摘要:
A method for managing communications within a network comprising utility meters, each associated and connected to at least one utility management center through at least one intermediate data concentrator. A message is sent by a utility meter to the destination data concentrator. This message includes metering data measurement reported by said utility meter, its utility meter identifier, the destination data concentrator identifier and the management center identifier. Then, on the basis of several metering data measurements, a metering counter differential consumption value is calculated by difference of two metering counter consumption indexes measured by the utility meter within a time period interval. Then, a report containing at least the metering counter differential consumption value is sent from the destination data concentrator towards the utility management center to which said utility meter is associated.
摘要:
A secure detachable utility monitoring device is disclosed, to be appended to a utility metering apparatus for controlling at least one utility usage consumption. A detachable metering monitoring device of at least one embodiment includes: a usage reading interface to acquire a utility consumption value metered by the utility meter; a first memory to store at least a unique identifier ID and a personal key, both pertaining to the device; a crypto processor to generate a cryptogram from information data comprising at least the utility consumption value, the cryptogram being encrypted with the personal key; a message generator to generate an information message including at least the cryptogram and the unique identifier ID; and a communication network interface including a sending unit to send the information message to a remote management center.
摘要:
A method for managing communications within a network comprising utility meters, each associated and connected to at least one utility management center through at least one intermediate data concentrator. A message is sent by a utility meter to the destination data concentrator. This message includes metering data measurement reported by said utility meter, its utility meter identifier, the destination data concentrator identifier and the management center identifier. Then, on the basis of several metering data measurements, a metering counter differential consumption value is calculated by difference of two metering counter consumption indexes measured by the utility meter within a time period interval. Then, a report containing at least the metering counter differential consumption value is sent from the destination data concentrator towards the utility management center to which said utility meter is associated.
摘要:
A secure detachable utility monitoring device is disclosed, to be appended to a utility metering apparatus for controlling at least one utility usage consumption. A detachable metering monitoring device of at least one embodiment includes: a usage reading interface to acquire a utility consumption value metered by the utility meter; a first memory to store at least a unique identifier ID and a personal key, both pertaining to the device; a crypto processor to generate a cryptogram from information data comprising at least the utility consumption value, the cryptogram being encrypted with the personal key; a message generator to generate an information message including at least the cryptogram and the unique identifier ID; and a communication network interface including a sending unit to send the information message to a remote management center.
摘要:
The present invention relates to a system, and method for enforcing utility usage and metering functions by a utility meter associated with a utility consumer end user, connected to a remote utility management center by a communication network. The present invention proposes a utility meter for controlling and metering a least one utility consumption.
摘要:
The present invention aims to overcome drawbacks of conventional content tracing methods requiring re-processing the content before its broadcast with a significant side channel transmission i.e. extra processing, storage and/or bandwidth at the distribution side, or alternately a complex signal processing implementation at the receiver side that has to be protected against hackers attacks. An efficient system and method consists of tracing and uniquely identifying decoders of a video stream wherein the decoders implement at least one variant of a standard image decompression algorithm and wherein the resulting decompressed image approximation varies according to the decoders' identifier.
摘要:
A method traces the origin of a (illegally) distributed video material. It fingerprints a data object A having a nominal stream format F to provide a fingerprinted data object B including a pre-fingerprinting forensic luring process.
摘要:
Even if high speed are available between the router and the multimedia unit through the IP line (up to 24 Mbits/sec), this is still the bottleneck in term of data transfer. Indeed in practice the vast majority of IP users have access speed between 2 to 5 Mbits/sec and the development of other services (telephony, videoconference, push VOD, game) are bandwidth consuming. It is now an object of the invention to propose a solution to reduce the data flow between the router and the multimedia unit over IP line.This is achieved by a method to optimize the data stream between a router and a multimedia unit, the router receiving at least one data stream forming a service and comprising several sub-streams from which part of them are alternatively used by the multimedia unit, the method comprising the steps of: defining a set of data representing the multimedia unit's profile, transmitting this set of data to the router, filtering by the router the unnecessary sub-stream according the given profile, sending the remaining sub-streams to the multimedia unit.
摘要:
The present invention aims to overcome drawbacks of conventional content tracing methods requiring re-processing the content before its broadcast with a significant side channel transmission i.e. extra processing, storage and/or bandwidth at the distribution side, or alternately a complex signal processing implementation at the receiver side that has to be protected against hackers attacks. An efficient system and method consists of tracing and uniquely identifying decoders of a video stream wherein the decoders implement at least one variant of a standard image decompression algorithm and wherein the resulting decompressed image approximation varies according to the decoders' identifier.
摘要:
A pricing method for utility consumptions of utility meters each connected to at least one management center through an intermediate data concentrator. The data concentrator receives, from each management center, at least a tariff table comprising at least one time interval and an associated pricing rate. It selects the lowest rate for each received time interval. The data concentrator receives, from the utility meter, secured utility meter messages, each comprising: a metering data measurement, the utility meter identifier, a data concentrator identifier and a management center identifier. On the basis of several metering data measurements, a metering counter differential consumption value is determined and the management center suggesting the lowest rate is assigned thereto. Finally, a secured report containing at least the metering counter differential consumption value together with the utility meter identifier to which this value refers is sent from the data concentrator towards each management center.