Abstract:
A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device.
Abstract:
A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device.
Abstract:
A wireless communication network system includes a plurality of nodes. Each node from the plurality of nodes includes a plurality of communication modules. Each module includes a modem and is configured to operate according to a communication protocol. Each communication module is configured to monitor its own communication parameter data and to cooperate with companion modules of a node by sharing communication parameter data, for instance through a coordination unit. Each communication module is further configured to allow, preferably according to a predefined set of rules, communication using a protocol of one communication module by utilizing a band associated with a companion module. The sharing of communication parameter data between modules may be continuous sharing or periodic sharing.
Abstract:
A node residing within a wireless mesh network is configured to transmit a state transition message to a downstream node also residing within the wireless mesh network. The state transition message indicates a new operating state for the downstream node. Upon receipt of the state transition message, the downstream node may transition to the new operating state and then transmit an acknowledgement message back to the node that sent the state transition message. Alternatively, the downstream node may transmit the acknowledgement message back to the node that sent the state transition message first, and then transition to the new operating state.
Abstract:
A node residing within a wireless mesh network is configured to transmit a state transition message to a downstream node also residing within the wireless mesh network. The state transition message indicates a new operating state for the downstream node. Upon receipt of the state transition message, the downstream node may transition to the new operating state and then transmit an acknowledgement message back to the node that sent the state transition message. Alternatively, the downstream node may transmit the acknowledgement message back to the node that sent the state transition message first, and then transition to the new operating state.
Abstract:
A wireless communication network system includes a plurality of nodes. Each node from the plurality of nodes includes a plurality of communication modules. Each module includes a modem and is configured to operate according to a communication protocol. Each communication module is configured to monitor its own communication parameter data and to cooperate with companion modules of a node by sharing communication parameter data, for instance through a coordination unit. Each communication module is further configured to allow, preferably according to a predefined set of rules, communication using a protocol of one communication module by utilizing a band associated with a companion module. The sharing of communication parameter data between modules may be continuous sharing or periodic sharing.
Abstract:
A method for transmitting communications by a transmitter includes selecting a non-alternating spreading sequence, receiving bits for transmission, encoding the bits using the non-alternating spreading sequence to obtain encoded bits, and transmitting the encoded bits to a frequency shift key (FSK) receiver. A method for receiving communications by an FSK receiver includes receiving, by the FSK receiver, encoded bits from a transmitter, decoding the encoded bits using a non-alternating spreading sequence to obtain decoded bits, and processing the decoded bits.
Abstract:
To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
Abstract:
A method for transmitting communications by a transmitter includes selecting a non-alternating spreading sequence, receiving bits for transmission, encoding the bits using the non-alternating spreading sequence to obtain encoded bits, and transmitting the encoded bits to a frequency shift key (FSK) receiver. A method for receiving communications by an FSK receiver includes receiving, by the FSK receiver, encoded bits from a transmitter, decoding the encoded bits using a non-alternating spreading sequence to obtain decoded bits, and processing the decoded bits.