SILVER SPRING NETWORKS, INC. Patent applications |
Patent application number | Title | Published |
20160119310 | AUTHENTICATION AND PAIRING OF A MOBILE DEVICE TO AN EXTERNAL POWER SOURCE - A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device. | 04-28-2016 |
20160105892 | WIRELESS DEVICE WITH OPPORTUNISTIC BAND ACCESS - A wireless communication network system includes a plurality of nodes. Each node from the plurality of nodes includes a plurality of communication modules. Each module includes a modem and is configured to operate according to a communication protocol. Each communication module is configured to monitor its own communication parameter data and to cooperate with companion modules of a node by sharing communication parameter data, for instance through a coordination unit. Each communication module is further configured to allow, preferably according to a predefined set of rules, communication using a protocol of one communication module by utilizing a band associated with a companion module. The sharing of communication parameter data between modules may be continuous sharing or periodic sharing. | 04-14-2016 |
20150215813 | MULTI-CHANNEL MESH NODES EMPLOYING STACKED RESPONSES - Rather than using a large number of transceivers (transmitter/receiver pairs) operating in parallel, Access Points with multiple channels are used to aggregate, or stack, transmitted response communications, e.g., transmitting multiple acknowledgements (ACKs) in a single packet to one or more sources of received packets. The method includes sending on a plurality of channels, by each of a plurality of respective first nodes, a communication to a second node, receiving on the plurality of channels, by the second node, the communication from each of the plurality of first nodes and sending, by the second node, a transmission that contains a response to each communication that was successfully received from each of the plurality of first nodes. The response to each of the plurality of first nodes is part of a single message sent by the second node. | 07-30-2015 |
20150189676 | SYSTEM AND METHOD FOR OPTIMAL LISTEN BEFORE TRANSMIT IN WIRELESS COMMUNICATIONS - One embodiment of the present invention sets forth a technique for transmitting data in a listen before talk (LBT) wireless transmission regime. A digital radio receiver is configured to simultaneously receive and decode digital data transmissions from multiple radio channels. A digital radio transmitter is configured to listen to the multiple radio channels prior to transmitting digital data on a selected one of the multiple channels, based on locally determined channel occupancy. Optimal LBT efficiency is achieved within the set of multiple channels, thereby improving overall transmission efficiency between the transmitter and the receiver. | 07-02-2015 |
20150186961 | AUTHENTICATION AND PAIRING OF A MOBILE DEVICE TO AN EXTERNAL POWER SOURCE - A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device. | 07-02-2015 |
20150180701 | METHOD AND SYSTEM FOR DETECTING FAILURES OF NETWORK NODES - Systems and methods for detecting device failures in a network having nodes coupled to a central controller, in which a first of the nodes communicates with the central controller via a second of the nodes. When the second node determines that the first node has not transmitted a predetermined number of messages over a predefined number of time periods, the second node provides a failure alert to the central controller. The central controller records a failure alert received from the second node in a log. Based on a set of failure alerts received from a number of nodes recorded in the log, the central controller determines whether the first node has failed. | 06-25-2015 |
20150163808 | WIRELESS DEVICE WITH OPPORTUNISTIC BAND ACCESS - A wireless communication network system includes a plurality of nodes. Each node from the plurality of nodes includes a plurality of communication modules. Each module includes a modem and is configured to operate according to a communication protocol. Each communication module is configured to monitor its own communication parameter data and to cooperate with companion modules of a node by sharing communication parameter data, for instance through a coordination unit. Each communication module is further configured to allow, preferably according to a predefined set of rules, communication using a protocol of one communication module by utilizing a band associated with a companion module. The sharing of communication parameter data between modules may be continuous sharing or periodic sharing. | 06-11-2015 |
20150120922 | SYSTEM, METHOD AND PROGRAM FOR DETECTING ANOMALOUS EVENTS IN A UTILITY NETWORK - A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event. | 04-30-2015 |
20150106894 | RETURN MATERIAL AUTHORIZATION FULFULLMENT SYSTEM FOR SMART GRID DEVICES WITH CUSTOMER SPECIFIC CRYPTOGRAPHIC CREDENTIALS - A method for removing credentials from a smart grid device includes: receiving, by a receiving device, a removal request, wherein the removal request includes a device identifier associated with a smart grid device and is signed by an entity associated with a set of security credentials stored in a memory of the smart grid device, the set of security credentials restricting access to one or more components or operations of the smart grid device; extracting, by a processing device, the device identifier included in the received removal request; generating, by the processing device, a permit configured to remove the set of credentials from the smart grid device, wherein the generated permit includes the extracted device identifier; and transmitting, by a transmitting device, the generated permit to the smart grid device for removal of the set of credentials from the memory of the smart grid device. | 04-16-2015 |
20150058918 | SECURE END-TO-END PERMITTING SYSTEM FOR DEVICE OPERATIONS - A permitting system for controlling devices in a system includes a permit issuing agent that receives a command to be sent to a device. Based upon at least one attribute of the command, the permit issuing agent identifies one or more business logic modules that is pertinent to the command. Each business logic module has a respectively different set of business rules associated with it. Each identified business logic module determines whether the command complies with the business rules associated with that module. If the command is determined to comply with the business rules of all of the identified business logic modules, the agent issues a permit for the command, and the permit is sent to the device for execution of the command. | 02-26-2015 |
20150029954 | TECHNIQUES FOR ROUTING FROM AN ENDPOINT WITH SIMULTANEOUS ASSOCIATIONS TO MULTIPLE NETWORKS - A node within a wireless endpoint device may be coupled to multiple heterogeneous networks simultaneously. The node is configured to select between the different networks based on various constraints associated with the endpoint device, applications executing on the endpoint device, traffic routed by the endpoint device, and constraints associated with the multiple networks. Based on these different constraints, and based on the current operating mode of the node, the node rates each network, and then selects the network with the highest rating to be used for routing purposes. | 01-29-2015 |
20140344906 | AUTHENTICATION OF MANUAL METER READINGS - A method for authenticating a meter reading. The method includes obtaining a measurement representing a measured attribute of a user, analyzing the measurement to generate an authentication code, generating the meter reading based on the measurement and the authentication code, presenting, by the metering device, the meter reading to the user who alters and reports the meter reading as a reported meter reading, analyzing, by a meter reading analysis device, the reported meter reading to detect that the meter reading was altered by the user, and generating, by the meter reading analysis device and in response to the detecting, a dispatch request to dispatch a human inspector for validating the measurement. | 11-20-2014 |
20140328272 | LEVERAGING DIVERSE COMMUNICATION LINKS TO IMPROVE COMMUNICATION BETWEEN NETWORK SUBREGIONS - A first subregion of a wireless mesh network is configured to transmit a data packet across multiple communication links to a second subregion of the wireless mesh network. Due to varying connectivity levels associated with the multiple communication links, the second subregion receives different versions of the data packet. A designated node within the second subregion receives the different versions and then combines those versions to reconstruct the data packet. The designated node may receive the multiple versions of the data packet from nodes within the first subregion and/or receive multiple versions of the data packet from nodes residing within the second subregion. In this fashion, the designated node leverages path diversity between the first and second subregions to remedy poor connectivity between those subregions. | 11-06-2014 |
20140320318 | USING LIGHTING AND OTHER STREETSIDE DEVICES TO INDICATE PARKING SPACE AVAILABILITY AND NAVIGATION INFORMATION - A method for directing a vehicle to a parking space within an environment is disclosed. The method includes selecting a parking space from a collection of parking spaces within the environment, further selecting one or more lighting devices within the environment based at least on a location of the selected parking space, and sending a signal to the one or more lighting devices to generate a lighting pattern visible to a driver of the vehicle, where the lighting pattern directs the driver to navigate the vehicle toward the parking space. In addition, the vehicle may be navigated using radio navigation algorithms based on beacon signals broadcasted from streetside devices, such as lighting devices or parking meters. | 10-30-2014 |
20140295772 | SECURE MANAGEMENT OF RADIO TRANSMISSIONS IN AN ENDPOINT DEVICE OF A NETWORK - A method for managing radio transmission in an endpoint device in a network includes: receiving, at a first endpoint device, a message requesting wake up of the first endpoint device; establishing a connection between the first endpoint device to a second endpoint device connected to the network; determining, at the first endpoint device, whether a secure command is received from the second endpoint device via the established connection within a predetermined period of time; and based on the received secure command, establishing a connection between the first endpoint device and the network via radio transmission, wherein the first endpoint device is configured to turn off radio transmission if the secure command is not received within the predetermined period of time. | 10-02-2014 |
20140293276 | DISTRIBUTING LIGHT INTENSITY READINGS IN A WIRELESS MESH - A method for controlling a light source associated with an environment includes: receiving, over a wireless mesh network and by a control node corresponding to the light source, a first light intensity value for the environment from a first sensor node; calculating, by the control node, a resulting light intensity (RLI) value based on the first intensity value; determining, by the control node, that the RLI value exceeds a light intensity threshold; and modifying, by the control node and in response to determining the RLI value exceeds the light intensity threshold, an output of the first light source. | 10-02-2014 |
20140281528 | Secure End-to-End Permitting System for Device Operations - A permitting system for controlling devices in a system includes a permit issuing agent that receives a command to be sent to a device. Based upon at least one attribute of the command, the permit issuing agent identifies one or more business logic modules that is pertinent to the command. Each business logic module has a respectively different set of business rules associated with it. Each identified business logic module determines whether the command complies with the business rules associated with that module. If the command is determined to comply with the business rules of all of the identified business logic modules, the agent issues a permit for the command, and the permit is sent to the device for execution of the command. | 09-18-2014 |
20140126346 | APPROACH FOR EXTENDED BATTERY LIFE NETWORK NODES - In an embodiment, triplets of network-enabled FCIs operate to monitor the three phases of a power distribution system. In being network-enabled, the FCIs also operate as nodes of an RF mesh network. In an embodiment, upon the detection of a power failure, the triplet of network FCIs is serially operated so as to extend their networking capabilities by approximately three times. | 05-08-2014 |
20140089912 | SYSTEM AND METHOD FOR EFFICIENTLY UPDATING FIRMWARE FOR NODES IN A MESH NETWORK - A technique for providing an improved way to update the nodes of a wireless mesh network is described. An upgrade engine executing on a server connected to the wireless mesh network determines a topology of the network, subdivides the network into a plurality of clusters based on the topology of the network, and seeds a small number of nodes within each cluster. The upgrade engine manages the upgrade process, notifying particular nodes within each cluster when to search for an upgrade package (e.g., an image of a new firmware) stored in an adjacent node. The upgrade engine also monitors success and failure of each node and delivers the upgrade package to a node directly when the node fails to download the upgrade package from an adjacent node within the network. | 03-27-2014 |
20140089443 | SYSTEM AND METHOD FOR BROADCASTING MESSAGES TO NODES WITHIN A WIRELESS MESH NETWORK - A node within a wireless mesh network is configured to forward a high-priority message to adjacent nodes in the wireless mesh network by either (i) transmitting the message during successive timeslots to the largest subset of nodes capable of receiving transmissions during each timeslot, or (ii) transmitting the message on each different channel during the timeslot when the largest subset of nodes are capable of receiving transmissions on each of those channels. | 03-27-2014 |
20140086218 | SYSTEM AND METHOD FOR BROADCASTING MESSAGES TO NODES WITHIN A WIRELESS MESH NETWORK - A node within a wireless mesh network is configured to forward a high-priority message to adjacent nodes in the wireless mesh network by either (i) transmitting the message during successive timeslots to the largest subset of nodes capable of receiving transmissions during each timeslot, or (ii) transmitting the message on each different channel during the timeslot when the largest subset of nodes are capable of receiving transmissions on each of those channels. | 03-27-2014 |
20140086042 | SYSTEM AND METHOD FOR MANAGING ACCESS POINT FAILOVER WITHIN A WIRELESS MESH NETWORK - A node within a wireless mesh network is configured to select a primary path through an access point and to designate that access point as the primary access point for the node. The access point then transmits a failover message indicating that the node designated that access point as the primary access point for the node at a particular time. When another access point receives the failover message, the other access point may determine that the first node has also designated the other access point as the primary access point for the node, and may then de-register the node and stop advertising a primary path to the node. | 03-27-2014 |
20140085105 | Power Outage Notification and Determination - Systems and methods for identifying and targeting power outages are provided. Electric meters of a system receive electric power from power distribution equipment in a power distribution network and information that identifies the respective power distribution equipment from which the meters receive electric power. Communication nodes are associated with electric meters and receive, from neighboring communication nodes, information identifying each respective neighboring communication node and the information identifying the power distribution equipment from which respective electric meters, associated with neighboring communication nodes, receive electric power. A communication node of a particular electric meter can select a suitable communication node of a neighboring electric meter with which it can communicate. When the particular electric meter experiences a loss in power, it can then transmit an immediate regarding the loss in power to the selected communication node. | 03-27-2014 |
20140012524 | POWER GRID TOPOLOGY DISCOVERY VIA TIME CORRELATION OF PASSIVE MEASUREMENT EVENTS - A wireless mesh network is configured to manage a power grid. Each node within the wireless mesh network is configured to detect and classify voltage fluctuations in power supplied by an upstream transformer coupled to the power grid. When a given node detects a particular type of fluctuation (i.e., an “event”), the node generates a timestamped event classification that reflects the type of event and a time when the event occurred. A server configured to manage the wireless mesh network receives timestamped event classifications from each node within the wireless mesh network and then performs a time correlation with the received timestamped event classifications to determine which nodes detected similar events. When two or more nodes detected the same event at similar times, the server determines that those nodes are coupled to the same transformer. | 01-09-2014 |
20130254426 | METHOD AND SYSTEM OF PROVIDING IP-BASED PACKET COMMUNICATIONS IN A UTILITY NETWORK - One example embodiment provides a method and system where a node in a utility network registers with one or more access point devices associated with one or more local area utility networks. The utility node generates a unique network address using a network address prefix of a network address associated with the access point device. The utility node registers with a DNS server. Messages sent to the utility node are routed through the access point corresponding to the received prefix used to generate the unique network address for the utility node. The network address for the utility node and access point may be IPv6 addresses and the network address prefix may be an IPv6 prefix, or may be an IPv4 address. | 09-26-2013 |
20130229947 | SYSTEM, METHOD AND PROGRAM FOR DETECTING ANOMALOUS EVENTS IN A UTILITY NETWORK - A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event. | 09-05-2013 |
20130223543 | METHOD AND SYSTEM FOR DETECTING FAILURES OF NETWORK NODES - Systems and methods for detecting device failures in a network having nodes coupled to a central controller, in which a first of the nodes communicates with the central controller via a second of the nodes. When the second node determines that the first node has not transmitted a predetermined number of messages over a predefined number of time periods, the second node provides a failure alert to the central controller. The central controller records a failure alert received from the second node in a log. Based on a set of failure alerts received from a number of nodes recorded in the log, the central controller determines whether the first node has failed. | 08-29-2013 |
20130198551 | Authentication and Pairing of a Mobile Device to an External Power Source - A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device. | 08-01-2013 |
20130148544 | METHOD AND SYSTEM FOR PROVIDING NETWORK AND ROUTING PROTOCOLS FOR UTILITY SERVICES - A method and system of operating a utility node to communicate in a wireless utility network are provided. A utility node in the wireless utility network discovers at least two access points each respectively constituting an interface between a wide area network and the wireless utility network. The node discovers at least two access points constituting an interface between the two networks, registers with the discovered access points, and obtains at least two unique network addresses each respectively associated with a corresponding one of the access points with which the node has registered. The node provides the at least two addresses to a back office server which is communication with the wide area network to provide the back office server with at least two routes to reach the node. The at least two routes are respectively associated with a corresponding one of the access points with which the node registered. | 06-13-2013 |
20130142083 | TECHNIQUE FOR CHANGING THE OPERATING STATE OF A NODE WITHIN A NETWORK - A node residing within a wireless mesh network is configured to transmit a state transition message to a downstream node also residing within the wireless mesh network. The state transition message indicates a new operating state for the downstream node. Upon receipt of the state transition message, the downstream node may transition to the new operating state and then transmit an acknowledgement message back to the node that sent the state transition message. Alternatively, the downstream node may transmit the acknowledgement message back to the node that sent the state transition message first, and then transition to the new operating state. | 06-06-2013 |
20130128894 | Registration and Data Exchange Using Proxy Gateway - A system and method is presented for broadcasting from a utility node a request for network routing information, receiving at the utility node routing information from neighboring utility nodes in response to the broadcast request, and registering the utility node with an access point that provides ingress and egress to and from the network. A node is selected to function as a proxy gateway for one or more other nodes in the network. A new utility node becomes connected to one or more utility networks by registering with the proxy gateway. The proxy gateway transmits registration requests and registration information from each node to a back office server and/or a Domain Name Server via an access point for which the proxy gateway functions as its proxy. | 05-23-2013 |
20130042014 | MULTI-PROTOCOL NETWORK REGISTRATION AND ADDRESS RESOLUTION - The functionality of communications standards and protocols that are application-layer specific are overlaid on an IP-based infrastructure, by employing an IP DNS server as the registration host for IP and other communications standards based and protocol based communications. Communication can occur at either the IP layer or the communications standards or protocol application layer. At the IP layer, a host application can interrogate network nodes. To extend this service to other communications standards or protocol communications, device registration and resolve services are implemented on the DNS server. Similar to the manner in which an IP-based service uses a native, IP-based DNS resolve request, a host can utilize a resolution request against the communications standards and protocol-enabled DNS server for standards and protocol application-layer interrogation of endpoints. | 02-14-2013 |
20130036329 | UPDATING ROUTING AND OUTAGE INFORMATION IN A COMMUNICATIONS NETWORK - After power is restored to a node in a utility network, that node employs one or more of its neighboring nodes as proxies to route a message to a central control facility of the utility. The message contains information about the restored node, and possibly one or more of its neighbor nodes. This information may include reboot counters, the amount of time that the node was down, momentary outages or power fluctuations, and/or the time of power restoration. The node that creates and initially sends the message can be the restored node itself, or another node that recognizes when a restored node has recently come back online. | 02-07-2013 |
20130024306 | SYSTEMS AND METHODS FOR CHARGING ELECTRIC VEHICLES - Systems and methods for controlling for distributing power to electric vehicles. The system includes a vehicle charging key (“VCK”) that is operable to communicate with both a vehicle and a utility communications network. The VCK includes a processor, a memory, and one or more radios for communicating with the vehicle and the utility communications network. The VCK receives information from the vehicle, such as location information and vehicle battery state-of-charge (“SOC”) information, and transmits the information to a back office system (“BOS”), such as a utility provider or a credit card company. The BOS generates utility pricing or charging information based on, for example, time of day, and transmits the utility pricing information back to the VCK. A transaction module of the VCK receives payment information from a user that includes a payment selection. The payment selection includes a payment type (e.g., credit card, prepaid account, utility account, etc.). The VCK transmits the payment information to the BOS, and the BOS responds with a charge authorization signal. | 01-24-2013 |
20120232844 | DETERMINING ELECTRIC GRID ENDPOINT PHASE CONNECTIVITY - The service phase of the electrical connection to a customer endpoint device located within a power distribution system is determined by various techniques. At the feeder level, the system may be programmed to induce disturbances, thereby causing missed zero crossings at the customer endpoint devices. The pattern of these disturbances is a controlled one, designed specifically to avoid causing noticeable disruption even to sensitive devices, but to be unusual enough that it is statistically unlikely to be naturally occurring. The monitoring of the zero crossing information is used to determine the phase of the service line to the customer endpoint devices. | 09-13-2012 |
20120173758 | METHOD AND SYSTEM FOR PROVIDING NETWORK AND ROUTING PROTOCOLS FOR UTILITY SERVICES - A method and system of operating a utility node to communicate in a wireless utility network are provided. A utility node in the wireless utility network discovers at least two access points each respectively constituting an interface between a wide area network and the wireless utility network. The node discovers at least two access points constituting an interface between the two networks, registers with the discovered access points, and obtains at least two unique network addresses each respectively associated with a corresponding one of the access points with which the node has registered. The node provides the at least two addresses to a back office server which is communication with the wide area network to provide the back office server with at least two routes to reach the node. The at least two routes are respectively associated with a corresponding one of the access points with which the node registered. | 07-05-2012 |
20120163177 | LOAD MANAGEMENT IN WIRELESS MESH COMMUNICATIONS NETWORKS - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms. | 06-28-2012 |
20120116602 | PHYSICALLY SECURED AUTHORIZATION FOR UTILITY APPLICATIONS - To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system. | 05-10-2012 |
20120092993 | System and Method of Monitoring Packets in Flight for Optimizing Packet Traffic in a Network - Systems and methods of optimizing packet flow in a network are disclosed. An internetwork has a first network and plural second networks. A respective packet-in-flight counter is established for each one of the plural second networks and a respective maximum packet-in-flight indication for each one of the plural second networks. The respective packet-in-flight counter for each one of the plural second networks when a request packet is sent from any node in the first network to any node in that one of the plural second networks, or a response packet is received from any node that one of the plural second networks. it is determined whether a second request packet can be sent from any node in the first network to any of the plurality of nodes in one of the plural second networks, based on processing a value of the respective packet-in-flight counter for that one of the plural second networks and a value of the respective maximum packet-in-flight indication for that one of the plural second networks. The respective maximum packet-in-flight indication for each one of the plural second networks is adjusted based on a statistic that is indicative of roundtrip time for request packets sent from any node of the first network to any of the plurality of nodes in that one of the plural second networks. | 04-19-2012 |
20120036250 | System, Method and Program for Detecting Anomalous Events in a Utility Network - A utility network communication device is provided to detect whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of the nodes in the utility network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the utility network during a predetermined time period, based on a condition and/or event occurring during the predetermined time period. The communication device receives operation data from nodes in the network, and determines whether the received operation data from a node in the network constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event. | 02-09-2012 |
20110255418 | Method and System for Detecting Failures of Network Nodes - Systems and methods for detecting device failures in a network having nodes coupled to a central controller, in which a first of the nodes communicates with the central controller via a second of the nodes. When the second node determines that the first node has not transmitted a predetermined number of messages over a predefined number of time periods, the second node provides a failure alert to the central controller. The central controller records a failure alert received from the second node in a log. Based on a set of failure alerts received from a number of nodes recorded in the log, the central controller determines whether the first node has failed. | 10-20-2011 |
20110222407 | Simulation of Multiple Nodes in an Internetwork - A method is provided for simulation of multiple network nodes in an internetwork. A range of a plurality of network addresses are assigned to a simulation node. The simulation node monitors network communications to listen for packets. Upon receipt of a packet having a destination address within the assigned range, a command is forwarded to an end-use application, such as firmware. The end-use application processes the command and returns a result. A response packet having the result is transmitted to the back office server with the destination address of the received packet as the source of the response packet. | 09-15-2011 |
20110131342 | MULTI-PROTOCOL NETWORK REGISTRATION AND ADDRESS RESOLUTION - The functionality of communications standards and protocols that are application-layer specific are overlaid on an IP-based infrastructure, by employing an IP DNS server as the registration host for IP and other communications standards based and protocol based communications. Communication can occur at either the IP layer or the communications standards or protocol application layer. At the IP layer, a host application can interrogate network nodes. To extend this service to other communications standards or protocol communications, device registration and resolve services are implemented on the DNS server. Similar to the manner in which an IP-based service uses a native, IP-based DNS resolve request, a host can utilize a resolution request against the communications standards and protocol-enabled DNS server for standards and protocol application-layer interrogation of endpoints. | 06-02-2011 |
20110122798 | POWERLINE CARRIER ZERO-CROSSING TRANSFORMER MAPPING WITH ASYMMETRIC RF RETURN PATH - Techniques are disclosed by which RF mesh networks can identify utility distribution topologies by using power line communication combined with wireless networking to identify the mapping of transformers and other distribution equipment at a back office system server. At a specified time, an item of distribution equipment signals a unique identifier by introducing a phase shift in the electric power being delivered by that equipment. A meter node detects and decodes these temporal shifts to obtain an identifier of equipment supplying the power to it. Upon ascertaining this identification, the meter node sends an acknowledgment to thereby register with that equipment. The association of the particular customer's premises with the equipment is also sent to a back office system, to enable a map of the correspondence between meter and the equipment to be generated. | 05-26-2011 |
20110116534 | DETECTION OF START FRAME DELIMITERS IN A WIRELESS DIGITAL COMMUNICATION SYSTEM - Forward error correction is used in conjunction with detection of a start frame delimiter (SFD) to provide flexibility and to reduce missed instances of an SFD. Candidate SFDs in an incoming signal are identified using a lower-than-normal detection threshold, and corresponding markers are stored in a buffer. For each stored marker, a physical layer header following the candidate SFD is decoded with error-correction techniques, to determine whether uncorrectable errors exist. If so, the candidate is discarded and the next candidate is evaluated. If no uncorrectable errors exist, the candidate is declared a valid SFD, and the remaining signal is decoded. Dual detection thresholds can be employed in networks that permit both error-encoded and non-coded packets. A technique for selecting SFD patterns that facilitate higher performance is also disclosed. | 05-19-2011 |
20110115643 | UTILITY NETWORK INTERFACE DEVICE CONFIGURED TO DETECT AND REPORT ABNORMAL OPERATING CONDITION - A utility network interface device is provided for operation with a utility network. The utility network interface device includes a control unit configured to detect a tampering with a software component of a utility meter with which the utility network interface device is associated. The utility network interface device also includes a notification unit configured to output, external to the utility meter, a visual indication constituting notification of the tampering detected by the control unit. The control unit is configured to automatically control the notification unit to output the external notification of the tampering in response to the detection of the tampering. Also provided are a utility network including the utility network interface device, a method of operating a utility network interface device, and a computer-readable recording medium having a computer program recorded thereon for operating a utility network interface device. | 05-19-2011 |
20110115642 | UTILITY NETWORK INTERFACE DEVICE CONFIGURED TO DETECT AND REPORT ABNORMAL OPERATING CONDITION - A utility network interface device is provided for operation with a utility network. The utility network interface device includes a detector configured to produce a state signal upon occurrence of a prescribed state that interferes with the ability of a utility meter, with which the utility network interface device is associated, to measure consumption of a commodity and/or report consumption of the commodity. The utility network interface device also includes a control unit configured to detect a tampering with the utility meter in accordance with the state signal produced by the detector. The control unit automatically controls a notification unit to output, external to the utility meter, notification of the tampering detected by the control unit, in response to the detection of the tampering. Also provided are a utility network including the utility network interface device, a method of operating a utility network interface device, and a computer-readable recording medium having a computer program recorded thereon for operating a utility network interface device. | 05-19-2011 |
20110090878 | Wireless Device With Opportunistic Band Access - A wireless communication network system includes a plurality of nodes. Each node from the plurality of nodes includes a plurality of communication modules. Each module includes a modem and is configured to operate according to a communication protocol. Each communication module is configured to monitor its own communication parameter data and to cooperate with companion modules of a node by sharing communication parameter data, for instance through a coordination unit. Each communication module is further configured to allow, preferably according to a predefined set of rules, communication using a protocol of one communication module by utilizing a band associated with a companion module. The sharing of communication parameter data between modules may be continuous sharing or periodic sharing. | 04-21-2011 |
20110040960 | Method and System for Securely Updating Field Upgradeable Units - Devices and methods for securely upgrading devices, such as field upgradeable units, are disclosed. In response to receiving an update object, a device may determine whether a predefined location of memory includes a predetermined value. Based on the value in the predefined location, the device may store the received update object in a verification portion of the memory. After verifying the authenticity of the update object, the device may copy the update object from the verification portion of the memory to an inactive portion. The inactive portion of the memory can be swapped with an active portion of the memory, such that the inactive portion becomes active. | 02-17-2011 |
20100302062 | Method and System for Providing a Network Protocol for Utility Services - A method and system for providing a network protocol for utility services are disclosed are disclosed. In one embodiment, a computer-implemented method comprises discovering a utility network, wherein a constant powered meter sends network discovery messages to find the utility network. Neighboring meters are discovered, wherein the constant powered meter sends hello messages periodically. The constant powered meter is registered with the utility network. Further, the battery powered meter finds and associates itself with a constant powered meter. The constant powered meter also registers its associate battery powered meter with the utility network. The constant powered meter sends a node registration message to the gateway of the utility network. The constant powered meter can sense outage problems with the gateway and the neighbors of its network, and search and migrate to an alternate network | 12-02-2010 |
20100299452 | METHOD AND SYSTEM FOR PROVIDING NETWORK AND ROUTING PROTOCOLS FOR UTILITY SERVICES - A method and system for providing a network and routing protocol for utility services are disclosed. In one embodiment, a computer-implemented method comprises discovering a utility network, wherein a utility device (for example, a constant powered meter) sends network discovery messages to find the utility network. Neighboring meters are discovered and the device listens for advertised routes for one or more networks from the neighbors. The device is then registered with one or more utility networks, receiving a unique address for each network registration. Also illustrated in this invention disclosure is how each device of a class of devices (for example, battery powered meter) finds and associates itself with another device (for example, constant powered meter). The constant powered meter also registers its associate battery powered meter with the utility networks. The constant powered meter registers itself with the access points and the upstream nodes in the path out of each network. Each upstream node can independently make forwarding decisions on both upstream and downstream packets i.e. choose the next hop according to the best information available to it. The constant powered meter can sense transient link problems, outage problems, and traffic characteristics. It uses the information to find the best route out of and within each network. Each network device thus maintains multi-egress, multi-ingress network routing options both for itself and the device(s) associated with it. | 11-25-2010 |
20100299441 | MULTI-PROTOCOL NETWORK REGISTRATION AND ADDRESS RESOLUTION - The functionality of communications standards and protocols that are application-layer specific are overlaid on an IP-based infrastructure, by employing an IP DNS server as the registration host for IP and other communications standards based and protocol based communications. Communication can occur at either the IP layer or the communications standards or protocol application layer. At the IP layer, a host application can interrogate network nodes. To extend this service to other communications standards or protocol communications, device registration and resolve services are implemented on the DNS server. Similar to the manner in which an IP-based service uses a native, IP-based DNS resolve request, a host can utilize a resolution request against the communications standards and protocol-enabled DNS server for standards and protocol application-layer interrogation of endpoints. | 11-25-2010 |
20100235209 | Method and System of Applying Environmental Incentives - Information relating to electrical energy usage for a given account is associated with a time segment that corresponds to a period when the electrical energy was received from an electrical energy distribution system. Electrical energy generation carbon impact information is retrieved for the corresponding time segment specifying when the electrical energy was received from an electrical energy distribution system. A carbon credit is calculated according to the retrieved electrical energy generation carbon impact information, and the retrieved electrical energy usage information associated with the time segment. The calculated carbon credit is then used to update a display of carbon credit related information, such as account balance, rate of carbon credit usage, currently applicable “cost” for carbon credit usage. Notifications can be provided to the consumer if any of this information crosses a threshold value. In addition, or alternatively, the carbon credit related information can be used to automatically control the operation of devices that consume electrical energy. | 09-16-2010 |
20100228601 | Method and System of Applying Environmental Incentives - Information relating to electrical energy usage for a given account is associated with a time segment that corresponds to a period when the electrical energy was received from an electrical energy distribution system. Electrical energy generation carbon impact information is retrieved for the corresponding time segment specifying when the electrical energy was received from an electrical energy distribution system. A carbon credit is calculated according to the retrieved electrical energy generation carbon impact information, and the retrieved electrical energy usage information associated with the time segment. The calculated carbon credit is then used to update a display of carbon credit related information, such as account balance, rate of carbon credit usage, currently applicable “cost” for carbon credit usage. Notifications can be provided to the consumer if any of this information crosses a threshold value. In addition, or alternatively, the carbon credit related information can be used to automatically control the operation of devices that consume electrical energy. | 09-09-2010 |
20100214922 | System and method of regulating a packet rate to optimize traffic in a network - Systems and methods of optimizing packet flow in a network are disclosed. An internetwork includes plural networks, each network having plural non-router nodes and at least one router node. The non-router nodes of a first network can be configured to perform congestion control. The non-router node establishes a packet rate value for a packet queue associated with a second network of the internetwork. A total number of packets not greater than the packet rate value are removed from the packet queue. The removed packets are sent to a node in the second network. | 08-26-2010 |
20100166015 | METHODS AND SYSTEMS FOR DYNAMIC FRAGMENTATION OF PACKETS BY COMMUNICATION NETWORK NODES - Methods and devices are disclosed for dynamically fragmenting packets transmitted in a communications network. Fragments are generated by splitting a packet based on a value of a fragment size parameter. A first fragment is sent to a receiving node. As the sending node, a transmission success parameter is determined that indicates whether the first fragment was successfully received. Based on the value of the transmission success parameter, a link quality parameter value representing a chance a second fragment having the same size as the first fragment will be successfully received by the receiving node is updated. The sending node compares the value of the link quality parameter and a value of a quality threshold parameter and changes the value of the fragment size parameter based on a result of the comparison. | 07-01-2010 |
20100157838 | Route and Link Evaluation in Wireless Mesh Communications Networks - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms. | 06-24-2010 |
20100150059 | STATIC ADDRESSING OF DEVICES IN A DYNAMICALLY ROUTED NETWORK - A method of routing in a network includes dividing a time corresponding to a predetermined maximum registration age of a first node registered with a second node into a number of first time intervals and second time intervals. The first time intervals each have a predetermined duration and the second time intervals each have a duration greater than the predetermined duration of the first time intervals. Each of the first and second time intervals are assigned a metric designating a cost associated with a path between the first node and the second node. The metric increases in value for each of the first and second time intervals as registration age increases. The second node sends a message including the metric associated with the time interval during which it is transmitted. | 06-17-2010 |
20100103940 | Rapid Dissemination of Bulk Information to Widely Dispersed Network Nodes - Bulk information is transferred to nodes in a communication network having a plurality of widely dispersed nodes. The information can be an image, content, or configuration information. The information is uni-cast to a selection of nodes by a central node or server, to seed the information at certain nodes in the network. The information is then distributed by these seed nodes to every other node in the network. A first algorithm selects which nodes should be seeded with information by the central node. A second algorithm distributes information in the network on a query basis. | 04-29-2010 |
20100074304 | Power Line Communication Using Frequency Hopping - Communications among multiple nodes via a shared power line medium are carried out by dividing the available frequency spectrum in the shared power line medium into plural non-overlapping channels. A first channel is assigned to a first group of nodes, and a second channel, different from the first channel, is assigned to a second group of nodes. Communications between the first group of nodes can occur simultaneously with communications between the second group of nodes via the shared power line medium. Time slots may be assigned for the communications between the first group of nodes that occurs simultaneously with the communications between the second group of nodes via the shared power line medium. The simultaneous communications between different groups of nodes via a shared power line medium may be implemented using a frequency-hopping spread spectrum technique. | 03-25-2010 |
20100074176 | MESHED NETWORKING OF ACCESS POINTS IN A UTILITY NETWORK - A meshed networking of access points in a utility network provides a more efficient and cost effective arrangement for communicating data between meters and the utility by linking the access points of multiple subnetworks for purposes of communicating with the utility. As a result, each individual subnetwork is not required to directly communicate with the utility. For those access points that are relieved of the need to directly communicate with the utility, the communication mechanism, e.g., cellular modem, can be eliminated, or deactivated, to thereby reduce capital expenditures and/or operational costs. Additionally, links to a WAN can be selectively activated or disabled to provision bandwidth, for example, on demand, to react to changing conditions in the subnetworks. | 03-25-2010 |
20100073193 | Transparent Routing in a Power Line Carrier Network - Meter nodes in a power line carrier (PLC) network may reliably communicate with an access point by alternate routes using additional media where available. A utility network may include one or more subnetworks. Each subnetwork may include one or more meter nodes and an access point configured to communicate with the meter nodes using PLC. Meter nodes operate as relays for other meter nodes to communicate with the access point. Some or all meter nodes may be configured to communicate using a power line carrier communications link and another communications link. The network may also include a node external to the subnetwork, e.g., a utility server. The access point may be configured to communicate with the node external to the subnetwork in addition to the meter nodes. | 03-25-2010 |
20100061350 | MULTI-CHANNEL MESH NODES EMPLOYING STACKED RESPONSES - Rather than using a large number of transceivers (transmitter/receiver pairs) operating in parallel, Access Points with multiple channels are used to aggregate, or stack, transmitted response communications, e.g., transmitting multiple acknowledgements (ACKs) in a single packet to one or more sources of received packets. The method includes sending on a plurality of channels, by each of a plurality of respective first nodes, a communication to a second node, receiving on the plurality of channels, by the second node, the communication from each of the plurality of first nodes and sending, by the second node, a transmission that contains a response to each communication that was successfully received from each of the plurality of first nodes. The response to each of the plurality of first nodes is part of a single message sent by the second node. | 03-11-2010 |
20100060259 | Determining Electric Grid Endpoint Phase Connectivity - The service phase of the electrical connection to a customer endpoint device located within a power distribution system is determined by various techniques. At the feeder level, the system may be programmed to induce momentary power interruptions, thereby causing missed zero crossings at the customer endpoint devices. The pattern of these interruptions is a controlled one, designed specifically to avoid causing noticeable disruption even to sensitive devices, but to be unusual enough that it is statistically unlikely to be naturally occurring. The monitoring of the zero crossing information is used to determine the phase of the service line to the customer endpoint devices. | 03-11-2010 |
20100040042 | BEACONING TECHNIQUES IN FREQUENCY HOPPING SPREAD SPECTRUM (FHSS) WIRELESS MESH NETWORKS - Methods include those by which nodes in a Frequency Hopping Spread Spectrum (FHSS) wireless network may be flexibly configured for beacon transmission and reception. The method may allow for any node to synchronize to any other node's given frequency to receive one or more beacon (broadcast) packets from that node at the designated period. The method may include sending, by a first node, a message to one or more neighbor nodes and responding, by the one or more neighbor nodes, with a message to the first node, the response message including a beacon frequency, a beacon transmit time and information about the current hopping sequence. The first node periodically programs its receiver to the beacon frequency at the beacon transmit time and uses the hopping sequence to receive information including at least one of routing information and timing updates for hopping channel synchronization from the one or more neighbor nodes. | 02-18-2010 |
20100037069 | Integrated Cryptographic Security Module for a Network Node - A system that provides a cryptographic unit that generates secret keys that are not directly accessible to software executed by a controller. The cryptographic unit can include a restrictor device, a finite state machine, a random number generator communicatively and a memory. The memory stores values generated by the random number generator. The restrictor device and the finite state machine include hardware logic that restricts access or changes to the contents of the memory. | 02-11-2010 |
20090310511 | METHODS AND SYSTEMS FOR DYNAMICALLY CONFIGURING AND MANAGING COMMUNICATION NETWORK NODES AT THE MAC SUBLAYER - Methods are disclosed for generating a data packet at a sending node of the network that conforms to a media access control (MAC) layer protocol for network communications. The data packet includes a MAC header and a data segment, wherein data in said data segment is encoded as a type-length-value element identifying a value for an operating parameter of the network. The data packet is transmitted from the sending node to a receiving node. At the receiving node, the data packet is processed at the MAC sublayer of network protocols to retrieve said element and determine the value for the operating parameter. Operating parameters within the receiving node are adjusted to conform to the determined value of the operating parameter. | 12-17-2009 |
20090300191 | Multi-Protocol Network Registration and Address Resolution - The functionality of a C12.22 application layer is overlaid on an IP-based infrastructure, by employing an IP DNS server as the registration host for both IP- and C12.22-based communications. Communication can occur at either the IP layer or the C12.22 application layer. At the IP layer, a host application can interrogate network nodes. To extend this service to C12.22 communications, C12.22 registration and resolve services are implemented on the DNS server. Similar to the manner in which an IP-based service uses a native, IP-based DNS resolve request, a C12.22 host can utilize a C12.22 resolution request against the C12.22-enabled DNS server for C12.22 application-layer interrogation of endpoints | 12-03-2009 |
20090262642 | Updating Routing and Outage Information in a Communications Network - After power is restored to a node in a utility network, that node employs one or more of its neighboring nodes as proxies to route a message to a central control facility of the utility. The message contains information about the restored node, and possibly one or more of its neighbor nodes. This information may include reboot counters, the amount of time that the node was down, momentary outages or power fluctuations, and/or the time of power restoration. The node that creates and initially sends the message can be the restored node itself, or another node that recognizes when a restored node has recently come back online. | 10-22-2009 |
20090245270 | Method and System of Updating Routing Information in a Communications Network - A method of updating routing information in a network where reboot information of other nodes in the network is used to determine whether a given node has recent route updates. If the reboot information indicates the given node has not recently rebooted, then routing information from that given node is used to update the routing information of the comparing node. The reboot information may be a reboot counter which is incremented by a node in response to the node going through a reboot process. When a node reboots, it may request the reboot counter from neighboring nodes. The received reboot counter is compared to the stored reboot counter for at least one node. The rebooting node may choose to receive routing information from a node which has not had its reboot counter changed from the stored reboot counter. In the event none of the neighboring nodes have an unchanged reboot counter, requests may be made for the reboot counters of other nodes, which may be compared to the corresponding stored reboot counters, until the rebooting node discovers a node which has not recently rebooted according to the reboot counter, and may then download routing information from that node. | 10-01-2009 |
20090003356 | NODE DISCOVERY AND CULLING IN WIRELESS MESH COMMUNICATIONS NETWORKS - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms. | 01-01-2009 |
20090003243 | NETWORK UTILITIES IN WIRELESS MESH COMMUNICATIONS NETWORKS - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms. | 01-01-2009 |
20090003232 | ROUTE AND LINK EVALUATION IN WIRELESS MESH COMMUNICATIONS NETWORKS - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms. | 01-01-2009 |
20090003214 | LOAD MANAGEMENT IN WIRELESS MESH COMMUNICATIONS NETWORKS - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms. | 01-01-2009 |
20080238716 | Gateway-Controlled Communications With a Meter In a Utility Network - An electronic electric meter for use in a networked automatic meter reading environment. The meter includes a meter microcontroller, a measurement microcontroller, a communication microcontroller and spread spectrum processor, and a plurality of other communication interface modules for communicating commodity utilization and power quality data to a utility. The meter measures electricity usage and monitors power quality parameters for transmission to the utility over a spread spectrum local area network (LAN) to a remotely located gateway node. The gateway node transmits this data to the utility over a commercially available fixed wide area network (WAN). The meter also provides direct communication to the utility over a commercially available network interface that plugs into the meter's backplane or bus system, bypassing the local area network communication link and gateway node. | 10-02-2008 |
20080238714 | Utility Network Communications Using Meter Identifiers - An electronic electric meter for use in a networked automatic meter reading environment. The meter includes a meter microcontroller, a measurement microcontroller, a communication microcontroller and spread spectrum processor, and a plurality of other communication interface modules for communicating commodity utilization and power quality data to a utility. The meter measures electricity usage and monitors power quality parameters for transmission to the utility over a spread spectrum local area network (LAN) to a remotely located gateway node. The gateway node transmits this data to the utility over a commercially available fixed wide area network (WAN). The meter also provides direct communication to the utility over a commercially available network interface that plugs into the meter's backplane or bus system, bypassing the local area network communication link and gateway node. | 10-02-2008 |
20080224891 | Commodity Monitoring Network - An electronic electric meter for use in a networked automatic meter reading environment. The meter includes a meter microcontroller, a measurement microcontroller, a communication microcontroller and spread spectrum processor, and a plurality of other communication interface modules for communicating commodity utilization and power quality data to a utility. The meter measures electricity usage and monitors power quality parameters for transmission to the utility over a spread spectrum local area network (LAN) to a remotely located gateway node. The gateway node transmits this data to the utility over a commercially available fixed wide area network (WAN). The meter also provides direct communication to the utility over a commercially available network interface that plugs into the meter's backplane or bus system, bypassing the local area network communication link and gateway node. | 09-18-2008 |
20080204272 | Utility Meter With Virtual Shut-Off Function - An electronic electric meter for use in a networked automatic meter reading environment. The meter includes a meter microcontroller, a measurement microcontroller, a communication microcontroller and spread spectrum processor, and a plurality of other communication interface modules for communicating commodity utilization and power quality data to a utility. The meter measures electricity usage and monitors power quality parameters for transmission to the utility over a spread spectrum local area network (LAN) to a remotely located gateway node. The gateway node transmits this data to the utility over a commercially available fixed wide area network (WAN). The meter also provides direct communication to the utility over a commercially available network interface that plugs into the meter's backplane or bus system, bypassing the local area network communication link and gateway node. | 08-28-2008 |