Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cisco IoT R&D Insights from Patents

489 views

Published on

Patents are a good information resource for obtaining IoT R&D status in a company. Followings are some examples of patents that provide Cisco IoT R&D status: connected car/ITS (intelligent transportation system), smart grid networks and wireless sensor networks.

Published in: Technology
  • Be the first to comment

Cisco IoT R&D Insights from Patents

  1. 1. 1 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ Cisco IoT R&D Insights from Patents Patents are a good information resource for obtaining IoT R&D status in a company. Followings are some examples of patents that provide Cisco IoT R&D status: connected car/ITS (intelligent transportation system), smart grid networks and wireless sensor networks. Connected Cars/ITS US20150029987 (SYSTEM AND METHOD FOR WIRELESS INTERFACE SELECTION AND FOR COMMUNICATION AND ACCESS CONTROL OF SUBSYSTEMS, DEVICES, AND DATA IN A VEHICULAR ENVIRONMENT; Cisco) Abstract: A method in one embodiment includes intercepting a message in an on-board unit (OBU) of a vehicular network environment between a source and a receiver in the vehicular network environment, verifying the message is sent from the source, verifying the message is not altered, evaluating a set of source flow control policies associated with the source, and blocking the message if the set of source flow control policies indicate the message is not permitted. In specific embodiments, the message is not permitted if a level of access assigned to the source in the set of source flow control policies does not match a level of access tagged on the message. In further
  2. 2. 2 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ embodiments, the method includes evaluating a set of receiver flow control policies associated with the receiver, and blocking the message if the set of receiver flow control policies indicates the message is not permitted. Technology Details: Vehicles can be mobile across a large geographic area, can travel at various speeds, and can include more than one end user at a time desiring network connectivity. Additionally, vehicles also typically include multiple networking
  3. 3. 3 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ technologies for enabling communications to and from machine devices (e.g., entertainment system, vehicle sensors, actuators, electronic control units, etc.) in the vehicle itself. Providing cost optimized, continuous external network connectivity in vehicular network environments presents significant challenges to system designers, automobile manufacturers, service providers, and the like. Furthermore, facilitating secure communication between disparate in-vehicle network subsystems and controlling information flow across vehicle applications and machine devices of the subsystems is desirable. A method is provided for selecting a wireless interface to establish or maintain network connectivity between an OBU 30 and an external network, thereby creating a "connected vehicle." The method includes evaluating parameters associated with wireless connectivity, including delay, power consumption, user preferences, location, time, application requirements, RSSI, BER, SNR, etc. In addition, cost-optimization may also be performed to determine the most cost efficient connectivity, which may be selected subject to defined policies by a user. The method also provides for seamless mobility management such that migration of a session from one wireless interface to another is virtually transparent to the user. Thus, automatic and continuous wireless connectivity to external networks is achieved, in which network interference is minimized and wireless access cost can be optimized. An interconnection device or central hub may be provided to interconnect internal network subsystems. A method is also provided for applying policy-based access control and segregation between the internal network subsystems,
  4. 4. 4 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ in addition to access control between the internal network subsystems and the other internal vehicular networks and external networks. A method is provided for applying Information Flow Control (IFC) to data from internal network subsystems and applications processing such data, based on predefined policies associated with the data and access levels of an entity processing the data. A method is provided for providing Internet Protocol (IP) mapping information to the controller; establishing a network session between the electronic device and the remote node through the first wireless interface, wherein packets of the network session are routed through the controller; intercepting a first message in the electronic device being sent from a first source to a first receiver; evaluating one or more predefined policies to determine whether the first source is permitted to communicate with the first receiver; blocking the first message if the first source is not permitted to communicate with the first receiver, wherein a first subsystem of the vehicular network environment includes one of the first source and the first receiver; intercepting a second message in the electronic device being sent from a second source to a second receiver in the vehicular network environment; verifying the second message is sent from the second source; verifying the second message is not altered; evaluating a set of source flow control policies associated with the second source; and blocking the second message if the set of source flow control policies indicates the second message is not permitted. Related Patents: US2015015012 (Cloud-assisted threat defense for connected vehicles; Cisco)
  5. 5. 5 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ Abstract: In an example embodiment herein, there is provided methods and a system for cloud-assisted threat defense for connected vehicles. A vehicle suitably includes an on-board computer system for operating and/or controlling various systems on the vehicle. The on-board computer system suitably operates in connection with or includes an on-board threat defense module for detecting and protecting against malware attacks and other security threats to the vehicle. In an example embodiment, a cloud-based security component or security cloud assists with the detection and protection against security threats and malware attacks to the vehicle while minimizing the processing load and memory requirements for the on-board threat defense module. US20100256846 (SYSTEM AND METHOD FOR MANAGING ELECTRIC VEHICLE TRAVEL; Cisco) Abstract: An apparatus is provided in one example embodiment and includes a power management module configured to receive data associated with travel being proposed by an end user of an electric vehicle. The power management module is configured to suggest a starting time for the travel based on time of use (ToU) rates for electricity consumption and a current level of power in the electric vehicle. In more specific embodiments, the data associated with the travel includes a starting location, an ending location, and a proposed drive time. In other embodiments, the power management module is further configured to interface with a mapping tool in suggesting the starting time for the end user. The power management module can be configured to obtain the ToU rates from a utility, and the ToU rates are provided as a function of time.
  6. 6. 6 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ US20150222708 (SYSTEM AND METHOD FOR APPLICATIONS MANAGEMENT IN A NETWORKED VEHICULAR ENVIRONMENT; Cisco) Abstract: A method in one example embodiment includes identifying a power state and a battery level of a vehicle. The method also includes allocating power to critical applications (for example) in response to determining that the battery level is above a reserve threshold while the power state of the vehicle is engine-off. The method also includes allocating remaining power in excess of the reserve threshold to non-critical applications according to a power management policy. The power management policy may comprise at least one of a user power preference index and an application power preference index. US20140095058 (AD-HOC MOBILE IP NETWORK FOR INTELLIGENT TRANSPORTATION SYSTEM; Cisco) Abstract: A method and system for intelligently managing a transportation network are provided. The method includes dynamically establishing an ad hoc data communications network that includes vehicle nodes provided by respective vehicles in a transportation network. Behavior of one or more of the vehicles can be controlled remotely in response to automated traffic analysis performed based on real-time information received via the ad hoc network. Remote control of the one or more vehicles can include controlling vehicle motion by controlling vehicle subsystems via real-time command data transmitted to the respective vehicles via the ad hoc network.
  7. 7. 7 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ Smart Grid Networks 20150200846 (DATA RATE SELECTION WITH PROACTIVE ROUTING IN SMART GRID NETWORKS; Cisco) Abstract: In one embodiment, a device communicates with one or more neighboring devices in a shared-media communication network using a default data rate. The device determines that the default data rate is not supported by a particular one of the neighboring devices. The particular neighboring device is then associated with a second data rate that has a lower data rate than the default data rate. The second data rate is then used to communicate with the particular neighboring device. Technology Details: Routing process contains computer executable instructions executed by the processor to perform functions provided by one or more routing protocols, such as proactive or reactive routing protocols. These functions may, on capable devices, be configured to manage a routing/forwarding table containing, e.g., data used to make routing/forwarding decisions. In particular, in proactive routing, connectivity is discovered and known prior to computing routes to any destination in the network, e.g., link state routing such as Open Shortest Path First (OSPF), or Intermediate-System-to-Intermediate-System (ISIS), or Optimized Link State Routing (OLSR). Reactive routing, on the other hand, discovers neighbors (i.e., does not have an a priori knowledge of network topology), and in response to a needed route to a destination, sends a route request into the network to determine which neighboring
  8. 8. 8 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ node may be used to reach the desired destination. Example reactive routing protocols may comprise Ad-hoc On- demand Distance Vector (AODV), Dynamic Source Routing (DSR), DYnamic MANET On-demand Routing (DYMO), etc. Notably, on devices not capable or configured to store routing entries, routing process may consist solely of providing mechanisms necessary for source routing techniques. That is, for source routing, other devices in the network can tell the less capable devices exactly where to send the packets, and the less capable devices simply forward the packets as directed.
  9. 9. 9 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ Smart Grid Networks for the advanced metering infrastructure (AMI) applications may be configured to use a proactive routing strategy instead of a reactive strategy. In other words, the network may be configured to proactively maintain routes for all devices using a low-rate, periodic reporting traffic model. In particular, the dominant traffic model for many devices in Smart Grid AMI networks is to periodically transmit messages towards the Field Area Router (FAR) with a relatively long period (e.g., every 30 minutes to several hours). Existing processes, such as the IEEE P1901.2 Adaptive Tone Mapping process, provide sub-optimal performance in these types of proactive routing systems. For example, such a low traffic rate may mean that the vast majority of traffic would be sent using ROBO mode. Furthermore, these types of packets would be sent with the TMREQ bit set, generating a TMREP providing transmission parameters that will be aged out before they are used again. Thus, the network would be wasting significant resources by sending data packets using ROBO mode and generating useless TMREP messages. The New techniques provide for a significant performance improvement over the data rate adaptation method currently proposed in IEEE P1901.2 for networks that rely on proactive routing. Unlike reactive networks, proactive networks are much better suited for low-rate periodic reporting that is typical in Smart Grid AMI networks. Low-rate periodic reporting does not offer significant opportunities to amortize the cost of a conservative approach that defaults to using the slowest data rate (e.g., using ROBO). Instead, network devices may default to using a high data rate to establish and maintain connectivity, only resorting to a low data rate when needed to
  10. 10. 10 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ establish network connectivity. Accordingly, the number of low data rate transmissions and overhead of sending unneeded Tone Map Request/Reply messages is significantly reduced. Utilizing higher data rates also reduces channel utilization and collisions, especially due to the hidden terminal problem, resulting in a more effective network overall. Related Patents: US20140146816 (SYSTEM AND METHOD FOR PROVIDING SMART GRID COMMUNICATIONS AND MANAGEMENT; Cisco) Abstract: A method is provided in one example embodiment and includes receiving a request for a service that involves phasor measurement unit (PMU) data; identifying a service device in a network to perform the service; and multicasting one or more results of the service to a group of subscribers identified by a multicast group address. In more particular embodiments, particular PMU data is redirected to the service device via a service insertion architecture (SIA) protocol. In addition, the service can include replicating packets and masking a subset of traffic for forwarding to a first hop router of the network. In certain example instances, metadata is used in order to apply the service to certain traffic propagating in the network. US20120323381 (Security Measures for the Smart Grid; Cisco) Abstract: Security is enabled in an electrical system by examining a configuration file for a substation present in the electrical system, where the substation includes one or more electrical devices and one or more network devices.
  11. 11. 11 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ Based on the examination of the configuration file, information is determined on a characteristic of an electrical device that is selected from a group including a type, allowed role of the electrical device and allowed communication modes for the electrical device. Based on the determined information, a basis for controlling the role and communication modes for the electrical device is identified. A security policy is configured in a network device in the substation to incorporate the identified basis. Based on the configured security policy in the network device, communication patterns for the electrical device are allowed that are associated with the allowed role and allowed communication modes for the electrical device. Wireless Sensor Networks US20150071255 (Sensor Data Transport and Consolidation Within Communication Nodes in a Network; Cisco) Abstract: In one embodiment, sensor data is transported in a network to a rendezvous point network node, which consolidates the information into a consolidated result which is communicated to the destination. Such consolidation by a network node reduces the number of paths required in the network between the sensors and the destination. One embodiment includes acquiring, by each of a plurality of originating nodes in a wireless deterministic network, external data related to a same physical event; communicating through the network said external data from each of the plurality of originating nodes to a rendezvous point network node (RP) within the network; processing, by the RP, said external data from each of the plurality of originating nodes to produce a
  12. 12. 12 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ consolidated result; and communicating the consolidated result to a destination node of the network. In one embodiment, the network is a low power lossy network (LLN). Technology Details:
  13. 13. 13 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ Deterministic networks rely on a set of predetermined time slots, which define at least a time (and possibly frequency to use especially in a wireless deterministic network), when each specific node can communicate a packet to a second specific node in the deterministic network. With reference to the figure in a time-slotted wireless deterministic network 200, one or more path computation engines (PCEs) 212 is used to compute the path (e.g., physical path and time slots) between each source S (sensor) 221-223 and the RP 251, and a single path from RP 251 to the destination (application host 211). PCE 212 computes the time slots and frequency channels used by each network hop, or some analogous abstraction that can be used by a more specific device to derive those. By advertisement, configuration or by other means (e.g., from a network management system), PCE 212 discovers all sources 221-223 that will be deriving and sending external data related to a same physical event (data that is not related to a communication node, but to an external event). PCE 212 also discovers one or more rendezvous points (RPs) 251 in network 200 that can be used to consolidate the multiple external data into a single consolidated result. PCE 212 discovers these rendezvous point(s) 251 by their advertisement, configuration or by other means (e.g., from a network management system). Extensions to Dynamic Host Configuration Protocol (DHCP) or Constrained Application Protocol (CoAP), or another protocol are used by network nodes to report to the PCE their nature (e.g., type of sensed data and location) and whether they could add an aggregator for the type of sensed data. Without consolidation by an RP in the network, there would need to be n independent paths determined and configured in the network to report the
  14. 14. 14 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ external data of n sensors 221-223 to the destination 211. Using RP 251 to consolidate this n external data into a single consolidated result greatly reduces the communication overhead of the network. There are n paths to RP 251 from sensors 221-223 (one path for each sensor), and one path from RP 251 to destination 211. Related Patents: US20120026890 (Reporting Statistics on the Health of a Sensor Node in a Sensor Network; Cisco) Abstract: In one embodiment, a method includes generating a set of statistics concerning a sensor node in a sensor network based on one or more of sensor data from a sensor at the sensor node, communication to the sensor node from one or more other sensor nodes in the sensor network, or communication from the sensor node; determining based on a subset of the set of statistics whether a predetermined anomalous event correlated with the subset has occurred; and, if the predetermined anomalous event has occurred, generating a summary of the subset and communicating it to a police node in the sensor network. US20120197856 (Hierarchical Network for Collecting, Aggregating, Indexing, and Searching Sensor Data; Cisco) Abstract: In particular embodiments, a system includes a sensor-data-collection network layer including multiple sensors. The sensor-data-collection network layer is a first logical layer of a sensor network. The system includes an aggregation network layer including one or more aggregators configured to access sensor data from the sensors and aggregate the sensor data. The aggregation network layer is a second logical layer residing logically above the first logical layer. The system includes an indexing network layer including one or more indexers that are
  15. 15. 15 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ configured to access the aggregated sensor data and generate an index of the aggregated sensor data according to a multi-dimensional array. The indexing network layer is a third logical layer residing logically above the second logical layer. The system includes a search network layer including one or more search engines. The search network layer is a fourth logical layer residing logically above the third logical layer.

×