Extending network security to locally connected edge devices
An edge device and local connection technology, applied in the field of data communication, can solve problems such as network security damage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] Systems and methods are provided for securing local connections between network nodes in a network and edge devices attached to the network nodes. Network security mechanisms such as security keys and security certificates extend to edge devices across the local connections between network nodes and edge devices. Using these security certificates and security keys, edge devices can securely interact with other devices on the network as if they were network nodes in the network. As a result, communications between network nodes and edge devices, and communications between edge devices and other network devices, are protected as securely as the rest of the communications on the network.
[0017] In one example, a network includes a plurality of network nodes communicating with each other over the network. The network may be a mesh network, a Wi-Fi network, a cellular network, a power line carrier network, or any other wired or wireless network. The network further inclu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


