US 12,335,261 B2
Secure authentication and interoperability model for machine to machine (“M2M”) communication
Srinivasan Selvaraj, Tamil Nadu (IN); and Ananda Raj, Tamil Nadu (IN)
Assigned to Bank of America Corporation, Charlotte, NC (US)
Filed by Bank of America Corporation, Charlotte, NC (US)
Filed on Oct. 16, 2023, as Appl. No. 18/380,271.
Prior Publication US 2025/0126118 A1, Apr. 17, 2025
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/0876 (2013.01) [H04L 63/0442 (2013.01); H04L 63/20 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A network of nodes supporting machine to machine (“M2M”) communication within the network, the network comprising:
a plurality of nodes, the plurality of nodes including a first node, each node being in an inactive communication state for communicating with one or more of the plurality of nodes prior to authentication of each node with a remote central node (“RCN”);
wherein, the RCN is configured to control authentication and communication between the first node and each of the remaining nodes in the plurality of nodes by:
at an authentication phase of the first node:
receiving a frequency signature from the first node;
verifying that the frequency signature corresponds to a network frequency signature; and
in response to the verifying, authenticating the first node; and
at a pre-communication phase following the authentication phase:
receive a data payload from the first node, the data payload comprising a frame format;
verify that the frame format corresponds to a network frame format;
in response to the verifying, transmitting a communication network protocol to the first node, the communication network protocol comprising:
a start bit position;
a length of the data payload; and
a mode of data segregation; and
transmitting an activation key to the first node, the activation key switching the first node from the inactive communication state to an active communication state;
at a communication phase, following the pre-communication phase, the first node being configured to transmit a communication request from the first node to a second node included in the plurality of nodes, the communication request comprising the activation key;
at the communication phase, the second node being in the inactive communication state, the second node being configured to:
receive the communication request from the first node;
transmit the activation key to the RCN for verification;
in response to a receipt of verification from the RCN, the second node is in the active communication state;
establish the communication with the first node; and
store data comprised in each communication at an RCN database; and
the RCN being further configured to, at a disconnect phase following the communication phase:
receive from the first node a disconnect signal and a flag comprising a data privacy level of the data in each communication;
when the data privacy level is greater than a pre-determined threshold, delete the data from the RCN database;
when the data privacy level is less than the pre-determined threshold, store the data in the RCN database for a pre-determined time period; and
switch a state of the first node and the second node from the active communication state to the inactive communication state.