×

Resource-limited device interactivity with cloud-based systems

  • US 10,284,422 B2
  • Filed: 03/18/2013
  • Issued: 05/07/2019
  • Est. Priority Date: 03/19/2012
  • Status: Active Grant
First Claim
Patent Images

1. A resource limited device comprising:

  • a microcontroller controlling an operation of the resource limited device;

    a communications module linked to the microcontroller via a link;

    a memory storing an identifier of the resource limited device and one or more encryption keys;

    a receiver in the communications module configured to (i) receive the one or more encryption keys and a configuration setting for a second communications protocol from a first computing system separate from the resource limited device using a first communications protocol, wherein at least one encryption key of the one or more encryption keys is generated by the first computing system for communicating with a second computing system, (ii) store the received one or more encryption keys and configuration setting in the memory, (iii) receive data from the second computing system over a communications network using the second communications protocol, and (iv) send the received data to the microcontroller through the link; and

    a transmitter in the communications module configured to (i) transmit the stored identifier of the resource limited device to the first computing system using the first communications protocol before the one or more encryption keys is received at the receiver, and (ii) transmit data from the microcontroller, obtained through the link, to the second computing system over the communications network using the second communications protocol after the second communications protocol is configured at the resource limited device with the configuration setting;

    wherein the first computing system;

    generates and transmits the one or more encryption keys to the resource limited device that are stored in the memory, wherein the one or more encryption keys include a first public encryption key and a first private encryption key;

    presents a user with a user interface for providing the configuration setting for the second communications protocol;

    transmits the user provided configuration setting for the second communications protocol to the resource limited device using the first communications protocol; and

    transmits the stored identifier of the resource limited device to the second computing system using a third communications protocol to register the resource limited device at the second computing system.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×