Home Patent Forecast® Sectors Log In   Contact  
How it works Patent Forecast® Sectors Insights
Menu
Enjoy your FREE PREVIEW which shows only 2022 data and 25 documents. Contact Patent Forecast for full access.        

Edge Computing

Search All Applications in Edge Computing


Application US20200044918


Published 2020-02-06

Configuring Resource-constrained Devices In A Network

A method is performed by a first fog node of a plurality of fog nodes. In some implementations, the first fog node includes a non-transitory memory and one or more processors coupled with the non-transitory memory. In some implementations, the method includes maintaining a distributed ledger in coordination with the remaining fog nodes of the plurality of fog nodes. In some implementations, the distributed ledger stores configuration information associated with one or more devices. In some implementations, the method includes obtaining a request for configuration information from a device that breaches a resource threshold associated with the distributed ledger. In some implementations, the method includes transmitting, to the device, the configuration information associated with the device in order to allow the device to be configured in accordance with the configuration information while the device breaches the resource threshold associated with the distributed ledger.



Much More than Average Length Specification


View the Patent Matrix® Diagram to Explore the Claim Relationships

USPTO Full Text Publication >

3 Independent Claims

  • 1. A method comprising: at a first fog node of a plurality of fog nodes, the first fog node including a non-transitory memory and one or more processors coupled with the non-transitory memory: maintaining a distributed ledger in coordination with the remaining fog nodes of the plurality of fog nodes, wherein the distributed ledger stores configuration information associated with one or more devices; obtaining a request for configuration information from a device that breaches a resource threshold associated with the distributed ledger; and transmitting, to the device, the configuration information associated with the device in order to allow the device to be configured in accordance with the configuration information while the device breaches the resource threshold associated with the distributed ledger.

  • 10. A fog node comprising: a processor provided to execute computer readable instructions included on a non-transitory memory; and a non-transitory memory including computer readable instructions, that when executed by the processor, cause the fog node to: maintain a distributed ledger in coordination with other fog nodes, wherein the distributed ledger stores configuration information associated with one or more devices; obtain a request for configuration information from a device that breaches a resource threshold associated with the distributed ledger; and transmit, to the device, the configuration information associated with the device in order to allow the device to be configured in accordance with the configuration information while the device breaches the resource threshold associated with the distributed ledger.

  • 19. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which, when executed by a first fog node of a plurality of fog nodes, cause the first fog node to perform or cause performance of: maintaining a distributed ledger in coordination with the remaining fog nodes of the plurality of fog nodes, wherein the distributed ledger stores configuration information associated with one or more devices; obtaining a request for configuration information from a device that breaches a resource threshold associated with the distributed ledger; and transmitting, to the device, the configuration information associated with the device in order to allow the device to be configured in accordance with the configuration information while the device breaches the resource threshold associated with the distributed ledger.