CONCURRENT NETWORK REFORMATION FOR LOW-POWER AND LOSSY NETWORKS

    公开(公告)号:US20200296001A1

    公开(公告)日:2020-09-17

    申请号:US16353137

    申请日:2019-03-14

    Abstract: In one embodiment, a device in a mesh network rooted at a root node receives a subroot selection notification. The subroot selection notification indicates that the device should function as a root of a sub-directed acyclic graph (DAG) were a power outage to occur. The device determines that a power outage has occurred. The device forms, after determining that a power outage has occurred, a sub-DAG that is rooted at the device by establishing one or more other devices in the mesh network as routing children of the device in the sub-DAG. The device joins the sub-DAG to a DAG rooted at the root node.

    Concurrent network reformation for low-power and lossy networks

    公开(公告)号:US10904097B2

    公开(公告)日:2021-01-26

    申请号:US16353137

    申请日:2019-03-14

    Abstract: In one embodiment, a device in a mesh network rooted at a root node receives a subroot selection notification. The subroot selection notification indicates that the device should function as a root of a sub-directed acyclic graph (DAG) were a power outage to occur. The device determines that a power outage has occurred. The device forms, after determining that a power outage has occurred, a sub-DAG that is rooted at the device by establishing one or more other devices in the mesh network as routing children of the device in the sub-DAG. The device joins the sub-DAG to a DAG rooted at the root node.

    SECURE DEVICE MANAGEMENT
    6.
    发明申请

    公开(公告)号:US20220353149A1

    公开(公告)日:2022-11-03

    申请号:US17246301

    申请日:2021-04-30

    Abstract: Techniques are described for managing devices using multiple virtual personal area networks (VPANs). A border router can receive a first request to join a network from a first device. The first device may be assigned to a first virtual personal area network (VPAN), which has an associated first group temporal key (GTK). The first GTK can be distributed to the first virtual device. The border router can also receive a second request to join a network from a second device. The second device may be assigned to a second VPAN, which has an associated second GTK. The second GTK can be distributed to the second virtual device.

    Secure device management
    10.
    发明授权

    公开(公告)号:US11677630B2

    公开(公告)日:2023-06-13

    申请号:US17246301

    申请日:2021-04-30

    CPC classification number: H04L41/12 H04L63/062 H04L63/065 H04L63/0892

    Abstract: Techniques are described for managing devices using multiple virtual personal area networks (VPANs). A border router can receive a first request to join a network from a first device. The first device may be assigned to a first virtual personal area network (VPAN), which has an associated first group temporal key (GTK). The first GTK can be distributed to the first virtual device. The border router can also receive a second request to join a network from a second device. The second device may be assigned to a second VPAN, which has an associated second GTK. The second GTK can be distributed to the second virtual device.

Patent Agency Ranking