G05B19/042

AUTOMATIC AND REMOTE VISUO-MECHANICS AUDITING

An eye test administered to a remote subject over a computer network, where sensors provide feedback through the computer network so that light source position, light source brightness and/or a display configuration and/or parameter setting related to a visual display that is used to implement the remote eye test.

Remote temperature monitoring system

A remote temperature monitoring system includes a temperature monitoring device and a remote monitoring platform. The temperature monitoring system uses a temperature acquisition sensor to process collected temperature data in a single-chip microcomputer, and then the processed data information is transmitted to a computer by the single-chip microcomputer. Monitoring software is installed in the computer. After the software obtains the data, the data are parsed, and then a temperature-time map is presented in a visual interface. At the same time, the temperature monitoring device also transmits the parsed data to the remote monitoring platform, thereby realizing remote monitoring of temperature. The system integrates multi-channel acquisition, remote monitoring, timed temperature measurement, real-time mapping, data storage, temperature alarm and other functions into one.

Cybersecurity hardening for networked systems

A computer-readable medium contains cybersecurity configuration settings (CCS) generating file(s) including instructions when executed cause a processor of a computer located at a node in a networked system having computers including at least one computer system class to generate CCS. The CCS generating file includes group policy objects (GPOs) applicable to all computers, policy setting scripts that are applicable to <all the computer s, and group policy definition files which provide a policy setting library for the computer class. Execution of the CCS generating file at the node automatically generates the CCS for cybersecurity protection of the node. The computer class can include computer classes that include ≥2 different operating systems, and there can be a CCS generating file for each computer class. The CCS generating file can be a single multi-class CCS generating file that includes a plurality of CCS generating files.

Programmable climate controller for a vehicle

A programmable replacement controller that has a number of embedded applications corresponding to a number of OEM vehicle systems and a selected application within the controller can be called to service or activated through the programming feature of the replacement controller.

Programmable climate controller for a vehicle

A programmable replacement controller that has a number of embedded applications corresponding to a number of OEM vehicle systems and a selected application within the controller can be called to service or activated through the programming feature of the replacement controller.

System and method for dynamic device discovery and address assignment

A pool or spa system includes networked pool or spa devices that can be dynamically configured with network address by a controller. The controller can transmit a device discovery request on a network and can receive a discovery response from pool or spa devices that require a network address. The system determines and assigns the network addresses for the pool or spa devices based on unique device identifiers associated with the responding pool or spa devices. The network addresses assigned to the pool or spa device are transmitted to the pool or spa device to be used by the pool or spa devices to communicate with the controller over the network. The system can be used to discover and assign addresses to various types of pool or spa devices, such as pumps, underwater lights, chlorinators, water feature controllers, remote controllers, and/or other types of devices.

Safety industrial controller providing diversity in single multicore processor

Different cores of a multicore processor are used to provide diagnostics of sophisticated hardware without full redundancy by static assignment of the cores during individual cycles of the control program and comparison of the outputs. A method of automatically generating diverse programs for execution by these cores may modify one program to compile two different instructions without functionally changing that program through the use of DeMorgan equivalents and diverse compiler optimizations.

Electronic control unit for vehicle and method of executing program
11556104 · 2023-01-17 · ·

An electronic control unit for vehicle capable of receiving a program by communication expands the received program in a volatile memory and executes the expanded program. As an example of this program, there is a program for changing a communication environment for communicating with another unit.

Control method, control system, first server, and data structure

A control method according to the present disclosure is executed by a first server of servers in a system including one or more IoT devices and the servers. The method includes: obtaining first transaction data including malfunction information indicating that one of the IoT devices is malfunctioning, and time information indicating a time when the IoT device has obtained the malfunction information; transferring the obtained first transaction data to second servers different from the first server; executing, together with the second servers, a first consensus algorithm for an agreement on an authenticity of the first transaction data; and recording a block containing the first transaction data in a distributed ledger of the first server, when the authenticity of the first transaction data is verified by the first consensus algorithm.

Control method, control system, first server, and data structure

A control method according to the present disclosure is executed by a first server of servers in a system including one or more IoT devices and the servers. The method includes: obtaining first transaction data including malfunction information indicating that one of the IoT devices is malfunctioning, and time information indicating a time when the IoT device has obtained the malfunction information; transferring the obtained first transaction data to second servers different from the first server; executing, together with the second servers, a first consensus algorithm for an agreement on an authenticity of the first transaction data; and recording a block containing the first transaction data in a distributed ledger of the first server, when the authenticity of the first transaction data is verified by the first consensus algorithm.