Techniques for contextualizing utility visualization patterns in a utility infrastructure environment are described herein. A utility meter data dashboard associated with a type of event may be displayed. A selection of a portion of a first utility visualization displayed in the utility meter data dashboard is received, the portion being associated with a subset of utility data. One or more previously used utility visualizations may be determined from among a plurality of additional utility visualizations. One or more candidate utility visualizations associated with the type of event may be determined from among the previously used utility visualizations. A ranked list of one or more candidate utility visualizations may be displayed. A second utility visualization may be displayed based at least in part on a selection from the ranked list.
Techniques for contextualizing utility visualization patterns in a utility infrastructure environment are described herein. A utility meter data dashboard associated with a type of event may be displayed. A selection of a portion of a first utility visualization displayed in the utility meter data dashboard is received, the portion being associated with a subset of utility data. One or more previously used utility visualizations may be determined from among a plurality of additional utility visualizations. One or more candidate utility visualizations associated with the type of event may be determined from among the previously used utility visualizations. A ranked list of one or more candidate utility visualizations may be displayed. A second utility visualization may be displayed based at least in part on a selection from the ranked list.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable application software for use in connection with
data processing, data storage, data capture, data
collection, data warehousing, data management, data mining,
database analytics, secure data sharing, cloud management;
downloadable computer software that provides real-time,
integrated business intelligence by combining information
from various databases and presenting it in an
easy-to-understand user interface; downloadable cloud-based
software for accessing, anonymizing, converting, storing,
managing, formatting, and transferring online and electronic
data; downloadable electronic data files featuring source
data from payment transactions for use in machine learning,
artificial intelligence, data monetization, and other
strategic cases; mobile computing and operating platforms
consisting of data transceivers, wireless networks, and
gateways for the collection and management of data;
downloadable computer software for providing an online
database in the field of financial and payments processing
to upload transactional data, provide statistical analysis,
and produce notifications and reports; downloadable computer
programs for the compilation of financial and payments data;
downloadable computer software for computer system and
application creation, development, deployment, control, and
management in the field of data monetization; electronic
data processing apparatus; downloadable computer software
for creating searchable databases of information and data;
integrated computerized system for collecting, processing,
anonymizing, organizing, analyzing, storing, transmitting,
and sharing of financial, payment card, banking, investment,
payments, and personal data and information; downloadable
computer software for electronic device installation and
configuration, meter reading, utility analytics and
forecasting, demand respond, energy efficiency, and payment
for resource usage. Business consultation services, business consulting and
information services; data processing; business intermediary
services relating to matching third party service providers
with customers; business management and consulting services
for the data industry, namely, providing industry expertise
and partnerships with cloud providers, data providers,
service providers, and technology providers; outsource
service provider in the field of business operation and
management of data processing, data storage, data capture,
data collection, data warehousing, data management, data
mining, database analytics, secure data sharing, cloud
management; promoting the sale of services of others by
means of incentive reward programs; maintaining a registry
of certified cloud providers, data providers, service
providers, technology providers, and technology
integrations; commercial assistance relating to system
implementation and system integration; online retail store
services featuring computer software programs. Application service provider featuring application
programming interface (API) software for use in connection
with data warehousing, data management, data mining,
database analytics and secure data sharing; software as a
service (SAAS) services, namely, hosting software for use by
others for use in connection with data warehousing, data
management, data mining, database analytics and secure data
sharing; platform as a service (PAAS) featuring computer
software platforms for use in connection with data
warehousing, data management, data mining, database
analytics and secure data sharing; computer technology
consultancy; electronic data storage; data warehousing; data
mining; data conversion of electronic information; providing
online non-downloadable software featuring technology that
enables business users to manage electronic business
information; providing online non-downloadable software
featuring technology that enables business users to analyze
electronic business information; providing online
non-downloadable software featuring technology that enables
business users to share electronic business information
securely; computer technology consultancy in the field of
data integration, data transformation, data management, data
migration, data warehousing, data sharing, data analytics,
data mining, and data security; information technology
consulting services; providing temporary use of
non-downloadable computer software for browsing and
accessing digital content and computer software programs;
Software as a service (SaaS) services, featuring software
for meter reading, utility analytics and forecasting, demand
respond, energy efficiency, payment for resource usage.
Various embodiments disclosed herein provide techniques for managing encryption keys at nodes in a mesh network. In various embodiments, a method includes receiving, by a first node in a network, a first message from a second node; determining, by the first node, that a first key usable by the first node to decrypt the first message is outdated based on a comparison of a first key version identifier associated with the first key and a second key version identifier associated with a second key, where the second key was used to encrypt the first message, and the second key version identifier is received from the second node with the first message; and in response to determining that the first key is outdated, transmitting, by the first node to a key management service, a first request for an updated version of the first key to replace the first key.
Various embodiments disclosed herein provide techniques for messaging among message groups associated with agents executing on nodes of a mesh network. A messaging application executing on a node of the mesh network receives a request from an agent executing on the first node to join a message group; verifies that a policy permits the agent to join the message group; adds the agent to the message group; receives, from the agent, content for a message for the message group; and transmits the message to a second messaging application of a second node of the mesh network for delivery to an agent that is executing on the second node and that is included in the message group. In various embodiments, the messaging application receives, from another node of the mesh network, a second message for the message group, and delivers content from the second message to the agent.
H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Various embodiments disclosed herein provide techniques for messaging among message groups associated with agents executing on nodes of a mesh network. A messaging application executing on a node of the mesh network receives content for a first message from an agent executing on the first node, the first message being for a first message group; and transmits a composite message to a second messaging application executed by a second node of the mesh network, the composite message including the first message and a second message for a second message group.
Various embodiments disclosed herein provide techniques for managing encryption keys at nodes in a mesh network. In various embodiments, a method includes receiving, by a first node in a network, a first message from a second node; determining, by the first node, that a first key usable by the first node to decrypt the first message is outdated based on a comparison of a first key version identifier associated with the first key and a second key version identifier associated with a second key, where the second key was used to encrypt the first message, and the second key version identifier is received from the second node with the first message; and in response to determining that the first key is outdated, transmitting, by the first node to a key management service, a first request for an updated version of the first key to replace the first key.
Various embodiments disclosed herein provide techniques for managing encryption keys at nodes in a mesh network. In various embodiments, a method includes, while in a key failure detection time period associated with a first key, detecting, by a node in a mesh network, a decryption failure using the first key; in response to detecting the decryption failure using the first key, incrementing, by the node, a failure count for the first key; and in response to determining that the failure count is at least a threshold count and a key update time period has been entered, transmitting, by the node to a key management service, a request for an update to the first key.
Various embodiments disclosed herein provide techniques for managing encryption keys at nodes in a mesh network. In various embodiments, a method includes, while in a key failure detection time period associated with a first key, detecting, by a node in a mesh network, a decryption failure using the first key; in response to detecting the decryption failure using the first key, incrementing, by the node, a failure count for the first key; and in response to determining that the failure count is at least a threshold count and a key update time period has been entered, transmitting, by the node to a key management service, a request for an update to the first key.
H04L 9/16 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
Various embodiments disclosed herein provide techniques for messaging among agents executing on nodes a mesh network. In various embodiments, a method includes receiving, by a messaging application executing on a node of a mesh network, content for a message from an agent executing on the node; verifying, by the messaging application, that a policy permits delivery of the message; and transmitting, by the messaging application, the message to another messaging application executing on another node of the mesh network.
Various embodiments disclosed herein provide techniques for messaging among message groups associated with agents executing on nodes of a mesh network. A messaging application executing on a node of the mesh network receives content for a first message from an agent executing on the first node, the first message being for a first message group; and transmits a composite message to a second messaging application executed by a second node of the mesh network, the composite message including the first message and a second message for a second message group.
Various embodiments disclosed herein provide techniques for messaging among message groups associated with agents executing on nodes of a mesh network. A messaging application executing on a node of the mesh network receives a request from an agent executing on the first node to join a message group; verifies that a policy permits the agent to join the message group; adds the agent to the message group; receives, from the agent, content for a message for the message group; and transmits the message to a second messaging application of a second node of the mesh network for delivery to an agent that is executing on the second node and that is included in the message group. In various embodiments, the messaging application receives, from another node of the mesh network, a second message for the message group, and delivers content from the second message to the agent.
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
H04W 12/03 - Protecting confidentiality, e.g. by encryption
H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Various embodiments disclosed herein provide techniques for messaging among agents executing on nodes a mesh network. In various embodiments, a method includes receiving, by a messaging application executing on a node of a mesh network, content for a message from an agent executing on the node; verifying, by the messaging application, that a policy permits delivery of the message; and transmitting, by the messaging application, the message to another messaging application executing on another node of the mesh network.
H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
Various embodiments disclose a method including detecting, by a first node in a mesh network while the first node is operating in a normal power mode, an outage event; in response to detecting the outage event, switching to operating the first node and a first memory of the first node in a low power mode, wherein the first memory is capable of switching between operating in the normal power mode and in the low power mode where an amount of power used by the first memory is reduced; and while operating the first node and the first memory in the low power mode: generating, by the first node, a first message; securing, by the first node using a key retrieved from the first memory, the first message; and sending, by the first node, the first message to a second node in the mesh network.
Various embodiments disclose a method comprising determining, by a first node, a first link latency associated with a second node based on a time period between consecutive slots in a unicast listening schedule for the second node; in response to the first node detecting a failure in transmitting a first frame to the second node, determining, by the first node based on the first link latency, a first backoff time; and in response to determining that the first backoff time has elapsed, retransmitting, by the first node, the first frame to the second node.
Techniques for detecting and remediating a low gas pressure situation within a gas delivery system are described. In one example, a smart gas metering device measures gas pressure. The first device determines that the gas pressure value is less than a first threshold value, indicating a low gas pressure condition. The first smart metering device reports this condition to a second smart metering device, which may be nearby. In response, the first smart metering device receives gas pressure information from the second smart gas metering device. The first smart gas metering device then reports one of two conditions to a headend device, such as a main office server. In a first possibility, the report indicates a low gas pressure event confined to the first device. Alternatively, the report indicates a low gas pressure event within a distribution area comprising the first device and the second device.
Techniques for obtaining and processing utility consumption data (e.g., gas, water, electricity, etc.) of a utility network to determine if a violation has occurred with respect to a restriction schedule associated with a service site. By way of example, a number of utility restriction schedules associated with a number of service sites may be generated that indicate, for example, a type of restricted activity and/or event (e.g., irrigation), seasons and/or which days activity is allowed or not allowed, duration activity is allowed, and/or mitigation to take place if a violation is detected. A device (e.g., a smart utility meter, a router, etc.) may monitor utility consumption and detect a particular usage activity (e.g., irrigation) via data disaggregation. The device may compare the activity to the restriction schedule for that particular service site and perform automatic mitigation if a violation is detected.
Techniques for transmitting data include one or more processors of a computing device included in a network device identifying data to be transmitted; and while a data session window is open: transmitting, using a transmitter of the network device, the data to a transceiver that is included in the network device and is separate from the one or more processors, wherein the transceiver is configured to transmit the data outside of the network device; and in response to determining that there is no additional data to be transmitted, (a) delaying for a period of time, and (b) after the period of time, instructing the transceiver to end the data session window early and transition to a lower power state.
A node in a mesh network compresses certificates by receiving a compression dictionary including at least a static portion, the compression dictionary storing associations between entries in certificates and indices in corresponding compressed certificates; in response to identifying a first entry in a first certificate that does not have an association in the compression dictionary, storing, by the node, a first association in the compression dictionary between the first entry and a first index; compressing, based on the first association and at least one second association stored in the static portion of the compression dictionary, the first certificate to generate a first compressed certificate; and transmitting the first compressed certificate and the compression dictionary to a neighboring node.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
One embodiment of the present invention sets forth a technique for communicating within a network. The technique includes receiving, by a first node in a mesh network at a first receive time, a first beacon from a second node in the mesh network, the first beacon including a first network time associated with the second node; determining, by the first node, a first transmission time of a first unicast message to the second node based on (a) the first receive time, (b) the first network time, and (c) a unicast interval between consecutive unicast listening times on the second node; and transmitting, by the first node, the first unicast message to the second node at the first transmission time.
Techniques for efficient compression of sensor data are described herein. In an example, metrology data is received from a metrology device, the metrology data comprising one or more of: voltage (V) data; current (A) data; resistive power (W) data; and volt-amps reactive power (VAR) data. The metrology data is processed, wherein the processing comprises: performing peak-detection on the metrology data, to create data-signals comprising: a timestamped peak- values data-signal; and a peak-removed data-signal. Median-filtering is performed on the peak-removed data-signal, wherein a median-filtered data-signal is created. Level-shift detection is performed on the median-filtered data-signal, wherein a timestamped level-shift data-signal is created. The data is sent to a server. The data may include the timestamped peak-values data-signal and the timestamped level-shift data-signal.
Techniques for efficient compression of sensor data are described herein. In an example, metrology data is received from a metrology device, the metrology data comprising one or more of: voltage (V) data; current (A) data; resistive power (W) data; and volt-amps reactive power (VAR) data. The metrology data is processed, wherein the processing comprises: performing peak-detection on the metrology data, to create data-signals comprising: a timestamped peak-values data-signal; and a peak-removed data-signal. Median-filtering is performed on the peak-removed data-signal, wherein a median-filtered data-signal is created. Level-shift detection is performed on the median-filtered data-signal, wherein a timestamped level-shift data-signal is created. The data is sent to a server. The data may include the timestamped peak-values data-signal and the timestamped level-shift data-signal.
G01R 22/06 - Arrangements for measuring time integral of electric power or current, e.g. electricity meters by electronic methods
G01R 29/04 - Measuring form factor, i.e. quotient of root-mean-square value and arithmetic mean of instantaneous value; Measuring peak factor, i.e. quotient of maximum value and root-mean-square value
23.
Utility restriction compliance monitoring and mitigation
Techniques for obtaining and processing utility consumption data (e.g., gas, water, electricity, etc.) of a utility network to determine if a violation has occurred with respect to a restriction schedule associated with a service site. By way of example, a number of utility restriction schedules associated with a number of service sites may be generated that indicate, for example, a type of restricted activity and/or event (e.g., irrigation), seasons and/or which days activity is allowed or not allowed, duration activity is allowed, and/or mitigation to take place if a violation is detected. A device (e.g., a smart utility meter, a router, etc.) may monitor utility consumption and detect a particular usage activity (e.g., irrigation) via data disaggregation. The device may compare the activity to the restriction schedule for that particular service site and perform automatic mitigation if a violation is detected.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
37 - Construction and mining; installation and repair services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Data collection communication network systems, comprised of combination encoder/transceivers, portable, mobile, and stationary data collection transceivers, and intelligent communication adapters; Data collection computer systems, namely, portable and stationary terminals, printers, communications controllers, communications cradles, function-specific peripherals, computer operating programs, and computer application programs; Electrical energy utilization metering devices, namely, commercial and industrial utility meters for electricity Downloadable computer software for use in electrical load control and management; Downloadable computer software for use in wireless meter data collection, storage and management; Wireless meter reading instruments being electricity meters; Electric control devices for heating, energy management, and devices for cooling being remote controls for air-conditioning apparatus; Thermostats; Apparatus for transmission of communication and storage of information being computer storage devices, namely, high-speed storage subsystems for storage and backup of electronic data either locally or via a telecommunications network, in the nature of electricity meters, remote transmitter controllers for radio-controlled devices, and meter data computer storage devices featuring data related to pricing, consumer usage, billing and load forecasting; Downloadable computer software for use in monitoring, controlling, managing and generating reports regarding energy, electricity, energy consumption and usage, energy efficiency, including through demand response and load shifting energy usage management, billing and related data and information in the field of energy consumption; Downloadable cloud-based software for connecting, operating and managing networked climate control devices in the Internet of Things (IoT), namely, software for use in monitoring, controlling, managing and generating reports regarding energy, electricity, energy consumption and usage, energy efficiency, including through demand response and load shifting energy usage management, billing and related data and information in the fields of energy consumption and usage; Flow meters and fluid meters for gas and water; Gas meters; Water meters; Electricity meters; Flow meters and fluid meters for gas, water and electricity and structural parts related thereto; Smart energy meters for tracking and monitoring energy usage; Fluid oscillators, electromagnetic static flow meters, electronic and mechanical electricity meters and structural parts related thereto; Pressure regulators for use with flow meters, energy meters and electricity meters and structural parts related thereto; gas flow meters used with flow meters; Energy meters for tracking and monitoring gas, fluids, and electricity usage; Electrical Smart energy meters for tracking and monitoring energy usage; Electromagnetic static flow meters, electronic and mechanical electricity meters and structural parts related thereto; Electrical Energy meters for tracking and monitoring electricity usage; Acoustic sensors for use with electric meters, gas meters, or water meters; Advanced metering infrastructure devices, namely water meters, gas meters, and electric meters and downloadable advanced metering infrastructure computer software for tracking, monitoring, controlling, or reporting energy, gas, and water usage, sold as a unit; electromagnetic static flow meters, electronic and mechanical electricity meters; spare parts related to such flow meters; pressure regulators for use with flow meters, oil meters, energy meters and electricity meters; card-operated, and smart-card operated electricity and gas meters; meters used with flow meters; energy meters for tracking and monitoring gas, fluid fuel and electricity usage; apparatus for the memorization of data related to such flow meters, namely, event recorders and computers; apparatus, namely, radio transmitters and electrical cable transmitters for the electronic transmission of data; systems consisting of computers and computer software for use in database management, radio transmitters, electrical cable transmitters, computer network hubs and computer printers for remotely reading and remotely transmitting and remotely retrieving and reviewing data related to such meters; software used to program devices that are used to remotely read meters; computer terminals; electronic modems; transponders; terminals for transaction management; Flow meters and fluid flow meters for use with gas, water and oil; Fluidic oscillators being automatic liquid-flow control machines and instruments; Electromagnetic static flow meters and structural parts therefore; Electricity meters and structural parts therefore; Meters for electricity and gas and flow meters for fluid fuel flow and supply that all feature a prepayment apparatus being an electronic payment terminal, namely, token-operated, coin-operated and card-operated electronic card readers for credit cards and mechanisms for coin-operated apparatus; Apparatus for the memorization of data related to flow meters, namely, event recorders and computers being computer storage devices, namely, high-speed storage subsystems for storage and backup of electronic data either locally or via a telecommunications network in the field of flow meters; Transmission apparatus, namely, radio transmitters, cable transmitters for the electronic transmission of data being transmitters for audio and visual signals for transmission over twisted pair cables; Smart home computer network hub systems comprised of computer hardware, downloadable computer software for use in database management, radio transmitters, cable television transmitters, and computer printers for printing documents, all for remotely reading and remotely transmitting and remotely retrieving and reviewing data related to flow meters; mobile signal transreceiver unit for use with automatic meter reading and telemetry in utilities and energy industries; computer software and software platform accessed via global communication networks for managing water and energy costs and uses and for optimizing water and energy procurement procedures by collecting, managing, analyzing, mining, integrating, reporting, benchmarking, validating, managing load-reduction programs, forecasting, billing, managing, analyzing, and reporting water, energy and energy-related data; computer software for use in distributed information access and collection and building device integration, control and management for use in water and energy management, namely, use, analysis and purchasing of the same; computer software for transmission and distribution line design and optimization; computer software for surveying and engineering in connection with transmission and distribution line design and optimization; computer software for creating and visualizing two-dimensional and three-dimensional models for transmission and distribution line design and optimization; computer software for importing and exporting survey data and models for transmission and distribution line design and engineering; computer software for interfacing and communicating with other sets of computer programs for use in the field of transmission and distribution line design, construction, material management and asset management; computer software for programming, activating, modifying, controlling and communicating with utilities systems and energy equipment; computer software for use by the utilities and energy industries for automating and monitoring the distribution of utility, energy and water services to customers; computer hardware and software for use in the utilities, energy and water industries, namely, for use in association with electric, gas, energy, and water facilities and management; computer software for scheduling, assigning, dispatching and monitoring field operations for the utilities and energy industries; portable electronic utility meter reading and billing unit therefor; computer software for use in data collection and control, communications and data exchange, electronic meter reading, off-site meter reading, keyed meter reading, and meter data recorders, all for use in the utilities and energy industries; computer software for billing customer accounts, for scheduling customer orders and for managing utility meters and energy equipment; computer software, namely, computer operating programs and computer software for application and database integration for use in the utilities and energy industries; computer software for load management and demand response; computer software for design and designation of transmission and distribution lines and substations; communications software and hardware for connecting computer network users; communications software and hardware for connecting global computer, Intranet and Extranet networks; Data collection computer and communication network systems comprised of computer hardware, computer operating software and computer software for data collection applications, namely, automated meter reading, distribution automation, two-way communications between networks and utility meters, and demand side management applications via the Internet, Intranet, Extranets, radio frequency networks, wireless networks, telephone lines, and integrated communications networks, namely, public switched telephone networks, virtual private networks, private networks, public networks, and cellular networks, all for use in the utility, power, and energy industries; Meter interface units comprised of digital, mechanical and optical sensors, encoders and transmitters; Inbound, outbound, two-way communication systems, namely, computer hardware, computer operating software and computer software for data collection and remote programming applications, namely, two-way automated meter reading, distribution automation, remote communications between networks and between and among utility meters, and demand side management applications via the Internet, Intranet, Extranets, radio frequency networks, wireless networks, telephone lines, and integrated communications networks, namely, public switched telephone networks, IP-based public networks, virtual private networks, private networks, broadband over powerline networks, public networks and cellular networks for energy data, and other utility meter monitoring points; Telephone, cellular and radio transreceivers, intelligent communication adapters, and switchpoints for use in the utility, power and energy industries; Energy usage monitoring devices being electronic energy utilization metering devices, namely, energy meters for tracking and monitoring energy usage, meter interfaces being remote metering systems in the nature of wireless controllers to remotely monitor and control the function and status of other electrical, electronic, and mechanical devices or systems, transponders for tracking and monitoring energy usage, and data collection units and electronic instrumentation for reading and collecting energy consumption data being computer storage devices, namely, high-speed storage subsystems for storage and backup of electronic data either locally or via a telecommunications network; Downloadable computer software and recorded computer software for receiving and monitoring usage and distribution information from remote sensors and meters; Computer hardware and peripheral devices; Mobile signal transreceiver units being receivers of electronic signals for automatically reading meters and collecting telemetry data in the utility and energy industries; Downloadable computer software and downloadable computer software platforms for managing water and energy costs and for optimizing water and energy procurement procedures by collecting, managing, analyzing, mining, integrating, reporting, benchmarking, validating, managing load-reduction programs, forecasting, billing, managing, analyzing, and reporting water, energy and energy-related data; Downloadable computer software for distributing and accessing information and collecting and building device integration, controlling and managing water and energy, and analyzing water and energy management; downloadable firmware and device drivers for energy and distributed energy resources management; Sensors for use with electric meters Services comprising the recording of data relating to water, gas, thermal energy and electricity meter readings in a computer file; automatic billing service; providing technical information and advice relating to automatic billing; data collection and management and analysis of automated billing data; data processing services, namely, reading and recording data related to water, gas, heat, and/or electricity meters; data processing services for use in the utility, power and energy industries; utility bill management services, namely, tracking, reporting, analyzing and delivering energy information in the form of thermostat displays, web pages, or mailings; management of energy data, customer data and their energy usage, namely, measurement or verification of energy usage; Promoting public awareness about energy generation, consumption, transmission, impact, conservation, and efficiency; providing information in the field of energy efficiency, including energy consumption, impact and conservation; providing resources in the nature of an interactive website featuring information and links in the field of energy conservation and efficiency Repair and maintenance of computer hardware and software systems Telecommunication, communication and networking services, namely, electronic delivery and transmission of messages, data, documents and information via the Internet, intranets, extranets, radio frequency networks, satellite, wireless networks and telephone lines; communication services, in the nature of electronic data exchange services between computer terminals and a meter; communication services in the nature of electronic data exchange services between computer terminals and a detector; communication services in the nature of electronic data exchange services between computer terminals and a data reader; providing multiple-user access to a global computer information network; providing multiple-user access to local and wide area networks; electronic remote transmission of data relating to water, gas, thermal energy and electricity meters; Remote transmission of data related to water, gas, heat and/or electricity meters by means of radio, cable, computer network being wireless electronic transmission of data via radio, cable and computer networks; Communication services by means of telephone, mobile radio, satellite and cable radio transmitter in the nature of telephone, mobile radio, satellite and cable radio transmitter communication services; Electronic transmission of messages and information related to flow meters by means of electronic computer communications networks; Providing communication between computers and flow meters, electronic sensors, detectors, and information readers being communication services, namely, providing electronic transmission of information stored in a database via interactively communicating computer systems; telecommunications services, namely, electronic transmission of data related to remote reading of meters measuring use and transmittal of electricity, gas, water and thermal energy Providing a website featuring non-downloadable instructional videos in the field of energy conservation and efficiency; educational services, namely, conducting on-line exhibitions and displays and interactive exhibits in the field of energy conservation and efficiency; conducting workshops and seminars in energy conservation and energy transmission Computer programming in the fields of energy, water, and gas; providing technical information and advice relating to remote meter reading; scientific and technological services in the field of remote meter reading and automatic billing in the nature of computer programming; research and design of electricity, gas, water, energy, oil and flow meters used for remote meter reading and automatic billing; design and development of computer hardware and software; computer related services and consulting for the utilities industries, namely, computer consulting for electric, gas and water facilities management; utility meters reading services, namely, reading water, gas, thermal energy and electricity meters; remote utility meter reading; Computer software programming for others; Remote reading of utility meters being utility meter reading services provided online; Providing technical information related to remote reading of utility meters; Online non-downloadable computer software for use in electrical load control and management; Online non-downloadable computer software for use in wireless meter data collection, storage and management; Wireless meter reading instruments being electricity meters; Online non-downloadable application software used to control and enable an apparatus for transmission of communication and storage of information being computer storage devices, namely, high-speed storage subsystems for storage and backup of electronic data either locally or via a telecommunications network, in the nature of electricity meters, remote transmitter controllers for radio-controlled devices, and meter data computer storage devices featuring data related to pricing, consumer usage, billing and load forecasting; Online non-downloadable computer software for use in monitoring, controlling, managing and generating reports regarding energy, electricity, energy consumption and usage, energy efficiency, including through demand response and load shifting energy usage management, and related data and information in the field of energy consumption; Online non-downloadable cloud-based software for connecting, operating and managing networked climate control devices in the Internet of Things (IoT), namely, software for use in monitoring, controlling, managing and generating reports regarding energy, electricity, energy consumption and usage, energy efficiency, including through demand response and load shifting energy usage management, and related data and information in the fields of energy consumption and usage; Cybersecurity services in the nature of restricting unauthorized access to computer and power grid systems; Design and development of computer software for biometrics, identity awareness, identity protection, fraud prevention, project management, technical skills and security management; Design and development of electronic data security systems
25.
TIME-MULTIPLEXING OF MULTIPLE LISTENING SCHEDULES AND PHYSICAL LAYER MODES IN A MESH NETWORK
Various embodiments disclose techniques for time-multiplexing multiple listening schedules and physical layer modes that include a first node listening, using a first physical layer mode, for a first network discovery signal; in response to not detecting the first network discovery signal, listening, using a second physical layer mode, for a second network discovery signal; and in response to detecting the second network discovery signal transmitted by a second node using the second physical layer mode, establishing a connection with the second node using the second physical layer mode.
Techniques for transmitting data include a network device receiving a message, the message comprising data to be transmitted from the network device; storing the message in a buffer of the network device. During an open data session window, the network device: extracts the message from the buffer; and transmits, using a transmitter of the network device, at least data included in the message to a transceiver of the network device. The transceiver is configured to transmit the data outside of the network device. In response to determining that a header of the message includes a last message indicator, the network device: delays for a period of time; and after the period of time, instructs the transceiver to end the data session window early and transition to a lower power state.
Techniques for contextualizing utility visualization patterns in a utility infrastructure environment are described herein. A utility meter data dashboard associated with a type of event may be displayed. A selection of a portion of a first utility visualization displayed in the utility meter data dashboard is received, the portion being associated with a subset of utility data. One or more previously used utility visualizations may be determined from among a plurality of additional utility visualizations. One or more candidate utility visualizations associated with the type of event may be determined from among the previously used utility visualizations. A ranked list of one or more candidate utility visualizations may be displayed. A second utility visualization may be displayed based at least in part on a selection from the ranked list.
The disclosure describes techniques for providing meter-to-transformer connectivity information and/or correction, using voltage-correlation, distance, and/or address data. In an example, a meter generates a time-series of voltage-changes. Transformers geographically close enough to the meter are assigned a time-series of voltage-changes. Pearson's Correlation Coefficient (PCC) values of the meter with respect to individual transformers are determined. A reference PCC value of the meter is set to be an average of a largest and a second largest PCC value from among the PCC values of the meter. Voltage-correlation confidence rating (VCCR) values for the meter with respect to each transformer that is within the threshold distance from the meter are calculated using the PCC. Based at least in part on the VCCR values for the meter with respect to each transformer that is within the threshold distance from that meter, a probability of the meter being connected to each transformer is determined.
A high-voltage protection module for a metrology device includes a metal-oxide varistor (MOV) coupled across a mains power line, a resistor electrically coupled to the MOV in series with the MOV, and a fuse electrically coupled to the MOV and the resistor in series, the resistor being located between the fuse and the MOV. The fuse opens upon an overvoltage event disengaging alternating current (AC) power from the mains power line to the metrology device.
H02H 3/22 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to excess voltage of short duration, e.g. lightning
A method performed by a first node includes determining respective routing metrics for individual nodes in a set of nodes, wherein higher values for a respective routing metric for a respective node of the set of nodes indicate a higher suitability for forwarding network traffic using the respective node of the set of nodes; receiving a first network packet; in response to determining that the first network packet is a low priority packet, selecting a second node from the set of nodes based on the second node having a respective routing metric below a threshold value; and forwarding the first network packet to the second node.
H04W 40/10 - Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources based on available power or energy
H04W 40/12 - Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
A method, apparatus, and system for providing an input overvoltage protection are disclosed. A voltage monitor may monitor input voltage to an electricity meter and output a reference voltage associated with, or based at least in part on, the input voltage. A ground switch may electrically connect a first ground to a second ground allowing current to flow from the second ground to the first ground and charge a bulk capacitor up to a predetermined level when the reference voltage is less than or equal to a threshold voltage, and electrically disconnect the first ground from the second ground and prevent from charging the bulk capacitor higher than the predetermined level when the reference voltage is greater than the threshold voltage.
H02H 7/20 - Emergency protective circuit arrangements specially adapted for specific types of electric machines or apparatus or for sectionalised protection of cable or line systems, and effecting automatic switching in the event of an undesired change from norm for electronic equipment
A method, apparatus, and system for providing an input overvoltage protection are disclosed. A voltage monitor may monitor input voltage to an electricity meter and output a reference voltage associated with, or based at least in part on, the input voltage. A ground switch may electrically connect a first ground to a second ground allowing current to flow from the second ground to the first ground and charge a bulk capacitor up to a predetermined level when the reference voltage is less than or equal to a threshold voltage, and electrically disconnect the first ground from the second ground and prevent from charging the bulk capacitor higher than the predetermined level when the reference voltage is greater than the threshold voltage.
H02H 3/12 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to underload or no-load
H02H 3/06 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection - Details with automatic reconnection
H02H 3/20 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to excess voltage
H02H 3/32 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to phase angle between voltages or between currents involving comparison of the voltage or current values at corresponding points in different conductors of a single system, e.g. of currents in go and return conductors
33.
TARGETED PARENT SELECTION FOR BATTERY-POWERED DEVICES
Targeted parent selection for nodes within a network include, filtering, by a node in a mesh network using one or more first network optimization criteria, a set of potential parent nodes to generate a subset of potential parent nodes; selecting, by the node using one or more second network optimization criteria, a target parent node from the subset of potential parent nodes; and transmitting, by the node, a connection request to the target parent node.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Online non-downloadable computer software for use in electrical load control and management; Online non-downloadable computer software for use in wireless meter data collection, storage and management;Electricity and natural gas services, namely, metering; Online non-downloadable application software used to control and enable an apparatus for transmission of communication and storage of information being computer storage devices, namely, high-speed storage subsystems for storage and backup of electronic data either locally or via a telecommunications network, in the nature of electricity meters, remote transmitter controllers for radio-controlled devices, and meter data computer storage devices featuring data related to pricing, consumer usage, billing and load forecasting; Online non-downloadable computer software for use in monitoring, controlling, managing and generating reports regarding energy, electricity, energy consumption and usage, energy efficiency, including through demand response and load shifting energy usage management, and related data and information in the field of energy consumption ; Online non-downloadable cloud-based software for connecting, operating and managing networked climate control devices in the Internet of Things (IoT), namely, software for use in monitoring, controlling, managing and generating reports regarding energy, electricity, energy consumption and usage, energy efficiency, including through demand response and load shifting energy usage management, and related data and information in the fields of energy consumption and usage; Cybersecurity services in the nature of restricting unauthorized access to computer and power grid systems; Design and development of computer software for biometrics, identity awareness, identity protection, fraud prevention, project management, technical skills and security management; Design and development of electronic data security systems
A load-side voltage detection module for a metrology device includes a plurality of first resistors electrically coupled to a first load-side terminal, the first resistors being in series, a plurality of second resistors electrically coupled to a second load-side terminal, the second resistors being in series, a voltage divider electrically coupled between a first line-side terminal and a second line-side terminal, the voltage divider creating a reference voltage for the load-side voltage detection module, and a pulse generator to generate a pulse based on detection of voltage, the pulse indicating a voltage on at least one of the first load-side terminal or the second load-side terminal, above at least one threshold.
G01R 22/06 - Arrangements for measuring time integral of electric power or current, e.g. electricity meters by electronic methods
H02J 3/06 - Controlling transfer of power between connected networks; Controlling sharing of load between connected networks
G01R 35/04 - Testing or calibrating of apparatus covered by the other groups of this subclass of instruments for measuring time integral of power or current
Techniques for evaluating electricity distribution infrastructures include a method comprising: determining, by a computing device, respective positions for individual solar panels included in a plurality of solar panels located within a geographical region; determining, by the computing device based on the respective positions and meteorological data for the geographical region, respective predicted solar power generation levels for the individual solar panels; determining, by the computing device based on the respective predicted solar power generation levels for the individual solar panels, a solar power generation estimate for the geographical region; and determining, by the computing device based on the solar power generation estimate for the geographical region and one or more properties of an electricity distribution infrastructure for the geographical region, one or more infrastructure modifications for the electricity distribution infrastructure.
Techniques for performing time synchronization within a network include a method comprising: determining, by a first node, a receive time at which a periodic beacon from a second node is expected to be received based on timing information associated with the second node; determining, by the first node, a first listening window for the periodic beacon based on the receive time and one or more of a drift uncertainty associated with an anticipated drift in a correction of a timing error between the first node and the second node or a jitter uncertainty associated with timing jitter in the first node or the second node; and listening, by the first node, for the periodic beacon during the first listening window.
A method, apparatus, and system for disconnecting loads from the electrical grid based on a power line frequency are disclosed. An electricity meter may monitor a power line frequency of a source power line connected to the electricity meter, and in response to determining that the power line frequency is lower than a disconnect threshold frequency, may open an internal switch and disconnect a load side output of the electricity meter from the source power line.
H02H 7/20 - Emergency protective circuit arrangements specially adapted for specific types of electric machines or apparatus or for sectionalised protection of cable or line systems, and effecting automatic switching in the event of an undesired change from norm for electronic equipment
G01R 23/15 - Indicating that frequency of pulses is either above or below a predetermined value or within or outside a predetermined range of values, by making use of non-linear or digital elements
Techniques for allocating event offsets within a period of transmission are described. A mains-powered device (MPD) may act as a “parent” to one or more battery-powered devices (BPDs). The MPD may assign “event offsets” to each BPD. The event offset is a time by which the BPD's timeslot is “offset” from the start of a periodic cycle of transmissions by the MPD. Thus, each event offset indicates a time that the BPD must be “awake,” i.e., operating its radio receiver and/or performing other functionality. A BPD may spend a substantial fraction of its time in a “sleep” mode, wherein less power is used and fewer functions are performed than during a period of that BPD's event offset. Another BPD may have a different event offset. Communications by the MPD with each child BPD may be substantially uniformly distributed over the period. To increase efficiency, groups of BPDs may receive multicasts.
Various embodiments set forth a method comprising validating, by a first computing system in a secured computing environment, a demand event generated by an operator, where the operator is authenticated to generate demand events within the secured computing environment and the demand event corresponds to a set of endpoints operating outside the secured computing environment, generating, by the first computing system, an authorization permit associated with the demand event, and sending, from the first computing system to a second computing system outside of the secured computing environment, (i) an indicator of the demand event, and (ii) the authorization permit, where the demand event is usable by the second computing system to generate a demand event command for the set of endpoints, and the authorization permit is usable by the set of endpoints to validate the demand event command
Various embodiments set forth a method comprising validating, by a first computing system in a secured computing environment, a demand event generated by an operator, where the operator is authenticated to generate demand events within the secured computing environment and the demand event corresponds to a set of endpoints operating outside the secured computing environment, generating, by the first computing system, an authorization permit associated with the demand event, and sending, from the first computing system to a second computing system outside of the secured computing environment, (i) an indicator of the demand event, and (ii) the authorization permit, where the demand event is usable by the second computing system to generate a demand event command for the set of endpoints, and the authorization permit is usable by the set of endpoints to validate the demand event command
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Techniques for acknowledging communications from multiple devices are described herein. For example, a device may broadcast a group acknowledgement message indicating that communications from multiple devices have been received by the device. Each acknowledgement in the group acknowledgement message may include a device identifier for a device that sent a communication (e.g., a Medium Access Control (MAC) address of the device, a hash of the MAC address of the device, etc.) and a communication identifier for the communication (e.g., a sequence number of the communication, a Cyclic Redundancy Check (CRC) code for the communication, etc.).
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04L 1/1607 - Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals - Details of the supervisory signal
Techniques for messaging based on trust levels and resource limitations in a mesh network include receiving, by a first node of a mesh network, a message; determining, by the first node, a security key type based on a resource parameter associated with a neighbor node included in the mesh network; securing, by the first node, the message using a security key of the security key type; and transmitting, by the first node, the secured message to the neighbor node. The resource parameter associated with the neighbor node comprises at least one of an amount of memory used to decrypt the secured message at the neighbor node, an amount of power used to decrypt the secured message at the neighbor node, or an indication of an amount of power remaining at the neighbor node.
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Techniques for forecasting solar power generation include determining, by a computing device, one or more configuration parameters of a photovoltaic (PV) installation; selecting, by the computing device based on the one or more configuration parameters, a prototype PV installation from a plurality of prototype PV installations; generating, by the computing device, a clear-sky solar power generation level for the selected prototype PV installation; and scaling, by the computing device, the clear-sky solar power generation level for the selected prototype PV installation to generate an estimated clear-sky solar power generation level for the PV installation.
A network system includes a main network implementing a conventional network protocol and a subtree of battery-powered nodes implementing a custom network protocol. The main network and the subtree are managed according to different subtree parameters. When a root node receives a request by a battery-powered node to join the subtree, the root node determines whether to allow the battery-powered node to join based on the subtree parameters for the subtree before sending a response to the battery-powered node.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Downloadable application software for use in connection with data processing, data storage, data capture, data collection, data warehousing, data management, data mining, database analytics, secure data sharing, cloud management; downloadable computer software that provides real-time, integrated business intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; downloadable cloud-based software for accessing, anonymizing, converting, storing, managing, formatting, and transferring online and electronic data; downloadable electronic data files featuring source data from payment transactions for use in machine learning, artificial intelligence, data monetization, and other strategic cases; mobile computing and operating platforms consisting of data transceivers, wireless networks, and gateways for the collection and management of data; downloadable computer software for providing an online database in the field of financial and payments processing to upload transactional data, provide statistical analysis, and produce notifications and reports; downloadable computer programs for the compilation of financial and payments data; downloadable computer software for computer system and application creation, development, deployment, control, and management in the field of data monetization; electronic data processing apparatus; downloadable computer software for creating searchable databases of information and data; integrated computerized system for collecting, processing, anonymizing, organizing, analyzing, storing, transmitting, and sharing of financial, payment card, banking, investment, payments, and personal data and information; downloadable computer software for electronic device installation and configuration, meter reading, utility analytics and forecasting, demand respond, energy efficiency, and payment for resource usage. (1) Business consultation services, business consulting and information services; data processing; business intermediary services relating to matching third party service providers with customers; business management and consulting services for the data industry, namely, providing industry expertise and partnerships with cloud providers, data providers, service providers, and technology providers; outsource service provider in the field of business operation and management of data processing, data storage, data capture, data collection, data warehousing, data management, data mining, database analytics, secure data sharing, cloud management; promoting the sale of services of others by means of incentive reward programs; maintaining a registry of certified cloud providers, data providers, service providers, technology providers, and technology integrations; commercial assistance relating to system implementation and system integration; online retail store services featuring computer software programs.
(2) Application service provider featuring application programming interface (API) software for use in connection with data warehousing, data management, data mining, database analytics and secure data sharing; software as a service (SAAS) services, namely, hosting software for use by others for use in connection with data warehousing, data management, data mining, database analytics and secure data sharing; platform as a service (PAAS) featuring computer software platforms for use in connection with data warehousing, data management, data mining, database analytics and secure data sharing; computer technology consultancy; electronic data storage; data warehousing; data mining; data conversion of electronic information; providing online non-downloadable software featuring technology that enables business users to manage electronic business information; providing online non-downloadable software featuring technology that enables business users to analyze electronic business information; providing online non-downloadable software featuring technology that enables business users to share electronic business information securely; computer technology consultancy in the field of data integration, data transformation, data management, data migration, data warehousing, data sharing, data analytics, data mining, and data security; information technology consulting services; providing temporary use of non-downloadable computer software for browsing and accessing digital content and computer software programs; Software as a service (SaaS) services, featuring software for meter reading, utility analytics and forecasting, demand respond, energy efficiency, payment for resource usage.
A method, apparatus, and system for disconnecting loads from the electrical grid based on a power line frequency are disclosed. An electricity meter may monitor a power line frequency of a source power line connected to the electricity meter, and in response to determining that the power line frequency is lower than a disconnect threshold frequency, may open an internal switch and disconnect a load side output of the electricity meter from the source power line.
H02H 7/00 - Emergency protective circuit arrangements specially adapted for specific types of electric machines or apparatus or for sectionalised protection of cable or line systems, and effecting automatic switching in the event of an undesired change from norm
H02H 7/20 - Emergency protective circuit arrangements specially adapted for specific types of electric machines or apparatus or for sectionalised protection of cable or line systems, and effecting automatic switching in the event of an undesired change from norm for electronic equipment
G01R 23/15 - Indicating that frequency of pulses is either above or below a predetermined value or within or outside a predetermined range of values, by making use of non-linear or digital elements
Techniques for data compression for efficient network management are described herein. In one example, group(s) of bytes are formed from among input bytes to be compressed. The groups are formed by including bytes having at least a certain number (e.g., three) zero-valued most significant bits (MSBs). A byte of input data having several zero-valued MSBs may be in several groups. A group having the largest product (number of bytes in the group times number of zero-valued MSBs in all bytes in the group) may be selected. A compressed-bytes array may be formed with data of the selected group of bytes, wherein the number of zero-valued MSBs originally present in all of the bytes of the group of bytes has been removed (to compress the array). An uncompressed-bytes array may be formed with bytes of the input bytes of data not in the selected group of bytes. An address-bit array may be formed to indicate the array in which data associated with each of the input bytes of data is stored.
H04L 69/04 - Protocols for data compression, e.g. ROHC
H04L 69/324 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the data link layer [OSI layer 2], e.g. HDLC
H03M 7/30 - Compression; Expansion; Suppression of unnecessary data, e.g. redundancy reduction
49.
Data compression techniques for efficient network management
Techniques for data compression for efficient network management are described herein. In one example, for each byte of input data, either: (1) a value of that byte is added to a first-instance array if the value of that byte has not yet been seen in the input data; or (2) an index value is added to an index array, wherein the index value points to the appropriate location in the first-instance array. An “address-bit array” is created with one bit for each byte of the input data. Each bit in the address-bit array indicates whether information of a corresponding byte of the input data was put into the first-instance array or the index array. When the input data file is smaller, the index values in the index array tend to be mostly small valued bytes. Accordingly, the number of zero-valued most significant bits (MSBs) present in all bytes may be stripped from the index array, thereby compressing the input data. The number of zero-valued MSBs stripped from all bytes in the index array may be indicated in a packet header.
A method, apparatus, and system for disconnecting loads from the electrical grid based on a power line frequency are disclosed. An electricity meter may monitor a power line frequency of a source power line connected to the electricity meter, and in response to determining that the power line frequency is lower than a disconnect threshold frequency, may open an internal switch and disconnect a load side output of the electricity meter from the source power line.
H02H 3/46 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to frequency deviations
H02J 3/00 - Circuit arrangements for ac mains or ac distribution networks
51.
Networked Utility Services and Vehicle Charging Stations
Networked utility services handle data-flow in a system to operate electrical vehicle charging stations. In an example, first and second utility companies may operate in first and second respective areas. A user may have a residence in the first area and may have an electric vehicle at a vehicle charging station in the second area. The user may provide identification at the vehicle charging station in the second area, and the user's vehicle may be charged at that location using electricity from the second utility. Data including the user's identification and the electricity consumed in the charging may be sent to the first utility serving the area including the user's residence. The first utility may bill the user for the electricity used to charge the user's vehicle at the remote vehicle charging station. The charging station, both utilities and/or other parties may share in the receipts.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
52.
TECHNIQUES FOR RELEASE ASSISTANCE INDICATION ASSERTION
Techniques for transmitting data include one or more processors of a computing device included in a network device identifying data to be transmitted, wherein the computing device includes the one or more processors, a queue, and a transmitter, and wherein the network device includes the computing device and a transceiver that is configured to transmit data outside of the network device; adding the data to the queue; and during an open data session window: transmitting, via the transmitter and to the transceiver, data extracted from the queue; and in response to determining that an amount of data in the queue is below a threshold, (a) delaying for a period of time, and (b) after the period of time, instructing the transceiver to end the open data session window early and transition to a lower power state.
Various embodiments set forth a method comprising determining, by a first computing device powered by a rechargeable battery and a non-rechargeable battery, whether to change operation of the first computing device from a first operating state to a second operating state based on one or more of a state of the rechargeable battery, a state of the non-rechargeable battery, or a state of a communication mode of the first computing device; and in response to determining that operation of the first computing device should change to the second operating state, increasing, by the first computing device, an interval between communications with one or more second computing devices using the communication mode.
Various embodiments set forth a method comprising determining, by a first computing device powered by a rechargeable battery and a non-rechargeable battery, whether to change operation of the first computing device from a first operating state to a second operating state based on one or more of a state of the rechargeable battery, a state of the non-rechargeable battery, or a state of a communication mode of the first computing device; and in response to determining that operation of the first computing device should change to the second operating state, increasing, by the first computing device, an interval between communications with one or more second computing devices using the communication mode.
55.
Disaggregation of Gas Load to Determine Meter or Service Under-Sizing
Techniques determine if a gas service (e.g., piping and/or meter) is under-sized for the customer's needs. In one example, flowrate information corresponding to gas usage at a service site over a first period of time is obtained. The flowrate information is disaggregated to determine an expected flowrate associated with each of two or more appliances having generally fixed-rates of gas consumption. Flowrate information is again obtained, corresponding to a second period of time. The second flowrate information is compared to one or more combinations (i.e., summations) of the expected flowrates associated with each of the two or more appliances. Based on the comparison, it may be determined that the service site is not appropriately sized. In an example, failure to detect two fixed-rate of gas-consumption appliances operating at their respective fixed-rates at the same time may indicate that the service cannot provide gas at a sufficient flowrate.
09 - Scientific and electric apparatus and instruments
Goods & Services
Computer software for electrical load control and management; computer software for wireless meter data collection, storage and management; wireless meter reading instruments; electric control devices for heating, cooling and energy management; thermostats; apparatus for transmission of communication and storage of information, namely, meters, remote transmitter controllers, or meter data storage devices related to pricing, consumer usage, billing and load forecasting.
09 - Scientific and electric apparatus and instruments
Goods & Services
(1) Computer software for electrical load control and management; computer software for wireless meter data collection, storage and management; wireless meter reading instruments; electric control devices for heating, cooling and energy management; thermostats; apparatus for transmission of communication and storage of information, namely, through meters, remote transmitter controllers, or meter data storage devices related to pricing, consumer usage, billing and load forecasting
A method includes receiving data packets from a stream partition of a plurality of stream partitions, processing the data packets with a plurality of stream processors to generate multiple table entries, transmitting the multiple table entries in batches to a plurality of staging tables, the plurality of staging tables being provided for a respective one of the plurality of stream partitions, and receiving the batches at a target table communicatively coupled to the plurality of staging tables, the batches being transmitted from the plurality of staging tables. The plurality of staging tables are updated in first batches at a first frequency and the target table is updated in second batches at a second frequency, the second frequency being different than the first frequency.
Techniques for forecasting solar power generation include a computing device determining a clear-sky solar power generation level for a photovoltaic installation; receiving, from a first measurement device, measurement data indicating an amount of cloud cover at a first location of the first measurement device, wherein the first measurement device and the photovoltaic installation are located in a same geographical area; and generating a solar power generation forecast for the photovoltaic installation based on the clear-sky solar power generation level and the measurement data.
G01W 1/10 - Devices for predicting weather conditions
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
H02J 3/00 - Circuit arrangements for ac mains or ac distribution networks
60.
NETWORK PROTOCOL FOR BATTERY POWERED DEVICES WITHIN A WIRELESS NETWORK
A network system implements a network protocol for devices and nodes withing a wireless network. A first node within a subtree of nodes in the wireless network performs a method including receiving a discovery request from a second node included in the wireless network, determining that an address associated with the second node is not included in a first address list that includes addresses of nodes along a node path between the first node and a root node of the subtree of nodes, and sending, in response to the determining, a response to the discovery request.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software for utility data analytics solutions;
computer software in the field of knowledge management for
the collection, editing, organizing, modifying, book
marking, transmission, storage and sharing of data and
information; computer software for data mining; computer
software for data warehousing; computer software for data
processing; computer software for electric meter reading and
data analysis. Software as a service (SAAS) services featuring software for
utility data analytics solutions; software as a service
(SAAS) services featuring software in the field of knowledge
management for the collection, editing, organizing,
modifying, book marking, transmission, storage and sharing
of data and information; data mining; data warehousing;
development and creation of computer programs for data
processing; development, updating and maintenance of
software and database systems; analysis of technical data
gathered from electric meter reading.
62.
Disaggregation of Gas Load to Determine Gas Appliance Performance
Techniques determine if an appliance having a fixed-rate of gas-consumption is degrading over time. In one example, a flowrate of gas at a service site is obtained. The flowrate of gas is disaggregated to obtain a flowrate of gas corresponding to an appliance having a generally fixed-rate of gas-consumption. The flowrate of gas of the appliance is compared to historical gas consumption by the appliance. Based at least in part on the comparing, it may be determined that performance of the appliance has changed over time. For example, the gas consumption of a hot water tank may increase due to mineral build-up in the bottom of the tank. Responsive to the determined degradation of the appliance, warnings may be sent, repairs may be made, and/or appliance(s) may be replaced.
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
An energy efficiency data collection system architecture may be configured to enable efficient and accurate collection of energy efficiency data associated with users and/or sites associated with users and generation of profiles associated with the users based on the energy efficiency data. An energy efficiency data collection service may receive location information, image data, and user-input data from an application operating on a mobile device associated with a user. The energy efficiency data collection service may generate profiles based on the information received from the application and may provide incentives to the users in response to participating in an energy efficiency data collection survey.
G06F 16/587 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location
G06F 16/13 - File access structures, e.g. distributed indices
G05B 19/042 - Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
H04W 4/029 - Location-based management or tracking services
H04W 4/20 - Services signalling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
64.
Efficient Collaboration between Meters under the Same Transformer
In an electrical grid, several electricity meters may be associated with the same transformer, and may measure electricity sold to respective customers. In an example, one electricity meter executes manager software, while the other electricity meters execute agent software. One or more applications operated on each electricity meter, and control metrology devices, data processing, operation of radio(s) and/or a powerline communications modem, aspects of electrical phase determination, etc. The agent software operating on each electricity meter may relay messages from applications operating on that electricity meter to other (possibly similar) applications operating on other electricity meters. Each message sent by each instantiation of agent software may include a networking score of that electricity meter. The manager software may additionally communicate with a data collector and/or main office server(s). The manager software may select a replacement meter from among those connected to the same transformer to assume the role of executing manager software.
In an electrical grid, several electricity meters may be associated with the same transformer, and may measure electricity sold to respective customers. One electricity meter executes manager software, while the other electricity meters execute agent software. One or more applications operated on each electricity meter, and control metrology devices, data processing, operation of radio(s) and/or a powerline communications modem, determine aspects of electrical phase determination, etc. The agent software operating on each electricity meter may relay messages from applications operating on that electricity meter to other applications operating on other electricity meters. Each message sent by each instantiation of agent software may include a networking score of that electricity meter. The manager software may communicate with a data collector and/or main office server(s). The manager software may select a replacement meter from among those connected to the same transformer to assume the role of executing manager software.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software for use in manual and remote
meter reading; downloadable application software for use in
manual and remote meter reading; downloadable computer
software for use in collection and management of information
from manual and remote meters; downloadable computer
software for use in organizing and displaying information
gathered from manual and remote meters. Business assistance, management and administrative services
in the field of manual and remote meter reading; data
processing services, namely, reading and recording data
related to manual and remote meters. Remote reading of utility meters being utility meter reading
services provided online; providing technical information
related to manual and remote reading of utility meters;
software design and development for others in the field of
manual and remote transmission and reading of data; remote
reading of utility meters being utility meter reading
services provided online; providing technical information
related to manual and remote reading of utility meters;
computer software design and development for others in the
field of manual and remote transmission and reading of data;
providing temporary use of non-downloadable cloud-based data
software collection and management platform for use in the
collection and management of data from manual and remote
electricity meters, gas meters and water meters; computer
software programming for others; providing temporary use of
online non-downloadable computer software for use in
organizing and displaying information gathered from manual
and remote meters; computer software programming for others;
providing temporary use of online non-downloadable computer
software for use in organizing and displaying information
gathered from manual and remote meters.
67.
EFFICIENT TRANSMISSION OF COMPRESSED CERTIFICATES IN A LOW BANDWIDTH MESH ENVIRONMENT
Various embodiments set forth a method comprising receiving, at a server node from a client node, a client compression dictionary that includes one or more first mappings between one or more first index values and one or more data entries included in a certificate cache of the client node; identifying, in response to receiving the client compression dictionary and based on the client compression dictionary, one or more certificates that should be transmitted to the client node; and transmitting, from the server node to the client node, the one or more identified certificates.
Various embodiments set forth a method comprising receiving, at a server node from a client node, a client compression dictionary that includes one or more first mappings between one or more first index values and one or more data entries included in a certificate cache of the client node; identifying, in response to receiving the client compression dictionary and based on the client compression dictionary, one or more certificates that should be transmitted to the client node; and transmitting, from the server node to the client node, the one or more identified certificates.
H03M 7/30 - Compression; Expansion; Suppression of unnecessary data, e.g. redundancy reduction
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
69.
ADAPTIVE TRANSMISSION MANAGEMENT BASED ON LINK LATENCY
Various embodiments disclose a method comprising receiving, at a first node, a listening schedule associated with a second node; determining, by the first node, a link latency associated with the second node based on the listening schedule; in response to the first node detecting a frame transmission failure for a frame being transmitted by the first node to the second node, determining, by the first node based on the link latency, a backoff time; and in response to the first node determining that the backoff time has elapsed, the first node retransmitting the frame from the first node to the second node. In some embodiments, the method also includes determining a frame lifetime value associated with the second node based on the link latency; and in response to determining that a time period corresponding to the frame lifetime value has elapsed, dropping the frame.
Various embodiments disclose a method that includes sending, by a first node to a plurality of neighbor nodes, a query associated with a dataset, wherein the dataset includes multiple blocks; receiving, at the first node from a set of the plurality of neighbor nodes, one or more responses to the query; based on a first quality ranking of individual nodes in the set, selecting, by the first node, a second node from the set; and sending, by the first node, a first request to the second node for at least one block of the multiple blocks.
Various embodiments disclose a method that includes: attempting to detect, with a first transceiver associated with a first node, a network discovery signal, wherein the attempting is performed according to (a) a first listening schedule associated with a first physical layer mode and (b) a second listening schedule associated with a second physical layer mode; detecting, with the first transceiver, the network discovery signal during a slot associated with the first listening schedule; and in response to detecting the network discovery signal, establishing, with the first node, a connection between the first node and the second node using the first physical layer mode.
Various embodiments disclose a method performed by a first node device in a mesh network that includes identifying a plurality of neighbor node devices that have one or more blocks of a dataset; determining quality scores for respective node devices of the plurality of neighbor node devices; selecting, based on the quality scores, a second node device from the plurality of neighbor node devices; and sending, to the second node device, a first request to receive at least one block of the one or more blocks.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 67/1008 - Server selection for load balancing based on parameters of servers, e.g. available memory or workload
73.
Adaptive transmission management based on link latency
Various embodiments disclose a method comprising receiving, at a first node, a listening schedule associated with a second node; determining, by the first node, a link latency associated with the second node based on the listening schedule; in response to the first node detecting a frame transmission failure for a frame being transmitted by the first node to the second node, determining, by the first node based on the link latency, a backoff time; and in response to the first node determining that the backoff time has elapsed, the first node retransmitting the frame from the first node to the second node. In some embodiments, the method also includes determining a frame lifetime value associated with the second node based on the link latency; and in response to determining that a time period corresponding to the frame lifetime value has elapsed, dropping the frame.
Various embodiments disclose a method that includes: attempting to detect, with a first transceiver associated with a first node, a network discovery signal, wherein the attempting is performed according to (a) a first listening schedule associated with a first physical layer mode and (b) a second listening schedule associated with a second physical layer mode; detecting, with the first transceiver, the network discovery signal during a slot associated with the first listening schedule; and in response to detecting the network discovery signal, establishing, with the first node, a connection between the first node and the second node using the first physical layer mode.
09 - Scientific and electric apparatus and instruments
Goods & Services
Electricity meters; Flow meters and fluid meters for gas, water and electricity and parts related thereto; Smart energy meters for tracking and monitoring energy usage; Electromagnetic static flow meters, electronic and mechanical electricity meters and parts related thereto; Meters used with flow meters; Energy meters for tracking and monitoring electricity usage; Sensors for use with electric meters; Advanced metering infrastructure devices, namely, electric meters, for tracking, monitoring, controlling, or reporting energy; Switches, electric; downloadable firmware and device drivers for energy and distributed energy resources management
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer application software for use in connection with data processing, data storage, data capture, data collection, data warehousing, data management, data mining, database analytics, secure data sharing, cloud management; Downloadable computer software that provides real-time, integrated business intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; downloadable cloud-based software for accessing, anonymizing, converting, storing, managing, formatting, and transferring online and electronic data; downloadable electronic data files featuring source data from payment transactions for use in machine learning, artificial intelligence, data monetization, and other strategic cases; mobile computing and operating platforms consisting of data transceivers, wireless networks, and gateways for the collection and management of data; downloadable computer software for providing an online database in the field of financial and payments processing to upload transactional data, provide statistical analysis, and produce notifications and reports; downloadable computer programs for the compilation of financial and payments data; downloadable computer software for computer system and application creation, development, deployment, control, and management in the field of data monetization; electronic data processing apparatus; downloadable computer software for creating searchable databases of information and data; integrated computerized system for collecting, processing, anonymizing, organizing, analyzing, storing, transmitting, and sharing of financial, payment card, banking, investment, payments, and personal data and information; downloadable computer software for electronic device installation and configuration, meter reading, utility analytics and forecasting, demand respond, energy efficiency, and payment for resource usage Business consultation services, business consulting and information services; Data processing; business intermediary services relating to matching third party service providers with customers; business management and consulting services for the data industry, namely, providing industry expertise and partnerships with cloud providers, data providers, service providers, and technology providers; maintaining a registry of certified cloud providers, data providers, service providers, technology providers, and technology integrations; commercial assistance relating to system implementation and system integration; online retail store services featuring computer software programs; promoting the sale of services of others by means of incentive reward programs Application service provider featuring application programming interface (API) software for use in connection with data warehousing, data management, data mining, database analytics and secure data sharing; Software as a service (SAAS) services, namely, hosting software for use by others for use in connection with data warehousing, data management, data mining, database analytics and secure data sharing; platform as a service (PAAS) featuring computer software platforms for use in connection with data warehousing, data management, data mining, database analytics and secure data sharing; Computer technology consultancy; electronic data storage; data warehousing; data mining; data conversion of electronic information; data management, namely, providing a website that features technology that enables business users to manage electronic business information; database analytics, namely, providing a website that features technology that enables business users to analyze electronic business information; secure data sharing, namely, providing a website that features technology that enables business users to share electronic business information securely; Computer technology consultancy in the field of data integration, data transformation, data management, data migration, data warehousing, data sharing, data analytics, data mining, and data security; Information technology consulting services; providing temporary use of non-downloadable computer software for browsing and accessing digital content and computer software programs; Software as a service (SAAS) services, namely, meter reading, utility analytics and forecasting, demand respond, energy efficiency, payment for resource usage; Outsource service provider in the field of data processing, data storage, data capture, data collection, data warehousing, data management, data mining, database analytics, secure data sharing, cloud management
77.
DETECTING ELECTRICAL ARCING IN HOUSEHOLD ELECTRICAL WIRING
Various embodiments disclosed herein provide techniques for detecting electrical arcing in an electrical system. The techniques include a network device receiving first voltage or current readings associated with a first power cycle, receiving second voltage or current readings associated with a second power cycle, determining that an electrical arcing condition is present by comparing the first voltage or current readings with the second voltage or current readings, and performing a remedial operation in response to determining that the electrical arcing condition is present.
H02H 3/46 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to frequency deviations
H02H 3/28 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to phase angle between voltages or between currents involving comparison of the voltage or current values at two spaced portions of a single system, e.g. at opposite ends of one line, at input and output of apparatus
Techniques are directed to controlling access to resources on a message bus of a network communication device. The techniques may include, by the network communication device, processing a message bus access policy file uniquely corresponding to a process. The message bus access policy file may include a certificate securely associating the message bus access policy file with the process. The techniques may further include, by the network communication device, based at least in part on the processing the message bus access policy file, exposing one or more resources of the network communication device to the process on the message bus, in a manner corresponding to at least one resource access permission indication contained within the message bus access policy file.
H04L 47/125 - Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
79.
REAL-TIME VALIDATION OF DISTRIBUTED ENERGY RESOURCE DEVICE COMMITMENTS
A computing device receives a commitment generated by a distributed resource device, the commitment indicating a type of the distributed resource device and a time interval when the distributed resource device modified usage of a resource at a location; receives an event corresponding to a pattern of usage of the resource at the location during the time interval; identifies an event model that is associated with a pattern of usage of the resource that matches the pattern of usage of the resource at the location during the time interval, the event model being included in a library of event models that associate different patterns of usage of the resource with corresponding types of distributed resource devices; and validates the commitment in response to determining that at least a type of distributed resource device associated with the event model corresponds to the type of distributed resource device indicated by the commitment.
A leak detection sensor may be capable of dynamically adjusting a sampling time for acoustic data based on monitored fluid flow. The leak detection sensor monitors leak detection information associated with a fluid in a fluid transporting medium over a predetermined time interval, where the leak detection information comprises flow and pressure of the fluid in the fluid transporting medium, and processing the leak detection data monitored at the sampling time in the predetermined time interval, where the sampling time is determined based at least in part on the monitored flow of the fluid.
G01M 3/24 - Investigating fluid tightness of structures by using fluid or vacuum by detecting the presence of fluid at the leakage point using infrasonic, sonic, or ultrasonic vibrations
F17D 5/06 - Preventing, monitoring, or locating loss using electric or acoustic means
G01M 3/28 - Investigating fluid tightness of structures by using fluid or vacuum by measuring rate of loss or gain of fluid, e.g. by pressure-responsive devices, by flow detectors for valves
A leak detection sensor may be capable of dynamically adjusting a sampling time for acoustic data based on monitored fluid flow. The leak detection sensor monitors leak detection information associated with a fluid in a fluid transporting medium over a predetermined time interval, where the leak detection information comprises flow and pressure of the fluid in the fluid transporting medium, and processing the leak detection data monitored at the sampling time in the predetermined time interval, where the sampling time is determined based at least in part on the monitored flow of the fluid.
F17D 5/06 - Preventing, monitoring, or locating loss using electric or acoustic means
E03B 7/07 - Arrangement of devices, e.g. filters, flow controls, measuring devices, siphons, valves, in the pipe systems
G01M 3/28 - Investigating fluid tightness of structures by using fluid or vacuum by measuring rate of loss or gain of fluid, e.g. by pressure-responsive devices, by flow detectors for valves
09 - Scientific and electric apparatus and instruments
Goods & Services
Gas meters; water meters; electricity meters; flow meters;
flow meters and fluid meters for gas, water and electricity
and parts related thereto; smart energy meters for tracking
and monitoring energy usage; electromagnetic static flow
meters, electronic and mechanical electricity meters and
parts related thereto; meters used with flow meters; energy
meters for tracking and monitoring electricity usage;
sensors for use with electric meters, gas meters, or water
meters; advanced metering infrastructure software and
devices, namely, water meters, gas meters, and electric
meters, for tracking, monitoring, controlling, or reporting
energy, gas, and water usage; control devices for use with
electric meters and gas meters.
83.
Electrical phase identification using a clustering algorithm
A method, apparatus, and system for identifying electrical phases connected to electricity meters are disclosed. Voltage time series data of electricity meters are collected over a preselected collection time period, and three initial kernels representing three line-to-neutral phases are generated based on voltage correlations of meter-to-meter combinations. Three new kernels are then generated based on correlation values calculated for each of the three initial kernels with each electricity meter, and electricity meters are clustered into three groups based on average correlation values associated with each electricity meter. Six new kernels representing six phases are then formed based on the average correlation value associated with each electricity meter, and a predicted phase is assigned to each electricity meter based on correlation values of the electricity meter with each of the six new kernels based on the voltage time series data.
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
G01R 19/25 - Arrangements for measuring currents or voltages or for indicating presence or sign thereof using digital measurement techniques
H02J 3/12 - Circuit arrangements for ac mains or ac distribution networks for adjusting voltage in ac networks by changing a characteristic of the network load
84.
ELECTRICAL PHASE IDENTIFICATION USING A CLUSTERING ALGORITHM
A method, apparatus, and system for identifying electrical phases connected to electricity meters are disclosed. Voltage time series data of electricity meters are collected over a preselected collection time period, and three initial kernels representing three line-to-neutral phases are generated based on voltage correlations of meter-to-meter combinations. Three new kernels are then generated based on correlation values calculated for each of the three initial kernels with each electricity meter, and electricity meters are clustered into three groups based on average correlation values associated with each electricity meter. Six new kernels representing six phases are then formed based on the average correlation value associated with each electricity meter, and a predicted phase is assigned to each electricity meter based on correlation values of the electricity meter with each of the six new kernels based on the voltage time series data.
G01R 19/25 - Arrangements for measuring currents or voltages or for indicating presence or sign thereof using digital measurement techniques
G01R 22/06 - Arrangements for measuring time integral of electric power or current, e.g. electricity meters by electronic methods
G01R 22/10 - Arrangements for measuring time integral of electric power or current, e.g. electricity meters by electronic methods using digital techniques
85.
ELECTRICAL PHASE IDENTIFICATION USING A CLUSTERING ALGORITHM
A method, apparatus, and system for identifying electrical phases connected to electricity meters are disclosed. Voltage time series data of electricity meters are collected over a preselected collection time period, and three initial kernels representing three line-to-neutral phases are generated based on voltage correlations of meter-to-meter combinations. Three new kernels are then generated based on correlation values calculated for each of the three initial kernels with each electricity meter, and electricity meters are clustered into three groups based on average correlation values associated with each electricity meter. Six new kernels representing six phases are then formed based on the average correlation value associated with each electricity meter, and a predicted phase is assigned to each electricity meter based on correlation values of the electricity meter with each of the six new kernels based on the voltage time series data.
G01R 22/06 - Arrangements for measuring time integral of electric power or current, e.g. electricity meters by electronic methods
G01R 22/10 - Arrangements for measuring time integral of electric power or current, e.g. electricity meters by electronic methods using digital techniques
G01R 19/25 - Arrangements for measuring currents or voltages or for indicating presence or sign thereof using digital measurement techniques
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Computer software for utility data analytics solutions; computer software in the field of knowledge management for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data and information; computer software for data mining; computer software for data warehousing; computer software for data processing; computer software for electric meter reading and data analysis. (1) Software as a service (SAAS) services featuring software for utility data analytics solutions; software as a service (SAAS) services featuring software in the field of knowledge management for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data and information; data mining; data warehousing; development and creation of computer programs for data processing; development, updating and maintenance of software and database systems; analysis of technical data gathered from electric meter reading.
87.
DETERMINING NETWORK RELIABILITY USING MESSAGE SUCCESS RATES
One embodiment of the present invention sets forth a technique for evaluating connections between nodes in a mesh network. The technique includes identifying a plurality of potential parent nodes for a first node included in the mesh network; computing, for each potential parent node, one or more accumulated message success rates associated with transmitting messages from the first node to a target destination within the mesh network via the potential parent node and with receiving messages from the target destination via the potential parent node; and selecting, from the plurality of potential parent nodes and based on the accumulated message success rates, a parent node for the first node.
One embodiment of the present invention sets forth a technique for processing packets transmitted within a network in accordance with a network protocol. The technique includes a network device in a mesh network receiving a type-length-value (TLV) element, determining, based on a type field of the TLV element, an expected length of a value field of the TLV element, and processing the value field up to the expected length.
One embodiment of the present invention sets forth a technique for evaluating connections between nodes in a mesh network. The technique includes determining, at a first node, one or more first accumulated message success rates associated with transmitting messages from the first node to a target destination within the mesh network via an established parent node and with receiving messages from the target destination via the established parent node; determining, based on the one or more first accumulated message success rates, that a search for a different parent node should be performed; identifying a plurality of potential parent nodes; computing, for each potential parent node, one or more second accumulated message success rates associated with transmitting messages from the first node to a target destination within the mesh network via the potential parent node and with receiving messages from the target destination via the potential parent node; and based on the second accumulated message success rates, selecting a new parent node from the plurality of potential parent nodes or maintaining the established parent node
Techniques for determining a potential electrical threat by a utility meter are described herein. A metrology unit of the meter is configured to receive electrical data associated with electrical usage at a location The meter is configured to determine, based on the electrical usage at the location and/or previous electrical data, abnormalities indicative of an unstable connection, such as a loose wire connecting a load to a power supply. The meter may employ a machine learned model or other algorithm to identify the loose wire or unstable connection and is configured to disconnect power to the location and/or send a message to an alarm device at the location and/or to a computing device remote from the location. In this way, the metrology unit can be used to mitigate potential electrical threats, such as fire, due to an unstable connection such as a loose connection.
Techniques for evaluating connections between nodes include computing a second accumulated uplink message success rate based on a first accumulated uplink message success rate and a second accumulated downlink message success rate based on a first accumulated downlink message success rate. The first accumulated uplink message success rate indicates a probability of successfully transmitting messages from a second node to a target destination and the second accumulated uplink message success rate indicates a probability of successfully transmitting messages from the first node to the target destination via a direct connection from the first node to the second node. The first accumulated downlink message success rate indicates a probability of successfully receiving messages transmitted by the target destination at the second node and the second accumulated downlink message success rate indicates a probability of successfully receiving messages transmitted by the target destination at the first node via the direct connection.
Techniques for evaluating connections between nodes include a first node determining one or more first accumulated message success rates associated with transmitting messages from the first node to a target destination via an established parent node and with receiving messages from the target destination via the established parent node; determining, based on the one or more first accumulated message success rates, that a search for a different parent node should be performed; identifying a plurality of potential parent nodes; computing, for each potential parent node, one or more second accumulated message success rates associated with transmitting messages from the first node to a target destination via the potential parent node and with receiving messages from the target destination via the potential parent node; and based on the second accumulated message success rates, selecting a new parent node from the plurality of potential parent nodes or maintaining the established parent node.
Techniques for evaluating connections between nodes in a mesh network include a first node listening across a plurality of listening windows for one or more messages transmitted by a second node during a time period; determining a number of messages received by the first node during the time period; computing, based on the number of messages received, a received message success rate associated with a connection between the first node and the second node, wherein the received message success rate indicates a probability of successfully receiving, at the first node, messages transmitted by the second node via the connection; and computing, based on at least one message received during the time period, a transmitted message success rate associated with the connection, wherein the transmitted message success rate indicates a probability of successfully transmitting messages from the first node to the second node via the connection.
Techniques for evaluating connections between nodes include computing a second accumulated uplink message success rate based on a first accumulated uplink message success rate and a second accumulated downlink message success rate based on a first accumulated downlink message success rate. The first accumulated uplink message success rate indicates a probability of successfully transmitting messages from a second node to a target destination and the second accumulated uplink message success rate indicates a probability of successfully transmitting messages from the first node to the target destination via a direct connection from the first node to the second node. The first accumulated downlink message success rate indicates a probability of successfully receiving messages transmitted by the target destination at the second node and the second accumulated downlink message success rate indicates a probability of successfully receiving messages transmitted by the target destination at the first node via the direct connection.
Techniques for evaluating connections between nodes include a first node determining one or more first accumulated message success rates associated with transmitting messages from the first node to a target destination via an established parent node and with receiving messages from the target destination via the established parent node; determining, based on the one or more first accumulated message success rates, that a search for a different parent node should be performed; identifying a plurality of potential parent nodes; computing, for each potential parent node, one or more second accumulated message success rates associated with transmitting messages from the first node to a target destination via the potential parent node and with receiving messages from the target destination via the potential parent node; and based on the second accumulated message success rates, selecting a new parent node from the plurality of potential parent nodes or maintaining the established parent node.
One embodiment of the present invention sets forth a technique for evaluating connections between nodes in a mesh network. The technique includes listening, at a first node and across a plurality of listening windows, for one or more messages transmitted by a second node during a first period of time; determining a number of messages received by the first node during the first period of time; computing, based on the number of messages received by the first node, a received message success rate associated with a first connection between the first node and the second node, wherein the received message success rate indicates a probability of successfully receiving, at the first node, messages transmitted by the second node via the first connection; and computing, based on at least one message received during the first period of time, a transmitted message success rate associated with the first connection, wherein the transmitted message success rate indicates a probability of successfully transmitting messages from the first node to the second node via the first connection.
One embodiment of the present invention sets forth a technique for evaluating connections between nodes in a mesh network. The technique includes identifying a plurality of potential parent nodes for a first node included in the mesh network; computing, for each potential parent node, one or more accumulated message success rates associated with transmitting messages from the first node to a target destination within the mesh network via the potential parent node and with receiving messages from the target destination via the potential parent node; and selecting, from the plurality of potential parent nodes and based on the accumulated message success rates, a parent node for the first node.
Techniques for determining network reliability using message success rates include a first node in a mesh network computing a transmitted message success rate associated with a connection from the first node to a second node, wherein the second node is a neighbor node to the first node; computing, based on a first accumulated transmitted message success rate and the transmitted message success rate, a second accumulated transmitted message success rate for a route from the first node to a target destination using the second node, wherein the first accumulated transmitted message success rate is received from the second node and is associated with intermediary connections between the second node and the target destination; selecting, based on the second accumulated transmitted message success rate, the second node from a plurality of neighbor nodes; and transmitting a message to the target destination via the second node.
Techniques for evaluating connections between nodes in a mesh network include a first node listening across a plurality of listening windows for one or more messages transmitted by a second node during a time period; determining a number of messages received by the first node during the time period; computing, based on the number of messages received, a received message success rate associated with a connection between the first node and the second node, wherein the received message success rate indicates a probability of successfully receiving, at the first node, messages transmitted by the second node via the connection; and computing, based on at least one message received during the time period, a transmitted message success rate associated with the connection, wherein the transmitted message success rate indicates a probability of successfully transmitting messages from the first node to the second node via the connection.
One embodiment of the present invention sets forth a technique for evaluating connections between nodes in a mesh network. The technique includes identifying a plurality of potential parent nodes for a first node included in the mesh network; computing, for each potential parent node, one or more accumulated message success rates associated with transmitting messages from the first node to a target destination within the mesh network via the potential parent node and with receiving messages from the target destination via the potential parent node; and selecting, from the plurality of potential parent nodes and based on the accumulated message success rates, a parent node for the first node.