NETWORK ADDRESS ASSIGNMENT AND RECLAMATION FOR HIERARCHICAL BASED RPL NETWORKS

    公开(公告)号:US20200099613A1

    公开(公告)日:2020-03-26

    申请号:US16696150

    申请日:2019-11-26

    Abstract: Disclosed embodiments relate to a Hierarchical Do-Dag based RPL (H-DOC) network configuration where the network address of each node corresponds to its location within the hierarchical network. Network addresses are initialized hierarchically. Candidate patent nodes signal availability. Candidate child nodes respond to a selected candidate parent node with a temporary address. The selected candidate parent node acknowledges selection and communicates a hierarchical address for the child node in a transmission to the temporary address. The child node changes its address to the hierarchical address from the parent node. When a node switches parent nodes, it signals the old parent node to deallocate it as a child node, and then signals a selected candidate parent node with a temporary address.

    SCHEDULER FOR POWER-EFFICIENT TIME SLOTTED PROTOCOL

    公开(公告)号:US20190069315A1

    公开(公告)日:2019-02-28

    申请号:US16175490

    申请日:2018-10-30

    Abstract: A network includes a parent node and at least one child node configured to communicate with the parent node via a wireless network protocol. The parent node includes a broadcast coordinator to transmit a broadcast message from the parent node to the child node at predetermined time intervals according to the wireless network protocol. A scheduler generates a scheduling packet that is communicated in the broadcast message. The scheduling packet includes a data field to instruct each child node to activate and receive data communicated from the parent node in a prescribed time slot following the broadcast message that is defined by the scheduling packet.

    SCHEDULER FOR POWER-EFFICIENT TIME SLOTTED PROTOCOL

    公开(公告)号:US20250039891A1

    公开(公告)日:2025-01-30

    申请号:US18915454

    申请日:2024-10-15

    Abstract: A network includes a parent node and at least one child node configured to communicate with the parent node via a wireless network protocol. The parent node includes a broadcast coordinator to transmit a broadcast message from the parent node to the child node at predetermined time intervals according to the wireless network protocol. A scheduler generates a scheduling packet that is communicated in the broadcast message. The scheduling packet includes a data field to instruct each child node to activate and receive data communicated from the parent node in a prescribed time slot following the broadcast message that is defined by the scheduling packet.

    Authentication of Networked Devices Having Low Computational Capacity

    公开(公告)号:US20240146717A1

    公开(公告)日:2024-05-02

    申请号:US18408969

    申请日:2024-01-10

    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.

    Authentication of Networked Devices Having Low Computational Capacity

    公开(公告)号:US20190245844A1

    公开(公告)日:2019-08-08

    申请号:US16252262

    申请日:2019-01-18

    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.

    Authentication of networked devices having low computational capacity

    公开(公告)号:US10187376B2

    公开(公告)日:2019-01-22

    申请号:US15222524

    申请日:2016-07-28

    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.

    Authentication of Networked Devices Having Low Computational Capacity
    17.
    发明申请
    Authentication of Networked Devices Having Low Computational Capacity 审中-公开
    具有低计算能力的网络设备的认证

    公开(公告)号:US20170063843A1

    公开(公告)日:2017-03-02

    申请号:US15222524

    申请日:2016-07-28

    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.

    Abstract translation: 用于通过网络进行安全通信的有限计算资源的网络设备的认证。 设备的认证开始于请求者节点向代理节点发送具有其认证凭证的签名数字证书。 在验证证书后,代理节点然后通过网络可访问的认证服务器来认证请求方的凭据,充当请求方节点的代理。 通常,该验证包括根据公共/私人密钥方案的解密。 成功认证后,认证服务器为请求方节点创建会话密钥,并将其与代理节点进行通信。 代理节点用对称密钥加密会话密钥,并将加密的会话密钥发送给请求方节点,该请求者节点在解密之后使用会话密钥进行安全通信。 在一些实施例中,认证服务器用对称密钥加密会话密钥。

    NETWORK ADDRESS ASSIGNMENT AND RECLAMATION FOR HIERARCHICAL BASED RPL NETWORKS
    18.
    发明申请
    NETWORK ADDRESS ASSIGNMENT AND RECLAMATION FOR HIERARCHICAL BASED RPL NETWORKS 审中-公开
    网络地址分配和基于分层的RPL网络的恢复

    公开(公告)号:US20170063685A1

    公开(公告)日:2017-03-02

    申请号:US15249716

    申请日:2016-08-29

    CPC classification number: H04L45/48 H04L45/02 H04L61/2007

    Abstract: This invention is an improvement of a Hierarchical Do-Dag based RPL (H-DOC) network configuration where the network address of each node corresponds to its location within the hierarchical network. Network addresses are initialized hierarchically. Candidate patent nodes signal availability. Candidate child nodes respond to a selected candidate parent node with a temporary address. The selected candidate parent node acknowledges selection and communicates a hierarchical address for the child node in a transmission to the temporary address. The child node changes its address to the hierarchical address from the parent node. When a node switches parent nodes, it signals the old parent node to deallocate it as a child node, and then signals a selected candidate parent node with a temporary address.

    Abstract translation: 本发明是基于分层Do-Dag的RPL(H-DOC)网络配置的改进,其中每个节点的网络地址对应于其在分层网络内的位置。 网络地址被分层初始化。 候选专利节点信号可用性。 候选子节点使用临时地址响应所选择的候选父节点。 选择的候选父节点确认选择,并将传输中的子节点的分层地址传送到临时地址。 子节点将其地址从父节点更改为分层地址。 当节点切换父节点时,它向旧的父节点发信号,将其解除分配为子节点,然后用临时地址发送选定的候选父节点。

Patent Agency Ranking