摘要:
To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
摘要:
To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
摘要:
A wireless communication network system includes a plurality of nodes. Each node from the plurality of nodes includes a plurality of communication modules. Each module includes a modem and is configured to operate according to a communication protocol. Each communication module is configured to monitor its own communication parameter data and to cooperate with companion modules of a node by sharing communication parameter data, for instance through a coordination unit. Each communication module is further configured to allow, preferably according to a predefined set of rules, communication using a protocol of one communication module by utilizing a band associated with a companion module. The sharing of communication parameter data between modules may be continuous sharing or periodic sharing.
摘要:
A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device.
摘要:
Forward error correction is used in conjunction with detection of a start frame delimiter (SFD) to provide flexibility and to reduce missed instances of an SFD. Candidate SFDs in an incoming signal are identified using a lower-than-normal detection threshold, and corresponding markers are stored in a buffer. For each stored marker, a physical layer header following the candidate SFD is decoded with error-correction techniques, to determine whether uncorrectable errors exist. If so, the candidate is discarded and the next candidate is evaluated. If no uncorrectable errors exist, the candidate is declared a valid SFD, and the remaining signal is decoded. Dual detection thresholds can be employed in networks that permit both error-encoded and non-coded packets. A technique for selecting SFD patterns that facilitate higher performance is also disclosed.
摘要:
An apparatus and method for interference cancellation using software or low speed hardware. Antenna signals are received and selected. After selection, interference cancellation processing is applied. In one embodiment, the signal is a spread spectrum signal and selection includes despreading the signal. In one example, the interference cancellation processing includes a phase rotation step and a magnitude manipulation step.
摘要:
A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device.
摘要:
A method for selecting a location determination solution from a set of possible location determination solutions generated from filtered, unfiltered, and loosely filtered ranging signals. The solution is computed using a first algorithm and filtered ranging signals to obtain a filtered location determination solution. Additional location determination solutions are computed using a second algorithm with unfiltered ranging signals to obtain one or more unfiltered location determination solutions. Further additional location determination solutions may be computed using a third algorithm with loosely filtered ranging signals to obtain one or more loosely filtered location determination solutions. A final location determination solution is chosen from the set of filtered location determination solution, unfiltered location determination solutions, and loosely filtered location determination solutions via an optimizing metric, M.
摘要:
A wireless communication network system includes a plurality of nodes. Each node from the plurality of nodes includes a plurality of communication modules. Each module includes a modem and is configured to operate according to a communication protocol. Each communication module is configured to monitor its own communication parameter data and to cooperate with companion modules of a node by sharing communication parameter data, for instance through a coordination unit. Each communication module is further configured to allow, preferably according to a predefined set of rules, communication using a protocol of one communication module by utilizing a band associated with a companion module. The sharing of communication parameter data between modules may be continuous sharing or periodic sharing.
摘要:
Forward error correction is used in conjunction with detection of a start frame delimiter (SFD) to provide flexibility and to reduce missed instances of an SFD. Candidate SFDs in an incoming signal are identified using a lower-than-normal detection threshold, and corresponding markers are stored in a buffer. For each stored marker, a physical layer header following the candidate SFD is decoded with error-correction techniques, to determine whether uncorrectable errors exist. If so, the candidate is discarded and the next candidate is evaluated. If no uncorrectable errors exist, the candidate is declared a valid SFD, and the remaining signal is decoded. Dual detection thresholds can be employed in networks that permit both error-encoded and non-coded packets. A technique for selecting SFD patterns that facilitate higher performance is also disclosed.