Managed device scatternet administration
First Claim
1. A non-transitory computer-readable medium embodying program code executable in at least one computing device, the program code being configured to cause the at least one computing device to at least:
- receive a network entry request from a client device;
examine a structure of a network to identify an opening for the client device in a network sublayer of the network in response to the network entry request;
transmit network access data to the client device, the network access data comprising a network address of a sublayer propagator device for the network sublayer having the opening;
transmit client admission data to the sublayer propagator device, the client admission data comprising a unique identifier for the client device and a session key for communications with the client device; and
dispatch configuration data for the client device to the sublayer propagator device.
2 Assignments
0 Petitions
Accused Products
Abstract
Managed device scatternet administration is described herein. In one example, to form a scatternet of managed devices, a network entry request including a unique device identifier and a public key is received from a client device. The public key is validated and the structure of the scatternet is examined to find an opening for the client device. After validation of the public key, network access data and a session key are encrypted by the public key and forwarded to the client device. The client device can use the network access data to find a network sublayer having the opening in the scatternet. At the same time, client admission data and the session key can also be sent to a sublayer propagator device of the network sublayer. After the client device enters the scatternet, management configuration data can be dispatched to it for device management.
-
Citations
20 Claims
-
1. A non-transitory computer-readable medium embodying program code executable in at least one computing device, the program code being configured to cause the at least one computing device to at least:
-
receive a network entry request from a client device; examine a structure of a network to identify an opening for the client device in a network sublayer of the network in response to the network entry request; transmit network access data to the client device, the network access data comprising a network address of a sublayer propagator device for the network sublayer having the opening; transmit client admission data to the sublayer propagator device, the client admission data comprising a unique identifier for the client device and a session key for communications with the client device; and dispatch configuration data for the client device to the sublayer propagator device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
establishing, by at least one computing device, a network for managed device administration of a plurality of client devices, the network comprising a scatternet of the plurality of client devices; receiving, by at least one computing device, a network exit request from a client device among the plurality of client devices, the client device operating as a sublayer propagator device for a network sublayer of the network; examining, by at least one computing device, the network sublayer to determine a topology reorganization for the network sublayer in response to the network exit request; dispatching, by at least one computing device, reorganized topology plan data for the topology reorganization to a second client device in the network sublayer; and instructing, by the at least one computing device, the second client device to operate as the sublayer propagator device for the network sublayer in accordance with the topology reorganization. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
querying, by at least one computing device, a certificate authority to obtain a verification result for a public key of a client device requesting entry to a network; based on a verification result for the public key, examining, by the at least one computing device, a structure of a network to identify an opening for a client device in the network; transmitting, by the at least one computing device, client admission data to a sublayer propagator device of a network sublayer having the opening in the network, the client admission data comprising a unique identifier for the client device and a session key for communications with the client device; transmitting, by the at least one computing device, network access data to the client device, the network access data comprising a network address of the sublayer propagator device and the session key; and dispatching, by the at least one computing device, configuration data for the client device to the sublayer propagator device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification