server 103 can use a selected set of cryptographic parameters 199 a to derive the keys. The DPP server 103 can use a random number generator and a key pair generation algorithm in order to derive the new, update initiator bootstrap PKI keys. The DPP server 103 can use the step 313 depicted and described in FIG. 3a to derived the initiator bootstrap PKI keys (e.g. using same or similar steps as deriving initiator ephemeral PKI keys). Although FIG. 6a depicts DPP server 103 as conducting a step 609 to derive new initiator bootstrap PKI keys, another server in a network 107 could conduct a step 609, including device database 104. At step 609, DPP server 103 can also update initiator bootstrap keys sequence number 197 recorded in a device database 104 depicted in FIG. 2b to reflect or account for the use of new initiator bootstrap PKI keys. The updated number 197 is depicted in FIG. 6a an initiator bootstrap keys sequence number 197 a. In exemplary embodiments, the initiator bootstrap keys sequence number 197 can be used at a later time by DPP server 103 when conducting a step 302 d for device 101 (e.g. querying device database 104 for initiator bootstrap PKI keys in FIG. 3a ), such as if DPP server 103 supports a device provisioning protocol for device 101 again at a later time.

A DPP server 103 can then send device database 104 a message 609 a, where message 609 a can include a device identity ID-token.device 206 (or ID.device 101 i), the new, updated initiator bootstrap public key Bi 104 a and the corresponding new, updated initiator bootstrap private key bi 104 b, where the PKI keys were generated in a step 609. Message 609 a can also include the updated initiator bootstrap keys sequence number 197 a. Note that DPP server 103 and device database 104 can continue to use secure session 302 a from a FIG. 3a in order to secure message 609 a. In some embodiments, initiator bootstrap private key bi 104 b can be recorded only within DPP server 103 in a server database 103 a, and for these embodiments initiator bootstrap private key bi 104 b can be omitted from a message 609 a.

At step 610, device database 104 can record the data from a message 609 a in a device table 104 d for device 101 using ID-token.device 206 (or ID.device 101 i). The data can be recorded by adding a row in device table 104 d for device 101. The new, updated initiator bootstrap public key Bi 104 a and the corresponding new, updated initiator bootstrap private key bi 104 b could be recorded in the added row, along with the received value for an initiator bootstrap keys sequence number 197 a. In this manner, device database 104 can record and identify the initiator bootstrap PKI keys for use with device 101 at a later time, for reasons such as, but not limited to, the reasons discussed in connection with step 608 above. Database 104 can then send DPP server 103 a message 611, where message 611 can confirm that step 610 was successfully completed and the new initiator bootstrap PKI keys were recorded in a device table 104 d.

After receiving message 611, DPP server 103 can send device 101 a message 612 via secure session 604. Message 612 can include the new, updated initiator bootstrap public key Bi 104 a, which was previously derived by DPP server 103 in a step 609 and recorded by device database 104 in a step 610. Message 612 can also include (i) a selected set of parameters 199 a associated with the new Bi 104 a (e.g. key length, ECC curve name, etc.), and (ii) the updated initiator bootstrap keys sequence number 197 a. Device 101 can receive message 612 with the new, updated initiator bootstrap public key Bi 104 a and updated initiator bootstrap keys sequence number 197 a.

At step 613, device 101 could record the data received in message 612 with a responder 101 x operating in device 101. In exemplary embodiments, in step 612, device 101 could also use the received parameters 199 a to derive an updated responder bootstrap private key br 101 b and responder bootstrap public key Br 101 a. Device 101 could use the equivalent steps as DPP server 103 in step 313 depicted and described in FIG. 3a in order for responder 101 x to derive a new, updated bootstrap private key br 101 b and responder bootstrap public key Br 101 a. A step 613 can also comprise device 101 recording the derived PKI keys and received key Bi 104 a in nonvolatile memory of device 101. Device 101 can also update a responder 101 x operating in device 101 to use the new PKI keys for any subsequent, later instance of a device provisioning protocol either with an initiator 102′ or an initiator 102*.

In message 614, device 101 can send DPP server 103 and “OK” message noting the successful receipt and recording of the new, updated initiator bootstrap public key Bi 104 a, and message 614 can comprise a confirmation of recording key Bi 104 a. Message 614 can also include the new, updated responder bootstrap public key Br 101 a. At a step 615, DPP server 103 can receive message 614 and record the data in a server database 103 a for a device 101 using device identity ID-token.device 206. In exemplary embodiments, the new, updated responder bootstrap public key Br 101 a can be used by DPP server 103 when supporting an initiator 102′ to conduct a device provisioning protocol with device 101 and responder 101 x at a later time.

DPP server 103 can then send device database 104 a message 615, where message 615 can include a device identity ID-token.device 206 (or ID.device 101 i) and a confirmation that device 101 received and recorded the new, updated initiator bootstrap public key Bi 104 a. In this manner, device database 104 can confirm that the new key Bi 104 a with corresponding private key bi 104 b is “ready for use”, and can be selected in a subsequent query 309 (in FIG. 3a ) from a DPP server 103 for device 101 with identity ID-token.device 206. As depicted in FIG. 6a , message 615 can also include a new, updated responder bootstrap public key Br 101 a. Device database 104 can also record the received new key Br 101 a in a key table 104 k for device 101 with identity ID-token.device 206 as depicted in FIG. 2b . In this manner, device database 104 can select the new, updated responder bootstrap public key Br 101 a (along with initiator PKI keys) in a subsequent query 309 from a DPP server 103 for device 101, in order to conduct a later device provisioning protocol 191.

Initiator 102′ can conduct a step 617, where step 617 can comprise the DPP application 102 g or initiator 102′ sending a query 618 to DPP server 103 in order to confirm successful completing of configuration step 106. The query 618 could be sent in a message over secure session 302 b which was established between DPP server 103 and initiator 102′ in a step 301 in FIG. 3a . DPP server 103 could determine if a configuration step 106 is complete based on the successful establishment of secure session 604 and receipt of a report 605 aa. DPP server 103 could also determine that a configuration step 106 is complete using a report 605 aa and any of: (i) device 101 has wireless connectivity properly established for a selected primary network 308 aa and/or selected backup network 308 ab (e.g. credentials 109 were received by device 101 and installed), (ii) device 101 has successfully collected a networks available list 304 c, (iii) a configuration package was downloaded and installed in a step 605, (iv) device 101 has received an updated initiator bootstrap public key Bi 104 a, and/or (v) device 101 has successfully updated responder bootstrap PKI keys comprising Bi 104 a, Br 101 a, and br 101 b.

As depicted in FIG. 6a , DPP server 103 can reply to query 618 with a message 619 of “device OK”, if configuration step 106 has been confirmed by DPP server 103 as completed, such as through any of (i) through (v) in the paragraph above. Individual components within (i) through (v) in the paragraph above could be recorded or confirmed in a report 605 aa. Not all of (i) through (v) are required for some embodiments, although connectivity for device 101 to an IP network 113 can be required for DPP server 103 to consider a configuration step 106 completed. In exemplary embodiments, upon successful receipt of a message 619 with a status of “device OK” for device 101 or an equivalent message 619, then initiator 102′ can display to initiator user 102 u that a configuration step 106 for device 101 has been completed and device 101 can be left in operation, potentially without additional steps or manual changes to be performed by initiator user 102 u. For embodiments where message 619 provides a status of “device not OK” or equivalent, then initiator 102′ could display to initiator user 102 u an error status and initiator user 102 u could work with device 101 and network 107 in order to diagnose and rectify an error code or error condition in order to retransmit message 619 with a second query 618 and receive a subsequent message 619 of “device OK”.

FIG. 6b

FIG. 6b is a graphical illustration of an exemplary system, where a responder records a plurality of initiator bootstrap public keys and the responder selects and uses an initiator bootstrap public key, in accordance with exemplary embodiments. The present invention contemplates that the systems and methods for (i) using an initiator 102′ with a DPP server 103 and a responder 101 x for a device provisioning protocol, where (ii) a responder 101 x can record a plurality of initiator bootstrap public keys Bi 104 a. Benefits can include the plurality of initiator bootstrap public keys 104 a can be recorded in a device 101 with responder 101 x before device 101 is taken to the physical location of a network access point 105. The plurality of initiator bootstrap public keys can be written to device 101 during manufacturing or distribution, thereby increasing the flexibility of (a) recording at least one compatible or supported initiator bootstrap public key Bi 104 a in a device 101 for initiator 102′, before (b) an initiator 102′ is selected or known for conducting the device provisioning protocol steps 191 with a responder 101 x. In exemplary embodiments, different values for recorded initiator bootstrap public keys Bi 104 a can represent different possible networks 107 for configuration 106 of device 101 with responder 101 x. As contemplated herein, (a) pre-recording a plurality of initiator bootstrap public keys Bi 104 a in a plurality of devices 101 can still keep the various systems depicted herein secure, because (b) the corresponding initiator bootstrap private keys bi 104 b can remain recorded individually and separately within each of a plurality of networks 107 which can conduct the device provisioning protocol 191 with the plurality of devices 101 recording the same values for initiator bootstrap public keys Bi 104 a. In other words, each of the plurality of different initiator bootstrap public keys Bi 104 a depicted in FIG. 6b can comprise “shared keys” as depicted and described in connection with FIG. 2b , such that different devices 101 and responders 101 x can record the same value or number for an initiator bootstrap public key Bi 104 a.

System 601 in FIG. 6b can include an initiator 102′ and a device 101, where device 101 can operate a responder 101 x. Initiator 102′ in FIG. 6b can operate as an initiator 102′ in FIG. 1a , FIG. 3a , FIG. 5a , etc. above. Responder 101 x can record (i) responder bootstrap PKI keys Br 101 a and br 101 b, as well as (ii) at least one of a set of selected cryptographic parameters 199 a. Although FIG. 6b depicts only a single set of PKI keys Br 101 a and br 101 b, and a set of selected cryptographic parameters 199 a, a responder 101 x could also record a plurality of different sets of PKI keys Br 101 a and br 101 b, with different parameters 199 a (e.g. a first set of responder bootstrap keys for a first ECC curve P-256, a second set of bootstrap keys for a second ECC curve P-384, etc.). Responder 101 x could determine which of the different sets of responder bootstrap PKI keys to utilize for conducting a device provisioning protocol 191 based on the received hash value for a responder bootstrap public key Br 101 a received in a message 122. Although not depicted in FIG. 6b , a responder 101 x could pre-compute the hash values for each of a possible plurality of bootstrap public keys Br 101 a using a hash 199 e over private key br 101 b using cryptographic parameters 199 a for each different responder bootstrap public key pair. Responder 101 x could (i) listen for receiving a hash 199 e value for any of the recorded bootstrap public keys Br 101 a in an incoming message 122. When responder 101 x observes a matching hash 199 e value for a recorded key Br 101 a, then select the private key br 101 b for use in creating a response message 123. In other embodiments, a single recorded set of bootstrap PKI keys Br 101 a and br 101 b can be sufficient in order for device 101 to securely conduct a device provisioning protocol 191.

In some embodiments of the present invention, a responder 101 x could record a plurality of different initiator bootstrap public keys Bi 104 a in an initiator bootstrap public keys table 622, as depicted in FIG. 6b . Each of the different initiator bootstrap public keys 104 a could also be recorded with both (i) a hash 199 e value for each individual key Bi 104 a, and (ii) a selected set of cryptographic parameters 199 a. Each of the different initiator bootstrap public keys 104 a could be associated with a different network 107, as depicted by the exemplary values for possible networks 107 (e.g. “Google”, “Amazon”, etc.). The corresponding bootstrap private key bi 104 b for each of the different depicted initiator bootstrap public keys Bi 104 a could be recorded in each of the different networks 107. The ninth listed exemplary network 107 in a table 622 in responder 101 x can comprise the exemplary network 107 depicted in FIG. 1a , which can also operate the DPP server 103 in FIG. 3a or FIG. 5a , etc.

Although a single initiator bootstrap public key Bi 104 a is depicted in FIG. 6b for each different exemplary network 107, each different exemplary network 107 could also record multiple different initiator bootstrap public keys Bi 104 a, such as (i) a first initiator bootstrap public key Bi 104 a for a network 107 with a first set of selected cryptographic parameters 199 a (e.g. with exemplary curve P-256), and (ii) a second initiator bootstrap public key Bi 104 a with a second set of selected cryptographic parameters 199 a (e.g. with exemplary curve P-384). Other possibilities exist as well for recording a plurality of keys Bi 104 a for the same network 107 in a table 622 without departing from the scope of the present invention.

Further, the exemplary recorded initiator bootstrap public key Bi 104 a for multiple networks 107 in a table 622 can either comprise (i) a “shared key” depicted and described in a key table 104 k in FIG. 2b where the value or number for the key Bi 104 a can be recorded across a plurality of different devices 101, or (ii) a “unique key”, where the value or number for the key Bi 104 a can be unique for a device 101 (e.g. not recorded in other devices 101). The use of unique initiator bootstrap public keys Bi 104 a recorded for responders 101 x is also depicted in a key table 104 k in FIG. 2b . For embodiments where each device 101 records a “unique key” for the initiator bootstrap public key Bi 104 a (such as during device manufacturing), then a device database 104 could record both (i) the unique initiator bootstrap public key Bi 104 a for device 101 and (ii) the corresponding unique initiator bootstrap private key bi 104 b (such as receiving the keys from the device manufacturer). Other possibilities exist as well, where a set of initiator bootstrap public keys 104 a recorded in a device 101 for a network 107 can comprise either (i) shared keys or (ii) unique keys, without departing from the scope of the present invention.

As depicted in FIG. 6b the responder 101 x in device 101 can receive the message 122 from an initiator 102′. Message 122 was depicted and described in connection with FIG. 3a above, and can comprise a DPP authentication request message. Responder 101 x can process the message 122 and extract the hash 199 e value of an initiator bootstrap public key Bi 104 a. Responder 101 x can (a) query 620 a table 622 with the hash 199 e value H(Bi) in order to (b) select and read the value for the initiator bootstrap public key Bi 104 a. The results of a query 620 can comprise a result 621 with key Bi 104 a and parameters 199 a. The result 621 (comprising at least one key Bi 104 a as depicted in FIG. 6b ) can be used with a set of steps 325 depicted and described in connection with FIG. 3a and FIG. 5a . Steps 325 can generate a DPP authentication response 123 for initiator 102′ using the selected key Bi 104 a and other PKI keys.

Although not depicted in FIG. 6b , for embodiments where responder 101 x records a plurality of different responder bootstrap PKI keys 101 a and 101 b, a query 620 can also be performed by responder 101 x in order to select one responder bootstrap public key Br 101 a and the corresponding responder bootstrap private key br 101 b. Responder 101 x could record the plurality of different responder bootstrap PKI keys in a table 623, along with a hash value 199 e for each responder bootstrap public key Br 101 a (not shown). Upon receipt of a message 122, responder 101 x could conduct a query 620 using the received hash 199 e H(Br) for a key Br 101 a in a table 623 with a plurality of different responder bootstrap public keys Br 101 a and hash 199 e values over Br 101 a comprising H(Br) from message 122 in order to select at least one key Br 101 a and the corresponding private key br 101 b. In exemplary embodiments, if the hash 199 e value received in a message 122 does not match an internally calculated or recorded hash 199 e value for a recorded responder bootstrap public key Br 101 a, then responder 101 x and device 101 remains silent on WiFi link 192, where WiFi link 192 is depicted above in FIG. 3a , FIG. 5a , etc. Device 101 and responder 101 x can then wait for a subsequent, different message 122 with different hash 199 e values for H(Br) in order conduct a subsequent, second query 620 for a matching responder bootstrap public key Br 101 a in a table 623. Device 101 with responder 101 x can conduct steps 325 to process message 122 and create message 123 when a matching value for H(Br) is received in a subsequent message 122.

FIG. 7

FIG. 7 is a graphical illustration of an exemplary system, where an access point conducts a configuration step for a device using a hosted device provisioning protocol, in accordance with exemplary embodiments. The present invention contemplates that the systems and methods for using an initiator 102′ with a DPP server 103 can support a device provisioning protocol 191 in order to configure a network access point 105′. System 700 in FIG. 7 can include an unconfigured network access point 105′, a mobile phone 701, and a network 107. Unconfigured network access point 105′ can include a responder 101 x, where responder 101 x can have the same or equivalent functionality as a responder 101 x for a device 101 depicted and described above in FIG. 1a , FIG. 1b , FIG. 1c , FIG. 3a , FIG. 5a , and FIG. 5b . In other words, for the embodiment depicted in FIG. 7, network access point 105′ can comprise a device 101. FIG. 7 also illustrates that a device 101 can comprise different possible computing devices with radios for communicating data. Responder 101 x in network access point 105′ can include a responder bootstrap public key Br 101 a, a responder bootstrap private key br 101 b, and an initiator bootstrap public key Bi 104 a. PKI keys could be recorded in access point 105′ before access point 105′ is installed at an operating location, such as during manufacturing or distribution of unconfigured access point 105′. Responder 101 x operating in unconfigured access point 105′ can have responder capabilities of an enrollee.

Mobile phone 701 can comprise a smart phone or a mobile handset, such as a mobile phone manufactured by Apple® or running an Android based operating system. Mobile phone 701 could also comprise another mobile and networked computing device, such as a laptop or a tablet. Mobile phone 701 could include an initiator 102′, where initiator 102′ could have the same or equivalent functionality as initiator 102′ depicted and described in connection with FIG. 1a , FIG. 1b , FIG. 1c , FIG. 1d , FIG. 2a , FIG. 3a , FIG. 5a , FIG. 5b , and FIG. 6a . In exemplary embodiments, initiator 102′ can operate as an application for mobile phone 701 downloaded from a repository of mobile phone applications, such as an “app store” or “play store”, or possibly a private application. In other words, embodiments herein contemplate that a mobile phone 701 could comprise the physical entity for an initiator 102′ and the software or firmware instructions for operation of initiator 102′ could comprise a DPP application 102 g. Other physical and/or logical arrangements for the operation of an initiator 102′ are possible as well, without departing from the scope of the present invention. Mobile phone 701 can have both a Wifi radio 102 w and a WAN radio 102 h. Mobile phone 701 can communicate with unconfigured access point 105′ via the WiFi radio 102 w and a network 107 via the WAN radio 102 h and an access network 112. Initiator 102′ for mobile phone 701 can have capabilities of a configurator.

Network 107 can operate a DPP server 103, where a DPP server 103 in FIG. 7 can have the functionality of a DPP server 103 depicted and described in connection with FIG. 1a , FIG. 3a , FIG. 3b , FIG. 5a , FIG. 5b , and FIG. 6a . Although not depicted in FIG. 7, a network 107 can also operate other supporting servers and/or running processes depicted in FIG. 1a , FIG. 2a , etc. Network 107 could be connected to mobile phone 107 via the access network 112 and an IP network 113 depicted in FIG. 1 a.

As depicted in FIG. 7, mobile phone 107 using initiator 102′ could conduct the series of messages for a device provisioning protocol 191 with responder 101 x operating in unconfigured access point 105′. The series of messages for a device provisioning protocol 191 could comprise the messages 122, 123, 123 a, 123 b, and 124 as depicted and described in connection with FIG. 3a and FIG. 5a . In order for initiator 102′ to send and receive the device provisioning protocol messages 191 depicted in FIG. 7, initiator 102 transmit and receive a series of messages with DPP server 103 in network 107, where the series of messages could comprise a hosted device provisioning protocol 702.

For a first mode 306 a, representing embodiments depicted in FIG. 3a (where initiator bootstrap and ephemeral secret keys remain in DPP server 103), the series of messages for a hosted device provisioning protocol 702 could comprise the messages between initiator 102′ and DPP server 103 that are depicted in FIG. 3a (e.g. messages 302 b, 305, 311, 317, etc.). For a second mode 306 a, representing embodiments depicted in FIG. 5a where (i) the initiator bootstrap private key bi 104 b can remain in DPP server 103, but (ii) initiator 102′ receives, records, and operates with public keys Bi 104 a and Br 101 a, the series of messages for a hosted device provisioning protocol 702 could comprise the messages between initiator 102′ and DPP server 103 that are depicted in FIG. 5a (e.g. messages 302 b, 305, 311, 503, 506, 510, etc.). For a third mode 306 a, representing embodiments depicted in FIG. 5b where the initiator bootstrap private key bi 104 b and responder bootstrap public key Br 101 a can remain in DPP server 103, the series of messages for a hosted device provisioning protocol 702 could comprise the messages between initiator 102′ and DPP server 103 that are depicted in FIG. 5b (e.g. messages 302 b, 305, 311, 521, 522, etc.).

Upon completion of a device provisioning protocol 191 and a hosted device provisioning protocol 702, unconfigured network access point 105′ can conduct a configuration step 106 to load a set of network credentials 109 and begin operating with the credentials 109, as depicted in FIG. 7. The configuration step 106 can convert the unconfigured network access point 105′ into an operating network access point 105, such that WiFi clients (or “sta”) can connect with network access point 105 using a compatible set of network credentials 109. As depicted in FIG. 7, a mobile phone 701 could also operate as an initiator 102′ with a roll of a configurator for the access point 105′.

A configuration object for credentials 109 in a message 124 in DPP 191 can specify that the network access point 105′ operates as an access point (or “ap”), where the configuration object for credentials 109 in a message 124 in DPP 191 can specify a device 101 in FIG. 1a and FIG. 3a operates as a WiFi client (or “sta”). Note that a configuration object with credentials 109 in message 124 in DPP 191 can also include credentials for network access point 105′ to connect with an access network 112. In other words, credentials 109 for network access point 105′ can comprise two subsets of credentials 109, where a first subset is for network access point 105′ to operate as an access point and a second subset is for network access point 105′ to establish a secure session equivalent to secure session 302 b with access network 112. Thus, the first subset of credentials 109 can include a first key 109 b for a WiFi link 192, and the second subset of credentials 109 can include a second key 109 b for an access network 112 and/or network 107.

Mobile phone 701 could also conduct a device provisioning protocol 191 using a hosted device provisioning protocol 702 with DPP server 103 in order to transfer a set of compatible network credentials 109 to device 101 in FIG. 7, such that device 101 could connect with network access point 105′. The compatible network credentials 109 for device 101 can specify that device 101 operates in a WiFi client mode with network access point 105.

FIG. 8

FIG. 8 is a graphical illustration of an exemplary system, where an access point operates as an initiator for a device with a responder, in order transfer a set of network credentials to the device, in accordance with exemplary embodiments. The present invention contemplates embodiments where a network access point 105 can operate as an initiator 102′ for a device 101 operating as a responder 101 x, in order for the network access point 105 to transfer network credentials 109 to the device 101. System 800 in FIG. 8 can include an unconfigured device 101′, a network access point 105, and a network 107.

Network access point 105 in a system 800 can operate with a set of network access credentials 109 and also operate as an initiator 102′. Network access point 105 can connect with a network 107 via an access network 112. Network 107 can operate a DPP server 103, where the function and operation of a DPP server 103 is depicted and described above in connection with FIG. 1a , FIG. 3a , FIG. 5a , etc. Although not depicted in FIG. 8, network 107 could also operate a device database 104 and DPP server 103 could include a server database 103 a. Network access point 105 could comprise a WiFi router and operate a WiFi radio. Network access point 105 can have the internal electrical components equivalent to an initiator 102′ depicted and described above in connection with FIG. 1d , including a CPU, RAM, nonvolatile memory, and a system bus. For the embodiment depicted in FIG. 8, the initiator 102′ in network access point 105 could comprise software, firmware, or a running process within network access point 105. Initiator 102′ in network access point 105 could have the same or equivalent functionality as initiator 102′ depicted and described in connection with FIG. 1a , FIG. 1b , FIG. 1c , FIG. 1d , FIG. 2a , FIG. 3a , FIG. 5a , FIG. 5b , and FIG. 6a . Network access point 105 could operate with capabilities as a configurator 801, as depicted in FIG. 8.

An unconfigured device 101′ could be a device with a WiFi radio 101 h and operate a responder 101 x. The electrical components inside device 101′ could be similar to the electrical components depicted for an initiator 102′ in FIG. 1d , such as including a CPU, RAM, nonvolatile memory, an operating system, and a system bus. Responder 101 x in unconfigured device 101 could have the same or equivalent functionality as a responder 101 x depicted and described above in FIG. 1a , FIG. 1b , FIG. 1c , FIG. 3a , FIG. 5a , and FIG. 5b . Unconfigured device 101′ can have capabilities as an enrollee 802.

As depicted in FIG. 8, network access point 105 initiator 102′ could conduct the series of messages for a device provisioning protocol 191 with responder 101 x operating in unconfigured device 101′. The series of messages for a device provisioning protocol 191 could comprise the messages 122, 123, 123 a, 123 b, and 124 as depicted and described in connection with FIG. 3a and FIG. 5a . In order for initiator 102′ to send and receive the device provisioning protocol messages 191 depicted in FIG. 8, initiator 102′ (or AP 105 operating the initiator 102′) transmits and receives a series of messages with DPP server 103 in network 107, where the series of messages could comprise a hosted device provisioning protocol 702. The series of messages for a hosted device provisioning protocol 702 were depicted and described in connection with FIG. 7 above. Note that the steps and messages for conducting a hosted device provisioning protocol 702 can depend on a mode 306 a, where the mode 306 a can be selected by a DPP server 103 in a step 306 for initiator 102′ operating in access point 105 in FIG. 8. The present invention also contemplates that a mode 306 a for a hosted device provisioning protocol 702 can be selected by an initiator 102′. For these embodiments, where mode 306 a is selected by an initiator 102′, a selected mode 306 a could be transmitted from initiator 102′ to DPP server 103 in a message 305 depicted and described in connection with FIG. 3a above.

The combined (i) device provision protocol 191 between network access point 105 and device 101 and (ii) hosted device provisioning protocol 702 between network access point 105 and DPP server 103 can securely transfer a set of compatible network access credentials 109 to device 101′. Upon completion of a device provisioning protocol 191 and a hosted device provisioning protocol 702, unconfigured device 101′ can conduct a configuration step 106 to (i) load a compatible set of network credentials 109 for network access point 105 and (ii) begin operating with the credentials 109, as depicted in FIG. 8. The configuration step 106 can convert the unconfigured device 101′ into an operating device 101, such that device 101 can conduct a WiFi connection setup step 803 using the received set of compatible network credentials 109.

CONCLUSION

Various exemplary embodiments have been described above. Those skilled in the art will understand, however, that changes and modifications may be made to those examples without departing from the scope of the claims. 

The invention claimed is:
 1. A method for conducting a device provisioning protocol, the method performed by a server, the method comprising: recording, by the server, an initiator bootstrap private key; receiving, by the server and from an initiator, a responder bootstrap public key; deriving, by the server, (i) an initiator ephemeral private key, (ii) a corresponding initiator ephemeral public key, and (iii) a pseudo random number comprising an initiator nonce; conducting, by the server, (x) a first elliptic curve Diffie-Hellman (ECDH) key exchange using the responder bootstrap public key and the derived initiator ephemeral private key in order to (y) derive a first symmetric ciphering key; encrypting, by the server, the initiator nonce into a first ciphertext using the first symmetric ciphering key; sending, from the server to the initiator, the first ciphertext and the initiator ephemeral public key; receiving, by the server and from the initiator, a second ciphertext and a responder ephemeral public key; conducting, by the server, (x) a second ECDH key exchange using the responder ephemeral public key and the derived initiator private key in order to (y) derive a second symmetric ciphering key; decrypting, by the server, the second ciphertext into a first plaintext using the second symmetric ciphering key, wherein the plaintext from the second ciphertext includes a third ciphertext; conducting, by the server, (x) a third ECDH key exchange using the received responder bootstrap public key, the received responder ephemeral public key, and the recorded initiator bootstrap private key in order to (y) derive a third symmetric ciphering key; decrypting, by the server, the third ciphertext into a second plaintext using the third symmetric ciphering key, wherein the second plaintext includes a received responder authentication value; determining, by the server, the received responder authentication value equals a calculated responder authentication value using at least, in part, the initiator nonce; selecting, by the server, a set of network credentials from a server database using at least, in part, a device identity; encrypting, by the server, a set of network credentials using the third symmetric ciphering key; and, sending, from the server to the initiator, the encrypted set of network credentials.
 2. The method of claim 1, further comprising sending, from the server to the initiator, a fourth ciphertext before sending the set of network credentials, wherein the fourth ciphertext includes an initiator authentication value, and wherein the fourth ciphertext is encrypted using the third symmetric ciphering key.
 3. The method of claim 1, further comprising the initiator operating as an initiator proxy, wherein the initiator proxy does not receive and does not operate with the initiator bootstrap private key.
 4. The method of claim 1, further comprising receiving, by a discovery server, a tag value from the initiator, wherein the discovery server uses the tag value to send the initiator a domain name for the server.
 5. The method of claim 1, wherein the server records a set of cryptographic parameters for the initiator bootstrap private key and the initiator ephemeral private key, wherein the server uses the set of cryptographic parameters for conducting the first, second, and third ECDH key exchanges.
 6. The method of claim 5, wherein the server uses a key derivation function and the set of cryptographic parameters with the first, second, and third ECDH key exchanges in order to respectively derive the first, second, and third symmetric keys.
 7. The method of claim 1, further comprising establishing, by the server and the initiator, a secure session, wherein the first, second, and third ciphertexts are transmitted through the secure session.
 8. A method for conducting a device provisioning protocol (DPP), the method performed by a mobile phone, the method comprising: operating, by the mobile phone, a DPP application, wherein the DPP application comprises an initiator for the device provisioning protocol; establishing, by the mobile phone, a secure session with a server, wherein the secure session comprises at least, in part, authentication of the DPP application; receiving, by the mobile phone and from a device, a tag value for a responder; sending, by the mobile phone and to the server, the received tag value; receiving, by the mobile phone and from the server, an initiator configuration, wherein the mobile phone uses the received initiator configuration with a WiFi radio in the mobile phone; receiving, by the mobile phone and from the server, an initiator ephemeral public key and a first ciphertext, wherein the first ciphertext includes an initiator nonce; sending, by the mobile phone and to the device, the initiator ephemeral public key and the first ciphertext, wherein the mobile phone uses the received initiator configuration to send the initiator ephemeral public key and the first ciphertext to the device; receiving, by the mobile phone and from the device, a responder ephemeral public key and a second ciphertext, wherein the second ciphertext includes a responder authentication value; sending, by the mobile phone and to the server, the responder ephemeral public key and the second ciphertext; and, receiving, by the mobile phone and from the server, a third ciphertext, wherein the third ciphertext includes a set of network credentials for the device.
 9. The method of claim 8, further comprising using a camera for the mobile phone in order to receive a QR code for the device, wherein the received QR code includes the tag value and a set of cryptographic parameters, and wherein the tag value does not include the responder bootstrap public key.
 10. The system of claim 8, wherein the mobile phone does not receive a responder bootstrap public key from the device, and wherein the server records the responder bootstrap public key before the mobile phone establishes the secure session with the server.
 11. The method of claim 8, further comprising the mobile phone conducting a radio-frequency scan in order to obtain a networks available list, wherein the mobile phone (i) sends the network available list to the server before (ii) receiving the set of network credentials in the third ciphertext.
 12. The method of claim 11, further comprising the server using the networks available list in order to select a primary access network for the device, wherein the server uses the selected primary access network to select the set of network credentials from a server database.
 13. The method of claim 8, further comprising the mobile phone using (i) a channel list for the initiator configuration and (ii) the WiFi radio for the mobile phone to cycle through the channel list and send the initiator ephemeral public key and the first ciphertext to a responder on a plurality of channels in the channel list.
 14. The method of claim 8, wherein (a) sending, by the mobile phone and to the device, the initiator ephemeral public key and the first ciphertext comprises (b) a Device Provisioning Protocol (DPP) authentication request message.
 15. A system for conducting a device provisioning protocol (DPP), the system comprising: an authentication server for authenticating an initiator and for sending the authenticated initiator an initiator configuration; a mobile phone for operating a DPP application, wherein the DPP application comprises at least, in part, the initiator, for receiving a responder bootstrap public key from a responder, wherein a secure hash value for the responder bootstrap public key comprises a device identity, for using the initiator configuration to communicate over a WiFi link, for receiving a responder ephemeral public key using the WiFi link, for receiving an encrypted set of network credentials from a network, and for sending the encrypted set of network credentials to the responder over the WiFi link; a device database for recording the device identity, an initiator bootstrap private key, and a set of cryptographic parameters for the bootstrap private key; a DPP server for receiving the device identity from the initiator, for querying the device database using the device identity in order to receive the initiator bootstrap private key, for receiving the responder bootstrap public key from the mobile phone, for conducting an elliptic curve Diffie-Hellman (ECDH) key exchange using (i) an ECC point addition operation over the received responder bootstrap public key and the received responder ephemeral public key and (ii) the received initiator bootstrap private key, wherein the output of the ECDH key exchange comprises a symmetric ciphering key, for selecting an initiator mode for the initiator, and for sending the initiator mode to the mobile phone; a processor in the DPP server for encrypting the set of network credentials using the symmetric ciphering key and the set of cryptographic parameters; and, a LAN interface in the DPP server for sending the encrypted set of network credentials to the mobile phone over a secure connection established between the DPP server and the mobile phone.
 16. The system of claim 15, wherein the mobile phone operates as an initiator proxy, and wherein the mobile phone does not receive and does not operate with the initiator bootstrap private key.
 17. The system of claim 15, further comprising a responder for recording an initiator bootstrap public key corresponding to the initiator bootstrap private key, and for using the recorded initiator bootstrap public key and to derive the symmetric ciphering key.
 18. The system of claim 17, further comprising a network access point for using the set of network access credentials, and for providing connectivity with an IP network to the responder using the set of network access credentials.
 19. The system of claim 15, wherein the mobile phone receives the responder ephemeral public key in a DPP authentication response message, wherein the DPP authentication response message includes a ciphertext of a responder authentication value, and wherein the ciphertext is encrypted with the symmetric ciphering key.
 20. The system of claim 15, wherein the DPP server uses the initiator bootstrap private key with a plurality of different responder bootstrap public keys, wherein the plurality of different responder bootstrap public keys are associated with a plurality of different responders. 