Patent application number | Description | Published |
20080310311 | Method and system for providing network and routing protocols for utility services - A method and system for providing a network and routing protocol for utility services are disclosed. In one embodiment, a computer-implemented method comprises discovering a utility network, wherein a utility device (for example, a constant powered meter) sends network discovery messages to find the utility network. Neighboring meters are discovered and the device listens for advertised routes for one or more networks from the neighbors. The device is then registered with one or more utility networks, receiving a unique address for each network registration. Also illustrated in this invention disclosure is how each device of a class of devices (for example, battery powered meter) finds and associates itself with another device (for example, constant powered meter). The constant powered meter also registers its associate battery powered meter with the utility networks. The constant powered meter registers itself with the access points and the upstream nodes in the path out of each network. Each upstream node can independently make forwarding decisions on both upstream and downstream packets i.e. choose the next hop according to the best information available to it. The constant powered meter can sense transient link problems, outage problems, and traffic characteristics. It uses the information to find the best route out of and within each network. Each network device thus maintains multi-egress, multi-ingress network routing options both for itself and the device(s) associated with it. | 12-18-2008 |
20080310377 | Method and system for providing routing protocols in a frequency hopping spread spectrum network - A method and system for providing a network and routing protocol for utility services are disclosed. In one embodiment, a computer-implemented method comprises discovering a utility network, wherein a utility device (for example, a constant powered meter) sends network discovery messages to find the utility network. Neighboring meters are discovered and the device listens for advertised routes for one or more networks from the neighbors. The device is then registered with one or more utility networks, receiving a unique address for each network registration. Also illustrated in this invention disclosure is how each device of a class of devices (for example, battery powered meter) finds and associates itself with another device (for example, constant powered meter). The constant powered meter also registers its associate battery powered meter with the utility networks. The constant powered meter registers itself with the access points and the upstream nodes in the path out of each network. Each upstream node can independently make forwarding decisions on both upstream and downstream packets i.e. choose the next hop according to the best information available to it. The constant powered meter can sense transient link problems, outage problems, and traffic characteristics. It uses the information to find the best route out of and within each network. Each network device thus maintains multi-egress, multi-ingress network routing options both for itself and the device(s) associated with it. | 12-18-2008 |
20090003214 | LOAD MANAGEMENT IN WIRELESS MESH COMMUNICATIONS NETWORKS - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms. | 01-01-2009 |
20090003232 | ROUTE AND LINK EVALUATION IN WIRELESS MESH COMMUNICATIONS NETWORKS - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms. | 01-01-2009 |
20090003243 | NETWORK UTILITIES IN WIRELESS MESH COMMUNICATIONS NETWORKS - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms. | 01-01-2009 |
20090003356 | NODE DISCOVERY AND CULLING IN WIRELESS MESH COMMUNICATIONS NETWORKS - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms. | 01-01-2009 |
20090034418 | Method and system of routing in a utility smart-grid network - A wireless network has a server that includes a server controller that controls the receipt and transmission of packets via a server radio. The server controller selects a route to nodes in the wireless network, and provides communication between the wireless network and at least one other network. A plurality of nodes in the wireless network include a node controller that controls the receipt and transmission of packets via a node radio, and selects a route to the server. A route included in a transmitted packet is selected as a preferred route based upon lowest path cost. The lowest path cost is determined on the basis of ambient noise level information associated with links along a given path in the wireless utility network. | 02-05-2009 |
20090034419 | Method and system of routing in a utility smart-grid network - A wireless utility network contains a plurality of utility nodes that communicate within a wireless utility network. A gateway to the wireless utility network communicates with the utility nodes in the wireless utility network, and connects the wireless utility network to at least one other network. A packet is transmitted from one utility node to another utility node according to a route included in the transmitted packet. The route included in the transmitted packet is updated with received network information to determine an updated path cost of the included route and compared to alternate routes to select a preferred route based upon path cost. The selected preferred route is included in the packet and the packet is transmitted to another node according to the selected preferred route. | 02-05-2009 |
20090043911 | Method and system for providing network and routing protocols for utility services - A method and system for providing a network and routing protocol for utility services are disclosed. In one embodiment, a computer-implemented method comprises discovering a utility network, wherein a utility device (for example, a constant powered meter) sends network discovery messages to find the utility network. Neighboring meters are discovered and the device listens for advertised routes for one or more networks from the neighbors. The device is then registered with one or more utility networks, receiving a unique address for each network registration. Also illustrated in this invention disclosure is how each device of a class of devices (for example, battery powered meter) finds and associates itself with another device (for example, constant powered meter). The constant powered meter also registers its associate battery powered meter with the utility networks. The constant powered meter registers itself with the access points and the upstream nodes in the path out of each network. Each upstream node can independently make forwarding decisions on both upstream and downstream packets i.e. choose the next hop according to the best information available to it. The constant powered meter can sense transient link problems, outage problems, and traffic characteristics. It uses the information to find the best route out of and within each network. Each network device thus maintains multi-egress, multi-ingress network routing options both for itself and the device(s) associated with it. | 02-12-2009 |
20090079584 | Method and system of reading utility meter data over a network - A utility meter may be read by sending a request to read the meter from a meter reading application, which may be located on a utility server or on an access point to a network, to a communications module associated with the utility meter. The communications module initiates a session with the utility meter, makes requests for data from the associated utility meter, receives the responses to requests for data from the utility meter, and terminates the session after receiving all the requested data from the meter. It then formats the responses with the data received from the utility meter, and transmits the formatted response to the meter reading application. | 03-26-2009 |
20090115626 | Electronic meter for networked meter reading - An automatic meter reading (AMR) data communication network for relaying meter commodity information includes a commodity provider node, a gateway node configured to communicate with the commodity provider node, and meter nodes configured to measure commodity characteristic data and communicate with the gateway node and with other meter nodes. A source node of the meter nodes generates a data packet that includes meter commodity information to be relayed to the commodity provider node, and when a first meter node of the meter nodes receives the source data packet, the first meter node relays the source data packet to a second node. The second node can include another meter node, a repeater node, the gateway node, or the commodity provider node. In an embodiment, the first meter node determines whether the data packet specifies a relay path for relaying the source data packet to the commodity provider node. | 05-07-2009 |
20090168846 | Creation and use of unique hopping sequences in a frequency-hopping spread spectrum (FHSS) wireless communications network - A method for generating and using frequency-hopping sequences in frequency-hopping spread spectrum (FHSS) networks, such that no additional network overhead is required to convey a device's hopping sequence to another device, is disclosed. Furthermore, a method to maximize the number of unique hopping sequences, without increasing the random access memory (RAM) requirements on the network devices, is disclosed. | 07-02-2009 |
20090245270 | Method and System of Updating Routing Information in a Communications Network - A method of updating routing information in a network where reboot information of other nodes in the network is used to determine whether a given node has recent route updates. If the reboot information indicates the given node has not recently rebooted, then routing information from that given node is used to update the routing information of the comparing node. The reboot information may be a reboot counter which is incremented by a node in response to the node going through a reboot process. When a node reboots, it may request the reboot counter from neighboring nodes. The received reboot counter is compared to the stored reboot counter for at least one node. The rebooting node may choose to receive routing information from a node which has not had its reboot counter changed from the stored reboot counter. In the event none of the neighboring nodes have an unchanged reboot counter, requests may be made for the reboot counters of other nodes, which may be compared to the corresponding stored reboot counters, until the rebooting node discovers a node which has not recently rebooted according to the reboot counter, and may then download routing information from that node. | 10-01-2009 |
20090262642 | Updating Routing and Outage Information in a Communications Network - After power is restored to a node in a utility network, that node employs one or more of its neighboring nodes as proxies to route a message to a central control facility of the utility. The message contains information about the restored node, and possibly one or more of its neighbor nodes. This information may include reboot counters, the amount of time that the node was down, momentary outages or power fluctuations, and/or the time of power restoration. The node that creates and initially sends the message can be the restored node itself, or another node that recognizes when a restored node has recently come back online. | 10-22-2009 |
20090303972 | Dynamic Scrambling Techniques for Reducing Killer Packets in a Wireless Network - Techniques are disclosed in which a parameter used for scrambling packet data is changed. If the initial scrambling of a packet causes a killer packet to be generated, the packet is re-scrambled using a different value for the parameter, so that a killer packet is avoided. In a network that employs frequency-hopping spread spectrum communications, a channel identifier can be employed as an input to the scrambling algorithm. In this implementation, a given packet of data will be transmitted on one channel with a first sequence of bits when it is scrambled, and on another channel with a different sequence of bits. If the scrambled packet for one of these channels results in a killer packet, it is statistically unlikely that it will also be a killer packet when it is re-transmitted on the other channel. | 12-10-2009 |
20090309749 | Utility Network Interface Device With Visual Indication of Network Connectivity - A network interface device includes a transceiver capable of connecting a utility meter to a wireless network, and a visual indicator capable of displaying a status of a connection between the utility meter and the wireless network. The visual indicator can be an LED, whose display state indicates the status of network connectivity. Alternatively, the visual indicator can be an integrated digital display of the meter that is typically used to indicate a metering parameter, such as total consumption or rate of consumption. | 12-17-2009 |
20090310511 | METHODS AND SYSTEMS FOR DYNAMICALLY CONFIGURING AND MANAGING COMMUNICATION NETWORK NODES AT THE MAC SUBLAYER - Methods are disclosed for generating a data packet at a sending node of the network that conforms to a media access control (MAC) layer protocol for network communications. The data packet includes a MAC header and a data segment, wherein data in said data segment is encoded as a type-length-value element identifying a value for an operating parameter of the network. The data packet is transmitted from the sending node to a receiving node. At the receiving node, the data packet is processed at the MAC sublayer of network protocols to retrieve said element and determine the value for the operating parameter. Operating parameters within the receiving node are adjusted to conform to the determined value of the operating parameter. | 12-17-2009 |
20100037069 | Integrated Cryptographic Security Module for a Network Node - A system that provides a cryptographic unit that generates secret keys that are not directly accessible to software executed by a controller. The cryptographic unit can include a restrictor device, a finite state machine, a random number generator communicatively and a memory. The memory stores values generated by the random number generator. The restrictor device and the finite state machine include hardware logic that restricts access or changes to the contents of the memory. | 02-11-2010 |
20100037293 | Systems and Methods for Security in a Wireless Utility Network - Methods and systems a provided for security in a wireless utility network. The methods and systems use different levels of trust to securely enroll new nodes into a network through other nodes acting as proxies. A node's security state with respect to another node in the network is categorized into one of several trust levels. A node responds to certain requests, actions or messages depending based on its trust level with the other entity. Initially, a node is not trusted. A first trust level is established based on a digital certificate that is stored in a node when the node is manufactured. A second trust level is established based on a second digital certificate obtained from a certifying authority while a node is in the first trust level. A node with a verified second certificate can be fully enrolled in the network and participate as a network node with minimal or no constraints. | 02-11-2010 |
20100040042 | BEACONING TECHNIQUES IN FREQUENCY HOPPING SPREAD SPECTRUM (FHSS) WIRELESS MESH NETWORKS - Methods include those by which nodes in a Frequency Hopping Spread Spectrum (FHSS) wireless network may be flexibly configured for beacon transmission and reception. The method may allow for any node to synchronize to any other node's given frequency to receive one or more beacon (broadcast) packets from that node at the designated period. The method may include sending, by a first node, a message to one or more neighbor nodes and responding, by the one or more neighbor nodes, with a message to the first node, the response message including a beacon frequency, a beacon transmit time and information about the current hopping sequence. The first node periodically programs its receiver to the beacon frequency at the beacon transmit time and uses the hopping sequence to receive information including at least one of routing information and timing updates for hopping channel synchronization from the one or more neighbor nodes. | 02-18-2010 |
20100060259 | Determining Electric Grid Endpoint Phase Connectivity - The service phase of the electrical connection to a customer endpoint device located within a power distribution system is determined by various techniques. At the feeder level, the system may be programmed to induce momentary power interruptions, thereby causing missed zero crossings at the customer endpoint devices. The pattern of these interruptions is a controlled one, designed specifically to avoid causing noticeable disruption even to sensitive devices, but to be unusual enough that it is statistically unlikely to be naturally occurring. The monitoring of the zero crossing information is used to determine the phase of the service line to the customer endpoint devices. | 03-11-2010 |
20100157838 | Route and Link Evaluation in Wireless Mesh Communications Networks - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms. | 06-24-2010 |
20100228601 | Method and System of Applying Environmental Incentives - Information relating to electrical energy usage for a given account is associated with a time segment that corresponds to a period when the electrical energy was received from an electrical energy distribution system. Electrical energy generation carbon impact information is retrieved for the corresponding time segment specifying when the electrical energy was received from an electrical energy distribution system. A carbon credit is calculated according to the retrieved electrical energy generation carbon impact information, and the retrieved electrical energy usage information associated with the time segment. The calculated carbon credit is then used to update a display of carbon credit related information, such as account balance, rate of carbon credit usage, currently applicable “cost” for carbon credit usage. Notifications can be provided to the consumer if any of this information crosses a threshold value. In addition, or alternatively, the carbon credit related information can be used to automatically control the operation of devices that consume electrical energy. | 09-09-2010 |
20100235209 | Method and System of Applying Environmental Incentives - Information relating to electrical energy usage for a given account is associated with a time segment that corresponds to a period when the electrical energy was received from an electrical energy distribution system. Electrical energy generation carbon impact information is retrieved for the corresponding time segment specifying when the electrical energy was received from an electrical energy distribution system. A carbon credit is calculated according to the retrieved electrical energy generation carbon impact information, and the retrieved electrical energy usage information associated with the time segment. The calculated carbon credit is then used to update a display of carbon credit related information, such as account balance, rate of carbon credit usage, currently applicable “cost” for carbon credit usage. Notifications can be provided to the consumer if any of this information crosses a threshold value. In addition, or alternatively, the carbon credit related information can be used to automatically control the operation of devices that consume electrical energy. | 09-16-2010 |
20100299452 | METHOD AND SYSTEM FOR PROVIDING NETWORK AND ROUTING PROTOCOLS FOR UTILITY SERVICES - A method and system for providing a network and routing protocol for utility services are disclosed. In one embodiment, a computer-implemented method comprises discovering a utility network, wherein a utility device (for example, a constant powered meter) sends network discovery messages to find the utility network. Neighboring meters are discovered and the device listens for advertised routes for one or more networks from the neighbors. The device is then registered with one or more utility networks, receiving a unique address for each network registration. Also illustrated in this invention disclosure is how each device of a class of devices (for example, battery powered meter) finds and associates itself with another device (for example, constant powered meter). The constant powered meter also registers its associate battery powered meter with the utility networks. The constant powered meter registers itself with the access points and the upstream nodes in the path out of each network. Each upstream node can independently make forwarding decisions on both upstream and downstream packets i.e. choose the next hop according to the best information available to it. The constant powered meter can sense transient link problems, outage problems, and traffic characteristics. It uses the information to find the best route out of and within each network. Each network device thus maintains multi-egress, multi-ingress network routing options both for itself and the device(s) associated with it. | 11-25-2010 |
20110077790 | METHODS AND SYSTEM FOR UTILITY NETWORK OUTAGE DETECTION - The present invention provides a system including a utility network including a product distribution pathway for delivering a product, a plurality of electronic utility devices associated with the utility network to monitor at least one parameter associated with the product distribution pathway, and a management processor in communication with the devices and operable to poll at least a subset of the electronic utility devices in response to an input to evaluate performance of one of the utility network and the system in response to information relating to the at least one parameter. The evaluation can include a rule-based analysis of one of the parameter and the information relating to the parameter. | 03-31-2011 |
20110115642 | UTILITY NETWORK INTERFACE DEVICE CONFIGURED TO DETECT AND REPORT ABNORMAL OPERATING CONDITION - A utility network interface device is provided for operation with a utility network. The utility network interface device includes a detector configured to produce a state signal upon occurrence of a prescribed state that interferes with the ability of a utility meter, with which the utility network interface device is associated, to measure consumption of a commodity and/or report consumption of the commodity. The utility network interface device also includes a control unit configured to detect a tampering with the utility meter in accordance with the state signal produced by the detector. The control unit automatically controls a notification unit to output, external to the utility meter, notification of the tampering detected by the control unit, in response to the detection of the tampering. Also provided are a utility network including the utility network interface device, a method of operating a utility network interface device, and a computer-readable recording medium having a computer program recorded thereon for operating a utility network interface device. | 05-19-2011 |
20110115643 | UTILITY NETWORK INTERFACE DEVICE CONFIGURED TO DETECT AND REPORT ABNORMAL OPERATING CONDITION - A utility network interface device is provided for operation with a utility network. The utility network interface device includes a control unit configured to detect a tampering with a software component of a utility meter with which the utility network interface device is associated. The utility network interface device also includes a notification unit configured to output, external to the utility meter, a visual indication constituting notification of the tampering detected by the control unit. The control unit is configured to automatically control the notification unit to output the external notification of the tampering in response to the detection of the tampering. Also provided are a utility network including the utility network interface device, a method of operating a utility network interface device, and a computer-readable recording medium having a computer program recorded thereon for operating a utility network interface device. | 05-19-2011 |
20110295730 | SYSTEMS AND METHODS FOR CHARGING VEHICLES - Systems and methods for charging vehicles. In some embodiments, a system includes at least one mobile device and a utility network management center (“NMC”). The at least one mobile device is configured as an electronic utility device and includes a network interface card (“NIC”). The at least one mobile device is also associated with a utility billing account and at least one utility commodity meter. The utility NMC is configured to communicate with the at least one mobile device and the at least one utility commodity meter over a network, locate the at least one mobile device, and monitor a state of the at least one utility commodity meter. The utility NMC is also configured to determine a usage of a commodity based on the state of the at least one utility commodity meter, and bill the utility billing account associated with the mobile device for the usage of the commodity. | 12-01-2011 |
20120036250 | System, Method and Program for Detecting Anomalous Events in a Utility Network - A utility network communication device is provided to detect whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of the nodes in the utility network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the utility network during a predetermined time period, based on a condition and/or event occurring during the predetermined time period. The communication device receives operation data from nodes in the network, and determines whether the received operation data from a node in the network constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event. | 02-09-2012 |
20120116602 | PHYSICALLY SECURED AUTHORIZATION FOR UTILITY APPLICATIONS - To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system. | 05-10-2012 |
20120163177 | LOAD MANAGEMENT IN WIRELESS MESH COMMUNICATIONS NETWORKS - Methods and systems for providing a network and routing protocol for utility services are disclosed. A method includes discovering a utility network. Neighboring nodes are discovered and the node listens for advertised routes for networks from the neighbors. The node is then registered with one or more utility networks, receiving a unique address for each network registration. Each upstream node can independently make forwarding decisions on both upstream and downstream packets, i.e., choose the next hop according to the best information available to it. The node can sense transient link problems, outage problems and traffic characteristics. Information is used to find the best route out of and within each network. Each network node maintains multi-egress, multi-ingress network routing options both for itself and the node(s) associated with it. The node is capable of several route maintenance functions utilizing the basic routing protocol and algorithms. | 06-28-2012 |
20120173758 | METHOD AND SYSTEM FOR PROVIDING NETWORK AND ROUTING PROTOCOLS FOR UTILITY SERVICES - A method and system of operating a utility node to communicate in a wireless utility network are provided. A utility node in the wireless utility network discovers at least two access points each respectively constituting an interface between a wide area network and the wireless utility network. The node discovers at least two access points constituting an interface between the two networks, registers with the discovered access points, and obtains at least two unique network addresses each respectively associated with a corresponding one of the access points with which the node has registered. The node provides the at least two addresses to a back office server which is communication with the wide area network to provide the back office server with at least two routes to reach the node. The at least two routes are respectively associated with a corresponding one of the access points with which the node registered. | 07-05-2012 |
20120232844 | DETERMINING ELECTRIC GRID ENDPOINT PHASE CONNECTIVITY - The service phase of the electrical connection to a customer endpoint device located within a power distribution system is determined by various techniques. At the feeder level, the system may be programmed to induce disturbances, thereby causing missed zero crossings at the customer endpoint devices. The pattern of these disturbances is a controlled one, designed specifically to avoid causing noticeable disruption even to sensitive devices, but to be unusual enough that it is statistically unlikely to be naturally occurring. The monitoring of the zero crossing information is used to determine the phase of the service line to the customer endpoint devices. | 09-13-2012 |
20130036329 | UPDATING ROUTING AND OUTAGE INFORMATION IN A COMMUNICATIONS NETWORK - After power is restored to a node in a utility network, that node employs one or more of its neighboring nodes as proxies to route a message to a central control facility of the utility. The message contains information about the restored node, and possibly one or more of its neighbor nodes. This information may include reboot counters, the amount of time that the node was down, momentary outages or power fluctuations, and/or the time of power restoration. The node that creates and initially sends the message can be the restored node itself, or another node that recognizes when a restored node has recently come back online. | 02-07-2013 |
20130148544 | METHOD AND SYSTEM FOR PROVIDING NETWORK AND ROUTING PROTOCOLS FOR UTILITY SERVICES - A method and system of operating a utility node to communicate in a wireless utility network are provided. A utility node in the wireless utility network discovers at least two access points each respectively constituting an interface between a wide area network and the wireless utility network. The node discovers at least two access points constituting an interface between the two networks, registers with the discovered access points, and obtains at least two unique network addresses each respectively associated with a corresponding one of the access points with which the node has registered. The node provides the at least two addresses to a back office server which is communication with the wide area network to provide the back office server with at least two routes to reach the node. The at least two routes are respectively associated with a corresponding one of the access points with which the node registered. | 06-13-2013 |
20130229947 | SYSTEM, METHOD AND PROGRAM FOR DETECTING ANOMALOUS EVENTS IN A UTILITY NETWORK - A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event. | 09-05-2013 |
20130254426 | METHOD AND SYSTEM OF PROVIDING IP-BASED PACKET COMMUNICATIONS IN A UTILITY NETWORK - One example embodiment provides a method and system where a node in a utility network registers with one or more access point devices associated with one or more local area utility networks. The utility node generates a unique network address using a network address prefix of a network address associated with the access point device. The utility node registers with a DNS server. Messages sent to the utility node are routed through the access point corresponding to the received prefix used to generate the unique network address for the utility node. The network address for the utility node and access point may be IPv6 addresses and the network address prefix may be an IPv6 prefix, or may be an IPv4 address. | 09-26-2013 |
20130297756 | METHOD AND SYSTEM OF PROVIDING NETWORK ADDRESSES TO IN-PREMISE DEVICES IN A UTILITY NETWORK - One example embodiment provides a method and system where a node in a utility network receives a block of IPv6 network addresses from an access point in the utility network. The utility node allocates an IP network address from the block of IPv6 network addresses received from the access point to an in-premise device which communicates to the utility node over an in-premise network which is not IP based. The utility node proxies the allocated IP address to the utility network, allowing other nodes on the utility network to address and communicate with the in-premise device. | 11-07-2013 |
20140085105 | Power Outage Notification and Determination - Systems and methods for identifying and targeting power outages are provided. Electric meters of a system receive electric power from power distribution equipment in a power distribution network and information that identifies the respective power distribution equipment from which the meters receive electric power. Communication nodes are associated with electric meters and receive, from neighboring communication nodes, information identifying each respective neighboring communication node and the information identifying the power distribution equipment from which respective electric meters, associated with neighboring communication nodes, receive electric power. A communication node of a particular electric meter can select a suitable communication node of a neighboring electric meter with which it can communicate. When the particular electric meter experiences a loss in power, it can then transmit an immediate regarding the loss in power to the selected communication node. | 03-27-2014 |
20140281528 | Secure End-to-End Permitting System for Device Operations - A permitting system for controlling devices in a system includes a permit issuing agent that receives a command to be sent to a device. Based upon at least one attribute of the command, the permit issuing agent identifies one or more business logic modules that is pertinent to the command. Each business logic module has a respectively different set of business rules associated with it. Each identified business logic module determines whether the command complies with the business rules associated with that module. If the command is determined to comply with the business rules of all of the identified business logic modules, the agent issues a permit for the command, and the permit is sent to the device for execution of the command. | 09-18-2014 |
20150039742 | METHOD AND SYSTEM OF PROVIDING IP-BASED PACKET COMMUNICATIONS IN A UTILITY NETWORK - One example embodiment provides a method and system where a node in a utility network registers with one or more access point devices associated with one or more local area utility networks. The utility node generates a unique network address using a network address prefix of a network address associated with the access point device. The utility node registers with a DNS server. Messages sent to the utility node are routed through the access point corresponding to the received prefix used to generate the unique network address for the utility node. The network address for the utility node and access point may be IPv6 addresses and the network address prefix may be an IPv6 prefix, or may be an IPv4 address. | 02-05-2015 |
20150058918 | SECURE END-TO-END PERMITTING SYSTEM FOR DEVICE OPERATIONS - A permitting system for controlling devices in a system includes a permit issuing agent that receives a command to be sent to a device. Based upon at least one attribute of the command, the permit issuing agent identifies one or more business logic modules that is pertinent to the command. Each business logic module has a respectively different set of business rules associated with it. Each identified business logic module determines whether the command complies with the business rules associated with that module. If the command is determined to comply with the business rules of all of the identified business logic modules, the agent issues a permit for the command, and the permit is sent to the device for execution of the command. | 02-26-2015 |