Method of targeted discovery of devices in a network
First Claim
1. A method of targeted discovery in a network, the method comprising:
- determining an identifier for a second device at a first device;
sending a device discovery message to the second device using the identifier for the second device, wherein the second device is configured to verify if the device discovery message includes a correct identifier of the second device, further wherein the second device is configured to respond to the device discovery message when the device discovery message includes the correct identifier for the second device;
receiving a response to the device discovery message from the second device; and
transmitting, by the first device, a registration key to the second device in response to receiving the response.
4 Assignments
0 Petitions
Accused Products
Abstract
A targeted discovery between a first device and a second device in a network, in particular, a WHDI network, provides discovery for an identified device or a group of identified devices. The targeted discovery determines an identifier for a second device or a group of devices that the second device belongs to, and sends a device discovery message to the second device using the identifier for the second device when the second device is configured to respond to the device discovery message if the device discovery message includes the identifier for the second device. The first device receives a response to the device discovery message from the second device and can start further communication with the second device.
75 Citations
20 Claims
-
1. A method of targeted discovery in a network, the method comprising:
-
determining an identifier for a second device at a first device; sending a device discovery message to the second device using the identifier for the second device, wherein the second device is configured to verify if the device discovery message includes a correct identifier of the second device, further wherein the second device is configured to respond to the device discovery message when the device discovery message includes the correct identifier for the second device; receiving a response to the device discovery message from the second device; and transmitting, by the first device, a registration key to the second device in response to receiving the response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer readable storage medium storing at least one computer program that when executed performs a method of targeted discovery in a network, the method comprising:
-
determining an identifier for a second device at a first device; sending a device discovery message to the second device using the identifier for the second device, wherein the second device is configured to verify if the device discovery message includes a correct identifier of the second device, further wherein the second device is configured to respond to the device discovery message when the device discovery message includes the correct identifier for the second device; receiving a response to the device discovery message from the second device; and transmitting, by the first device, a registration key to the second device in response to receiving the response. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A device configured to communicate with a second device in a wireless network, the device comprising:
-
a processor configured to determine an identifier for the second device and to send a device discovery message to the second device using the identifier for the second device, wherein the second device is configured to verify if the device discovery message includes a correct identifier of the second device, further wherein the processor is further configured to receive a response to the device discovery message from the second device when the device discovery message includes the correct identifier of the second device; a data storage storing the identifier; and a network interface configured to send the discovery message to the second device via a network, wherein the network interface is further configured to send a registration key to the second device in response to receiving the response. - View Dependent Claims (17, 18, 19, 20)
-
Specification