摘要:
The fiber optic isolator of the present invention transports data signals between high voltage power lines and a communications interface device, bypassing a step down transformer to low voltage power. The communication interface device includes a low voltage power line as well as telecommunications and wireless interfaces. The signals are coupled and de-coupled off of a high voltage power line by a power line coupler. The fiber optic isolator gets the signals (in light form) and transports them to and from the communications interface device. This insulates the system from current flow between the high voltage power lines and the communications interface.
摘要:
Simultaneous bi-directional communication of digital signals across an isolation barrier, such as a pulse transformer, is presented. On the pimary side of the barrier, a voltage driver drives a digital transmit data stream, that is encoded to be DC balanced in both current and voltage domains, across the barrier. On the secondary side, an impedance switching circuit modulates the load impedance of the voltage driver in accordance with a digital receive data stream. The modulation of the load impedance is detected on the primary side by sampling the sourced current of the voltage driver to extract the digital receive data. The voltage driver may be sampled at predictable points in time when the current it is sourcing is primarily dependent upon the load impedance of the secondary side. Alternatively, the magnetizing inductance current of the isolation barrier can be subtracted from the current sourced due to the known transmit data.
摘要:
A user interface device for specifying network connection in a straightforward manner between information apparatus is provided. When a user wishes to connect two apparatuses, connection buttons on each apparatus are pressed down at the same time, with pressing then being released at the same time. Packets containing timing of pressing down and release of the connection buttons are then transmitted from each apparatus using multicasting. The times included in the packets are then compared with those recorded within the apparatuses, so as to enable both apparatuses to correctly identify each other. This connection method is scaleable as being able to detect duplicate connection requests. It is therefore possible to establish secure connection by exchanging public keys.
摘要:
A method for requesting location information, for example, Enhanced Observed Time of Arrival timing information, from mobile wireless communications in wireless communications networks. The exemplary location request (300) includes multiple response interval field (310) specifying intervals at which multiple responses to the location request must be sent or maximum intervals between which multiple responses to the location request must be sent, a final response time field (320) specifying a maximum time interval during which a final response to the location request must be sent, and an initial response time field (330) specifying when an initial response to the location request must be sent.
摘要:
A media converter for bridging or inter-connecting a power-line backhaul distribution (WAN) and coaxial (LAN) distribution within a Multi-Tenant Unit (nullMTUnull). The functions required to facilitate nullconvertingnull and transporting information between the power line distribution network and the coaxial distribution network would be contained within one or more (media converters).
摘要:
A low cost frequency shift keying communications system for communication between utility meters within a local area network and for communication with a central database. Transmitters coupled to the utility meters transmit utility meter data measurements over power lines to at least one power line receiver associated with another utility meter within the local area network. The power line receiver communicates the data measurements from each utility meter to the central database via telephone or radio frequency transmitter.
摘要:
A system receives AC power from an Uninterruptable Power Supply (UPS) on an AC power cable. The AC power cable couples a primary AC line voltage or a switched secondary AC line voltage depending on the quality of the primary AC line voltage. The UPS has a modulating circuit with a power line carrier protocol that receives a power down signal from the UPS if the primary AC line voltage indicates that the system should power down in a controlled manner or take other power down actions. The modulating circuit generates a modulated power down signal that is coupled to the AC power cable. The system has a corresponding demodulating receiving circuit with the power line carrier protocol that receives the modulated power down signal and regenerates the power down signal. The power down signal is coupled to circuitry in the system that initiates power down sequencing options.
摘要:
An apparatus and methods for expeditious handling of emergency message frames (e.g., 911 voice-over-Internet-Protocol nullVoIPnull frames, etc.) sent by a station in a wireless local-area network are disclosed. The illustrative embodiment increases the probability with which an emergency message frame is accorded the highest quality-of-service by establishing polling schedules that preferentially accommodate stations that transmit emergency message frames.
摘要:
A system and method for monitoring individuals using voice print matching to match previously stored unidentified speech samples with known voice prints is disclosed. Voice prints of unidentified individuals are obtained and stored in a central repository for use by authorized agencies or other entities that monitor voice communications, such as, for example, if the conversation being monitored causes the monitor, based on their predetermined alert criteria, to suspect the speakers of illegal activity, such as, for example, terrorism, or otherwise cause the monitor to seek additional information about the speakers. Voice prints of known individuals are taken by authorized agencies based on predetermined criteria. When these known voice prints are being obtained, they are compared to the unidentified voice prints in the database, and if a match is found, the monitor is notified, and put in communication with the agency taking the voice print for further action as appropriate.
摘要:
A relatively simple redialer device is provided at the customer's home to redirect outgoing alarm calls to a middleware processing center. The redialer first dials nullnull82null (or other appropriate code) to disable caller-ID blocking. The redialer then redirects the alarm call to a middleware processing center. The middleware processing center receives the alarm call and determines the customer identification by detecting the caller ID. The middleware processing center then dials out to the appropriate alarm company for that customer, and transfers the alarm data along with customer identification information (account number or the like) in a data format compatible with the alarm monitoring company's computers. The alarm is then handled by the alarm monitoring company in the normal manner practiced by the alarm monitoring company.