Systems and methods for charging vehicles includes at least one mobile device and a utility network management center (“NMC”). The at least one mobile device is configured as an electronic utility device and includes a network interface card (“NIC”). The at least one mobile device is also associated with a utility billing account and at least one utility commodity meter. The utility NMC is configured to communicate with the at least one mobile device and the at least one utility commodity meter over a network, locate the at least one mobile device, and monitor a state of the at least one utility commodity meter. The utility NMC is also configured to determine a usage of a commodity based on the state of the at least one utility commodity meter and bill the utility billing account associated with the mobile device for the usage of the commodity.
G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
H04L 69/167 - Adaptation for transition between two IP versions, e.g. between IPv4 and IPv6
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
A battery-powered node includes a primary cell, a secondary cell, and a battery controller. The battery controller includes a current source that draws power from the primary cell to charge the secondary cell. The battery-powered node draws power from the secondary cell across a wide range of current levels. When the voltage of the secondary cell drops beneath a minimum voltage level, the current source charges the secondary cell at a constant current level and a charging signal is sent to the battery-powered node. When the voltage of the second cell exceeds a maximum voltage level, the current source stops charging the secondary cell and the charging signal is terminated. The battery-powered node records the amount of time the charging signal is active, which can be used to determine a battery depletion level for the primary cell. Battery replacement may then be efficiently scheduled based on the depletion level.
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
H01M 10/48 - Accumulators combined with arrangements for measuring, testing or indicating the condition of cells, e.g. the level or density of the electrolyte
A power system within a battery-powered node includes a primary cell, a secondary cell, and a battery controller. The battery controller includes a constant current source that draws power from the primary cell to charge the secondary cell. The battery-powered node draws power from the secondary cell across a wide range of current levels. When the voltage of the secondary cell drops beneath a minimum voltage level, the constant current source charges the secondary cell and a charging signal is sent to the battery-powered node. When the voltage of the second cell exceeds a maximum voltage level, the constant current source stops charging the secondary cell and the charging signal is terminated. The battery-powered node records the amount of time the charging signal is active and then determines a battery depletion level based on that amount of time. Battery replacement may then be efficiently scheduled based on the depletion level.
H02J 7/02 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries for charging batteries from ac mains by converters
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
H01M 10/48 - Accumulators combined with arrangements for measuring, testing or indicating the condition of cells, e.g. the level or density of the electrolyte
A node in network is configured to buffer data received from other nodes across multiple channels. The node process a portion of the buffered data associated with a subset of those channels. When the node receives data on that subset of channels that includes a notification, the node then processes a larger portion of the buffered data associated with a larger number of channels. In doing so, the node may identify additional notifications include within data that was buffered but not previously processed. The node may also coordinate with other nodes in order to process buffered data upon identification of a notification.
A central controller is configured to obtain a scan of a quick response (QR) code affixed to an internet-of-things (IoT) device. The central controller decodes the QR code to extract various operating parameters associated with the IoT device. The central controller then provisions a device controller for coordinating operation of the IoT device. The central controller configures the device controller based on the operating parameters, thereby allowing the device controller to coordinate operations of the IoT device in a device-specific manner. The central controller may then install the device controller on the IoT device, or cause the device controller to coordinate IoT device operations across a network. With this approach, a technician is no longer required to manually obtain IoT device operating parameters or input those parameters to a central controller, thereby streamlining the IoT device installation process.
H04L 41/08 - Configuration management of networks or network elements
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
H04L 67/00 - Network arrangements or protocols for supporting network services or applications
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
H05B 47/19 - Controlling the light source by remote control via wireless transmission
G06K 7/14 - Methods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
6.
Method and system for communicating between private mesh network and public network
A network node (MR/BR node) is configured as a mesh router node in a first wireless network comprised of a plurality of first nodes and as a border router node in a second wireless network comprised of a plurality of second nodes, the second wireless network distinct from the first wireless network. The MR/BR node has a unique first address in the first wireless network and a unique second address in the second wireless network. In this way, the MR/BR node can receive a first communication in the first wireless network via the first address, and transmit the received first communication to at least one of the second nodes in the second wireless network. The MR/BR node can also receive a second communication in the second wireless network via the second address, and transmit the received second communication to at least one of the first nodes in the first wireless network.
A battery-powered node within a wireless mesh network performs energy-aware packet routing based on multiple factors. The battery powered node computes, for a given link to an adjacent node, the energy needed to transmit a packet to the adjacent node. The battery-powered node also determines the amount of battery energy remaining in the adjacent node. Based on these two factors, the battery powered node computes a link cost associated with the link to the adjacent node. The battery-powered node performs a similar computation for all adjacent nodes and then forwards packets via these adjacent nodes based on the associated link costs. The battery-powered node also maintains a table of routes through adjacent nodes, and reroutes packets through different adjacent nodes in response to link failures.
H04W 40/10 - Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources based on available power or energy
H04W 40/22 - Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
A battery-powered node within a wireless mesh network performs energy-aware packet routing based on multiple factors. The battery powered node computes, for a given link to an adjacent node, the energy needed to transmit a packet to the adjacent node. The battery-powered node also determines the amount of battery energy remaining in the adjacent node. Based on these two factors, the battery powered node computes a link cost associated with the link to the adjacent node. The battery-powered node performs a similar computation for all adjacent nodes and then forwards packets via these adjacent nodes based on the associated link costs. The battery-powered node also maintains a table of routes through adjacent nodes, and reroutes packets through different adjacent nodes in response to link failures.
H04W 40/10 - Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources based on available power or energy
H04W 40/22 - Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
A battery-powered node within a wireless mesh network performs energy-aware packet routing based on multiple factors. The battery powered node computes, for a given link to an adjacent node, the energy needed to transmit a packet to the adjacent node. The battery-powered node also determines the amount of battery energy remaining in the adjacent node. Based on these two factors, the battery powered node computes a link cost associated with the link to the adjacent node. The battery-powered node performs a similar computation for all adjacent nodes and then forwards packets via these adjacent nodes based on the associated link costs. The battery-powered node also maintains a table of routes through adjacent nodes, and reroutes packets through different adjacent nodes in response to link failures.
H04W 40/10 - Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources based on available power or energy
H04L 12/707 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy
H04L 12/703 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP]
H04L 12/721 - Routing procedures, e.g. shortest path routing, source routing, link state routing or distance vector routing
A battery-powered node within a wireless mesh network performs energy-aware packet routing based on multiple factors. The battery powered node computes, for a given link to an adjacent node, the energy needed to transmit a packet to the adjacent node. The battery-powered node also determines the amount of battery energy remaining in the adjacent node. Based on these two factors, the battery powered node computes a link cost associated with the link to the adjacent node. The battery-powered node performs a similar computation for all adjacent nodes and then forwards packets via these adjacent nodes based on the associated link costs. The battery-powered node also maintains a table of routes through adjacent nodes, and reroutes packets through different adjacent nodes in response to link failures.
H04J 3/16 - Time-division multiplex systems in which the time allocation to individual channels within a transmission cycle is variable, e.g. to accommodate varying complexity of signals, to vary number of channels transmitted
H04W 40/10 - Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources based on available power or energy
H04L 12/721 - Routing procedures, e.g. shortest path routing, source routing, link state routing or distance vector routing
A battery powered node within a wireless mesh network maintains a mapping between temperature and oscillator drift and compensates for oscillator drift based on this mapping. When the mapping includes insufficient data points to map the current temperature to an oscillator drift value, the battery powered node requests calibration packets from an adjacent upstream node in the network. The adjacent node transmits two calibration packets with a transmit time delta and also indicates this time delta in the first calibration packet. The battery powered node receives the two calibration packets and measures the receive time delta. The battery powered node compares the transmit time delta to the receive time delta to determine oscillator drift compared to an oscillator in the adjacent node. The battery powered node then updates the mapping based on the current temperature and determined oscillator drift.
A battery powered node within a wireless mesh network maintains a mapping between temperature and oscillator drift and compensates for oscillator drift based on this mapping. When the mapping includes insufficient data points to map the current temperature to an oscillator drift value, the battery powered node requests calibration packets from an adjacent upstream node in the network. The adjacent node transmits two calibration packets with a transmit time delta and also indicates this time delta in the first calibration packet. The battery powered node receives the two calibration packets and measures the receive time delta. The battery powered node compares the transmit time delta to the receive time delta to determine oscillator drift compared to an oscillator in the adjacent node. The battery powered node then updates the mapping based on the current temperature and determined oscillator drift.
H04L 27/152 - Demodulator circuits; Receiver circuits with demodulation using spectral properties of the received signal, e.g. by using frequency selective- or frequency sensitive elements using controlled oscillators, e.g. PLL arrangements
H04W 48/16 - Discovering; Processing access restriction or access information
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
13.
COMPENSATING FOR OSCILLATOR DRIFT IN WIRELESS MESH NETWORKS
A battery powered node within a wireless mesh network maintains a mapping between temperature and oscillator drift and compensates for oscillator drift based on this mapping. When the mapping includes insufficient data points to map the current temperature to an oscillator drift value, the battery powered node requests calibration packets from an adjacent upstream node in the network. The adjacent node transmits two calibration packets with a transmit time delta and also indicates this time delta in the first calibration packet. The battery powered node receives the two calibration packets and measures the receive time delta. The battery powered node compares the transmit time delta to the receive time delta to determine oscillator drift compared to an oscillator in the adjacent node. The battery powered node then updates the mapping based on the current temperature and determined oscillator drift.
G08C 15/00 - Arrangements characterised by the use of multiplexing for the transmission of a plurality of signals over a common path
G08C 19/16 - Electric signal transmission systems in which transmission is by pulses
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
H04L 7/033 - Speed or phase control by the received code signals, the signals containing no special synchronisation information using the transitions of the received signal to control the phase of the synchronising-signal- generating means, e.g. using a phase-locked loop
14.
METHOD AND SYSTEM FOR COMMUNICATING BETWEEN PRIVATE MESH NETWORK AND PUBLIC NETWORK
A wireless communication system includes a first wireless network having first nodes each assigned a unique first address, a second wireless network having second nodes each assigned a unique second address, a border router node constituting an interface between the second network and a third wireless network, and at least one access point constituting an interface between the first and third networks. At least one of the first nodes is a mesh router node in the first network and a border router node in the second network (MR/BR node). The MR/BR node has unique addresses respectively assigned in the first and second networks. The MR/BR node receives a communication in the first network and transmits it to at least one second node in the second network. The MR/BR node receives a communication in the second network and transmits it to at least one first node in the first network.
A wireless communication system includes a first wireless network having first nodes each assigned a unique first address, a second wireless network having second nodes each assigned a unique second address, a border router node constituting an interface between the second network and a third wireless network, and at least one access point constituting an interface between the first and third networks. At least one of the first nodes is a mesh router node in the first network and a border router node in the second network (MR/BR node). The MR/BR node has unique addresses respectively assigned in the first and second networks. The MR/BR node receives a communication in the first network and transmits it to at least one second node in the second network. The MR/BR node receives a communication in the second network and transmits it to at least one first node in the first network.
A battery powered node within a wireless mesh network maintains a mapping between temperature and oscillator drift and compensates for oscillator drift based on this mapping. When the mapping includes insufficient data points to map the current temperature to an oscillator drift value, the battery powered node requests calibration packets from an adjacent upstream node in the network. The adjacent node transmits two calibration packets with a transmit time delta and also indicates this time delta in the first calibration packet. The battery powered node receives the two calibration packets and measures the receive time delta. The battery powered node compares the transmit time delta to the receive time delta to determine oscillator drift compared to an oscillator in the adjacent node. The battery powered node then updates the mapping based on the current temperature and determined oscillator drift.
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
G08C 15/00 - Arrangements characterised by the use of multiplexing for the transmission of a plurality of signals over a common path
G08C 19/16 - Electric signal transmission systems in which transmission is by pulses
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
17.
METHOD AND SYSTEM FOR COMMUNICATING BETWEEN PRIVATE MESH NETWORK AND PUBLIC NETWORK
A wireless communication system includes a first wireless network having first nodes each assigned a unique first address, a second wireless network having second nodes each assigned a unique second address, a border router node constituting an interface between the second network and a third wireless network, and at least one access point constituting an interface between the first and third networks. At least one of the first nodes is a mesh router node in the first network and a border router node in the second network (MR/BR node). The MR/BR node has unique addresses respectively assigned in the first and second networks. The MR/BR node receives a communication in the first network and transmits it to at least one second node in the second network. The MR/BR node receives a communication in the second network and transmits it to at least one first node in the first network.
A communications device has a first communications port via which secure messages are received, and a second communications port via which non-secure messages are received. In response to detecting that a secure message has been received, the device determines whether the second communications port is in a state that enables non-secure messages to be received. If the second communications port is in the enabled state, the device autonomously disables the second communications port to preclude non-secure messages received at that port from being processed.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/74 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
A central controller is configured to obtain a scan of a quick response (QR) code affixed to an internet-of-things (IoT) device. The central controller decodes the QR code to extract various operating parameters associated with the IoT device. The central controller then provisions a device controller for coordinating operation of the IoT device. The central controller configures the device controller based on the operating parameters, thereby allowing the device controller to coordinate operations of the IoT device in a device-specific manner. The central controller may then install the device controller on the IoT device, or cause the device controller to coordinate IoT device operations across a network. With this approach, a technician is no longer required to manually obtain IoT device operating parameters or input those parameters to a central controller, thereby streamlining the IoT device installation process.
A central controller is configured to obtain a scan of a quick response (QR) code affixed to an internet-of-things (IoT) device. The central controller decodes the QR code to extract various operating parameters associated with the IoT device. The central controller then provisions a device controller for coordinating operation of the IoT device. The central controller configures the device controller based on the operating parameters, thereby allowing the device controller to coordinate operations of the IoT device in a device-specific manner. The central controller may then install the device controller on the IoT device, or cause the device controller to coordinate IoT device operations across a network. With this approach, a technician is no longer required to manually obtain IoT device operating parameters or input those parameters to a central controller, thereby streamlining the IoT device installation process.
A wireless mesh network includes a mesh of continuously-powered devices (CPDs) and a mesh of battery-powered devices (BPDs). The BPDs are organized into hop layers based on hopping distance to the mesh of CPDs. The CPDs transmit time beacons to BPDs in a first hop layer during a first receive window associated with the first hop layer. The BPDs in the first hop layer then transmit time beacons to BPDs in a second hop layer during a second receive window. In this manner, the wireless mesh network propagates time values throughout the BPD mesh. Based on these time values, the BPDs power on during short time intervals to exchange data with neighboring BPDs, and then power off for longer time intervals, thereby conserving battery power. The techniques described herein for conserving battery power for BPDs may also be applied to conserve power consumption of CPDs.
A wireless mesh network includes a mesh of continuously-powered devices (CPDs) and a mesh of battery-powered devices (BPDs). The BPDs are organized into hop layers based on hopping distance to the mesh of CPDs. The CPDs transmit time beacons to BPDs in a first hop layer during a first receive window associated with the first hop layer. The BPDs in the first hop layer then transmit time beacons to BPDs in a second hop layer during a second receive window. In this manner, the wireless mesh network propagates time values throughout the BPD mesh. Based on these time values, the BPDs power on during short time intervals to exchange data with neighboring BPDs, and then power off for longer time intervals, thereby conserving battery power. The techniques described herein for conserving battery power for BPDs may also be applied to conserve power consumption of CPDs.
A wireless mesh network includes a mesh of continuously-powered devices (CPDs) and a mesh of battery-powered devices (BPDs). The BPDs are organized into hop layers based on hopping distance to the mesh of CPDs. In a medium latency communication mode, a given BPD receives data during a receive window that is scheduled to occur within either the first half of a communication window or the second half of the communication window, depending on the parity of the hop layer where the BPD resides. With this approach, a data packet can traverse one hop of the BPD mesh per communication window. In a low-latency communication mode, a given BPD receives and transmits data according to an alternating pattern that depends on the parity of the hop layer where the node resides. With this technique, a data packet can traverse multiple hops of the BPD mesh within a single communication window. These techniques also are applicable to CPDs and other types of nodes as well.
A wireless mesh network includes a mesh of continuously-powered devices (CPDs) and a mesh of battery-powered devices (BPDs). The BPDs are organized into hop layers based on hopping distance to the mesh of CPDs. In a medium latency communication mode, a given BPD receives data during a receive window that is scheduled to occur within either the first half of a communication window or the second half of the communication window, depending on the parity of the hop layer where the BPD resides. With this approach, a data packet can traverse one hop of the BPD mesh per communication window. In a low-latency communication mode, a given BPD receives and transmits data according to an alternating pattern that depends on the parity of the hop layer where the node resides. With this technique, a data packet can traverse multiple hops of the BPD mesh within a single communication window. These techniques also are applicable to CPDs and other types of nodes as well.
A wireless mesh network includes a mesh of continuously-powered devices (CPDs) and a mesh of battery-powered devices (BPDs). The BPDs are organized into hop layers based on hopping distance to the mesh of CPDs. The CPDs transmit time beacons to BPDs in a first hop layer during a first receive window associated with the first hop layer. The BPDs in the first hop layer then transmit time beacons to BPDs in a second hop layer during a second receive window. In this manner, the wireless mesh network propagates time values throughout the BPD mesh. Based on these time values, the BPDs power on during short time intervals to exchange data with neighboring BPDs, and then power off for longer time intervals, thereby conserving battery power. The techniques described herein for conserving battery power for BPDs may also be applied to conserve power consumption of CPDs.
A wireless mesh network includes a mesh of continuously-powered devices (CPDs) and a mesh of battery-powered devices (BPDs). The BPDs are organized into hop layers based on hopping distance to the mesh of CPDs. In a medium latency communication mode, a given BPD receives data during a receive window that is scheduled to occur within either the first half of a communication window or the second half of the communication window, depending on the parity of the hop layer where the BPD resides. With this approach, a data packet can traverse one hop of the BPD mesh per communication window. In a low-latency communication mode, a given BPD receives and transmits data according to an alternating pattern that depends on the parity of the hop layer where the node resides. With this technique, a data packet can traverse multiple hops of the BPD mesh within a single communication window. These techniques also are applicable to CPDs and other types of nodes as well.
A wireless mesh network includes a mesh of continuously-powered devices (CPDs) and a mesh of battery-powered devices (BPDs). The BPDs are organized into hop layers based on hopping distance to the mesh of CPDs. The CPDs transmit time beacons to BPDs in a first hop layer during a first receive window associated with the first hop layer. The BPDs in the first hop layer then transmit time beacons to BPDs in a second hop layer during a second receive window. In this manner, the wireless mesh network propagates time values throughout the BPD mesh. Based on these time values, the BPDs power on during short time intervals to exchange data with neighboring BPDs, and then power off for longer time intervals, thereby conserving battery power. The techniques described herein for conserving battery power for BPDs may also be applied to conserve power consumption of CPDs.
A method for optimizing communication modes between network nodes includes: storing, in a first node in a communication network, a data success rate for each of a plurality of communication modes; receiving, by the first node, mode data from a second node in the communication network including at least a mode identifier for at least two of the plurality of communication modes; determining, by the first node, a metric for each of the at least two communication modes based on at least a data success rate of transmissions using the respective communication mode; selecting, by the first node, a preferred communication mode of the at least two communication modes based on the determined metric for each of the at least two communication modes; and transmitting, by the first node, an initiation data message to the second node via the communication network indicating the selected preferred communication mode.
To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A battery controller buffers a higher voltage provided by a primary cell in order to charge a secondary cell that operates at a lower voltage. The battery controller includes a storage device that is charged by the primary cell. When the voltage of the storage device reaches a threshold, the battery controller conducts the stored charge into the secondary cell while isolating the secondary cell from the primary cell. The secondary cell, when charged, powers a node that operates with a low voltage.
A power system within a battery-powered node includes a primary cell, a secondary cell, and a battery controller. The battery controller includes a constant current source that draws power from the primary cell to charge the secondary cell. The battery-powered node draws power from the secondary cell across a wide range of current levels. When the voltage of the secondary cell drops beneath a minimum voltage level, the constant current source charges the secondary cell and a charging signal is sent to the battery-powered node. When the voltage of the second cell exceeds a maximum voltage level, the constant current source stops charging the secondary cell and the charging signal is terminated. The battery-powered node records the amount of time the charging signal is active and then determines a battery depletion level based on that amount of time. Battery replacement may then be efficiently scheduled based on the depletion level.
H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
H01M 10/48 - Accumulators combined with arrangements for measuring, testing or indicating the condition of cells, e.g. the level or density of the electrolyte
H02J 7/34 - Parallel operation in networks using both storage and other dc sources, e.g. providing buffering
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
32.
System, method and program for detecting anomalous events in a network
A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event.
A method for determining configuration of a communication device includes: storing, in a memory of the communication device, a plurality of configuration schemes, wherein each configuration scheme is associated with a geographic location; receiving, at the communication device, a data message from a first communicating device, wherein the data message indicates a first geographic location; identifying, in the memory of the communication device, a first configuration scheme associated with the first geographic location; and transmitting, by the communication device, a data transmission using the first configuration scheme.
A plurality of nodes in a first network mitigate data restrictions on access points which are an interface between the first network and a second network. The access points advertise their access parameters to the second network to the nodes. The nodes maintain a list of the advertised access parameters of each access point. The nodes determine whether to transmit data to the second network according to a first transmission mode or a second transmission mode based on the data to be transmitted and the list of access parameters maintained by that node. In the first transmission mode, the node determines to transmit the data to a first access point having a lowest cost with that node. In the second transmission mode, the node determines to transmit the data to a second access point having fewer access restrictions to the second network than the first access point.
A method for removing credentials from a smart grid device includes: receiving, by a receiving device, a removal request, wherein the removal request includes a device identifier associated with a smart grid device and is signed by an entity associated with a set of security credentials stored in a memory of the smart grid device, the set of security credentials restricting access to one or more components or operations of the smart grid device; extracting, by a processing device, the device identifier included in the received removal request; generating, by the processing device, a permit configured to remove the set of credentials from the smart grid device, wherein the generated permit includes the extracted device identifier; and transmitting, by a transmitting device, the generated permit to the smart grid device for removal of the set of credentials from the memory of the smart grid device.
A permitting system for controlling devices in a system includes a permit issuing agent that receives a command to be sent to a device. Based upon at least one attribute of the command, the permit issuing agent identifies one or more business logic modules that is pertinent to the command. Each business logic module has a respectively different set of business rules associated with it. Each identified business logic module determines whether the command complies with the business rules associated with that module. If the command is determined to comply with the business rules of all of the identified business logic modules, the agent issues a permit for the command, and the permit is sent to the device for execution of the command.
A node in network is configured to buffer data received from other nodes across multiple channels. The node process a portion of the buffered data associated with a subset of those channels. When the node receives data on that subset of channels that includes a notification, the node then processes a larger portion of the buffered data associated with a larger number of channels. In doing so, the node may identify additional notifications include within data that was buffered but not previously processed. The node may also coordinate with other nodes in order to process buffered data upon identification of a notification.
A node within a wireless mesh network is configured to forward a high-priority message to adjacent nodes in the wireless mesh network by either (i) transmitting the message during successive timeslots to the largest subset of nodes capable of receiving transmissions during each timeslot, or (ii) transmitting the message on each different channel during the timeslot when the largest subset of nodes are capable of receiving transmissions on each of those channels.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
H04L 27/28 - Systems using multi-frequency codes with simultaneous transmission of different frequencies each representing one code element
H04L 12/413 - Bus networks with decentralised control with random access, e.g. carrier-sense multiple-access with collision detection (CSMA-CD)
39.
Techniques for collecting and analyzing notifications received from neighboring nodes across multiple channels
A node in network is configured to buffer data received from other nodes across multiple channels. The node process a portion of the buffered data associated with a subset of those channels. When the node receives data on that subset of channels that includes a notification, the node then processes a larger portion of the buffered data associated with a larger number of channels. In doing so, the node may identify additional notifications include within data that was buffered but not previously processed. The node may also coordinate with other nodes in order to process buffered data upon identification of a notification.
Methods and systems for implementing a rotation sensing device are provided. The rotation sensing device may include a magnet, a magnetic field sensor located in a fixed position relative to the magnet, the magnetic field sensor configured to sense a magnetic field of the magnet, and a flux conductor configured to alter the magnetic field of the magnet, wherein the flux conductor is mounted to a rotatable element. The magnet may be mounted in a fixed position relative to the flux conductor, and the magnetic field sensor may be configured to generate a signal based on a sensed strength of the magnetic field in accordance with rotation of the flux conductor.
G01D 5/14 - Mechanical means for transferring the output of a sensing member; Means for converting the output of a sensing member to another variable where the form or nature of the sensing member does not constrain the means for converting; Transducers not specially adapted for a specific variable using electric or magnetic means influencing the magnitude of a current or voltage
41.
Techniques for routing from an endpoint with simultaneous associations to multiple networks
A node within a wireless endpoint device may be coupled to multiple heterogeneous networks simultaneously. The node is configured to select between the different networks based on various constraints associated with the endpoint device, applications executing on the endpoint device, traffic routed by the endpoint device, and constraints associated with the multiple networks. Based on these different constraints, and based on the current operating mode of the node, the node rates each network, and then selects the network with the highest rating to be used for routing purposes.
A method for locking out a remote terminal unit includes: receiving a lockout request, wherein the lockout request includes at least a public key associated with a user, a user identifier, and a terminal identifier; identifying a user profile associated with the user based on the user identifier included in the received lockout request; verifying the public key included in the received lockout request and permission for the user to lockout a remote terminal unit associated with the terminal identifier included in the received lockout request based on data included in the identified user profile; generating a lockout permit, wherein the lockout permit includes at least the public key included in the received lockout request; and transmitting at least a lockout request and the generated lockout permit, wherein the lockout request includes an instruction to place a lockout on the remote terminal unit.
One embodiment of the present invention sets forth a technique for transmitting data in a frequency hopping spread spectrum (FHSS) wireless communication system. A multi-channel receiver is configured to receive data from one or more channels simultaneously. The multi-channel receiver enables efficient implementation of a transmission protocol in which multiple candidate nodes within a wireless mesh network are polled for availability to receive a packet of data. The packet of data is transmitted to one or more available nodes based on prevailing link conditions, thereby increasing the likelihood of successful delivery. Data flooding may be selectively implemented to further increase the likelihood of successful delivery.
A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event.
A system and method analyzes resource consumption without requiring sensors at every device for which consumption is analyzed. Data rates used to provide resource use information may be increased or decreased based on user actions.
A permitting system for controlling devices in a system includes a permit issuing agent that receives a command to be sent to a device. Based upon at least one attribute of the command, the permit issuing agent identifies one or more business logic modules that is pertinent to the command. Each business logic module has a respectively different set of business rules associated with it. Each identified business logic module determines whether the command complies with the business rules associated with that module. If the command is determined to comply with the business rules of all of the identified business logic modules, the agent issues a permit for the command, and the permit is sent to the device for execution of the command.
In an embodiment, triplets of network-enabled FCIs operate to monitor the three phases of a power distribution system. In being network-enabled, the FCIs also operate as nodes of an RF mesh network. In an embodiment, upon the detection of a power failure, the triplet of network FCIs is serially operated so as to extend their networking capabilities by approximately three times.
One embodiment of the present disclosure sets forth a technique for convergence and automatic disabling of access points in a wireless mesh network. Specifically, an access point within a wireless mesh network computes one or more network metrics to determine whether the metrics are unfavorable or favorable. If the network metrics are favorable, then the access point disables the access point's network connection. An access point turns the network connection back on based on whether a routing was lost for at least a preset amount of time, utilization of one or more neighboring access points is above a preset value, or one or more network metrics have degraded by a certain percentage value. One advantage of this approach is that cost savings may be achieved when the number of access points dynamically changes to accommodate varying communications conditions.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Telecommunications services; electronic mail and messaging services; transmission of sound, picture, video and data signals; provision of multiple user telecommunications access to information, data, communications, content, services via a global network and wireless communication apparatus; providing private and secure real time electronic communication over a computer network; providing a high speed access to area networks and a global computer information network. Computer services; Design, deployment and management of wireless networks for others; planning and development of electronic communications networks; providing an on-line network environment that features technology that enables users to share data; Platform as a service (PAAS), Software as a service (SAAS) and cloud computing featuring software for use in data collection, information management, workflow management, data analytics and reporting of data on a sensor-based network; Platform as a service (PAAS), Software as a service (SAAS) and cloud computing featuring software for use in securing, monitoring and managing machine to machine networks, for use in asset optimization, industrial automation, machine diagnostics, and optimization of industrial, enterprise, healthcare, manufacturing, and municipal infrastructure management processes; cloud computing featuring software that allows users to access, organize, store, analyze, receive reports related to, and program applications based on, various types of real-time data on a sensor-based network and that allows users to remotely manage and monitor their network and infrastructure availability in real time, receive alerts and performance data and metrics, increase operational efficiency, and receive reports relating to endpoint data; providing planning and engineering services in the field of information and communications networks; design and development of integrated data collection and wireless transmission hardware systems for equipment and for software applications associated with that equipment; IT consulting services, namely, information system consulting, advice on information system and information technology analysis, and advice on the design of computer systems and networks; technological consultation in the technology field of computer networks; technical support, namely, monitoring technological functions of computer network systems; computer services for others, namely, implementing computer networks comprised of software for securing, monitoring and managing machine to machine networks; computer services for others, namely operating computer networks comprised of computer hardware for searching, monitoring and managing machine to machine networks; technical support, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; design and development of computer systems for the collection, storage and transmission of data; computer services, namely, consultation services in the field of cloud computing and the creation and management of applications used in connection with cloud computing; computer system integration services; computer consultation services; updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; provision of technical support concerning the use of communication equipment.
50.
Mesh network nodes configured to alleviate congestion in cellular network
A plurality of nodes in a first network mitigate data restrictions on access points which are an interface between the first network and a second network. The access points advertise their access parameters to the second network to the nodes. The nodes maintain a list of the advertised access parameters of each access point. The nodes determine whether to transmit data to the second network according to a first transmission mode or a second transmission mode based on the data to be transmitted and the list of access parameters maintained by that node. In the first transmission mode, the node determines to transmit the data to a first access point having a lowest cost with that node. In the second transmission mode, the node determines to transmit the data to a second access point having fewer access restrictions to the second network than the first access point.
A method for managing radio transmission in an endpoint device in a network includes: receiving, at a first endpoint device, a message requesting wake up of the first endpoint device; establishing a connection between the first endpoint device to a second endpoint device connected to the network; determining, at the first endpoint device, whether a secure command is received from the second endpoint device via the established connection within a predetermined period of time; and based on the received secure command, establishing a connection between the first endpoint device and the network via radio transmission, wherein the first endpoint device is configured to turn off radio transmission if the secure command is not received within the predetermined period of time.
To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A wireless mesh network includes heterogeneous types of nodes, including continuously-powered nodes and battery-powered nodes. The battery-powered nodes may reside in a sleeping state most of the time to conserve power. The various nodes in the network may communicate with one another by transmitting and receiving at scheduled times and on scheduled frequencies. The battery-powered nodes may become active during the scheduled transmit and receive times. Network management nodes may facilitate network formation by transmitting information that reflects the scheduled transmit and receive times across the network. Based on this data, the continuously-powered nodes and battery-powered nodes may establish communication links with one another.
A wireless mesh network includes heterogeneous types of nodes, including continuously-powered nodes and battery-powered nodes. The battery-powered nodes may reside in a sleeping state most of the time to conserve power. The various nodes in the network may communicate with one another by transmitting and receiving at scheduled times and on scheduled frequencies. The battery-powered nodes may become active during the scheduled transmit and receive times. Network management nodes may facilitate network formation by transmitting information that reflects the scheduled transmit and receive times across the network. Based on this data, the continuously-powered nodes and battery-powered nodes may establish communication links with one another.
One embodiment of the present invention sets forth a technique for transmitting data in a listen before talk (LBT) wireless transmission regime. A digital radio receiver is configured to simultaneously receive and decode digital data transmissions from multiple radio channels. A digital radio transmitter is configured to listen to the multiple radio channels prior to transmitting digital data on a selected one of the multiple channels, based on locally determined channel occupancy. Optimal LBT efficiency is achieved within the set of multiple channels, thereby improving overall transmission efficiency between the transmitter and the receiver.
Rather than using a large number of transceivers (transmitter/receiver pairs) operating in parallel, Access Points with multiple channels are used to aggregate, or stack, transmitted response communications, e.g., transmitting multiple acknowledgements (ACKs) in a single packet to one or more sources of received packets. The method includes sending on a plurality of channels, by each of a plurality of respective first nodes, a communication to a second node, receiving on the plurality of channels, by the second node, the communication from each of the plurality of first nodes and sending, by the second node, a transmission that contains a response to each communication that was successfully received from each of the plurality of first nodes. The response to each of the plurality of first nodes is part of a single message sent by the second node.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04L 1/16 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
H04B 1/7143 - Arrangements for generation of hop patterns
H04L 12/743 - Header address processing for routing, e.g. table lookup using hashing techniques
H04L 12/855 - Traffic type related actions, e.g. QoS or priority for signalling traffic, e.g. operations, administration and maintenance [OAM] or acknowledge [ACK] packets
42 - Scientific, technological and industrial services, research and design
Goods & Services
Electronic mail and messaging services; transmission of sound, picture, video and data signals; provision of multiple user telecommunications access to information, data, communications, content, services via a global network and wireless communication apparatus; providing private and secure real time electronic communication over a computer network; providing a high speed access to area networks and a global computer information network. Design, deployment and management of wireless networks for others; planning and development of electronic communications networks; providing an on-line network environment that features technology that enables users to share data; Platform as a service (PAAS), Software as a service (SAAS) and cloud computing featuring software for use in data collection, information management, workflow management, data analytics and reporting of data on a sensor-based network; Platform as a service (PAAS), Software as a service (SAAS) and cloud computing featuring software for use in securing, monitoring and managing machine to machine networks, for use in asset optimization, industrial automation, machine diagnostics, and optimization of industrial, enterprise, healthcare, manufacturing, and municipal infrastructure management processes; cloud computing featuring software that allows users to access, organize, store, analyze, receive reports related to, and program applications based on, various types of real-time data on a sensor-based network and that allows users to remotely manage and monitor their network and infrastructure availability in real time, receive alerts and performance data and metrics, increase operational efficiency, and receive reports relating to endpoint data; providing planning and engineering services in the field of information and communications networks; design and development of integrated data collection and wireless transmission hardware systems for equipment and for software applications associated with that equipment; IT consulting services, namely, information system consulting, advice on information system and information technology analysis, and advice on the design of computer systems and networks; technological consultation in the technology field of computer networks; technical support, namely, monitoring technological functions of computer network systems; computer services for others, namely, implementing and operating computer networks comprised of computer hardware and software for securing, monitoring and managing machine to machine networks; technical support, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; design and development of computer systems for the collection, storage and transmission of data; computer services, namely, consultation services in the field of cloud computing and the creation and management of applications used in connection with cloud computing; computer system integration services; computer consultation services; updating and maintaining cloud-based computer software through on-line updates, enhancements and patches; provision of technical support concerning the use of communication equipment in the nature of troubleshooting software problems related to telecommunications equipment.
58.
Technique for changing the operating state of a node within a network
A node residing within a wireless mesh network is configured to transmit a state transition message to a downstream node also residing within the wireless mesh network. The state transition message indicates a new operating state for the downstream node. Upon receipt of the state transition message, the downstream node may transition to the new operating state and then transmit an acknowledgement message back to the node that sent the state transition message. Alternatively, the downstream node may transmit the acknowledgement message back to the node that sent the state transition message first, and then transition to the new operating state.
H04L 12/24 - Arrangements for maintenance or administration
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
H04W 40/24 - Connectivity information management, e.g. connectivity discovery or connectivity update
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software; computer hardware; computer software and networking equipment, namely, network hardware and software for monitoring and managing machine to machine networks; computer software and networking equipment, namely, network hardware and software for data collection applications; computer software and networking equipment, namely, network hardware and software for monitoring and managing data in the public utilities, gas utilities, electric utilities and water utilities industries; computer database management software; computer software used for receiving and monitoring usage and distribution information from remote sensors and meters in the public utilities, gas utilities, electric utilities, water utilities, municipal infrastructure and other industries; Software which allows users to access, organize, store, analyze, receive reports related to, and program applications based on, various types of real-time data on a sensor-based network; Data management, analytics and reporting software. Software as a services (SAAS) services; Computer services for others, namely, implementing and operating computer networks comprised of computer hardware and software for securing, monitoring and managing machine to machine networks; Computer services for others, namely, implementing and operating computer networks comprised of computer hardware and software for receiving and transmitting energy-related information and requests between and among commodity meters, securing, monitoring and managing utility distribution equipment and monitoring customer utility usage; Computer software design; Technical support, namely, monitoring of network systems and troubleshooting in the nature of diagnosing computer hardware and software problems; Design and development of computer systems for the collection, storage and transmission of data; Software as a service (SAAS) services, namely, hosting software for use by others for securing, monitoring and managing machine to machine networks; Software as a service (SAAS) services, namely, hosting software for use by others for receiving and transmitting energy-related information and requests between and among utility meters, securing, monitoring and managing utility distribution automation and demand response data and monitoring customer utility usage; Software as a service (SAAS) services, namely, hosting software that allows energy consumers, including public utility customers, to view and monitor energy consumption.
60.
Authentication and pairing of a mobile device to an external power source
A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device.
G06F 1/26 - Power supply means, e.g. regulation thereof
B60L 11/18 - using power supplied from primary cells, secondary cells, or fuel cells
G06F 21/81 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors
A wireless communication network system includes a plurality of nodes. Each node from the plurality of nodes includes a plurality of communication modules. Each module includes a modem and is configured to operate according to a communication protocol. Each communication module is configured to monitor its own communication parameter data and to cooperate with companion modules of a node by sharing communication parameter data, for instance through a coordination unit. Each communication module is further configured to allow, preferably according to a predefined set of rules, communication using a protocol of one communication module by utilizing a band associated with a companion module. The sharing of communication parameter data between modules may be continuous sharing or periodic sharing.
A wireless mesh network is configured to manage a power grid. Each node within the wireless mesh network is configured to detect and classify voltage fluctuations in power supplied by an upstream transformer coupled to the power grid. When a given node detects a particular type of fluctuation (i.e., an “event”), the node generates a timestamped event classification that reflects the type of event and a time when the event occurred. A server configured to manage the wireless mesh network receives timestamped event classifications from each node within the wireless mesh network and then performs a time correlation with the received timestamped event classifications to determine which nodes detected similar events. When two or more nodes detected the same event at similar times, the server determines that those nodes are coupled to the same transformer.
G01R 21/133 - Arrangements for measuring electric power or power factor by using digital technique
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
H04L 12/24 - Arrangements for maintenance or administration
63.
Distributing light intensity readings in a wireless mesh
A method for controlling a light source associated with an environment includes: receiving, over a wireless mesh network and by a control node corresponding to the light source, a first light intensity value for the environment from a first sensor node; calculating, by the control node, a resulting light intensity (RLI) value based on the first intensity value; determining, by the control node, that the RLI value exceeds a light intensity threshold; and modifying, by the control node and in response to determining the RLI value exceeds the light intensity threshold, an output of the first light source.
One embodiment of the present disclosure sets forth a technique for convergence and automatic disabling of access points in a wireless mesh network. Specifically, an access point within a wireless mesh network computes one or more network metrics to determine whether the metrics are unfavorable or favorable. If the network metrics are favorable, then the access point disables the access point's network connection. An access point turns the network connection back on based on whether a routing was lost for at least a preset amount of time, utilization of one or more neighboring access points is above a preset value, or one or more network metrics have degraded by a certain percentage value. One advantage of this approach is that cost savings may be achieved when the number of access points dynamically changes to accommodate varying communications conditions.
A node in network is configured to buffer data received from other nodes across multiple channels. The node process a portion of the buffered data associated with a subset of those channels. When the node receives data on that subset of channels that includes a notification, the node then processes a larger portion of the buffered data associated with a larger number of channels. In doing so, the node may identify additional notifications include within data that was buffered but not previously processed. The node may also coordinate with other nodes in order to process buffered data upon identification of a notification.
09 - Scientific and electric apparatus and instruments
Goods & Services
(1) Computer hardware; network interface cards; computer software and networking equipment, namely, computer network communications hardware and software for monitoring and managing machine to machine networks in the public utilities, gas utilities, electric utilities, water utilities industries, and industrial and municipal infrastructure; computer software and networking equipment, namely, computer network communications hardware and software for data collection applications in the public utilities, gas utilities, electric utilities, water utilities industries, and industrial and municipal infrastructure; computer software and networking equipment, namely, computer network communications hardware and software for transmission of data in the public utilities, gas utilities, electric utilities, water utilities industries, and industrial and municipal infrastructure; computer database management software; computer software and networking equipment, namely, computer network communications hardware and software for monitoring and managing data in the public utilities, gas utilities, electric utilities, water utilities industries, and industrial and municipal infrastructure; computer software used for receiving and monitoring usage and distribution information from remote sensors and meters in the public utilities, gas utilities, electric utilities, water utilities and municipal infrastructure; electronic devices, namely, radio frequency repeaters used in long range communication for tracking and monitoring energy usage and advanced meter reading data
Nodes within a wireless mesh network are configured to monitor time series data associated with a utility network, including voltage fluctuations, current levels, temperature data, humidity measurements, and other observable physical quantities. The nodes execute stream functions to process the recorded time series data and generate data streams. The node is configured to transmit generated data streams to neighboring nodes. A neighboring node may execute other stream functions to process the received data stream(s), thereby generating additional data streams. A server coupled to the wireless mesh network collects and processes the data streams to identify events occurring within the network.
G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
G01R 25/00 - Arrangements for measuring phase angle between a voltage and a current or between voltages or currents
H02J 3/00 - Circuit arrangements for ac mains or ac distribution networks
G01R 21/00 - Arrangements for measuring electric power or power factor
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 12/24 - Arrangements for maintenance or administration
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
H02J 3/24 - Arrangements for preventing or reducing oscillations of power in networks
Nodes within a wireless mesh network are configured to monitor time series data associated with a utility network (or any other device network). One or more servers coupled to the wireless mesh network configures a data ingestion cloud to receive and process the time series data from the nodes to generate data streams. The server(s) also configure a distributed processing cloud to perform historical analysis on data streams, and a real-time processing cloud to perform real-time analysis on data streams. The distributed processing cloud and the real-time processing cloud may interoperate with one another in response to processing the data streams. Specifically, the real-time processing cloud may trigger a historical analysis on the distributed processing cloud, and the distributed processing cloud may trigger real-time processing on the real-time processing cloud. Any of the processing clouds may encompass edge nodes configured to perform real-time processing and generate data streams.
G01R 25/00 - Arrangements for measuring phase angle between a voltage and a current or between voltages or currents
H02J 3/00 - Circuit arrangements for ac mains or ac distribution networks
G01R 21/00 - Arrangements for measuring electric power or power factor
H02J 3/24 - Arrangements for preventing or reducing oscillations of power in networks
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 12/24 - Arrangements for maintenance or administration
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
A node within a wireless mesh network is configured to record a zero crossing of alternating current or alternating voltage drawn by a single-phase power consumer and a precise timestamp when the zero crossing occurred, thereby generating timestamped zero crossing data. The node receives similar zero crossing data from a neighboring node. The node then compares the timestamped zero crossing data with the received zero crossing data to determine whether the phase associated with the node is equivalent to, leads, or lags the phase associated with the neighboring node. The node then acquires a positive phase identification associated with the neighboring node. Based on the phase identification, and based on the phase difference between the two nodes, the node infers the phase associated with the single-phase power consumer. That phase indicates the specific power line within a three-phase power distribution network to which the single-phase power consumer is coupled.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G01R 25/00 - Arrangements for measuring phase angle between a voltage and a current or between voltages or currents
H02J 3/00 - Circuit arrangements for ac mains or ac distribution networks
G01R 21/00 - Arrangements for measuring electric power or power factor
H02J 3/24 - Arrangements for preventing or reducing oscillations of power in networks
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 12/24 - Arrangements for maintenance or administration
H04L 29/06 - Communication control; Communication processing characterised by a protocol
Nodes within a wireless mesh network are configured to monitor time series data associated with a utility network, including voltage fluctuations, current levels, temperature data, humidity measurements, and other observable physical quantities. The nodes execute stream functions to process the recorded time series data and generate data streams. The node is configured to transmit generated data streams to neighboring nodes. A neighboring node may execute other stream functions to process the received data stream(s), thereby generating additional data streams. A server coupled to the wireless mesh network collects and processes the data streams to identify events occurring within the network.
G01R 25/00 - Arrangements for measuring phase angle between a voltage and a current or between voltages or currents
H02J 3/00 - Circuit arrangements for ac mains or ac distribution networks
G01R 21/00 - Arrangements for measuring electric power or power factor
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 12/24 - Arrangements for maintenance or administration
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
H02J 3/24 - Arrangements for preventing or reducing oscillations of power in networks
Nodes within a wireless mesh network are configured to monitor time series data associated with a utility network (or any other device network). One or more servers coupled to the wireless mesh network configures a data ingestion cloud to receive and process the time series data from the nodes to generate data streams. The server(s) also configure a distributed processing cloud to perform historical analysis on data streams, and a real-time processing cloud to perform real-time analysis on data streams. The distributed processing cloud and the real-time processing cloud may interoperate with one another in response to processing the data streams. Specifically, the real-time processing cloud may trigger a historical analysis on the distributed processing cloud, and the distributed processing cloud may trigger real-time processing on the real-time processing cloud. Any of the processing clouds may encompass edge nodes configured to perform real-time processing and generate data streams.
G01R 25/00 - Arrangements for measuring phase angle between a voltage and a current or between voltages or currents
H02J 3/00 - Circuit arrangements for ac mains or ac distribution networks
G01R 21/00 - Arrangements for measuring electric power or power factor
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 12/24 - Arrangements for maintenance or administration
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
H02J 3/24 - Arrangements for preventing or reducing oscillations of power in networks
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software ,not including software for water purification equipment; computer hardware,not including apparatus or equipment for water purification ; network interface cards; computer software and networking equipment, namely, network hardware and software for monitoring and managing machine to machine networks , not including apparatus and equipment for water purification or software for water purification equipment; computer software and networking equipment, namely, network hardware and software for data collection applications , not including apparatus and equipment for water purification or software for water purification equipment; computer software and networking equipment, namely, network hardware and software for transmission of data, not including apparatus and equipment for water purification or software for water purification equipment; computer database management software, not including software for water purification equipment ; computer software and networking equipment, namely, network hardware and software for monitoring and managing data in the public utilities, gas utilities, electric utilities and water utilities industries, not including apparatus and equipment for water purification or software for water purification equipment; computer software used for receiving and monitoring usage and distribution information from remote sensors and meters in the public utilities, gas utilities, electric utilities, water utilities, municipal infrastructure and other industries, not including software for water purification equipment; electronic devices, namely, radio frequency repeaters used in long range communication for tracking and monitoring energy usage and advanced meter reading data, not including apparatus and equipment for water purification; none of the foregoing for use in connection with water purification. Computer services for others, namely, implementing and operating computer networks comprising computer hardware and software for monitoring and managing machine to machine networks; computer services for others, namely, implementing and operating computer networks comprising computer hardware and software for receiving and transmitting information and requests between and among commodity meters, monitoring and managing utility distribution equipment and monitoring utility usage; design and development of computer systems for the collection, storage and transmission of data; software as a service (SAAS) services, namely, hosting software for use by others for monitoring and managing machine to machine networks and for data collection and transmission; software as a service (SAAS) services, namely, hosting software for use by others for receiving and transmitting information and requests between and among utility meters, monitoring and managing utility distribution automation and demand response data and monitoring utility usage; software as a service (SAAS) services, namely, hosting software that allows utilities and municipalities to view and monitor energy consumption and distribution; software as a services (SAAS) services, namely, hosting data collection software for monitoring and reporting of any physical property or condition using computers and sensors; computer software design; technical support, namely, monitoring of network systems and troubleshooting in the nature of diagnosing computer hardware and software problems.
Rather than using a large number of transceivers (transmitter/receiver pairs) operating in parallel, Access Points with multiple channels are used to aggregate, or stack, transmitted response communications, e.g., transmitting multiple acknowledgements (ACKs) in a single packet to one or more sources of received packets. The method includes sending on a plurality of channels, by each of a plurality of respective first nodes, a communication to a second node, receiving on the plurality of channels, by the second node, the communication from each of the plurality of first nodes and sending, by the second node, a transmission that contains a response to each communication that was successfully received from each of the plurality of first nodes. The response to each of the plurality of first nodes is part of a single message sent by the second node.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04L 1/16 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
H04B 1/7143 - Arrangements for generation of hop patterns
H04L 12/743 - Header address processing for routing, e.g. table lookup using hashing techniques
H04L 12/855 - Traffic type related actions, e.g. QoS or priority for signalling traffic, e.g. operations, administration and maintenance [OAM] or acknowledge [ACK] packets
A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device.
B60L 11/18 - using power supplied from primary cells, secondary cells, or fuel cells
G06F 21/81 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors
One embodiment of the present invention sets forth a technique for transmitting data in a listen before talk (LBT) wireless transmission regime. A digital radio receiver is configured to simultaneously receive and decode digital data transmissions from multiple radio channels. A digital radio transmitter is configured to listen to the multiple radio channels prior to transmitting digital data on a selected one of the multiple channels, based on locally determined channel occupancy. Optimal LBT efficiency is achieved within the set of multiple channels, thereby improving overall transmission efficiency between the transmitter and the receiver.
Systems and methods for detecting device failures in a network having nodes coupled to a central controller, in which a first of the nodes communicates with the central controller via a second of the nodes. When the second node determines that the first node has not transmitted a predetermined number of messages over a predefined number of time periods, the second node provides a failure alert to the central controller. The central controller records a failure alert received from the second node in a log. Based on a set of failure alerts received from a number of nodes recorded in the log, the central controller determines whether the first node has failed.
A wireless communication network system includes a plurality of nodes. Each node from the plurality of nodes includes a plurality of communication modules. Each module includes a modem and is configured to operate according to a communication protocol. Each communication module is configured to monitor its own communication parameter data and to cooperate with companion modules of a node by sharing communication parameter data, for instance through a coordination unit. Each communication module is further configured to allow, preferably according to a predefined set of rules, communication using a protocol of one communication module by utilizing a band associated with a companion module. The sharing of communication parameter data between modules may be continuous sharing or periodic sharing.
H04W 24/00 - Supervisory, monitoring or testing arrangements
78.
Method and system of providing IPv6 packet transit between two IPv6 nodes of a utility network connected via an IPv4 network using encapsulation technique
One example embodiment provides a method and system where a node in an IPv6 utility network communicates with an IPv6 destination node through and IPv4 network. IPv6 utility nodes are reachable through at least one access point. IPv6 packets to be transmitted between an IPv6 access point and an IPv6 destination node through a IPv4 communications network are encapsulated in IPv4 packets for transmission through the IPv4 communications network. Packets received after transmission through the IPv4 communications network at the destination node are extracted to retrieve the IPv6 packet.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software; computer hardware; computer software and networking equipment, namely, network hardware and software for monitoring and managing machine to machine networks; computer software and networking equipment, namely, network hardware and software for data collection applications; computer software and networking equipment, namely, network hardware and software for monitoring and managing data in the public utilities, gas utilities, electric utilities and water utilities industries; computer database management software; computer software used for receiving and monitoring usage and distribution information from remote sensors and meters in the public utilities, gas utilities, electric utilities, water utilities, municipal infrastructure and other industries. Telecommunication services; telecommunication services, namely, providing electronic message alerts via the internet. Computer services for others, namely, implementing and operating computer networks comprising computer hardware and software for monitoring and managing machine to machine networks; computer services for others, namely, implementing and operating computer networks comprising computer hardware and software for receiving and transmitting information and requests between and among commodity meters, monitoring and managing utility distribution equipment and monitoring utility usage; design and development of computer systems for the collection, storage and transmission of data; software as a service (SAAS) services, namely, hosting software for use by others for monitoring and managing machine to machine networks and for data collection; software as a service (SAAS) services, namely, hosting software for use by others for receiving and transmitting information and requests between and among utility meters, monitoring and managing utility distribution automation and demand response data and monitoring utility usage; software as a service (SAAS) services, namely, hosting software that allows utilities and municipalities to view and monitor energy consumption and distribution; software as a services (SAAS) services, namely, hosting data collection software for monitoring and reporting of any physical property or condition using computers and sensors.
80.
System, method and program for detecting anomalous events in a utility network
A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event.
A node within a wireless mesh network is configured to forward a high-priority message to adjacent nodes in the wireless mesh network by either (i) transmitting the message during successive timeslots to the largest subset of nodes capable of receiving transmissions during each timeslot, or (ii) transmitting the message on each different channel during the timeslot when the largest subset of nodes are capable of receiving transmissions on each of those channels.
A method for removing credentials from a smart grid device includes: receiving, by a receiving device, a removal request, wherein the removal request includes a device identifier associated with a smart grid device and is signed by an entity associated with a set of security credentials stored in a memory of the smart grid device, the set of security credentials restricting access to one or more components or operations of the smart grid device; extracting, by a processing device, the device identifier included in the received removal request; generating, by the processing device, a permit configured to remove the set of credentials from the smart grid device, wherein the generated permit includes the extracted device identifier; and transmitting, by a transmitting device, the generated permit to the smart grid device for removal of the set of credentials from the memory of the smart grid device.
G06F 7/04 - Identity comparison, i.e. for like or unlike values
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G06F 17/30 - Information retrieval; Database structures therefor
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/45 - Structures or tools for the administration of authentication
The invention relates to a method for controlling thermal properties of a node. The method steps include calculating, using a temperature reading, a transmission duty cycle of the node, calculating a data amount capable of being transmitted with the transmission duty cycle, and transmitting, from a network interface of the node, a plurality of available data at a rate less than the data amount based on a priority of the plurality of available data.
H04L 12/917 - Dynamic resource allocation, e.g. in-call renegotiation requested by the user or upon changing network conditions requested by the network
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software and downloadable mobile applications for use in operation of utilities, public utilities, electric utilities, water utilities, and energy utilities; Computer software and networking equipment, namely, network hardware and software for securing, monitoring and managing energy in the public utilities, electric utilities, water utilities, and energy utilities industries; Communications networking systems consisting of computer hardware and software, radio frequency wireless communications technology, one-way and two-way automated meter reading devices and other monitoring and control devices for use in the energy and utility fields; Computer hardware and software for use in transmitting data one-way and two-way between a data computing network and remote communications devices, namely, wireless network repeaters, routers, personal computers, laptop computers, cellular phones and handheld computers; Electronic interface modules for receiving and transmitting energy-related information and requests between and among commodity meters, electronic devices and a host computer over a wide area network and a local area network; Computer database management software used for receiving and monitoring energy usage information from multiple remote commodity meters in the public utilities, electric utilities, water utilities, and energy utilities industries; Electric utility meters, namely, gas meters, electric meters, and water meters; Network interface cards; Gateway routers in the nature of computer control hardware; Electronic devices, namely, radio frequency repeaters used in long range communication for tracking and monitoring data; Advanced meter communications devices, namely, transmitters, receivers and antennas used to collect, store and process consumption data, distribution automation data, demand response data and other information in the energy and utility fields, including electric, water, gas, solar, coal, thermal and nuclear energy; Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; Apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; Apparatus for recording, transmission or reproduction of sound or images; Magnetic data carriers, recording discs; Compact discs, DVDs and other digital recording media; Mechanisms for coin-operated apparatus; Cash registers, calculating machines, data processing equipment, computers; Computer software; Fire-extinguishing apparatus. Telecommunications; Providing user access to global computer networks; Electronic bulletin board services; Providing online discussion forums; Providing online chat rooms and electronic bulletin boards for transmission of messages among users. Software as a service (SAAS) services featuring software for use in operation of utilities, public utilities, electric utilities, water utilities, and energy utilities; Software as a service (SAAS) services featuring software for receiving and transmitting energy-related information and requests between and among commodity meters, securing, monitoring and managing utility distribution equipment and monitoring utility usage and operations; Software as a service (SAAS) services featuring software for use by others for receiving and transmitting energy-related information and requests between and among utility meters, securing, monitoring and managing utility distribution automation and demand response data and monitoring utility usage and operations; Software as a service (SAAS) services featuring software that allows utilities to view and monitor energy consumption, voltage management, meter temperature management, revenue assurance, and network management; Computer software design; Technical support, namely, monitoring of network systems and troubleshooting in the nature of diagnosing computer hardware and software problems; Design and development of computer systems for the collection, storage and transmission of data; Scientific and technological services and research and design relating thereto; Industrial analysis and research services; Design and development of computer hardware and software.
09 - Scientific and electric apparatus and instruments
Goods & Services
computer hardware; network interface cards; computer software and networking equipment, namely, network hardware and software for monitoring and managing machine to machine networks; computer software and networking equipment, namely, network hardware and software for transmission of data; computer database management software; computer software used for receiving and monitoring usage and distribution information from remote sensors and meters in the public utilities, gas utilities, electric utilities, water utilities, and municipal infrastructure; electronic devices, namely, radio frequency repeaters used in long range communication for tracking and monitoring energy usage and advanced meter reading data; none of the foregoing for use in connection with water purification
86.
Secure end-to-end permitting system for device operations
A permitting system for controlling devices in a system includes a permit issuing agent that receives a command to be sent to a device. Based upon at least one attribute of the command, the permit issuing agent identifies one or more business logic modules that is pertinent to the command. Each business logic module has a respectively different set of business rules associated with it. Each identified business logic module determines whether the command complies with the business rules associated with that module. If the command is determined to comply with the business rules of all of the identified business logic modules, the agent issues a permit for the command, and the permit is sent to the device for execution of the command.
One example embodiment provides a method and system where a node in a utility network registers with one or more access point devices associated with one or more local area utility networks. The utility node generates a unique network address using a network address prefix of a network address associated with the access point device. The utility node registers with a DNS server. Messages sent to the utility node are routed through the access point corresponding to the received prefix used to generate the unique network address for the utility node. The network address for the utility node and access point may be IPv6 addresses and the network address prefix may be an IPv6 prefix, or may be an IPv4 address.
A node within a wireless endpoint device may be coupled to multiple heterogeneous networks simultaneously. The node is configured to select between the different networks based on various constraints associated with the endpoint device, applications executing on the endpoint device, traffic routed by the endpoint device, and constraints associated with the multiple networks. Based on these different constraints, and based on the current operating mode of the node, the node rates each network, and then selects the network with the highest rating to be used for routing purposes.
A method for locking out a remote terminal unit includes: receiving a lockout request, wherein the lockout request includes at least a public key associated with a user, a user identifier, and a terminal identifier; identifying a user profile associated with the user based on the user identifier included in the received lockout request; verifying the public key included in the received lockout request and permission for the user to lockout a remote terminal unit associated with the terminal identifier included in the received lockout request based on data included in the identified user profile; generating a lockout permit, wherein the lockout permit includes at least the public key included in the received lockout request; and transmitting at least a lockout request and the generated lockout permit, wherein the lockout request includes an instruction to place a lockout on the remote terminal unit.
Nodes within a network are configured to communicate with one another on one or more television white space (TVWS) frequencies that may be subject to interference caused by nearby TV towers. In order to mitigate that interference, the nodes may be configured to communicate according to specific operating parameters. The operating parameters may be generated based on expected interference levels caused by the nearby TV towers or QOS metrics associated with available channels. The nodes may also update a private database to reflect the expected interference levels or measured QOS metrics for different channels.
A method for authenticating a meter reading. The method includes obtaining a measurement representing a measured attribute of a user, analyzing the measurement to generate an authentication code, generating the meter reading based on the measurement and the authentication code, presenting, by the metering device, the meter reading to the user who alters and reports the meter reading as a reported meter reading, analyzing, by a meter reading analysis device, the reported meter reading to detect that the meter reading was altered by the user, and generating, by the meter reading analysis device and in response to the detecting, a dispatch request to dispatch a human inspector for validating the measurement.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer programming services; research services and breakdown diagnostic services pertaining to computers and computer software; consulting services in the field of computer networking, computer software and lighting design and selection; research, development and engineering in the field of lighting, urban planning, technical project studies, technical assistance services; design, development and updating of computer programs, software and lighting systems; design, development, and updating of web sites; computer services for others, namely, implementing and operating computer networks comprised of computer hardware and software for securing, monitoring and managing machine to machine networks; computer services for others, namely, implementing and operating computer networks comprised of computer hardware and software for receiving and transmitting energy-related information and requests between and among commodity meters, securing, monitoring and managing utility distribution equipment and monitoring customer utility usage; computer software design; technical support, namely, monitoring of network systems and troubleshooting in the nature of diagnosing computer hardware and software problems; design and development of computer systems for the collection, storage and transmission of data; software as a service (SAAS) services, namely, hosting software for use by others for securing, monitoring and managing machine to machine networks; software as a service (SAAS) services, namely, hosting software for use by others for receiving and transmitting energy-related information and requests between and among utility meters, securing, monitoring and managing utility distribution automation and demand response data and monitoring customer utility usage; software as a service (SAAS) services, namely, hosting software that allows municipalities and streetlight maintenance companies to monitor and control use of streetlights and light sensors, cameras, wireless internet access points; computer services for others, namely, implementing and operating computer networks on behalf of cities for receiving and transmitting energy-related information; network as a service services, namely, implementing and operating computer networks comprised of computer hardware and software on behalf of cities for monitoring and controlling use of streetlights and light sensors, cameras, wireless internet access points
93.
Leveraging diverse communication links to improve communication between network subregions
A first subregion of a wireless mesh network is configured to transmit a data packet across multiple communication links to a second subregion of the wireless mesh network. Due to varying connectivity levels associated with the multiple communication links, the second subregion receives different versions of the data packet. A designated node within the second subregion receives the different versions and then combines those versions to reconstruct the data packet. The designated node may receive the multiple versions of the data packet from nodes within the first subregion and/or receive multiple versions of the data packet from nodes residing within the second subregion. In this fashion, the designated node leverages path diversity between the first and second subregions to remedy poor connectivity between those subregions.
A method for directing a vehicle to a parking space within an environment is disclosed. The method includes selecting a parking space from a collection of parking spaces within the environment, further selecting one or more lighting devices within the environment based at least on a location of the selected parking space, and sending a signal to the one or more lighting devices to generate a lighting pattern visible to a driver of the vehicle, where the lighting pattern directs the driver to navigate the vehicle toward the parking space. In addition, the vehicle may be navigated using radio navigation algorithms based on beacon signals broadcasted from streetside devices, such as lighting devices or parking meters.
B60Q 1/48 - Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic for parking purposes
G08G 1/14 - Traffic control systems for road vehicles indicating individual free spaces in parking areas
A method for controlling a light source associated with an environment includes: receiving, over a wireless mesh network and by a control node corresponding to the light source, a first light intensity value for the environment from a first sensor node; calculating, by the control node, a resulting light intensity (RLI) value based on the first intensity value; determining, by the control node, that the RLI value exceeds a light intensity threshold; and modifying, by the control node and in response to determining the RLI value exceeds the light intensity threshold, an output of the first light source.
A method for managing radio transmission in an endpoint device in a network includes: receiving, at a first endpoint device, a message requesting wake up of the first endpoint device; establishing a connection between the first endpoint device to a second endpoint device connected to the network; determining, at the first endpoint device, whether a secure command is received from the second endpoint device via the established connection within a predetermined period of time; and based on the received secure command, establishing a connection between the first endpoint device and the network via radio transmission, wherein the first endpoint device is configured to turn off radio transmission if the secure command is not received within the predetermined period of time.
A wireless mesh network is configured to implement a latency-sensitive communication protocol in order to facilitate data communications between devices coupled to that network and configured to communicate with one another based on that protocol. Specifically, a node within the wireless mesh network receives a continuous stream of data that includes an N-bit sequence from an upstream device coupled to the wireless mesh network. The node transmits the N-bit sequence to a downstream node within the wireless mesh network. The downstream node re-creates the continuous stream of bits based on the received N-bit sequence, and then transmits the re-created continuous stream of bits to another device coupled to the wireless mesh network. By operating in conjunction with one another, the nodes within the wireless mesh network facilitate communication between the devices coupled to wireless mesh network according to the latency-sensitive communication protocol.
A permitting system for controlling devices in a system includes a permit issuing agent that receives a command to be sent to a device. Based upon at least one attribute of the command, the permit issuing agent identifies one or more business logic modules that is pertinent to the command. Each business logic module has a respectively different set of business rules associated with it. Each identified business logic module determines whether the command complies with the business rules associated with that module. If the command is determined to comply with the business rules of all of the identified business logic modules, the agent issues a permit for the command, and the permit is sent to the device for execution of the command.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
An access point coupled to a node within a network is configured to combine channel maps provided by other access points to which the node is coupled, thereby reconciling any discrepancies between those channel maps. The access point may also combine channel maps associated with different regions that the node may occupy, thereby reducing the number of channel maps that must be transmitted to the node when the node travel between regions.
A server acts as a proxy mechanism for node registration with a database. The node initially registers to participate in a wireless mesh network by transmitting a registration request to the server. The server forwards the request to the database, which validates the request. The server records that the registration request was, in fact, validated by the database. The node is then permitted to participate in the network. If the node becomes decoupled from the network, the node may then transmit a re-registration request to the server. Since the server recorded that the previous registration was validated, the server may then simply validate the re-registration request, without interacting with the database.