-
11.
公开(公告)号:US20210028817A1
公开(公告)日:2021-01-28
申请号:US17035891
申请日:2020-09-29
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Ariton E. Xhafa , Xiaolin Lu , Janwei Zhou , Il Han Kim
IPC: H04B1/7156 , H04L9/06 , H04L29/06 , H04W12/00 , H04W12/04
Abstract: A network includes a first wireless node that communicates over a wireless network connection. The first wireless node includes a first encryption engine that processes a first initialization data set and a current transmit sequence associated with a current communication to generate a next transmit sequence that is employed to communicate with a second wireless node that derives a next received sequence that corresponds to the next transmit sequence to process a subsequent communication.
-
公开(公告)号:US10833890B2
公开(公告)日:2020-11-10
申请号:US16154626
申请日:2018-10-08
Applicant: Texas Instruments Incorporated
Inventor: Shu Du , Robert W. Liang , Xiaolin Lu
IPC: H04L12/413 , H04B3/54 , H04L5/00
Abstract: Systems and methods for carrier sense multiple access (CSMA) protocols for power line communications (PLC) are described. In some embodiments, a method may include performing a virtual carrier sensing operation and, in response to the virtual carrier sensing operation indicating that a communication channel is idle, calculating a contention window. The method may also include performing a physical carrier sensing operation subsequent to the virtual carrier sensing operation, the physical carrier sensing operation based, at least in part, upon the contention window. In response to the physical carrier sensing operation indicating that the communication channel is idle, the method may then include transmitting data over the channel. In other embodiments, another method may include determining that a data transmission is a unicast transmission and that an acknowledgement message has not been received. The method may further include incrementing a backoff parameter and repeating one or more carrier sense operations.
-
公开(公告)号:US20190245844A1
公开(公告)日:2019-08-08
申请号:US16252262
申请日:2019-01-18
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
CPC classification number: H04L63/0823 , H04L9/3268 , H04L63/0428 , H04L63/0435 , H04L63/0442 , H04L63/062 , H04L63/0884
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US10334087B2
公开(公告)日:2019-06-25
申请号:US15894250
申请日:2018-02-12
Applicant: Texas Instruments Incorporated
Inventor: Gang Xu , Ramanuja Vedantham , Kumaran Vijayasankar , Anand G Dabak , Tarkesh Pande , Il Han Kim , Xiaolin Lu
Abstract: In a disclosed embodiment, a method for communication in a network includes receiving, at a first device registered to the network, a physical layer (PHY) frame that includes a PHY header and a MAC header. The PHY frame may further include a MAC payload. The PHY header includes a destination address field. The method further includes comparing a network address of the first device to the destination address field to determine whether the destination address field stores a value having the same number of bits as the network address. When the comparison indicates that the value stored by the destination address field does not have the same number of bits as the network address, the method skips decoding the MAC header and the MAC payload.
-
公开(公告)号:US20190097679A1
公开(公告)日:2019-03-28
申请号:US16137456
申请日:2018-09-20
Applicant: Texas Instruments Incorporated
Inventor: Jyotirmoy Banik , Il Han Kim , Jianwei Zhou , Xiaolin Lu
IPC: H04B1/7143
Abstract: A method of generating a channel hopping sequence for a link in a wireless sensor network is provided that includes receiving performance quality data for respective frequency channels of a plurality of frequency channels in the link in a monitoring system, determining a channel quality indicator (CQI) by the monitoring system for each frequency channel based on the respective performance quality data, and determining a repetition factor by the monitoring system for each frequency channel based on the respective CQI, wherein a repetition factor for a frequency channel indicates a number of times the frequency channel is repeated in the channel hopping sequence.
-
公开(公告)号:US10187376B2
公开(公告)日:2019-01-22
申请号:US15222524
申请日:2016-07-28
Applicant: Texas Instruments Incorporated
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US10104192B2
公开(公告)日:2018-10-16
申请号:US14516168
申请日:2014-10-16
Applicant: Texas Instruments Incorporated
Inventor: Xiaolin Lu , Robert Liang , Mehul Soman , Kumaran Vijayasankar , Ramanuja Vedantham
Abstract: A communication system and method includes receiving payload data of first and second media access control (MAC) frames. A MAC-level protocol is identified in response to the indication of the selected network for each of the first and second MAC frames. The payload data of the first and second MAC frames is transmitted and/or received across respective networks transmitted using, for example, power line communications signals over a common communications medium. The common communications medium is operable for carrying signals of a plurality of networks.
-
公开(公告)号:US20180294842A1
公开(公告)日:2018-10-11
申请号:US16004928
申请日:2018-06-11
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Yanjun Sun , Minghua Fu , Xiaolin Lu
Abstract: In accordance with disclosed embodiments, a first power line communication (PLC) device connected to a PLC network includes channel control logic that assigns a first channel of the PLC network for transmission on a power line of PLC data packets between the first PLC device and a second PLC device connected to the PLC network and assigns a second channel of the PLC network for transmission on the power line of PLC data packets between the first PLC device and the third PLC device connected to the PLC network. The PLC device includes a transceiver that receives and transmits PLC data packets on the PLC network and which operates as a bridge device that communicates on both the first and second channels to pass PLC data packets between the second PLC device and the third PLC device.
-
公开(公告)号:US09998175B2
公开(公告)日:2018-06-12
申请号:US15421147
申请日:2017-01-31
Applicant: Texas Instruments Incorporated
Inventor: Yanjun Sun , Minghua Fu , Xiaolin Lu
Abstract: In accordance with disclosed embodiments, a first power line communication (PLC) device connected to a PLC network includes channel control logic that assigns a first channel of the PLC network for transmission on a power line of PLC data packets between the first PLC device and a second PLC device connected to the PLC network and assigns a second channel of the PLC network for transmission on the power line of PLC data packets between the first PLC device and the third PLC device connected to the PLC network. The PLC device includes a transceiver that receives and transmits PLC data packets on the PLC network and which operates as a bridge device that communicates on both the first and second channels to pass PLC data packets between the second PLC device and the third PLC device.
-
20.
公开(公告)号:US09854516B2
公开(公告)日:2017-12-26
申请号:US14751602
申请日:2015-06-26
Applicant: Texas Instruments Incorporated
Inventor: Arvind Kandhalu Raghu , Ariton E. Xhafa , Jianwei Zhou , Ramanuja Vedantham , Xiaolin Lu
CPC classification number: H04W52/0209 , H04L5/0048 , H04W48/00 , H04W56/001 , H04W72/12 , H04W84/10 , H04W84/18 , Y02D70/00 , Y02D70/142 , Y02D70/144
Abstract: A device may be coupled to a time slot based communication system and receive a timing beacon packet that is broadcast in a time slot of the communication system at a periodic rate, in which the network uses a time slotted channel hopping protocol of sequential frames each having a plurality of time slots. The device may synchronize its time base to the timing beacon. The device may calculate a sleep time corresponding to a number of time slots until a next time slot that is scheduled for use by the device and then place the device in a sleep mode. The device may be awakened after the sleep time and operate during the next time slot. The device may repeat the process of calculating a sleep time, going into sleep mode, and waking for operation after the sleep time in order to reduce power consumption.
-
-
-
-
-
-
-
-
-