Abstract:
A permitting system for controlling devices in a system includes a permit issuing agent that receives a command to be sent to a device. Based upon at least one attribute of the command, the permit issuing agent identifies one or more business logic modules that is pertinent to the command. Each business logic module has a respectively different set of business rules associated with it. Each identified business logic module determines whether the command complies with the business rules associated with that module. If the command is determined to comply with the business rules of all of the identified business logic modules, the agent issues a permit for the command, and the permit is sent to the device for execution of the command.
Abstract:
The functionality of communications standards and protocols that are application-layer specific are overlaid on an IP-based infrastructure, by employing an IP DNS server as the registration host for IP and other communications standards based and protocol based communications. Communication can occur at either the IP layer or the communications standards or protocol application layer. At the IP layer, a host application can interrogate network nodes. To extend this service to other communications standards or protocol communications, device registration and resolve services are implemented on the DNS server. Similar to the manner in which an IP-based service uses a native, IP-based DNS resolve request, a host can utilize a resolution request against the communications standards and protocol-enabled DNS server for standards and protocol application-layer interrogation of endpoints.
Abstract:
One embodiment of the present invention implements a FHSS system using single transmitter/multiple receiver transceivers. Such transceivers are configured to receive multiple FHSS channels (e.g., five channels) but only transmit on one channel. In an embodiment, one channel is dedicated to high priority traffic and the other four channels are dedicated to standard traffic. In receiving a high priority message, the transceiver is configured to address the high priority traffic first. For example, because the single transmitter/multiple receiver transceivers only has one transmitter, such transceiver may immediately dedicate it transmitting resources to addressing the received high priority data. Other embodiments are disclosed that implement multiple priorities among a plurality of communication channels.
Abstract:
A method for managing radio transmission in an endpoint device in a network includes: receiving, at a first endpoint device, a message requesting wake up of the first endpoint device; establishing a connection between the first endpoint device to a second endpoint device connected to the network; determining, at the first endpoint device, whether a secure command is received from the second endpoint device via the established connection within a predetermined period of time; and based on the received secure command, establishing a connection between the first endpoint device and the network via radio transmission, wherein the first endpoint device is configured to turn off radio transmission if the secure command is not received within the predetermined period of time.
Abstract:
A method for controlling a light source associated with an environment includes: receiving, over a wireless mesh network and by a control node corresponding to the light source, a first light intensity value for the environment from a first sensor node; calculating, by the control node, a resulting light intensity (RLI) value based on the first intensity value; determining, by the control node, that the RLI value exceeds a light intensity threshold; and modifying, by the control node and in response to determining the RLI value exceeds the light intensity threshold, an output of the first light source.
Abstract:
Securing the manufacturing supply chain with digital certificates. A token is coupled to a manufacturing station and enabled via a personal identification number. The token includes a counter limiting the maximum number of certificates to be signed, and compares a serial number of a digital certificate to a tracked serial number. In some embodiments, the token is linked to a particular manufacturing station once the token is enabled.
Abstract:
Techniques are disclosed by which RF mesh networks can identify utility distribution topologies by using power line communication combined with wireless networking to identify the mapping of transformers and other distribution equipment at a back office system server. At a specified time, an item of distribution equipment signals a unique identifier by introducing a phase shift in the electric power being delivered by that equipment. A meter node detects and decodes these temporal shifts to obtain an identifier of equipment supplying the power to it. Upon ascertaining this identification, the meter node sends an acknowledgment to thereby register with that equipment. The association of the particular customer's premises with the equipment is also sent to a back office system, to enable a map of the correspondence between meter and the equipment to be generated.
Abstract:
A source node residing within a wireless mesh network is configured to transmit data packets to downstream nodes also residing within the wireless mesh network. Upon receipt of a data packet, a given downstream node determines a channel on which to transmit an acknowledgement packet and a sub-interval of time during which to transmit the acknowledgement packet based on a short ID assigned by the source node. At the determined sub-interval of time, the downstream node transmits the acknowledgement packet to the source node on the determined channel.
Abstract:
One example embodiment provides a method and system where a node in a utility network registers with one or more access point devices associated with one or more local area utility networks. The utility node generates a unique network address using a network address prefix of a network address associated with the access point device. The utility node registers with a DNS server. Messages sent to the utility node are routed through the access point corresponding to the received prefix used to generate the unique network address for the utility node. The network address for the utility node and access point may be IPv6 addresses and the network address prefix may be an IPv6 prefix, or may be an IPv4 address.
Abstract:
One example embodiment provides a method and system where a node in a utility network assigns an IP network address to an in-premise device which communicates to the utility node over an in-premise network which is not IP based. The utility node proxies the assigned IP address to the utility network, allowing other nodes on the utility network to address and communicate with the in-premise device.