SlideShare a Scribd company logo
1 of 15
1
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
Cisco IoT R&D Insights from Patents
Patents are a good information resource for obtaining IoT R&D status in a company. Followings are some
examples of patents that provide Cisco IoT R&D status: connected car/ITS (intelligent transportation system),
smart grid networks and wireless sensor networks.
Connected Cars/ITS
US20150029987 (SYSTEM AND METHOD FOR WIRELESS INTERFACE SELECTION AND FOR
COMMUNICATION AND ACCESS CONTROL OF SUBSYSTEMS, DEVICES, AND DATA IN A
VEHICULAR ENVIRONMENT; Cisco)
Abstract: A method in one embodiment includes intercepting a message in an on-board unit (OBU) of a vehicular
network environment between a source and a receiver in the vehicular network environment, verifying the message
is sent from the source, verifying the message is not altered, evaluating a set of source flow control policies
associated with the source, and blocking the message if the set of source flow control policies indicate the message
is not permitted. In specific embodiments, the message is not permitted if a level of access assigned to the source in
the set of source flow control policies does not match a level of access tagged on the message. In further
2
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
embodiments, the method includes evaluating a set of receiver flow control policies associated with the receiver,
and blocking the message if the set of receiver flow control policies indicates the message is not permitted.
Technology Details:
Vehicles can be mobile across a large geographic area, can travel at various speeds, and can include more than one
end user at a time desiring network connectivity. Additionally, vehicles also typically include multiple networking
3
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
technologies for enabling communications to and from machine devices (e.g., entertainment system, vehicle
sensors, actuators, electronic control units, etc.) in the vehicle itself. Providing cost optimized, continuous external
network connectivity in vehicular network environments presents significant challenges to system designers,
automobile manufacturers, service providers, and the like. Furthermore, facilitating secure communication between
disparate in-vehicle network subsystems and controlling information flow across vehicle applications and machine
devices of the subsystems is desirable.
A method is provided for selecting a wireless interface to establish or maintain network connectivity between an
OBU 30 and an external network, thereby creating a "connected vehicle." The method includes evaluating
parameters associated with wireless connectivity, including delay, power consumption, user preferences, location,
time, application requirements, RSSI, BER, SNR, etc. In addition, cost-optimization may also be performed to
determine the most cost efficient connectivity, which may be selected subject to defined policies by a user. The
method also provides for seamless mobility management such that migration of a session from one wireless
interface to another is virtually transparent to the user. Thus, automatic and continuous wireless connectivity to
external networks is achieved, in which network interference is minimized and wireless access cost can be
optimized.
An interconnection device or central hub may be provided to interconnect internal network subsystems. A method
is also provided for applying policy-based access control and segregation between the internal network subsystems,
4
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
in addition to access control between the internal network subsystems and the other internal vehicular networks and
external networks. A method is provided for applying Information Flow Control (IFC) to data from internal
network subsystems and applications processing such data, based on predefined policies associated with the data
and access levels of an entity processing the data.
A method is provided for providing Internet Protocol (IP) mapping information to the controller; establishing a
network session between the electronic device and the remote node through the first wireless interface, wherein
packets of the network session are routed through the controller; intercepting a first message in the electronic
device being sent from a first source to a first receiver; evaluating one or more predefined policies to determine
whether the first source is permitted to communicate with the first receiver; blocking the first message if the first
source is not permitted to communicate with the first receiver, wherein a first subsystem of the vehicular network
environment includes one of the first source and the first receiver; intercepting a second message in the electronic
device being sent from a second source to a second receiver in the vehicular network environment; verifying the
second message is sent from the second source; verifying the second message is not altered; evaluating a set of
source flow control policies associated with the second source; and blocking the second message if the set of
source flow control policies indicates the second message is not permitted.
Related Patents:
US2015015012 (Cloud-assisted threat defense for connected vehicles; Cisco)
5
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
Abstract: In an example embodiment herein, there is provided methods and a system for cloud-assisted threat
defense for connected vehicles. A vehicle suitably includes an on-board computer system for operating and/or
controlling various systems on the vehicle. The on-board computer system suitably operates in connection with or
includes an on-board threat defense module for detecting and protecting against malware attacks and other security
threats to the vehicle. In an example embodiment, a cloud-based security component or security cloud assists with
the detection and protection against security threats and malware attacks to the vehicle while minimizing the
processing load and memory requirements for the on-board threat defense module.
US20100256846 (SYSTEM AND METHOD FOR MANAGING ELECTRIC VEHICLE TRAVEL; Cisco)
Abstract: An apparatus is provided in one example embodiment and includes a power management module
configured to receive data associated with travel being proposed by an end user of an electric vehicle. The power
management module is configured to suggest a starting time for the travel based on time of use (ToU) rates for
electricity consumption and a current level of power in the electric vehicle. In more specific embodiments, the data
associated with the travel includes a starting location, an ending location, and a proposed drive time. In other
embodiments, the power management module is further configured to interface with a mapping tool in suggesting
the starting time for the end user. The power management module can be configured to obtain the ToU rates from a
utility, and the ToU rates are provided as a function of time.
6
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
US20150222708 (SYSTEM AND METHOD FOR APPLICATIONS MANAGEMENT IN A NETWORKED
VEHICULAR ENVIRONMENT; Cisco)
Abstract: A method in one example embodiment includes identifying a power state and a battery level of a vehicle.
The method also includes allocating power to critical applications (for example) in response to determining that the
battery level is above a reserve threshold while the power state of the vehicle is engine-off. The method also
includes allocating remaining power in excess of the reserve threshold to non-critical applications according to a
power management policy. The power management policy may comprise at least one of a user power preference
index and an application power preference index.
US20140095058 (AD-HOC MOBILE IP NETWORK FOR INTELLIGENT TRANSPORTATION SYSTEM;
Cisco)
Abstract: A method and system for intelligently managing a transportation network are provided. The method
includes dynamically establishing an ad hoc data communications network that includes vehicle nodes provided by
respective vehicles in a transportation network. Behavior of one or more of the vehicles can be controlled remotely
in response to automated traffic analysis performed based on real-time information received via the ad hoc network.
Remote control of the one or more vehicles can include controlling vehicle motion by controlling vehicle
subsystems via real-time command data transmitted to the respective vehicles via the ad hoc network.
7
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
Smart Grid Networks
20150200846 (DATA RATE SELECTION WITH PROACTIVE ROUTING IN SMART GRID NETWORKS;
Cisco)
Abstract: In one embodiment, a device communicates with one or more neighboring devices in a shared-media
communication network using a default data rate. The device determines that the default data rate is not supported
by a particular one of the neighboring devices. The particular neighboring device is then associated with a second
data rate that has a lower data rate than the default data rate. The second data rate is then used to communicate with
the particular neighboring device.
Technology Details:
Routing process contains computer executable instructions executed by the processor to perform functions
provided by one or more routing protocols, such as proactive or reactive routing protocols. These functions may,
on capable devices, be configured to manage a routing/forwarding table containing, e.g., data used to make
routing/forwarding decisions. In particular, in proactive routing, connectivity is discovered and known prior to
computing routes to any destination in the network, e.g., link state routing such as Open Shortest Path First (OSPF),
or Intermediate-System-to-Intermediate-System (ISIS), or Optimized Link State Routing (OLSR). Reactive routing,
on the other hand, discovers neighbors (i.e., does not have an a priori knowledge of network topology), and in
response to a needed route to a destination, sends a route request into the network to determine which neighboring
8
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
node may be used to reach the desired destination. Example reactive routing protocols may comprise Ad-hoc On-
demand Distance Vector (AODV), Dynamic Source Routing (DSR), DYnamic MANET On-demand Routing
(DYMO), etc. Notably, on devices not capable or configured to store routing entries, routing process may consist
solely of providing mechanisms necessary for source routing techniques. That is, for source routing, other devices
in the network can tell the less capable devices exactly where to send the packets, and the less capable devices
simply forward the packets as directed.
9
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
Smart Grid Networks for the advanced metering infrastructure (AMI) applications may be configured to use a
proactive routing strategy instead of a reactive strategy. In other words, the network may be configured to
proactively maintain routes for all devices using a low-rate, periodic reporting traffic model. In particular, the
dominant traffic model for many devices in Smart Grid AMI networks is to periodically transmit messages towards
the Field Area Router (FAR) with a relatively long period (e.g., every 30 minutes to several hours). Existing
processes, such as the IEEE P1901.2 Adaptive Tone Mapping process, provide sub-optimal performance in these
types of proactive routing systems. For example, such a low traffic rate may mean that the vast majority of traffic
would be sent using ROBO mode. Furthermore, these types of packets would be sent with the TMREQ bit set,
generating a TMREP providing transmission parameters that will be aged out before they are used again. Thus, the
network would be wasting significant resources by sending data packets using ROBO mode and generating useless
TMREP messages.
The New techniques provide for a significant performance improvement over the data rate adaptation method
currently proposed in IEEE P1901.2 for networks that rely on proactive routing. Unlike reactive networks,
proactive networks are much better suited for low-rate periodic reporting that is typical in Smart Grid AMI
networks. Low-rate periodic reporting does not offer significant opportunities to amortize the cost of a conservative
approach that defaults to using the slowest data rate (e.g., using ROBO). Instead, network devices may default to
using a high data rate to establish and maintain connectivity, only resorting to a low data rate when needed to
10
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
establish network connectivity. Accordingly, the number of low data rate transmissions and overhead of sending
unneeded Tone Map Request/Reply messages is significantly reduced. Utilizing higher data rates also reduces
channel utilization and collisions, especially due to the hidden terminal problem, resulting in a more effective
network overall.
Related Patents:
US20140146816 (SYSTEM AND METHOD FOR PROVIDING SMART GRID COMMUNICATIONS AND
MANAGEMENT; Cisco)
Abstract: A method is provided in one example embodiment and includes receiving a request for a service that
involves phasor measurement unit (PMU) data; identifying a service device in a network to perform the service;
and multicasting one or more results of the service to a group of subscribers identified by a multicast group address.
In more particular embodiments, particular PMU data is redirected to the service device via a service insertion
architecture (SIA) protocol. In addition, the service can include replicating packets and masking a subset of traffic
for forwarding to a first hop router of the network. In certain example instances, metadata is used in order to apply
the service to certain traffic propagating in the network.
US20120323381 (Security Measures for the Smart Grid; Cisco)
Abstract: Security is enabled in an electrical system by examining a configuration file for a substation present in
the electrical system, where the substation includes one or more electrical devices and one or more network devices.
11
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
Based on the examination of the configuration file, information is determined on a characteristic of an electrical
device that is selected from a group including a type, allowed role of the electrical device and allowed
communication modes for the electrical device. Based on the determined information, a basis for controlling the
role and communication modes for the electrical device is identified. A security policy is configured in a network
device in the substation to incorporate the identified basis. Based on the configured security policy in the network
device, communication patterns for the electrical device are allowed that are associated with the allowed role and
allowed communication modes for the electrical device.
Wireless Sensor Networks
US20150071255 (Sensor Data Transport and Consolidation Within Communication Nodes in a Network; Cisco)
Abstract: In one embodiment, sensor data is transported in a network to a rendezvous point network node, which
consolidates the information into a consolidated result which is communicated to the destination. Such
consolidation by a network node reduces the number of paths required in the network between the sensors and the
destination. One embodiment includes acquiring, by each of a plurality of originating nodes in a wireless
deterministic network, external data related to a same physical event; communicating through the network said
external data from each of the plurality of originating nodes to a rendezvous point network node (RP) within the
network; processing, by the RP, said external data from each of the plurality of originating nodes to produce a
12
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
consolidated result; and communicating the consolidated result to a destination node of the network. In one
embodiment, the network is a low power lossy network (LLN).
Technology Details:
13
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
Deterministic networks rely on a set of predetermined time slots, which define at least a time (and possibly
frequency to use especially in a wireless deterministic network), when each specific node can communicate a
packet to a second specific node in the deterministic network. With reference to the figure in a time-slotted
wireless deterministic network 200, one or more path computation engines (PCEs) 212 is used to compute the path
(e.g., physical path and time slots) between each source S (sensor) 221-223 and the RP 251, and a single path from
RP 251 to the destination (application host 211). PCE 212 computes the time slots and frequency channels used by
each network hop, or some analogous abstraction that can be used by a more specific device to derive those.
By advertisement, configuration or by other means (e.g., from a network management system), PCE 212 discovers
all sources 221-223 that will be deriving and sending external data related to a same physical event (data that is not
related to a communication node, but to an external event). PCE 212 also discovers one or more rendezvous points
(RPs) 251 in network 200 that can be used to consolidate the multiple external data into a single consolidated result.
PCE 212 discovers these rendezvous point(s) 251 by their advertisement, configuration or by other means (e.g.,
from a network management system).
Extensions to Dynamic Host Configuration Protocol (DHCP) or Constrained Application Protocol (CoAP), or
another protocol are used by network nodes to report to the PCE their nature (e.g., type of sensed data and location)
and whether they could add an aggregator for the type of sensed data. Without consolidation by an RP in the
network, there would need to be n independent paths determined and configured in the network to report the
14
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
external data of n sensors 221-223 to the destination 211. Using RP 251 to consolidate this n external data into a
single consolidated result greatly reduces the communication overhead of the network. There are n paths to RP 251
from sensors 221-223 (one path for each sensor), and one path from RP 251 to destination 211.
Related Patents:
US20120026890 (Reporting Statistics on the Health of a Sensor Node in a Sensor Network; Cisco)
Abstract: In one embodiment, a method includes generating a set of statistics concerning a sensor node in a sensor
network based on one or more of sensor data from a sensor at the sensor node, communication to the sensor node
from one or more other sensor nodes in the sensor network, or communication from the sensor node; determining
based on a subset of the set of statistics whether a predetermined anomalous event correlated with the subset has
occurred; and, if the predetermined anomalous event has occurred, generating a summary of the subset and
communicating it to a police node in the sensor network.
US20120197856 (Hierarchical Network for Collecting, Aggregating, Indexing, and Searching Sensor Data; Cisco)
Abstract: In particular embodiments, a system includes a sensor-data-collection network layer including multiple
sensors. The sensor-data-collection network layer is a first logical layer of a sensor network. The system includes
an aggregation network layer including one or more aggregators configured to access sensor data from the sensors
and aggregate the sensor data. The aggregation network layer is a second logical layer residing logically above the
first logical layer. The system includes an indexing network layer including one or more indexers that are
15
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
configured to access the aggregated sensor data and generate an index of the aggregated sensor data according to a
multi-dimensional array. The indexing network layer is a third logical layer residing logically above the second
logical layer. The system includes a search network layer including one or more search engines. The search
network layer is a fourth logical layer residing logically above the third logical layer.

More Related Content

What's hot

Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016
Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016
Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016Alex G. Lee, Ph.D. Esq. CLP
 
Internet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and OpportunitiesInternet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and OpportunitiesDr. Mazlan Abbas
 
IOT - The 3rd Internet Tsunami is Here
IOT - The 3rd Internet Tsunami is HereIOT - The 3rd Internet Tsunami is Here
IOT - The 3rd Internet Tsunami is HereDr. Mazlan Abbas
 
The IP of Internet of Things (IoT)
The IP of Internet of Things (IoT)The IP of Internet of Things (IoT)
The IP of Internet of Things (IoT)citiusminds_patent
 
Internet of Things - We Are at the Tip of an Iceberg
Internet of Things - We Are at the Tip of an IcebergInternet of Things - We Are at the Tip of an Iceberg
Internet of Things - We Are at the Tip of an IcebergDr. Mazlan Abbas
 
M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.Pedro Menendez-Valdes
 
Product tracking and tracing with Blockchain and Internet of Things
Product tracking and tracing with Blockchain and Internet of ThingsProduct tracking and tracing with Blockchain and Internet of Things
Product tracking and tracing with Blockchain and Internet of ThingsMurali Venkatesh
 
Internet of Things Ecosystem
Internet of Things Ecosystem Internet of Things Ecosystem
Internet of Things Ecosystem CompTIA
 
Internet of Things Workshop
Internet of Things WorkshopInternet of Things Workshop
Internet of Things WorkshopDr. Mazlan Abbas
 
Are We Ready for IoT Now? Or Risk Being Left Behind
Are We Ready for IoT Now? Or Risk Being Left BehindAre We Ready for IoT Now? Or Risk Being Left Behind
Are We Ready for IoT Now? Or Risk Being Left BehindDr. Mazlan Abbas
 
IoT Startups Innovation Insights from Patents: Part I. Quantitative Analysis
IoT Startups Innovation Insights from Patents: Part I. Quantitative AnalysisIoT Startups Innovation Insights from Patents: Part I. Quantitative Analysis
IoT Startups Innovation Insights from Patents: Part I. Quantitative AnalysisAlex G. Lee, Ph.D. Esq. CLP
 
Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022Dr. Mazlan Abbas
 
Finpro report market study nigeria
Finpro report market study nigeriaFinpro report market study nigeria
Finpro report market study nigeriaBusiness Finland
 
Industrial internet big data usa market study
Industrial internet big data usa market studyIndustrial internet big data usa market study
Industrial internet big data usa market studySari Ojala
 
Malaysia National IoT Strategic Roadmap
Malaysia National IoT Strategic RoadmapMalaysia National IoT Strategic Roadmap
Malaysia National IoT Strategic RoadmapDr. Mazlan Abbas
 

What's hot (20)

IoT Connected Car Patents Data 2Q 2016
IoT Connected Car Patents Data 2Q 2016IoT Connected Car Patents Data 2Q 2016
IoT Connected Car Patents Data 2Q 2016
 
Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016
Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016
Internet of Things (IoT) Strategic Patent Development and Monetization 1Q 2016
 
IoT research results (Jan2017) - by Ahmad Haji
IoT research results (Jan2017) - by Ahmad HajiIoT research results (Jan2017) - by Ahmad Haji
IoT research results (Jan2017) - by Ahmad Haji
 
Internet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and OpportunitiesInternet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and Opportunities
 
IOT - The 3rd Internet Tsunami is Here
IOT - The 3rd Internet Tsunami is HereIOT - The 3rd Internet Tsunami is Here
IOT - The 3rd Internet Tsunami is Here
 
The IP of Internet of Things (IoT)
The IP of Internet of Things (IoT)The IP of Internet of Things (IoT)
The IP of Internet of Things (IoT)
 
Internet of Things - We Are at the Tip of an Iceberg
Internet of Things - We Are at the Tip of an IcebergInternet of Things - We Are at the Tip of an Iceberg
Internet of Things - We Are at the Tip of an Iceberg
 
M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.
 
Product tracking and tracing with Blockchain and Internet of Things
Product tracking and tracing with Blockchain and Internet of ThingsProduct tracking and tracing with Blockchain and Internet of Things
Product tracking and tracing with Blockchain and Internet of Things
 
Internet of Things Ecosystem
Internet of Things Ecosystem Internet of Things Ecosystem
Internet of Things Ecosystem
 
Forbes Article
Forbes ArticleForbes Article
Forbes Article
 
Your Next IoT Journey
Your Next IoT JourneyYour Next IoT Journey
Your Next IoT Journey
 
Internet of Things Workshop
Internet of Things WorkshopInternet of Things Workshop
Internet of Things Workshop
 
Are We Ready for IoT Now? Or Risk Being Left Behind
Are We Ready for IoT Now? Or Risk Being Left BehindAre We Ready for IoT Now? Or Risk Being Left Behind
Are We Ready for IoT Now? Or Risk Being Left Behind
 
The IOT scenario in the digital age
The IOT scenario in the digital ageThe IOT scenario in the digital age
The IOT scenario in the digital age
 
IoT Startups Innovation Insights from Patents: Part I. Quantitative Analysis
IoT Startups Innovation Insights from Patents: Part I. Quantitative AnalysisIoT Startups Innovation Insights from Patents: Part I. Quantitative Analysis
IoT Startups Innovation Insights from Patents: Part I. Quantitative Analysis
 
Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022
 
Finpro report market study nigeria
Finpro report market study nigeriaFinpro report market study nigeria
Finpro report market study nigeria
 
Industrial internet big data usa market study
Industrial internet big data usa market studyIndustrial internet big data usa market study
Industrial internet big data usa market study
 
Malaysia National IoT Strategic Roadmap
Malaysia National IoT Strategic RoadmapMalaysia National IoT Strategic Roadmap
Malaysia National IoT Strategic Roadmap
 

Viewers also liked

Uk best sme_mobile_health_app_-_total_mobile
Uk best sme_mobile_health_app_-_total_mobileUk best sme_mobile_health_app_-_total_mobile
Uk best sme_mobile_health_app_-_total_mobile3GDR
 
Connected Medical Devices in the Internet of Things
Connected Medical Devices in the Internet of ThingsConnected Medical Devices in the Internet of Things
Connected Medical Devices in the Internet of ThingsReal-Time Innovations (RTI)
 
Patent Evaluation Services for Investment Professionals
Patent Evaluation Services for Investment ProfessionalsPatent Evaluation Services for Investment Professionals
Patent Evaluation Services for Investment ProfessionalsAlex G. Lee, Ph.D. Esq. CLP
 
Relazione 30.0[1]
Relazione 30.0[1]Relazione 30.0[1]
Relazione 30.0[1]Alain Denis
 
Infomgmt assignment 1
Infomgmt assignment 1Infomgmt assignment 1
Infomgmt assignment 1li wang
 
Research methodology
Research methodologyResearch methodology
Research methodologydhinnar
 
Future Smart UI UX Insights from Patents Implementing Minority Report
Future Smart UI UX Insights from Patents Implementing Minority ReportFuture Smart UI UX Insights from Patents Implementing Minority Report
Future Smart UI UX Insights from Patents Implementing Minority ReportAlex G. Lee, Ph.D. Esq. CLP
 
Afstudeerontwerp D. le Pair
Afstudeerontwerp D. le PairAfstudeerontwerp D. le Pair
Afstudeerontwerp D. le Paird.lepair
 
Network learning: new solutions for all?
Network learning: new solutions for all?Network learning: new solutions for all?
Network learning: new solutions for all?Manuela Francisco
 

Viewers also liked (20)

Uk best sme_mobile_health_app_-_total_mobile
Uk best sme_mobile_health_app_-_total_mobileUk best sme_mobile_health_app_-_total_mobile
Uk best sme_mobile_health_app_-_total_mobile
 
Connected Medical Devices in the Internet of Things
Connected Medical Devices in the Internet of ThingsConnected Medical Devices in the Internet of Things
Connected Medical Devices in the Internet of Things
 
Patent Evaluation Services for Investment Professionals
Patent Evaluation Services for Investment ProfessionalsPatent Evaluation Services for Investment Professionals
Patent Evaluation Services for Investment Professionals
 
Twitter
TwitterTwitter
Twitter
 
Relazione 30.0[1]
Relazione 30.0[1]Relazione 30.0[1]
Relazione 30.0[1]
 
Mis Gustos
Mis GustosMis Gustos
Mis Gustos
 
Infomgmt assignment 1
Infomgmt assignment 1Infomgmt assignment 1
Infomgmt assignment 1
 
廖月秋
廖月秋廖月秋
廖月秋
 
HTC ITC Complaint to Apple
HTC ITC Complaint to AppleHTC ITC Complaint to Apple
HTC ITC Complaint to Apple
 
Research methodology
Research methodologyResearch methodology
Research methodology
 
Jeddah e mar Vermelho
Jeddah e mar VermelhoJeddah e mar Vermelho
Jeddah e mar Vermelho
 
Venetia panorama
Venetia panoramaVenetia panorama
Venetia panorama
 
Alexandra Blaga
Alexandra BlagaAlexandra Blaga
Alexandra Blaga
 
IoT Disruptive Innovation & Patent Exploitation
IoT Disruptive Innovation & Patent ExploitationIoT Disruptive Innovation & Patent Exploitation
IoT Disruptive Innovation & Patent Exploitation
 
Future Smart UI UX Insights from Patents Implementing Minority Report
Future Smart UI UX Insights from Patents Implementing Minority ReportFuture Smart UI UX Insights from Patents Implementing Minority Report
Future Smart UI UX Insights from Patents Implementing Minority Report
 
Afstudeerontwerp D. le Pair
Afstudeerontwerp D. le PairAfstudeerontwerp D. le Pair
Afstudeerontwerp D. le Pair
 
劉宗儒
劉宗儒劉宗儒
劉宗儒
 
Network learning: new solutions for all?
Network learning: new solutions for all?Network learning: new solutions for all?
Network learning: new solutions for all?
 
특허펀드 투자모델과 가치평가
특허펀드 투자모델과 가치평가특허펀드 투자모델과 가치평가
특허펀드 투자모델과 가치평가
 
Intel\'s Processor Innovation Frontline 2009 1Q
Intel\'s Processor Innovation Frontline 2009 1QIntel\'s Processor Innovation Frontline 2009 1Q
Intel\'s Processor Innovation Frontline 2009 1Q
 

Similar to Cisco IoT R&D Insights from Patents

Patents for the IoT (Internet of Things) Architecture
Patents for the IoT (Internet of Things) ArchitecturePatents for the IoT (Internet of Things) Architecture
Patents for the IoT (Internet of Things) ArchitectureAlex G. Lee, Ph.D. Esq. CLP
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
 
Server congestion control
Server congestion controlServer congestion control
Server congestion controlIJCNCJournal
 
27859 a new distributed architecture for remote communications 2013
27859 a new distributed architecture for remote communications 201327859 a new distributed architecture for remote communications 2013
27859 a new distributed architecture for remote communications 2013Benjamin Kyalo
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideAngela Hays
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...IOSR Journals
 
Patent Monetization by Value Integration for New IoT Business Development Cas...
Patent Monetization by Value Integration for New IoT Business Development Cas...Patent Monetization by Value Integration for New IoT Business Development Cas...
Patent Monetization by Value Integration for New IoT Business Development Cas...Alex G. Lee, Ph.D. Esq. CLP
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18raymurphy9533
 
LTE-based Vehicle and Drone Networks Insights from Patents
LTE-based Vehicle and Drone Networks Insights from PatentsLTE-based Vehicle and Drone Networks Insights from Patents
LTE-based Vehicle and Drone Networks Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Cloud for Internet of Things Insights from Patents
Cloud for Internet of Things Insights from PatentsCloud for Internet of Things Insights from Patents
Cloud for Internet of Things Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...IRJET Journal
 
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET Journal
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
 
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)IAEME Publication
 
Understanding Wi-Fi offload
Understanding Wi-Fi offloadUnderstanding Wi-Fi offload
Understanding Wi-Fi offloadKenan Masic
 
66794384 3 g-lte-wifi-offload-framework
66794384 3 g-lte-wifi-offload-framework66794384 3 g-lte-wifi-offload-framework
66794384 3 g-lte-wifi-offload-frameworkLaurindo Carinhas
 

Similar to Cisco IoT R&D Insights from Patents (20)

Patents for the IoT (Internet of Things) Architecture
Patents for the IoT (Internet of Things) ArchitecturePatents for the IoT (Internet of Things) Architecture
Patents for the IoT (Internet of Things) Architecture
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc NetworksCooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
 
IoT Connected Car Insights from Patents
IoT Connected Car Insights from PatentsIoT Connected Car Insights from Patents
IoT Connected Car Insights from Patents
 
Server congestion control
Server congestion controlServer congestion control
Server congestion control
 
27859 a new distributed architecture for remote communications 2013
27859 a new distributed architecture for remote communications 201327859 a new distributed architecture for remote communications 2013
27859 a new distributed architecture for remote communications 2013
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
 
E017112028
E017112028E017112028
E017112028
 
Patent Monetization by Value Integration for New IoT Business Development Cas...
Patent Monetization by Value Integration for New IoT Business Development Cas...Patent Monetization by Value Integration for New IoT Business Development Cas...
Patent Monetization by Value Integration for New IoT Business Development Cas...
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
LTE-based Vehicle and Drone Networks Insights from Patents
LTE-based Vehicle and Drone Networks Insights from PatentsLTE-based Vehicle and Drone Networks Insights from Patents
LTE-based Vehicle and Drone Networks Insights from Patents
 
Cloud for Internet of Things Insights from Patents
Cloud for Internet of Things Insights from PatentsCloud for Internet of Things Insights from Patents
Cloud for Internet of Things Insights from Patents
 
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
A Study of Message Authentication Protocol with Reduced Computation in Vehicu...
 
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
 
Understanding Wi-Fi offload
Understanding Wi-Fi offloadUnderstanding Wi-Fi offload
Understanding Wi-Fi offload
 
66794384 3 g-lte-wifi-offload-framework
66794384 3 g-lte-wifi-offload-framework66794384 3 g-lte-wifi-offload-framework
66794384 3 g-lte-wifi-offload-framework
 

More from Alex G. Lee, Ph.D. Esq. CLP

[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...Alex G. Lee, Ph.D. Esq. CLP
 
Metaverse x AI x Web3 x Sustainability Convergence
Metaverse x AI x  Web3 x Sustainability ConvergenceMetaverse x AI x  Web3 x Sustainability Convergence
Metaverse x AI x Web3 x Sustainability ConvergenceAlex G. Lee, Ph.D. Esq. CLP
 
Tokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World AssetsTokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World AssetsAlex G. Lee, Ph.D. Esq. CLP
 
Maximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent AnalysisMaximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent AnalysisAlex G. Lee, Ph.D. Esq. CLP
 
Maximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing PatentsMaximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Real-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi IntegrationReal-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi IntegrationAlex G. Lee, Ph.D. Esq. CLP
 
Metaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business DevelopmentMetaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business DevelopmentAlex G. Lee, Ph.D. Esq. CLP
 
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강Alex G. Lee, Ph.D. Esq. CLP
 
NFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdfNFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdfAlex G. Lee, Ph.D. Esq. CLP
 
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform IntroductionFAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform IntroductionAlex G. Lee, Ph.D. Esq. CLP
 
NAVIGATING THE METAVERSE (Wiley) One Page Book Summary
NAVIGATING THE METAVERSE (Wiley)  One Page Book SummaryNAVIGATING THE METAVERSE (Wiley)  One Page Book Summary
NAVIGATING THE METAVERSE (Wiley) One Page Book SummaryAlex G. Lee, Ph.D. Esq. CLP
 

More from Alex G. Lee, Ph.D. Esq. CLP (20)

[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
 
Metaverse x AI x Web3 x Sustainability Convergence
Metaverse x AI x  Web3 x Sustainability ConvergenceMetaverse x AI x  Web3 x Sustainability Convergence
Metaverse x AI x Web3 x Sustainability Convergence
 
Tokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World AssetsTokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World Assets
 
Maximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent AnalysisMaximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent Analysis
 
Maximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing PatentsMaximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing Patents
 
Real-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi IntegrationReal-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi Integration
 
Metaverse x Web3 Interoperability Overview
Metaverse x Web3 Interoperability OverviewMetaverse x Web3 Interoperability Overview
Metaverse x Web3 Interoperability Overview
 
AI for Metaverse x Web3 Overview
AI for Metaverse x Web3 OverviewAI for Metaverse x Web3 Overview
AI for Metaverse x Web3 Overview
 
NFT Web3 Metaverse Global Leaders Roundtable
NFT Web3 Metaverse Global Leaders RoundtableNFT Web3 Metaverse Global Leaders Roundtable
NFT Web3 Metaverse Global Leaders Roundtable
 
Fame Universe Introduction
Fame Universe IntroductionFame Universe Introduction
Fame Universe Introduction
 
Metaverse Fashion Overview
Metaverse Fashion OverviewMetaverse Fashion Overview
Metaverse Fashion Overview
 
Global Metaverse Fashion Innovators Roadshow
Global Metaverse Fashion Innovators RoadshowGlobal Metaverse Fashion Innovators Roadshow
Global Metaverse Fashion Innovators Roadshow
 
NFT Financialization Overview
NFT Financialization OverviewNFT Financialization Overview
NFT Financialization Overview
 
Metaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business DevelopmentMetaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business Development
 
NFT Monetization Innovation Webinar
NFT Monetization Innovation WebinarNFT Monetization Innovation Webinar
NFT Monetization Innovation Webinar
 
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
 
NFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdfNFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdf
 
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform IntroductionFAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
 
NAVIGATING THE METAVERSE (Wiley) One Page Book Summary
NAVIGATING THE METAVERSE (Wiley)  One Page Book SummaryNAVIGATING THE METAVERSE (Wiley)  One Page Book Summary
NAVIGATING THE METAVERSE (Wiley) One Page Book Summary
 
FAME Universe Introduction
FAME Universe IntroductionFAME Universe Introduction
FAME Universe Introduction
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Cisco IoT R&D Insights from Patents

  • 1. 1 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ Cisco IoT R&D Insights from Patents Patents are a good information resource for obtaining IoT R&D status in a company. Followings are some examples of patents that provide Cisco IoT R&D status: connected car/ITS (intelligent transportation system), smart grid networks and wireless sensor networks. Connected Cars/ITS US20150029987 (SYSTEM AND METHOD FOR WIRELESS INTERFACE SELECTION AND FOR COMMUNICATION AND ACCESS CONTROL OF SUBSYSTEMS, DEVICES, AND DATA IN A VEHICULAR ENVIRONMENT; Cisco) Abstract: A method in one embodiment includes intercepting a message in an on-board unit (OBU) of a vehicular network environment between a source and a receiver in the vehicular network environment, verifying the message is sent from the source, verifying the message is not altered, evaluating a set of source flow control policies associated with the source, and blocking the message if the set of source flow control policies indicate the message is not permitted. In specific embodiments, the message is not permitted if a level of access assigned to the source in the set of source flow control policies does not match a level of access tagged on the message. In further
  • 2. 2 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ embodiments, the method includes evaluating a set of receiver flow control policies associated with the receiver, and blocking the message if the set of receiver flow control policies indicates the message is not permitted. Technology Details: Vehicles can be mobile across a large geographic area, can travel at various speeds, and can include more than one end user at a time desiring network connectivity. Additionally, vehicles also typically include multiple networking
  • 3. 3 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ technologies for enabling communications to and from machine devices (e.g., entertainment system, vehicle sensors, actuators, electronic control units, etc.) in the vehicle itself. Providing cost optimized, continuous external network connectivity in vehicular network environments presents significant challenges to system designers, automobile manufacturers, service providers, and the like. Furthermore, facilitating secure communication between disparate in-vehicle network subsystems and controlling information flow across vehicle applications and machine devices of the subsystems is desirable. A method is provided for selecting a wireless interface to establish or maintain network connectivity between an OBU 30 and an external network, thereby creating a "connected vehicle." The method includes evaluating parameters associated with wireless connectivity, including delay, power consumption, user preferences, location, time, application requirements, RSSI, BER, SNR, etc. In addition, cost-optimization may also be performed to determine the most cost efficient connectivity, which may be selected subject to defined policies by a user. The method also provides for seamless mobility management such that migration of a session from one wireless interface to another is virtually transparent to the user. Thus, automatic and continuous wireless connectivity to external networks is achieved, in which network interference is minimized and wireless access cost can be optimized. An interconnection device or central hub may be provided to interconnect internal network subsystems. A method is also provided for applying policy-based access control and segregation between the internal network subsystems,
  • 4. 4 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ in addition to access control between the internal network subsystems and the other internal vehicular networks and external networks. A method is provided for applying Information Flow Control (IFC) to data from internal network subsystems and applications processing such data, based on predefined policies associated with the data and access levels of an entity processing the data. A method is provided for providing Internet Protocol (IP) mapping information to the controller; establishing a network session between the electronic device and the remote node through the first wireless interface, wherein packets of the network session are routed through the controller; intercepting a first message in the electronic device being sent from a first source to a first receiver; evaluating one or more predefined policies to determine whether the first source is permitted to communicate with the first receiver; blocking the first message if the first source is not permitted to communicate with the first receiver, wherein a first subsystem of the vehicular network environment includes one of the first source and the first receiver; intercepting a second message in the electronic device being sent from a second source to a second receiver in the vehicular network environment; verifying the second message is sent from the second source; verifying the second message is not altered; evaluating a set of source flow control policies associated with the second source; and blocking the second message if the set of source flow control policies indicates the second message is not permitted. Related Patents: US2015015012 (Cloud-assisted threat defense for connected vehicles; Cisco)
  • 5. 5 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ Abstract: In an example embodiment herein, there is provided methods and a system for cloud-assisted threat defense for connected vehicles. A vehicle suitably includes an on-board computer system for operating and/or controlling various systems on the vehicle. The on-board computer system suitably operates in connection with or includes an on-board threat defense module for detecting and protecting against malware attacks and other security threats to the vehicle. In an example embodiment, a cloud-based security component or security cloud assists with the detection and protection against security threats and malware attacks to the vehicle while minimizing the processing load and memory requirements for the on-board threat defense module. US20100256846 (SYSTEM AND METHOD FOR MANAGING ELECTRIC VEHICLE TRAVEL; Cisco) Abstract: An apparatus is provided in one example embodiment and includes a power management module configured to receive data associated with travel being proposed by an end user of an electric vehicle. The power management module is configured to suggest a starting time for the travel based on time of use (ToU) rates for electricity consumption and a current level of power in the electric vehicle. In more specific embodiments, the data associated with the travel includes a starting location, an ending location, and a proposed drive time. In other embodiments, the power management module is further configured to interface with a mapping tool in suggesting the starting time for the end user. The power management module can be configured to obtain the ToU rates from a utility, and the ToU rates are provided as a function of time.
  • 6. 6 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ US20150222708 (SYSTEM AND METHOD FOR APPLICATIONS MANAGEMENT IN A NETWORKED VEHICULAR ENVIRONMENT; Cisco) Abstract: A method in one example embodiment includes identifying a power state and a battery level of a vehicle. The method also includes allocating power to critical applications (for example) in response to determining that the battery level is above a reserve threshold while the power state of the vehicle is engine-off. The method also includes allocating remaining power in excess of the reserve threshold to non-critical applications according to a power management policy. The power management policy may comprise at least one of a user power preference index and an application power preference index. US20140095058 (AD-HOC MOBILE IP NETWORK FOR INTELLIGENT TRANSPORTATION SYSTEM; Cisco) Abstract: A method and system for intelligently managing a transportation network are provided. The method includes dynamically establishing an ad hoc data communications network that includes vehicle nodes provided by respective vehicles in a transportation network. Behavior of one or more of the vehicles can be controlled remotely in response to automated traffic analysis performed based on real-time information received via the ad hoc network. Remote control of the one or more vehicles can include controlling vehicle motion by controlling vehicle subsystems via real-time command data transmitted to the respective vehicles via the ad hoc network.
  • 7. 7 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ Smart Grid Networks 20150200846 (DATA RATE SELECTION WITH PROACTIVE ROUTING IN SMART GRID NETWORKS; Cisco) Abstract: In one embodiment, a device communicates with one or more neighboring devices in a shared-media communication network using a default data rate. The device determines that the default data rate is not supported by a particular one of the neighboring devices. The particular neighboring device is then associated with a second data rate that has a lower data rate than the default data rate. The second data rate is then used to communicate with the particular neighboring device. Technology Details: Routing process contains computer executable instructions executed by the processor to perform functions provided by one or more routing protocols, such as proactive or reactive routing protocols. These functions may, on capable devices, be configured to manage a routing/forwarding table containing, e.g., data used to make routing/forwarding decisions. In particular, in proactive routing, connectivity is discovered and known prior to computing routes to any destination in the network, e.g., link state routing such as Open Shortest Path First (OSPF), or Intermediate-System-to-Intermediate-System (ISIS), or Optimized Link State Routing (OLSR). Reactive routing, on the other hand, discovers neighbors (i.e., does not have an a priori knowledge of network topology), and in response to a needed route to a destination, sends a route request into the network to determine which neighboring
  • 8. 8 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ node may be used to reach the desired destination. Example reactive routing protocols may comprise Ad-hoc On- demand Distance Vector (AODV), Dynamic Source Routing (DSR), DYnamic MANET On-demand Routing (DYMO), etc. Notably, on devices not capable or configured to store routing entries, routing process may consist solely of providing mechanisms necessary for source routing techniques. That is, for source routing, other devices in the network can tell the less capable devices exactly where to send the packets, and the less capable devices simply forward the packets as directed.
  • 9. 9 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ Smart Grid Networks for the advanced metering infrastructure (AMI) applications may be configured to use a proactive routing strategy instead of a reactive strategy. In other words, the network may be configured to proactively maintain routes for all devices using a low-rate, periodic reporting traffic model. In particular, the dominant traffic model for many devices in Smart Grid AMI networks is to periodically transmit messages towards the Field Area Router (FAR) with a relatively long period (e.g., every 30 minutes to several hours). Existing processes, such as the IEEE P1901.2 Adaptive Tone Mapping process, provide sub-optimal performance in these types of proactive routing systems. For example, such a low traffic rate may mean that the vast majority of traffic would be sent using ROBO mode. Furthermore, these types of packets would be sent with the TMREQ bit set, generating a TMREP providing transmission parameters that will be aged out before they are used again. Thus, the network would be wasting significant resources by sending data packets using ROBO mode and generating useless TMREP messages. The New techniques provide for a significant performance improvement over the data rate adaptation method currently proposed in IEEE P1901.2 for networks that rely on proactive routing. Unlike reactive networks, proactive networks are much better suited for low-rate periodic reporting that is typical in Smart Grid AMI networks. Low-rate periodic reporting does not offer significant opportunities to amortize the cost of a conservative approach that defaults to using the slowest data rate (e.g., using ROBO). Instead, network devices may default to using a high data rate to establish and maintain connectivity, only resorting to a low data rate when needed to
  • 10. 10 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ establish network connectivity. Accordingly, the number of low data rate transmissions and overhead of sending unneeded Tone Map Request/Reply messages is significantly reduced. Utilizing higher data rates also reduces channel utilization and collisions, especially due to the hidden terminal problem, resulting in a more effective network overall. Related Patents: US20140146816 (SYSTEM AND METHOD FOR PROVIDING SMART GRID COMMUNICATIONS AND MANAGEMENT; Cisco) Abstract: A method is provided in one example embodiment and includes receiving a request for a service that involves phasor measurement unit (PMU) data; identifying a service device in a network to perform the service; and multicasting one or more results of the service to a group of subscribers identified by a multicast group address. In more particular embodiments, particular PMU data is redirected to the service device via a service insertion architecture (SIA) protocol. In addition, the service can include replicating packets and masking a subset of traffic for forwarding to a first hop router of the network. In certain example instances, metadata is used in order to apply the service to certain traffic propagating in the network. US20120323381 (Security Measures for the Smart Grid; Cisco) Abstract: Security is enabled in an electrical system by examining a configuration file for a substation present in the electrical system, where the substation includes one or more electrical devices and one or more network devices.
  • 11. 11 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ Based on the examination of the configuration file, information is determined on a characteristic of an electrical device that is selected from a group including a type, allowed role of the electrical device and allowed communication modes for the electrical device. Based on the determined information, a basis for controlling the role and communication modes for the electrical device is identified. A security policy is configured in a network device in the substation to incorporate the identified basis. Based on the configured security policy in the network device, communication patterns for the electrical device are allowed that are associated with the allowed role and allowed communication modes for the electrical device. Wireless Sensor Networks US20150071255 (Sensor Data Transport and Consolidation Within Communication Nodes in a Network; Cisco) Abstract: In one embodiment, sensor data is transported in a network to a rendezvous point network node, which consolidates the information into a consolidated result which is communicated to the destination. Such consolidation by a network node reduces the number of paths required in the network between the sensors and the destination. One embodiment includes acquiring, by each of a plurality of originating nodes in a wireless deterministic network, external data related to a same physical event; communicating through the network said external data from each of the plurality of originating nodes to a rendezvous point network node (RP) within the network; processing, by the RP, said external data from each of the plurality of originating nodes to produce a
  • 12. 12 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ consolidated result; and communicating the consolidated result to a destination node of the network. In one embodiment, the network is a low power lossy network (LLN). Technology Details:
  • 13. 13 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ Deterministic networks rely on a set of predetermined time slots, which define at least a time (and possibly frequency to use especially in a wireless deterministic network), when each specific node can communicate a packet to a second specific node in the deterministic network. With reference to the figure in a time-slotted wireless deterministic network 200, one or more path computation engines (PCEs) 212 is used to compute the path (e.g., physical path and time slots) between each source S (sensor) 221-223 and the RP 251, and a single path from RP 251 to the destination (application host 211). PCE 212 computes the time slots and frequency channels used by each network hop, or some analogous abstraction that can be used by a more specific device to derive those. By advertisement, configuration or by other means (e.g., from a network management system), PCE 212 discovers all sources 221-223 that will be deriving and sending external data related to a same physical event (data that is not related to a communication node, but to an external event). PCE 212 also discovers one or more rendezvous points (RPs) 251 in network 200 that can be used to consolidate the multiple external data into a single consolidated result. PCE 212 discovers these rendezvous point(s) 251 by their advertisement, configuration or by other means (e.g., from a network management system). Extensions to Dynamic Host Configuration Protocol (DHCP) or Constrained Application Protocol (CoAP), or another protocol are used by network nodes to report to the PCE their nature (e.g., type of sensed data and location) and whether they could add an aggregator for the type of sensed data. Without consolidation by an RP in the network, there would need to be n independent paths determined and configured in the network to report the
  • 14. 14 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ external data of n sensors 221-223 to the destination 211. Using RP 251 to consolidate this n external data into a single consolidated result greatly reduces the communication overhead of the network. There are n paths to RP 251 from sensors 221-223 (one path for each sensor), and one path from RP 251 to destination 211. Related Patents: US20120026890 (Reporting Statistics on the Health of a Sensor Node in a Sensor Network; Cisco) Abstract: In one embodiment, a method includes generating a set of statistics concerning a sensor node in a sensor network based on one or more of sensor data from a sensor at the sensor node, communication to the sensor node from one or more other sensor nodes in the sensor network, or communication from the sensor node; determining based on a subset of the set of statistics whether a predetermined anomalous event correlated with the subset has occurred; and, if the predetermined anomalous event has occurred, generating a summary of the subset and communicating it to a police node in the sensor network. US20120197856 (Hierarchical Network for Collecting, Aggregating, Indexing, and Searching Sensor Data; Cisco) Abstract: In particular embodiments, a system includes a sensor-data-collection network layer including multiple sensors. The sensor-data-collection network layer is a first logical layer of a sensor network. The system includes an aggregation network layer including one or more aggregators configured to access sensor data from the sensors and aggregate the sensor data. The aggregation network layer is a second logical layer residing logically above the first logical layer. The system includes an indexing network layer including one or more indexers that are
  • 15. 15 ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ configured to access the aggregated sensor data and generate an index of the aggregated sensor data according to a multi-dimensional array. The indexing network layer is a third logical layer residing logically above the second logical layer. The system includes a search network layer including one or more search engines. The search network layer is a fourth logical layer residing logically above the third logical layer.