-
公开(公告)号:US12150136B2
公开(公告)日:2024-11-19
申请号:US17402688
申请日:2021-08-16
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Arvind K. Raghu , Ariton E. Xhafa , Ramanuja Vedantham , Xiaolin Lu
IPC: H04W72/23 , H04W72/1273
Abstract: A network includes a parent node and at least one child node configured to communicate with the parent node via a wireless network protocol. The parent node includes a broadcast coordinator to transmit a broadcast message from the parent node to the child node at predetermined time intervals according to the wireless network protocol. A scheduler generates a scheduling packet that is communicated in the broadcast message. The scheduling packet includes a data field to instruct each child node to activate and receive data communicated from the parent node in a prescribed time slot following the broadcast message that is defined by the scheduling packet.
-
公开(公告)号:US20210152546A1
公开(公告)日:2021-05-20
申请号:US17159016
申请日:2021-01-26
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US20230032116A1
公开(公告)日:2023-02-02
申请号:US17963411
申请日:2022-10-11
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US11470077B2
公开(公告)日:2022-10-11
申请号:US17159016
申请日:2021-01-26
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US11368393B2
公开(公告)日:2022-06-21
申请号:US16696150
申请日:2019-11-26
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Ramanuja Vedantham , Kumaran Vijayasankar , Arvind K. Raghu , Ariton E. Xhafa
IPC: H04L45/02 , H04L45/48 , H04L61/5007
Abstract: Disclosed embodiments relate to a Hierarchical Do-Dag based RPL (H-DOC) network configuration where the network address of each node corresponds to its location within the hierarchical network. Network addresses are initialized hierarchically. Candidate patent nodes signal availability. Candidate child nodes respond to a selected candidate parent node with a temporary address. The selected candidate parent node acknowledges selection and communicates a hierarchical address for the child node in a transmission to the temporary address. The child node changes its address to the hierarchical address from the parent node. When a node switches parent nodes, it signals the old parent node to deallocate it as a child node, and then signals a selected candidate parent node with a temporary address.
-
公开(公告)号:US11909730B2
公开(公告)日:2024-02-20
申请号:US17963411
申请日:2022-10-11
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
CPC classification number: H04L63/0823 , H04L9/3268 , H04L63/0428 , H04L63/0435 , H04L63/0442 , H04L63/062 , H04L63/0884
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US10938803B2
公开(公告)日:2021-03-02
申请号:US16252262
申请日:2019-01-18
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US12261835B2
公开(公告)日:2025-03-25
申请号:US18408969
申请日:2024-01-10
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Kumaran Vijayasankar , Oliver Shih , Arvind K. Raghu , Ramanuja Vedantham , Xiaolin Lu
Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
-
公开(公告)号:US20210378002A1
公开(公告)日:2021-12-02
申请号:US17402688
申请日:2021-08-16
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Arvind K. Raghu , Ariton E. Xhafa , Ramanuja Vedantham , Xiaolin Lu
IPC: H04W72/12
Abstract: A network includes a parent node and at least one child node configured to communicate with the parent node via a wireless network protocol. The parent node includes a broadcast coordinator to transmit a broadcast message from the parent node to the child node at predetermined time intervals according to the wireless network protocol. A scheduler generates a scheduling packet that is communicated in the broadcast message. The scheduling packet includes a data field to instruct each child node to activate and receive data communicated from the parent node in a prescribed time slot following the broadcast message that is defined by the scheduling packet.
-
公开(公告)号:US11096208B2
公开(公告)日:2021-08-17
申请号:US16175490
申请日:2018-10-30
Applicant: TEXAS INSTRUMENTS INCORPORATED
Inventor: Arvind K. Raghu , Ariton E. Xhafa , Ramanuja Vedantham , Xiaolin Lu
IPC: H04W72/12
Abstract: A network includes a parent node and at least one child node configured to communicate with the parent node via a wireless network protocol. The parent node includes a broadcast coordinator to transmit a broadcast message from the parent node to the child node at predetermined time intervals according to the wireless network protocol. A scheduler generates a scheduling packet that is communicated in the broadcast message. The scheduling packet includes a data field to instruct each child node to activate and receive data communicated from the parent node in a prescribed time slot following the broadcast message that is defined by the scheduling packet.
-
-
-
-
-
-
-
-
-