Authentication of networked devices having low computational capacity

    公开(公告)号:US11909730B2

    公开(公告)日:2024-02-20

    申请号:US17963411

    申请日:2022-10-11

    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.

    Node synchronization for networks
    82.
    发明授权

    公开(公告)号:US11601904B2

    公开(公告)日:2023-03-07

    申请号:US17353872

    申请日:2021-06-22

    Abstract: A network includes an intermediate node to communicate with a child node via a wireless network protocol. An intermediate node synchronizer in the intermediate node facilitates time synchronization with its parent node and with the child node. A child node synchronizer in the child node to facilitates time synchronization with the intermediate node. The intermediate node synchronizer exchanges synchronization data with the child node synchronizer to enable the child node to be time synchronized to the intermediate node before the intermediate node is synchronized to its parent node if the intermediate node has not synchronized to its parent node within a predetermined guard time period established for the child node.

    SELECTIVE MULTIPLE-MEDIA ACCESS CONTROL

    公开(公告)号:US20210274593A1

    公开(公告)日:2021-09-02

    申请号:US17322987

    申请日:2021-05-18

    Abstract: Disclosed embodiments include a network device having a split network stack that includes a physical (PHY) layer associated with first and second media access control (MAC) protocol sublayers, a processing device, and memory storing instructions that, when executed by the processing device, cause the processing device to select a route through the split network stack that includes one of the first and second MAC protocol sublayers but not the other one of the first and second MAC protocol sublayers.

    Node synchronization for networks
    84.
    发明授权

    公开(公告)号:US11076370B2

    公开(公告)日:2021-07-27

    申请号:US15591698

    申请日:2017-05-10

    Abstract: A network includes an intermediate node to communicate with a child node via a wireless network protocol. An intermediate node synchronizer in the intermediate node facilitates time synchronization with its parent node and with the child node. A child node synchronizer in the child node to facilitates time synchronization with the intermediate node. The intermediate node synchronizer exchanges synchronization data with the child node synchronizer to enable the child node to be time synchronized to the intermediate node before the intermediate node is synchronized to its parent node if the intermediate node has not synchronized to its parent node within a predetermined guard time period established for the child node.

    Authentication of networked devices having low computational capacity

    公开(公告)号:US10938803B2

    公开(公告)日:2021-03-02

    申请号:US16252262

    申请日:2019-01-18

    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.

    Advanced switch node selection for power line communications network

    公开(公告)号:US10587476B2

    公开(公告)日:2020-03-10

    申请号:US15050163

    申请日:2016-02-22

    Abstract: An algorithm for the promotion of terminal nodes to switch nodes in a PLC network reduces overall network overhead and collisions, while ensuring the appropriate selection of a switch node and minimizing the number of levels in a PLC network. It also ensures that the terminal nodes with appropriate signal-to-noise ratios (SNRs) are promoted. It is desirable to have a network with fewer levels. The disclosed approach favors the nodes that are closer to the DC to promote them as switch nodes. This is achieved by waiting for a smaller number of PNPDUs for a node that is closer to the DC in comparison to a node that is farther away from the DC.

    CARRIER SENSE MULTIPLE ACCESS (CSMA) PROTOCOLS FOR POWER LINE COMMUNICATIONS (PLC)

    公开(公告)号:US20190044751A1

    公开(公告)日:2019-02-07

    申请号:US16154626

    申请日:2018-10-08

    CPC classification number: H04L12/413 H04B3/544 H04L5/0096

    Abstract: Systems and methods for carrier sense multiple access (CSMA) protocols for power line communications (PLC) are described. In some embodiments, a method may include performing a virtual carrier sensing operation and, in response to the virtual carrier sensing operation indicating that a communication channel is idle, calculating a contention window. The method may also include performing a physical carrier sensing operation subsequent to the virtual carrier sensing operation, the physical carrier sensing operation based, at least in part, upon the contention window. In response to the physical carrier sensing operation indicating that the communication channel is idle, the method may then include transmitting data over the channel. In other embodiments, another method may include determining that a data transmission is a unicast transmission and that an acknowledgement message has not been received. The method may further include incrementing a backoff parameter and repeating one or more carrier sense operations.

Patent Agency Ranking