Landis+Gyr Innovations, Inc.
|Landis+Gyr Innovations, Inc. Patent applications|
|Patent application number||Title||Published|
|20150244513||Clock Drift Compensation in a Time Synchronous Channel Hopping Network - Disclosed are various embodiments for compensating for clock drift between nodes in a time synchronous network. A node receives time synchronization information from a parent node in the network. A drift between a clock of the node and a clock of the parent node is determined based upon the time synchronization information. The node identifies a number of time slots of the network since making a last time synchronization based on previous time synchronization information transmitted from the parent node. A compensation interval is calculated that represents a number of the time slots over which the clock of the node deviated, with respect to the parent node, by a predefined compensation value. The node compensates, by the compensation value, one of the time slots according to the compensation interval.||08-27-2015|
|20150244415||SYSTEM AND METHOD FOR TIME ADJUSTMENT IN A TIME SYNCHRONIZED CHANNEL HOPPING NETWORK - Systems and methods are provided for adjusting time in a synchronized network by a central device on the network. Each device on the network provided current time, hopping pattern, time slot duration, and an absolute slot number. Devices on the network synchronized to communicate on a repeating schedule of time slots. The central device receives an updated time and determines a time difference between the updated time and the current time. The current time is adjusted in integer multiples of the hopping pattern length up to the time difference. The absolute slot number is updated based on the number of time slots in the adjusted time difference. The updated absolute slot number is propagated to other devices on the network. In turn, these other devices may also propagate the updated absolute slot number.||08-27-2015|
|20150143108||SYSTEM AND METHOD FOR UPDATING AN ENCRYPTION KEY ACROSS A NETWORK - Systems and methods are provided for generating subsequent encryption keys by a client device as one of a plurality of client devices across a network. Each client device is provided with the same key generation information and the same key setup information from an authentication server. Each client device maintains and stores its own key generation information and key setup information. Using its own information, each client device generates subsequent encryption keys that are common or the same across devices. These subsequent encryption keys are generated and maintained the same across devices without any further instruction or information from the authentication server or any other client device. Additionally, client devices can recover the current encryption key by synchronizing information with another client device.||05-21-2015|
|20150110108||DISTRIBUTED DATA TRANSMISSION IN DATA NETWORKS - Systems and methods are disclosed for distributed data transmission in an RF mesh network or other data network. An exemplary system includes at least two distribution devices. A first distribution device can receive a first data message that includes a first header and payload data. The first distribution device can determine that the second distribution device is not identified in the first header as receiving the payload data. The first distribution device can generate a second data message based on determining that the second distribution device is not identified in the first header. The second data message includes the payload data and the second header. The second header identifies the second distribution device as being selected to receive the payload data. The first distribution device transmits the second data message to the second distribution device.||04-23-2015|
|20150106631||SECURING A DEVICE AND DATA WITHIN THE DEVICE - Systems and methods are provided for securing a self-securing device and information that is stored in memory within the device. The self-securing device comprising a processor unit and memory external to the processor unit. The processor unit contains a processor and processor unit memory. Upon initialization of the self-securing device, the processor unit determines whether a secure key is stored in the processor unit memory. If no secure key is stored, then the processor unit generates a secure key and stores it in the processor unit memory. The processor unit uses the secure key to decrypt information read from the memory external to the processor unit and to encrypt information to be stored in memory external to the processor unit.||04-16-2015|
|20150101016||SECURING COMMUNICATION WITHIN A NETWORK ENDPOINT - Systems and methods for securing communication within a network endpoint, for example, a meter. The meter may include a communication module and a metrology module where the modules are connected via a communication path that is external to both modules. The modules exchange a pairing key to establish a paired channel of communication. When the communication module receives a communication through a network for establishing a secure channel to the endpoint, the communications module sends some or all of the security data to the metrology module to establish a secure communication from a head-end system through the communication module to the metrology module.||04-09-2015|
|20150097693||IN-PREMISES MANAGEMENT OF HOME AREA NETWORKS - Systems and methods are disclosed for providing in-premises management of home area networks. An example management includes a network interface device, a processor in communication with the network interface device, and a transceiver device in communication with the processor. The network interface device can establish a paired communication link with a computing device that is in communication with a head-end system. The processor can receive a command originating from the head-end system and communicated to the management device from the computing device via the paired communication link. The processor can identify a terminal device of the home area network that can perform a function in response to the command. The processor can generate a message for the terminal device including the command. The transceiver device can transmit the message from the processor to the terminal device via a wireless communication link of the home area network.||04-09-2015|
|20140330955||Monitoring the Health of a Home Area Network - Systems and methods are disclosed for monitoring the health of a home area network. An example system includes multiple devices communicatively coupled via a home area network and a gateway device communicatively coupled to the devices via the home area network. The home area network is configured for communicating information regarding a resource consumed at a geographical area serviced by the home area network. The gateway device includes a processor and a computer-readable medium. The processor can execute instructions embodied in the computer-readable medium to perform operations. The operations include monitoring communication metrics describing communications among the devices via the home area network. The operations also include monitoring application-level events generated by applications executed by the devices. The operations also include generating a status indicator for the home area network based on the communication metrics and the application-level events. The status indicator describes a health of the home area network.||11-06-2014|
|20140211798||METHOD AND SYSTEM FOR USING EXTENSION HEADERS TO SUPPORT PROTOCOL STACK MIGRATION - An IP packet may include an IP header and one or more optional IP extension headers. The packet may contain non-IP protocol data in one of the IP extension headers. An application that uses non-IP protocol data may use the non-IP protocol data from the IP extension header. This allows an application designed for a non-IP protocol stack to operate on a device with an IP protocol stack with minimal modification. The non-IP protocol data may support routing options within a network or sub-network.||07-31-2014|
|20140118151||External Antenna Detection Device - Systems and methods for detecting that a removable antenna is electrically connected to a communication device are disclosed. An exemplary detection device includes a visual indicator component and a data indicator component. The visual indicator component electrically connects to an RF antenna connector of the communication device. The visual indicator component generates a visual indicator in response to the RF antenna connector being connected to the removable antenna. The RF antenna connector being connected to the removable antenna provides electrical paths through the visual indicator component and through the data indicator component from at least one voltage source to ground. The data indicator component electrically connects to the RF antenna connector. The data indicator component generates a data indicator in response to the RF antenna connector being connected to the removable antenna.||05-01-2014|
|20130343430||METHODS AND SYSTEMS FOR DISTRIBUTING BROADCAST MESSAGES ON VARIOUS NETWORKS - Methods and systems for sending a broadcast message in frequency hopping and other systems. Instead of sending a complete message separately to each device, a relatively small packet or “chirp” is sent. These chirps are either targeted at known devices or sent in a manner to sweep the RF band. Devices that hear the chirps get information about the channel and/or time that the broadcast data will be sent. These devices then listen for the broadcast data as instructed, e.g., at the specified time on the specified channel. A system may alternatively, or in addition, use a scheduled hopping sequence break as a broadcast moment. Such a broadcast moment can be scheduled to periodically interrupt the node hopping sequences so that, at such times, many or all nodes are scheduled to be on the same channel for potential broadcasts.||12-26-2013|
|20130285833||TAMPER DETECTION FOR PULSE-PRODUCING DEVICE - Systems and methods for detecting tampering with a pulse-producing component of an electrical device are disclosed. An example electrical device includes a pulse-producing circuit and a tamper detection circuit. The pulse-producing circuit is configured for generating at least one pulse. The pulse-producing circuit includes a pulse interface via which the at least one pulse is communicated from the pulse-producing circuit. The tamper detection circuit is electrically connected to the pulse interface. The tamper detection circuit can be connected between a pulse-counting device and the pulse interface. The tamper detection circuit is configured for communicating the pulse to the pulse-counting device via at least one electrical path in the absence of a tampering condition. The tamper detection circuit is also configured for simulating damage to the pulse interface by modifying the at least one electrical path in response to the presence of the tampering condition.||10-31-2013|
Patent applications by Landis+Gyr Innovations, Inc.