CONFIGURING RESOURCE-CONSTRAINED DEVICES IN A NETWORK

A method is performed by a first fog node of a plurality of fog nodes. In some implementations, the first fog node includes a non-transitory memory and one or more processors coupled with the non-transitory memory. In some implementations, the method includes maintaining a distributed ledger in coor...

Full description

Saved in:
Bibliographic Details
Main Authors BYERS, Charles Calvin, GANDHI, Biren, NANNRA, Anoop, PARELLO, John, JAGADEESAN, Ramanathan
Format Patent
LanguageEnglish
Published 06.02.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A method is performed by a first fog node of a plurality of fog nodes. In some implementations, the first fog node includes a non-transitory memory and one or more processors coupled with the non-transitory memory. In some implementations, the method includes maintaining a distributed ledger in coordination with the remaining fog nodes of the plurality of fog nodes. In some implementations, the distributed ledger stores configuration information associated with one or more devices. In some implementations, the method includes obtaining a request for configuration information from a device that breaches a resource threshold associated with the distributed ledger. In some implementations, the method includes transmitting, to the device, the configuration information associated with the device in order to allow the device to be configured in accordance with the configuration information while the device breaches the resource threshold associated with the distributed ledger.
Bibliography:Application Number: US201816056012