Abstract:
Nodes within a wireless mesh network are configured to monitor time series data associated with a utility network, including voltage fluctuations, current levels, temperature data, humidity measurements, and other observable physical quantities. The nodes execute stream functions to process the recorded time series data and generate data streams. The node is configured to transmit generated data streams to neighboring nodes. A neighboring node may execute other stream functions to process the received data stream(s), thereby generating additional data streams. A server coupled to the wireless mesh network collects and processes the data streams to identify events occurring within the network.
Abstract:
One example embodiment provides a method and system where a node in a utility network receives a block of IPv6 network addresses from an access point in the utility network. The utility node allocates an IP network address from the block of IPv6 network addresses received from the access point to an in-premise device which communicates to the utility node over an in-premise network which is not IP based. The utility node proxies the allocated IP address to the utility network, allowing other nodes on the utility network to address and communicate with the in-premise device.
Abstract:
A method for removing credentials from a smart grid device includes: receiving, by a receiving device, a removal request, wherein the removal request includes a device identifier associated with a smart grid device and is signed by an entity associated with a set of security credentials stored in a memory of the smart grid device, the set of security credentials restricting access to one or more components or operations of the smart grid device; extracting, by a processing device, the device identifier included in the received removal request; generating, by the processing device, a permit configured to remove the set of credentials from the smart grid device, wherein the generated permit includes the extracted device identifier; and transmitting, by a transmitting device, the generated permit to the smart grid device for removal of the set of credentials from the memory of the smart grid device.
Abstract:
The invention relates to a method for controlling thermal properties of a node. The method steps include calculating, using a temperature reading, a transmission duty cycle of the node, calculating a data amount capable of being transmitted with the transmission duty cycle, and transmitting, from a network interface of the node, a plurality of available data at a rate less than the data amount based on a priority of the plurality of available data.
Abstract:
A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event.
Abstract:
One example embodiment provides a method and system where a node in a utility network registers with one or more access point devices associated with one or more local area utility networks. The utility node generates a unique network address using a network address prefix of a network address associated with the access point device. The utility node registers with a DNS server. Messages sent to the utility node are routed through the access point corresponding to the received prefix used to generate the unique network address for the utility node. The network address for the utility node and access point may be IPv6 addresses and the network address prefix may be an IPv6 prefix, or may be an IPv4 address.
Abstract:
A method for enabling a scalable public-key infrastructure (PKI) comprises invoking a process of receiving a message for a device, identifying an association ID for the device, retrieving encrypted association keys stored on the server for communicating with the device, the encrypted association keys encrypted using a wrapping key stored on a Hardware Security Module (HSM). The method further comprises sending the message and the encrypted association keys to the HSM, unwrapping, by the HSM, the encrypted association keys to create unwrapped association keys, cryptographically processing the message to generate a processed message, deleting the unwrapped association keys, sending the processed message to the device, and invoking, concurrently and by a second application, the process.
Abstract:
A method for locking out a remote terminal unit includes: receiving a lockout request, wherein the lockout request includes at least a public key associated with a user, a user identifier, and a terminal identifier; identifying a user profile associated with the user based on the user identifier included in the received lockout request; verifying the public key included in the received lockout request and permission for the user to lockout a remote terminal unit associated with the terminal identifier included in the received lockout request based on data included in the identified user profile; generating a lockout permit, wherein the lockout permit includes at least the public key included in the received lockout request; and transmitting at least a lockout request and the generated lockout permit, wherein the lockout request includes an instruction to place a lockout on the remote terminal unit.
Abstract:
A method for authenticating a meter reading. The method includes obtaining a measurement representing a measured attribute of a user, analyzing the measurement to generate an authentication code, generating the meter reading based on the measurement and the authentication code, presenting, by the metering device, the meter reading to the user who alters and reports the meter reading as a reported meter reading, analyzing, by a meter reading analysis device, the reported meter reading to detect that the meter reading was altered by the user, and generating, by the meter reading analysis device and in response to the detecting, a dispatch request to dispatch a human inspector for validating the measurement.
Abstract:
A permitting system for controlling devices in a system includes a permit issuing agent that receives a command to be sent to a device. Based upon at least one attribute of the command, the permit issuing agent identifies one or more business logic modules that is pertinent to the command. Each business logic module has a respectively different set of business rules associated with it. Each identified business logic module determines whether the command complies with the business rules associated with that module. If the command is determined to comply with the business rules of all of the identified business logic modules, the agent issues a permit for the command, and the permit is sent to the device for execution of the command.