Smart Edge Co-Processor

Patent No. US11416758 (titled "Smart Edge Co-Processor") was filed by Nusantao Ip Llc on Apr 2, 2020.

What is this patent about?

’758 is related to the field of securing data from sensors in electronic devices, particularly in the context of the Internet of Things (IoT). Traditional sensor architectures provide raw data directly to a device's processor, leaving it vulnerable to hacking. The patent addresses the problem of securing sensor data at the network edge , before it reaches the main processor, to prevent unauthorized access even if the device itself is compromised.

The underlying idea behind ’758 is to interpose a smart edge module between a sensor and the device's main processor. This module intercepts the raw sensor data, encrypts it, and then passes the encrypted data to the processor. This ensures that even if a hacker gains access to the processor or intercepts communications, they will only obtain encrypted data, rendering it useless without the decryption key.

The claims of ’758 focus on a smart edge module comprising a sensor, a hardware co-processor for encrypting the raw signal from the sensor, a secured interface between the sensor and the co-processor, a communication interface for external communication, and an authentication module. Crucially, the authentication module includes a JTAG module for verifying the integrity of the sensor and secured interface, with the co-processor mounted on a PCB board with a JTAG access point.

In practice, the smart edge module operates by receiving raw data from a sensor, pre-processing it to filter out noise or irrelevant information, encrypting the filtered data using a local contract (potentially a blockchain contract) for secure key management, and then transmitting the encrypted data to the device's processor. The JTAG module periodically validates the hardware configuration to detect tampering, ensuring that the sensor and interface haven't been compromised.

This approach differs from prior solutions by pushing security to the sensor level, rather than relying solely on device-level or network-level security measures. By encrypting data at the source, ’758 protects against vulnerabilities in the device's operating system or communication channels. The use of a JTAG dongle for hardware authentication adds an additional layer of security, preventing physical tampering and ensuring the integrity of the entire system from sensor to processor.

How does this patent fit in bigger picture?

Technical landscape at the time

In the late 2010s when ’758 was filed, security measures were typically targeted at the communication link and the devices themselves. At a time when security and privacy were implemented on top of processors with millions of gates and operating systems with millions of lines of code, the attack surface area was dramatically increasing due to the Internet of Things (IoT) and artificial intelligence (AI) applications.

Novelty and Inventive Step

The examiner approved the application because the prior art does not teach or suggest the specific claim limitations recited in independent claims 1 and 18, taken as a whole. Specifically, the examiner stated that Chou, Varadarajan, and Chen disclose a smart module, sensor sensing physical events, generating an encrypted signal, a secured interface, and a communication interface handling communications, but do not teach or suggest the specific combination of elements as claimed.

Claims

This patent contains 10 claims, with independent claims 1 and 9. Independent claim 1 is directed to a smart edge module configured to sense physical events and output a corresponding electronic signal, while independent claim 9 is directed to a smart edge module configured to receive an electronic signal and generate corresponding physical events. The dependent claims generally elaborate on specific features, components, or configurations of the smart edge module described in the independent claims.

Key Claim Terms New

Definitions of key terms used in the patent claims.

Term (Source)Support for SpecificationInterpretation
Authentication module
(Claim 1, Claim 9)
“Disclosed aspects include a smart edge module configured to sense physical events and output a corresponding electronic signal, comprising: a sensor sensing physical event and generating a raw signal corresponding to the physical event; a co-processor receiving the raw signal and generating an encrypted signal therefrom; a secured interface inserted between the sensor and the co-processor and enabling communication between the sensor and the co-processor; a communication interface handling communications between the co-processor and devices external to the smart edge module; and, an authentication module authenticating the construction and functionality of the sensor and the secured interface.”A component that verifies the integrity and authenticity of the sensor/actuator and the secured interface, potentially using a JTAG module.
Encrypted JTAG specification library
(Claim 9)
“In disclosed embodiments, the sensor co-processors can validate their environment during their boot process in order to identify hardware tampering. Additionally, the pre-processing functionality can be used to identify and/or mitigate external physical and/or cyber-attacks.”A secure repository of JTAG specifications used for authentication, stored within the smart edge module in an encrypted format.
Hardware co-processor
(Claim 1, Claim 9)
“Disclosed embodiments provide a sensor co-processor that adds intelligence to digital I/O and is designed to be implemented at the furthest edge of the network, directly adjacent to the I/O which provides information about the physical world to the digital world. The co-processor may be directly integrated with the sensor, e.g., speaker, microphone, headphones, etc., to provide source to sink management and encryption of sensor data streams.”A dedicated processing unit, distinct from a main processor, used for encrypting/decrypting signals and performing other functions within the smart edge module.
JTAG access point
(Claim 1, Claim 9)
“The co-processor is generally mounted on a PCB board, and the PCB board comprises a JTAG access point. The JTAG access point may be embedded in epoxy. Also, the secured interface and the JTAG access point may be embedded in epoxy.”A physical connection point on the PCB board that allows access to the JTAG interface for debugging and authentication purposes.
Secured interface
(Claim 1, Claim 9)
“Disclosed aspects include a smart edge module configured to sense physical events and output a corresponding electronic signal, comprising: a sensor sensing physical event and generating a raw signal corresponding to the physical event; a co-processor receiving the raw signal and generating an encrypted signal therefrom; a secured interface inserted between the sensor and the co-processor and enabling communication between the sensor and the co-processor; a communication interface handling communications between the co-processor and devices external to the smart edge module; and, an authentication module authenticating the construction and functionality of the sensor and the secured interface.”A secure communication pathway between a sensor/actuator and the co-processor, designed to prevent unauthorized access or tampering.

Patent Family

Patent Family

File Wrapper

The dossier documents provide a comprehensive record of the patent's prosecution history - including filings, correspondence, and decisions made by patent offices - and are crucial for understanding the patent's legal journey and any challenges it may have faced during examination.

  • Date

    Description

  • Get instant alerts for new documents

US11416758

NUSANTAO IP LLC
Application Number
US16838676
Filing Date
Apr 2, 2020
Status
Granted
Expiry Date
Feb 9, 2041
External Links
Slate, USPTO, Google Patents