WO2017007497A1 - Location of object within network of objects - Google Patents

Location of object within network of objects Download PDF

Info

Publication number
WO2017007497A1
WO2017007497A1 PCT/US2015/055067 US2015055067W WO2017007497A1 WO 2017007497 A1 WO2017007497 A1 WO 2017007497A1 US 2015055067 W US2015055067 W US 2015055067W WO 2017007497 A1 WO2017007497 A1 WO 2017007497A1
Authority
WO
WIPO (PCT)
Prior art keywords
objects
computing device
network
metadata
geospatial location
Prior art date
Application number
PCT/US2015/055067
Other languages
French (fr)
Inventor
Nagaraj Sharanayya CHITTAPUR
Original Assignee
Hewlett Packard Enterprise Development Lp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Enterprise Development Lp filed Critical Hewlett Packard Enterprise Development Lp
Publication of WO2017007497A1 publication Critical patent/WO2017007497A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the Internet of Things is a network of physical objects embedded with components that allow each object to communicate with other connected objects and/or devices.
  • an object within the Internet of Things may receive data from and/or send data to a connected object or device.
  • FIG. 1 is a block diagram of an example system for managing the location of objects within a network of objects
  • FIG. 2 is a block diagram of an example computing device for managing the location of objects within a network of objects.
  • FIG. 3 is a flowchart of an example method for managing the location of objects within a network of objects.
  • the Internet of Things is a network of physical objects embedded with components that allow each object to communicate with other connected objects and/or devices.
  • physical objects such as thermostat devices, fans, smoke detectors, and the like, may be capable of communicating with a central computing device, such that the central computing device may manage the operation of those objects.
  • a central computing device such that the central computing device may manage the operation of those objects.
  • an object within the loT malfunctions or becomes missing, communication with that object may cease, and that object may need to be replaced.
  • Examples discussed herein provide techniques for managing the location of objects within a network of objects (e.g., within the loT).
  • an object within the loT may provide a central computing device with metadata associated with the object, such as data associated with the object's geospatial location, properties of the object, and the like.
  • a geospatial location of an object may refer to the object's position relative to the earth's surface (e.g., latitude, longitude, height, elevation above sea level, etc.).
  • Properties of an object may refer to any suitable properties and/or
  • the metadata may be stored in a central database and may be used to manage, update, restore, and/or replace objects.
  • the techniques disclosed herein may be part of, or may operate in conjunction with, a data backup application.
  • FIG. 1 is a block diagram of an example system 100 for managing the location of objects 102 within a network of objects.
  • System 100 may include computing device 104, which may be any suitable computing device managing any number of physical objects 102 within the loT.
  • Computing device 104 may include a processor 106 and an object management engine 108 that may be any suitable engine that may cause the processor 106 to manage the location of objects 102.
  • the object management engine 108 may be part of a data backup management application managed by computing device 104 and may manage and backup objects 102.
  • the object management engine 108 of computing device 104 may cause processor 106 to authenticate an object within a network of objects (e.g., one of the objects 102), where each object in the network of objects may be capable of communicating with the computing device.
  • the object may be authenticated using any suitable authentication techniques.
  • the object management engine 108 may cause processor 106 to send a request for metadata to the object and receive the metadata from the object in response to the request.
  • the metadata may include any suitable data associated with the object, such as geospatial location data of the object and property data associated with a property of the object.
  • the geospatial location data may include any suitable data indicating a geospatial location of the object, such as a latitude, a longitude, a height, an elevation above sea level, and the like.
  • the property data may include any suitable data associated with any properties of the object, such as a make and/or model of the object, a function associated with the object, and the like.
  • the object management engine 108 may cause processor 106 to store the metadata in database 110, where database 110 may be any suitable database having data associated with the network of objects.
  • the metadata stored in database 110 may be used to manage, backup, and/or restore data associated with objects 102 and/or to replace malfunctioning or missing objects.
  • processor 106 may determine that a particular event has occurred. For example, processor 106 may determine that an error or a catastrophic disaster has occurred that may affect objects 102. In response to determining that an event has occurred, processor 106 may ping each object 102 in the network of objects and may identify a subset of objects that are non-responsive to being pinged. For example, processor 106 may identify any objects that did not respond to the ping, as those objects may be malfunctioning and/or missing. In some examples, processor 106 may create a list of new objects that may be used to replace any objects that were non- responsive to being pinged.
  • database 110 may store a catalog of various functions of objects, where each function may be identified by a unique identifier.
  • the function of an old object to be replaced may be specified by metadata in database 110 via a corresponding unique identifier, and that identifier may be used to determine an appropriate replacement object.
  • processor 106 may determine a geospatial location for any objects that did not respond to being pinged. The geospatial locations for those objects may be determined by looking up the stored geospatial locations for the objects in database 110. Processor 106 may generate a map identifying the geospatial location of each of the objects that did not respond to the ping, and the map may be used to replace the potentially malfunctioning and/or missing objects with new objects in the same geospatial location.
  • processor 106 may authenticate the new object, identify a geospatial location of the new object, determine a geospatial location of the old object, and verify that the geospatial locations match (e.g., verify that the new object was placed in the same geospatial location as the old object). Additionally, processor 106 may access configuration data for the old object from database 110 and send the configuration data to the new object such that the new object may be configured to operate similarly to the old object.
  • Computing device 104 and objects 102 may be in communication with each other directly or over a network, which may be any suitable network, such as an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), a metropolitan area network (MAN), a portion of the Internet, a portion of the Public Switched Telephone Network (PSTN), a cellular telephone network, or any other type of network, or a combination of two or more such networks.
  • Each object 102 may be any suitable physical object having components that allow the object to
  • an object 102 may be a thermostat capable of transmitting its geospatial location to computing device 104.
  • FIG. 2 is a block diagram of an example computing device 200 for managing the location of objects within a network of objects.
  • Computing device 200 may be any suitable computing device (e.g., computing device 104 of FIG. 1) that may manage objects in the loT.
  • Computing device 200 may be, for example, a web-based server, a local area network server, a cloud-based server, a notebook computer, a desktop computer, an all-in-one system, a tablet computing device, a mobile phone, an electronic book reader, a printing device, or any other electronic device suitable for managing the location of objects within a network of objects.
  • Computing device 200 may include a processor 202 and a machine- readable storage medium 204.
  • Computing device 200 may be in
  • Processor 202 is a tangible hardware component that may be a central processing unit (CPU), a semiconductor-based microprocessor, and/or other hardware devices suitable for retrieval and execution of instructions stored in machine-readable storage medium 204.
  • Processor 202 may fetch, decode, and execute instructions 206, 208, and 210 to control a process of managing the location of objects within a network of objects.
  • processor 202 may include at least one electronic circuit that includes electronic components for performing the functionality of instructions 206, 208, 210, or a combination thereof.
  • Machine-readable storage medium 204 may be any electronic, magnetic, optical, or other physical storage device that contains or stores executable instructions.
  • machine-readable storage medium 204 may be, for example, Random Access Memory (RAM), an EPROM, an Electrically Erasable Programmable Read-Only Memory (EEPROM), a storage device, an optical disc, and the like.
  • machine-readable storage medium 204 may be a non-transitory storage medium, where the term "non- transitory" does not encompass transitory propagating signals.
  • machine-readable storage medium 204 may be encoded with a series of processor executable instructions 206, 208, and 210 for sending an authentication request to a first object within a network of objects, where each object in the network of objects is capable of communicating with the computing device 200; receiving, from the first object, an authentication response based on the authentication request; determining that the
  • authentication response is valid; sending a request for metadata to the first object; receiving the metadata from the first object in response to the request, the metadata including geospatial location data of the first object and property data associated with a property of the first object; and storing the metadata in a database having data associated with the network of objects.
  • Authentication instructions 206 may manage and control
  • authentication instructions 206 may send an authentication request to a first object within a network of objects, where each object in the network of objects is capable of communicating with the computing device 200.
  • Authentication instructions may receive an
  • the first object may exchange data with the computing device 200.
  • Metadata receipt instructions 208 may manage and control the receipt of metadata from objects in the loT. For example, metadata receipt instructions 208 may send a request for metadata to the first object and receive the metadata from the first object in response to the request.
  • the metadata may include any suitable data associated with the first object, such as geospatial location data of the first object (e.g., latitude, longitude, height, elevation above sea level, etc.) and property data associated with a property of the first object (e.g., a make and/or model of the first object, a function associated with the first object, etc.).
  • Database access instructions 210 may manage and control access to a database storing data associated with objects in the loT.
  • database access instructions 210 may store and retrieve metadata obtained by metadata receipt instructions 208.
  • machine-readable storage medium 204 may store processor executable instructions that may cause processor 202 to determine that a particular event has occurred, ping each object in the loT in response to the event, and identify any objects that are non-responsive to being pinged, as those objects may be determined to be malfunctioning and/or missing.
  • FIG. 3 is a flowchart of an example method 300 for managing the location of objects within a network of objects.
  • Method 300 may be implemented using computing device 200 of FIG. 2.
  • Method 300 includes, at 302, validating an authenticity of a first object within a network of objects, where each object in the network of objects is capable of communicating with the computing device managing the method 300.
  • the authenticity of the first object may be validated in any suitable manner using any suitable authentication techniques.
  • Method 300 also includes, at 304, requesting metadata associated with the first object. For example, a request for metadata may be sent to the first object.
  • Method 300 also includes, at 306, receiving the metadata from the first object in response to the request.
  • the metadata may include geospatial location data of the first object (e.g., latitude, longitude, height, elevation above sea level, etc.) and property data associated with a property of the first object (e.g., a make and/or model of the first object, a function associated with the first object, etc.).
  • Method 300 also includes, at 308, sending the metadata to a database having data associated with the network of objects.
  • the metadata may be used to manage the first object and replace the first object with new object if/when the first object malfunctions and/or becomes missing.
  • Example systems may include a controller/processor and memory resources for executing instructions stored in a tangible non-transitory medium (e.g., volatile memory, non-volatile memory, and/or machine-readable media).
  • a tangible non-transitory medium e.g., volatile memory, non-volatile memory, and/or machine-readable media.
  • Non-transitory machine-readable media can be tangible and have machine-readable instructions stored thereon that are executable by a processor to implement examples according to the present disclosure.
  • An example system can include and/or receive a tangible non- transitory machine-readable medium storing a set of machine-readable instructions (e.g., software).
  • the controller/processor can include one or a plurality of processors such as in a parallel processing system.
  • the memory can include memory addressable by the processor for execution of machine-readable instructions.
  • the machine-readable medium can include volatile and/or non-volatile memory such as a random access memory (“RAM”), magnetic memory such as a hard disk, floppy disk, and/or tape memory, a solid state drive (“SSD”), flash memory, phase change memory, and the like.
  • RAM random access memory
  • SSD solid state drive

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Example implementations relate to locations of objects within a network of objects. For example, a computing device may include a processor. The processor may authenticate a first object within a network of objects, where each object in the network of objects is capable of communicating with the computing device. The processor may send a request for metadata to the first object and may receive the metadata from the first object in response to the request. The metadata may include geospatial location data of the first object and property data associated with a property of the first object. The processor may store the metadata in a database having data associated with the network of objects.

Description

LOCATION OF OBJECT WITHIN NETWORK OF OBJECTS
BACKGROUND
[0001] The Internet of Things is a network of physical objects embedded with components that allow each object to communicate with other connected objects and/or devices. For example, an object within the Internet of Things may receive data from and/or send data to a connected object or device.
BRIEF DESCRIPTION OF THE DRAWINGS
[0002] Some examples of the present application are described with respect to the following figures:
[0003] FIG. 1 is a block diagram of an example system for managing the location of objects within a network of objects;
[0004] FIG. 2 is a block diagram of an example computing device for managing the location of objects within a network of objects; and
[0005] FIG. 3 is a flowchart of an example method for managing the location of objects within a network of objects.
DETAILED DESCRIPTION
[0006] As described above, the Internet of Things (loT) is a network of physical objects embedded with components that allow each object to communicate with other connected objects and/or devices. For example, physical objects, such as thermostat devices, fans, smoke detectors, and the like, may be capable of communicating with a central computing device, such that the central computing device may manage the operation of those objects. However, if an object within the loT malfunctions or becomes missing, communication with that object may cease, and that object may need to be replaced.
[0007] Examples discussed herein provide techniques for managing the location of objects within a network of objects (e.g., within the loT). For example, an object within the loT may provide a central computing device with metadata associated with the object, such as data associated with the object's geospatial location, properties of the object, and the like. A geospatial location of an object may refer to the object's position relative to the earth's surface (e.g., latitude, longitude, height, elevation above sea level, etc.).
Properties of an object may refer to any suitable properties and/or
characteristics associated with the object, such as a make and/or model of the object, a function associated with the object (e.g., object takes a temperature every hour), and the like. The metadata may be stored in a central database and may be used to manage, update, restore, and/or replace objects. In some examples, the techniques disclosed herein may be part of, or may operate in conjunction with, a data backup application.
[0008] Referring now to the figures, FIG. 1 is a block diagram of an example system 100 for managing the location of objects 102 within a network of objects. System 100 may include computing device 104, which may be any suitable computing device managing any number of physical objects 102 within the loT. Computing device 104 may include a processor 106 and an object management engine 108 that may be any suitable engine that may cause the processor 106 to manage the location of objects 102. In some examples, the object management engine 108 may be part of a data backup management application managed by computing device 104 and may manage and backup objects 102.
[0009] For example, the object management engine 108 of computing device 104 may cause processor 106 to authenticate an object within a network of objects (e.g., one of the objects 102), where each object in the network of objects may be capable of communicating with the computing device. The object may be authenticated using any suitable authentication techniques. The object management engine 108 may cause processor 106 to send a request for metadata to the object and receive the metadata from the object in response to the request. The metadata may include any suitable data associated with the object, such as geospatial location data of the object and property data associated with a property of the object. The geospatial location data may include any suitable data indicating a geospatial location of the object, such as a latitude, a longitude, a height, an elevation above sea level, and the like. The property data may include any suitable data associated with any properties of the object, such as a make and/or model of the object, a function associated with the object, and the like. The object management engine 108 may cause processor 106 to store the metadata in database 110, where database 110 may be any suitable database having data associated with the network of objects. The metadata stored in database 110 may be used to manage, backup, and/or restore data associated with objects 102 and/or to replace malfunctioning or missing objects.
[0010] In some examples, processor 106 may determine that a particular event has occurred. For example, processor 106 may determine that an error or a catastrophic disaster has occurred that may affect objects 102. In response to determining that an event has occurred, processor 106 may ping each object 102 in the network of objects and may identify a subset of objects that are non-responsive to being pinged. For example, processor 106 may identify any objects that did not respond to the ping, as those objects may be malfunctioning and/or missing. In some examples, processor 106 may create a list of new objects that may be used to replace any objects that were non- responsive to being pinged. This may be performed by identifying the function of each object to be replaced (e.g., as specified by metadata in database 110 for each non-responsive object) and determining a new object that is capable of performing the identified function. For example, database 110 may store a catalog of various functions of objects, where each function may be identified by a unique identifier. The function of an old object to be replaced may be specified by metadata in database 110 via a corresponding unique identifier, and that identifier may be used to determine an appropriate replacement object.
[0011] In some examples, processor 106 may determine a geospatial location for any objects that did not respond to being pinged. The geospatial locations for those objects may be determined by looking up the stored geospatial locations for the objects in database 110. Processor 106 may generate a map identifying the geospatial location of each of the objects that did not respond to the ping, and the map may be used to replace the potentially malfunctioning and/or missing objects with new objects in the same geospatial location. Once an old object is replaced with a new object, processor 106 may authenticate the new object, identify a geospatial location of the new object, determine a geospatial location of the old object, and verify that the geospatial locations match (e.g., verify that the new object was placed in the same geospatial location as the old object). Additionally, processor 106 may access configuration data for the old object from database 110 and send the configuration data to the new object such that the new object may be configured to operate similarly to the old object.
[0012] Computing device 104 and objects 102 may be in communication with each other directly or over a network, which may be any suitable network, such as an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), a metropolitan area network (MAN), a portion of the Internet, a portion of the Public Switched Telephone Network (PSTN), a cellular telephone network, or any other type of network, or a combination of two or more such networks. Each object 102 may be any suitable physical object having components that allow the object to
communicate with computing device 104. For example, an object 102 may be a thermostat capable of transmitting its geospatial location to computing device 104.
[0013] FIG. 2 is a block diagram of an example computing device 200 for managing the location of objects within a network of objects. Computing device 200 may be any suitable computing device (e.g., computing device 104 of FIG. 1) that may manage objects in the loT.
[0014] Computing device 200 may be, for example, a web-based server, a local area network server, a cloud-based server, a notebook computer, a desktop computer, an all-in-one system, a tablet computing device, a mobile phone, an electronic book reader, a printing device, or any other electronic device suitable for managing the location of objects within a network of objects. Computing device 200 may include a processor 202 and a machine- readable storage medium 204. Computing device 200 may be in
communication with objects in the loT and may manage and store metadata associated with those objects. [0015] Processor 202 is a tangible hardware component that may be a central processing unit (CPU), a semiconductor-based microprocessor, and/or other hardware devices suitable for retrieval and execution of instructions stored in machine-readable storage medium 204. Processor 202 may fetch, decode, and execute instructions 206, 208, and 210 to control a process of managing the location of objects within a network of objects. As an
alternative or in addition to retrieving and executing instructions, processor 202 may include at least one electronic circuit that includes electronic components for performing the functionality of instructions 206, 208, 210, or a combination thereof.
[0016] Machine-readable storage medium 204 may be any electronic, magnetic, optical, or other physical storage device that contains or stores executable instructions. Thus, machine-readable storage medium 204 may be, for example, Random Access Memory (RAM), an EPROM, an Electrically Erasable Programmable Read-Only Memory (EEPROM), a storage device, an optical disc, and the like. In some examples, machine-readable storage medium 204 may be a non-transitory storage medium, where the term "non- transitory" does not encompass transitory propagating signals. As described in detail below, machine-readable storage medium 204 may be encoded with a series of processor executable instructions 206, 208, and 210 for sending an authentication request to a first object within a network of objects, where each object in the network of objects is capable of communicating with the computing device 200; receiving, from the first object, an authentication response based on the authentication request; determining that the
authentication response is valid; sending a request for metadata to the first object; receiving the metadata from the first object in response to the request, the metadata including geospatial location data of the first object and property data associated with a property of the first object; and storing the metadata in a database having data associated with the network of objects.
[0017] Authentication instructions 206 may manage and control
authentication of objects in the loT using any suitable authentication techniques. For example, authentication instructions 206 may send an authentication request to a first object within a network of objects, where each object in the network of objects is capable of communicating with the computing device 200. Authentication instructions may receive an
authentication response from the first object based on the authentication request and determine whether the authentication response is valid. If the authentication response is valid, the first object may exchange data with the computing device 200.
[0018] Metadata receipt instructions 208 may manage and control the receipt of metadata from objects in the loT. For example, metadata receipt instructions 208 may send a request for metadata to the first object and receive the metadata from the first object in response to the request. The metadata may include any suitable data associated with the first object, such as geospatial location data of the first object (e.g., latitude, longitude, height, elevation above sea level, etc.) and property data associated with a property of the first object (e.g., a make and/or model of the first object, a function associated with the first object, etc.).
[0019] Database access instructions 210 may manage and control access to a database storing data associated with objects in the loT. For example, database access instructions 210 may store and retrieve metadata obtained by metadata receipt instructions 208.
[0020] In some examples, machine-readable storage medium 204 may store processor executable instructions that may cause processor 202 to determine that a particular event has occurred, ping each object in the loT in response to the event, and identify any objects that are non-responsive to being pinged, as those objects may be determined to be malfunctioning and/or missing.
[0021] FIG. 3 is a flowchart of an example method 300 for managing the location of objects within a network of objects. Method 300 may be implemented using computing device 200 of FIG. 2.
[0022] Method 300 includes, at 302, validating an authenticity of a first object within a network of objects, where each object in the network of objects is capable of communicating with the computing device managing the method 300. The authenticity of the first object may be validated in any suitable manner using any suitable authentication techniques.
[0023] Method 300 also includes, at 304, requesting metadata associated with the first object. For example, a request for metadata may be sent to the first object.
[0024] Method 300 also includes, at 306, receiving the metadata from the first object in response to the request. The metadata may include geospatial location data of the first object (e.g., latitude, longitude, height, elevation above sea level, etc.) and property data associated with a property of the first object (e.g., a make and/or model of the first object, a function associated with the first object, etc.).
[0025] Method 300 also includes, at 308, sending the metadata to a database having data associated with the network of objects. The metadata may be used to manage the first object and replace the first object with new object if/when the first object malfunctions and/or becomes missing.
[0026] Examples provided herein (e.g., methods) may be implemented in hardware, software, or a combination of both. Example systems may include a controller/processor and memory resources for executing instructions stored in a tangible non-transitory medium (e.g., volatile memory, non-volatile memory, and/or machine-readable media). Non-transitory machine-readable media can be tangible and have machine-readable instructions stored thereon that are executable by a processor to implement examples according to the present disclosure.
[0027] An example system can include and/or receive a tangible non- transitory machine-readable medium storing a set of machine-readable instructions (e.g., software). As used herein, the controller/processor can include one or a plurality of processors such as in a parallel processing system. The memory can include memory addressable by the processor for execution of machine-readable instructions. The machine-readable medium can include volatile and/or non-volatile memory such as a random access memory ("RAM"), magnetic memory such as a hard disk, floppy disk, and/or tape memory, a solid state drive ("SSD"), flash memory, phase change memory, and the like.

Claims

Claims What is claimed is:
1. A computing device, comprising:
a processor to:
authenticate a first object within a network of objects, wherein each object in the network of objects is capable of communicating with the computing device;
send a request for metadata to the first object;
receive the metadata from the first object in response to the request, the metadata including geospatial location data of the first object and property data associated with a property of the first object; and
store the metadata in a database having data associated with the network of objects.
2. The computing device of claim 1 , wherein the geospatial location data includes at least one of a latitude, a longitude, and a height.
3. The computing device of claim 1 , wherein the property data includes at least one of a make associated with the first object, a model associated with the first object, and a function associated with the first object.
4. The computing device of claim 1 , wherein the processor is further to:
determine that an event has occurred;
ping each object in the network of objects in response to the event; and identify a subset of objects that are non-responsive to being pinged.
5. The computing device of claim 4, wherein the processor is further to:
determine a geospatial location of each object in the subset of objects using the data stored in the database; and generate a map identifying the geospatial location of each object in the subset of objects.
6. The computing device of claim 4, wherein the processor is further to:
determine that a second object in the subset of objects has been replaced with a new object;
identify a geospatial location of the new object;
determine a geospatial location associated with the second object using the data stored in the database; and
verify that the geospatial location of the new object matches the geospatial location of the second object.
7. The computing device of claim 6, wherein the processor is further to:
access, from the database, configuration data associated with the second object; and
send the configuration data to the new object.
8. A method, comprising:
validating, by a computing device, an authenticity of a first object within a network of objects, wherein each object in the network of objects is capable of communicating with the computing device;
requesting, by the computing device, metadata associated with the first object;
receiving, by the computing device, the metadata from the first object in response to the requesting, the metadata including geospatial location data of the first object and property data associated with a property of the first object; and
sending, by the computing device, the metadata to a database having data associated with the network of objects.
9. The method of claim 8, further comprising:
determining, by the computing device, that an event has occurred; pinging, by the computing device, each object in the network of objects in response to the event; and
identifying, by the computing device, a subset of objects that are non- responsive to being pinged.
10. The method of claim 9, further comprising:
determining, by the computing device, a geospatial location of each object in the subset of objects using the data stored in the database; and generating, by the computing device, a map identifying the geospatial location of each object in the subset of objects.
11. The method of claim 9, further comprising:
determining, by the computing device, that a second object in the subset of objects has been replaced with a new object;
identifying, by the computing device, a geospatial location of the new object;
determining, by the computing device, a geospatial location associated with the second object using the data stored in the database; and
verifying, by the computing device, that the geospatial location of the new object matches the geospatial location of the second object.
12. A non-transitory machine-readable storage medium storing instructions that, when executed by at least one processor of a computing device, cause the computing device to:
send an authentication request to a first object within a network of objects, wherein each object in the network of objects is capable of communicating with the computing device;
receive, from the first object, an authentication response based on the authentication request;
determine that the authentication response is valid;
send a request for metadata to the first object; receive the metadata from the first object in response to the request, the metadata including geospatial location data of the first object and property data associated with a property of the first object; and
store the metadata in a database having data associated with the network of objects.
13. The non-transitory machine-readable storage medium of claim 12, wherein the geospatial location data includes at least one of a latitude, a longitude, and a height.
14. The non-transitory machine-readable storage medium of claim 12, wherein the property data includes at least one of a make associated with the first object, a model associated with the first object, and a function associated with the first object.
15. The non-transitory machine-readable storage medium of claim 12, wherein the instructions further cause the computing device to:
determine that an event has occurred;
ping each object in the network of objects in response to the event; and identify a subset of objects that are non-responsive to being pinged.
PCT/US2015/055067 2015-07-08 2015-10-12 Location of object within network of objects WO2017007497A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN3486/CHE/2015 2015-07-08
IN3486CH2015 2015-07-08

Publications (1)

Publication Number Publication Date
WO2017007497A1 true WO2017007497A1 (en) 2017-01-12

Family

ID=57685589

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/055067 WO2017007497A1 (en) 2015-07-08 2015-10-12 Location of object within network of objects

Country Status (1)

Country Link
WO (1) WO2017007497A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2482488A1 (en) * 2010-01-28 2012-08-01 ZTE Corporation Method and system for authorizing management of terminals of internet of things
US20140059695A1 (en) * 2012-08-24 2014-02-27 Environmental Systems Research Institute (ESRI) Systems and methods for managing location data and providing a privacy framework
US20140244710A1 (en) * 2013-02-25 2014-08-28 Qualcomm Incorporated Context aware actions among heterogeneous internet of things (iot) devices
WO2015006044A2 (en) * 2013-07-11 2015-01-15 Neura, Inc. Data consolidation mechanisms for internet of things integration platform
US20150134954A1 (en) * 2013-11-14 2015-05-14 Broadcom Corporation Sensor management system in an iot network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2482488A1 (en) * 2010-01-28 2012-08-01 ZTE Corporation Method and system for authorizing management of terminals of internet of things
US20140059695A1 (en) * 2012-08-24 2014-02-27 Environmental Systems Research Institute (ESRI) Systems and methods for managing location data and providing a privacy framework
US20140244710A1 (en) * 2013-02-25 2014-08-28 Qualcomm Incorporated Context aware actions among heterogeneous internet of things (iot) devices
WO2015006044A2 (en) * 2013-07-11 2015-01-15 Neura, Inc. Data consolidation mechanisms for internet of things integration platform
US20150134954A1 (en) * 2013-11-14 2015-05-14 Broadcom Corporation Sensor management system in an iot network

Similar Documents

Publication Publication Date Title
US11657171B2 (en) Large network attached storage encryption
KR101956486B1 (en) Method and system for facilitating terminal identifiers
US10567542B2 (en) Method for state based snapshot difference with restart capability
US10013306B2 (en) Data recovery agent and search service for repairing bit rot
US11399014B2 (en) System and method of obtaining data from private cloud behind enterprise firewall
US9736262B2 (en) Using groups of user accounts to deliver content to electronic devices using local caching servers
US9930112B2 (en) Maintaining system firmware images remotely using a distribute file system protocol
US9891973B2 (en) Data storage system durability using hardware failure risk indicators
US10503718B2 (en) Parallel transfers of electronic data
US20170364406A1 (en) Security patch tool
WO2015116197A1 (en) Storing data based on a write allocation policy
KR101663526B1 (en) Storage integrating method and system using file system
US11119866B2 (en) Method and system for intelligently migrating to a centralized protection framework
US20130219061A1 (en) Cloud computing device and distributed data management method
EP3080717A1 (en) Cache and non-cache usage in a distributed storage system
US10924452B1 (en) Auditing IP address assignments
US9684668B1 (en) Systems and methods for performing lookups on distributed deduplicated data systems
WO2019205133A1 (en) Vpn line handover method, apparatus and electronic device
US10348705B1 (en) Autonomous communication protocol for large network attached storage
US9560027B1 (en) User authentication
US20120246285A1 (en) Management system, management apparatus, management method, and non-transitory computer readable medium storing control program
WO2017007497A1 (en) Location of object within network of objects
US10338845B1 (en) Self-erasing portable storage devices
US20180052743A1 (en) Disaster recovery tool
US20210103598A1 (en) Managing persistent handle information for a file

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15897888

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15897888

Country of ref document: EP

Kind code of ref document: A1