Abstract:
The system of the subject invention includes an antenna system, a surface apparatus and a battery-powered remote apparatus useful for applications such as well bore telemetry. In well bore telemetry, the surface apparatus is located uphole on the earth's surface and the remote apparatus is positioned at a remote location downhole in a well bore. The remote apparatus includes a sensor/transmitter unit for sensing physical characteristics such as pressure and/or temperature. The remote apparatus conserves power stored in its battery by transmitting change-in-pressure and/or change-in-temperature data that requires less power for transmission than absolute pressure and/or temperature data. The remote apparatus also conserves power by transmitting absolute pressure data in a single data frame and transmitting absolute temperature data in portions in a series of data frames. The remote apparatus can transition between initial time delay, fixed transmit sequence, sleep, operation, and test states based on its control program and/or based upon the transmission of control data from the surface apparatus. The surface apparatus receives a main signal from the remote apparatus and a reference signal from the antenna system and uses the reference signal to remove noise components from the main signal.
Abstract:
The methods of this invention reduce the amount of power consumed by a remotely positioned (i.e. downhole) sensor/transmitter used in applications such as well bore telemetry. The method involves the sensing of physical characteristics such as pressure and/or temperature to generate a first absolute value than is transmitted to a surface receiver located at the earth's surface. At a later time (or period) the physical characteristic is again sensed to generate a second absolute value that is subtracted from the first absolute value to generate a difference. If the difference is significant (i.e., greater than a predetermined value), the difference will be transmitted to the surface receiver. Because the difference will generally have fewer bits of data than the absolute data, less data can be transmitted so that battery power is conserved in the remote sensor/transmitter. In the event that the difference is not significant, even fewer bits need to be transmitted by the remote sensor/transmitter. Another method uses the fact that temperature is a more slowly changing phenomenon than pressure, and transmits data in frame formats constructed so that the transmission bit rate of sensed pressure data is higher than the transmission rate of sensed temperature data. In another method of this invention, the remote sensor/transmitter is programmed into a sleep state in which the remote sensor/transmitter consumes no appreciable battery power, for example, while being run down a well bore. The remote sensor/transmitter then transitions from the sleep state to the operation state after the expiration of a predetermined time period or by transmission of a control signal thereto.
Abstract:
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
Abstract:
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
Abstract:
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
Abstract:
A method for providing access to a passive optical network for services to homes or businesses from two or more telecommunications service providers and a billing means is described. A first service provider connects to a point of presence at one side of passive optical network. The provider transmits the appropriate services through this network to an authorization receiver. The authorization receiver is used to receive a periodic authorization code from the network provider to enable the appropriate services from the service provider to be transmitted to a subscriber at a home or business. The authorization receiver enables an optical fiber path to be established for the services to flow to and from the home or business. The authorization code that is transmitted through the network also provides an unambiguous means to provide a billing record such that the service provider can be billed by the network provider on an individual service address connected basis in conjunction with a record of houses passed and not yet connected.
Abstract:
A method of manufacturing a composite structural member (1), comprising the step of laying up a stack of fibre reinforced laminate plies (12), wherein at least one of the plies is laid up as discrete first (13) and second ply (14) portions, and the fibres of the second portion (14) have a different characteristic from those of the first portion (13). Also, a composite structural member (1) manufactured according to the method.