G16Y20/30

Decentralized green-energy ecosystem

A processor may identify that a computing device is below a power threshold. The processor may generate a charge request. The charge request may include metrics associated with a requested power exchange. The processor may send the charge request to a decentralized exchange. The decentralized exchange may include the computing device and at least two other devices. The processor may receive respective charging proposals from the at least two other devices. The processor may select one of the respective charging proposals.

Device Anomaly Monitoring Method and Device
20230379234 · 2023-11-23 ·

An Internet of Things device includes an anomaly monitoring switch such that the Internet of Things device performs anomaly monitoring when the anomaly monitoring switch is enabled. An anomaly rule is stored in the Internet of Things device. According to the anomaly rule, the Internet of Things device determines whether a request sent by the Internet of Things device is an anomaly request and whether a control instruction received from an Internet of Things cloud platform is an anomaly control instruction. When the anomaly request or anomaly control instruction is received, the Internet of Things device discards the anomaly request or the anomaly control instruction.

Device Anomaly Monitoring Method and Device
20230379234 · 2023-11-23 ·

An Internet of Things device includes an anomaly monitoring switch such that the Internet of Things device performs anomaly monitoring when the anomaly monitoring switch is enabled. An anomaly rule is stored in the Internet of Things device. According to the anomaly rule, the Internet of Things device determines whether a request sent by the Internet of Things device is an anomaly request and whether a control instruction received from an Internet of Things cloud platform is an anomaly control instruction. When the anomaly request or anomaly control instruction is received, the Internet of Things device discards the anomaly request or the anomaly control instruction.

Method for attack protection in IoT devices
11665189 · 2023-05-30 · ·

A method of operating an Internet of Things device is described. In the method, an electrical power is supplied to electrical circuitry in the Internet of Things device. The Internet of Things device is communicatively coupled to a computer network using circuitry of a transceiver and a communications module of the Internet of Things device. A detecting circuit is operated to indirectly monitor a level of activity of the communications module. If the level of activity of the communications module is determined to exceed a threshold value, a volume of communications between the Internet of Things device and the computer network is curtailed.

Method for attack protection in IoT devices
11665189 · 2023-05-30 · ·

A method of operating an Internet of Things device is described. In the method, an electrical power is supplied to electrical circuitry in the Internet of Things device. The Internet of Things device is communicatively coupled to a computer network using circuitry of a transceiver and a communications module of the Internet of Things device. A detecting circuit is operated to indirectly monitor a level of activity of the communications module. If the level of activity of the communications module is determined to exceed a threshold value, a volume of communications between the Internet of Things device and the computer network is curtailed.

Vehicle fuel volume estimation systems and methods

Vehicle fuel volume estimation systems and methods are provided herein. An example method includes determining a fuel level percentage value for a vehicle, determining a vehicle identification number (VIN) of the vehicle, determining a fuel tank part number using the VIN, converting the fuel level percentage value into a fuel volume value based on the fuel tank part number, and transmitting a message to a recipient, the message that includes the fuel volume value.

Vehicle fuel volume estimation systems and methods

Vehicle fuel volume estimation systems and methods are provided herein. An example method includes determining a fuel level percentage value for a vehicle, determining a vehicle identification number (VIN) of the vehicle, determining a fuel tank part number using the VIN, converting the fuel level percentage value into a fuel volume value based on the fuel tank part number, and transmitting a message to a recipient, the message that includes the fuel volume value.

Facility Analytics

A network edge device includes a local network interface, a remote network interface, a memory and a processor. The local network interface receives data from local data sources over a local network. The remote network interface communicates with a remote computer over a remote network. The processor receives a filter parameter set for each local data source from the remote computer. Each filter parameter set includes a data rate parameter and at least one of a minimum threshold parameter, a maximum threshold parameter or a change-of-value (COV) parameter. For each local data source, the processor compare each data value received from the local data source to at least one of the filter parameters, and sends the data value and subsequent data values to the remote computer at a data rate that is based on the data rate parameter.

Facility Analytics

A network edge device includes a local network interface, a remote network interface, a memory and a processor. The local network interface receives data from local data sources over a local network. The remote network interface communicates with a remote computer over a remote network. The processor receives a filter parameter set for each local data source from the remote computer. Each filter parameter set includes a data rate parameter and at least one of a minimum threshold parameter, a maximum threshold parameter or a change-of-value (COV) parameter. For each local data source, the processor compare each data value received from the local data source to at least one of the filter parameters, and sends the data value and subsequent data values to the remote computer at a data rate that is based on the data rate parameter.

TECHNIQUES FOR PRESERVING BATTERY LIFE IN POOR SIGNAL CONDITIONS USING CELLULAR PROTOCOL INFORMATION
20220286968 · 2022-09-08 ·

Techniques for preserving battery life in poor signal conditions include an electronic device determining a coverage enhancement (CE) parameter associated with a link between the electronic device and a base station for a first point in time; determining, based on the CE parameter, that a signaling metric associated with the link for the first point in time is equal to or below a corresponding threshold; and in response to determining that the signaling metric is equal to or below the corresponding threshold, delaying transmission of one or more messages from the electronic device over the link until a second point in time that is later than the first point in time.