Resource-limited device interactivity with cloud-based systems
First Claim
1. A resource limited device comprising:
- a microcontroller controlling an operation of the resource limited device;
a communications module linked to the microcontroller via a link;
a memory storing an identifier of the resource limited device and one or more encryption keys;
a receiver in the communications module configured to (i) receive the one or more encryption keys and a configuration setting for a second communications protocol from a first computing system separate from the resource limited device using a first communications protocol, wherein at least one encryption key of the one or more encryption keys is generated by the first computing system for communicating with a second computing system, (ii) store the received one or more encryption keys and configuration setting in the memory, (iii) receive data from the second computing system over a communications network using the second communications protocol, and (iv) send the received data to the microcontroller through the link; and
a transmitter in the communications module configured to (i) transmit the stored identifier of the resource limited device to the first computing system using the first communications protocol before the one or more encryption keys is received at the receiver, and (ii) transmit data from the microcontroller, obtained through the link, to the second computing system over the communications network using the second communications protocol after the second communications protocol is configured at the resource limited device with the configuration setting;
wherein the first computing system;
generates and transmits the one or more encryption keys to the resource limited device that are stored in the memory, wherein the one or more encryption keys include a first public encryption key and a first private encryption key;
presents a user with a user interface for providing the configuration setting for the second communications protocol;
transmits the user provided configuration setting for the second communications protocol to the resource limited device using the first communications protocol; and
transmits the stored identifier of the resource limited device to the second computing system using a third communications protocol to register the resource limited device at the second computing system.
9 Assignments
0 Petitions
Accused Products
Abstract
Resource limited devices may be provided with a communications module enabling the resource limited device to communicate with a more powerful user computing system using a personal area networking protocol. The communications with the user computing system may be used to configure the resource limited device and/or its communications module to communicate with a remote computing system using a local or wide area networking protocol. This technology may shift processing functions that cannot be performed by resource-limited processors of the electronic device to more powerful computing systems, including, but not limited to cloud based systems. Bridges may also coordinate communications between multiple resource limited devices and the more powerful computing systems. Shifting these processing functions to more powerful computing systems may avoid the need for device manufacturers to include more expensive processors and may reduce device manufacturing costs. Devices and methods are provided.
27 Citations
6 Claims
-
1. A resource limited device comprising:
-
a microcontroller controlling an operation of the resource limited device; a communications module linked to the microcontroller via a link; a memory storing an identifier of the resource limited device and one or more encryption keys; a receiver in the communications module configured to (i) receive the one or more encryption keys and a configuration setting for a second communications protocol from a first computing system separate from the resource limited device using a first communications protocol, wherein at least one encryption key of the one or more encryption keys is generated by the first computing system for communicating with a second computing system, (ii) store the received one or more encryption keys and configuration setting in the memory, (iii) receive data from the second computing system over a communications network using the second communications protocol, and (iv) send the received data to the microcontroller through the link; and a transmitter in the communications module configured to (i) transmit the stored identifier of the resource limited device to the first computing system using the first communications protocol before the one or more encryption keys is received at the receiver, and (ii) transmit data from the microcontroller, obtained through the link, to the second computing system over the communications network using the second communications protocol after the second communications protocol is configured at the resource limited device with the configuration setting; wherein the first computing system; generates and transmits the one or more encryption keys to the resource limited device that are stored in the memory, wherein the one or more encryption keys include a first public encryption key and a first private encryption key; presents a user with a user interface for providing the configuration setting for the second communications protocol; transmits the user provided configuration setting for the second communications protocol to the resource limited device using the first communications protocol; and transmits the stored identifier of the resource limited device to the second computing system using a third communications protocol to register the resource limited device at the second computing system. - View Dependent Claims (2, 3)
-
-
4. A method, comprising:
-
transmitting, at a transmitter of a communications module connected to a resource limited device, an identifier of the resource limited device to a first computing system using a first communications protocol; receiving from the first computing system, using the first communications protocol at a receiver of the communications module connected to the resource limited device, one or more encryption keys and a configuration setting for communicating with a second computing system over a communications network using a second communications protocol, wherein at least one encryption key of the one or more encryption keys is generated by the first computing system for communicating with a second computing system; storing the one or more encryption keys; configuring communications with the second computing system with the received configuration setting; transmitting and receiving data between the resource limited device and the second computing system over the communications network using the second communications protocol after the configuring; receiving the one or more encryption keys from the first computing system for the resource limited device, wherein the one or more encryption keys include a first public encryption key and a first private encryption key generated by the first computing system; encrypting communications to the second computing system using a second public encryption key of the second computing system; and decrypting encrypted communications from the second computing system using the first private encryption key; wherein the first computing system transmits the first encryption public key and identifier of the resource limited device to the second computing system using a third communications protocol to register the resource limited device at the second computing system. - View Dependent Claims (5, 6)
-
Specification