Unlock instant, AI-driven research and patent intelligence for your innovation.

Extending network security to locally connected edge devices

An edge device and local connection technology, applied in the field of data communication, can solve problems such as network security damage

Pending Publication Date: 2022-02-08
LANDISGYR INNOVATIONS INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the local connection is not secured, the security of the network will be compromised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Extending network security to locally connected edge devices
  • Extending network security to locally connected edge devices
  • Extending network security to locally connected edge devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Systems and methods are provided for securing local connections between network nodes in a network and edge devices attached to the network nodes. Network security mechanisms such as security keys and security certificates extend to edge devices across the local connections between network nodes and edge devices. Using these security certificates and security keys, edge devices can securely interact with other devices on the network as if they were network nodes in the network. As a result, communications between network nodes and edge devices, and communications between edge devices and other network devices, are protected as securely as the rest of the communications on the network.

[0017] In one example, a network includes a plurality of network nodes communicating with each other over the network. The network may be a mesh network, a Wi-Fi network, a cellular network, a power line carrier network, or any other wired or wireless network. The network further inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In some embodiments, a secure local connection between a network node of a network and an edge device attached to the network node is provided by extending the security of the network to this local connection. The edge device attached to the network node communicates with a network manager of the network to obtain security keys and security credentials for the edge device. Using the security keys and the security credentials, the edge device can establish a secure channel between the network node and the edge device over the local connection. The edge device further communicates with the network manager to exchange routing information and to obtain a network address for the edge device. The edge device can then communicate, through the network node, with other network nodes in the network using the security keys, the security credentials, and the network address.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to U.S. Provisional Application No. 62 / 843,764, filed May 6, 2019, entitled "Extending Network Security to Locally Connected Edge Devices," which U.S. Provisional Application is hereby incorporated by this reference in its entirety. technical field [0003] The present disclosure relates generally to data communications, and more particularly to securing communications within network endpoints by securing communications via local connections to edge devices. Background technique [0004] A network allows nodes in the network to communicate with each other. For example, a metering network may be used to communicate between resource providers and devices in a home or other location that monitor and control resources such as electricity. Computer networks allow computing devices to exchange data with each other. Network links between nodes are typically secured so that communications be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04W12/30G06F21/44H04L12/46
CPCH04L63/0853G06F21/445H04L63/0428H04L63/20H04L63/0281H04W12/50H04W12/069H04L63/062H04L63/0876
Inventor S·J·查斯科
Owner LANDISGYR INNOVATIONS INC