Y04S40/20

Transaction-enabled systems and methods for royalty apportionment and stacking

Transaction-enabled systems and methods for royalty apportionment and stacking are disclosed. An example system may include a plurality of royalty generating elements (a royalty stack) each related to a corresponding one or more of a plurality of intellectual property (IP) assets (an aggregate stack of IP). The system may further include a royalty apportionment wrapper to interpret IP licensing terms and apportion royalties to a plurality of owning entities corresponding to the aggregate stack of IP in response to the IP licensing terms and a smart contract wrapper. The smart contract wrapper is configured to access a distributed ledger, interpret an IP description value and IP addition request, to add an IP asset to the aggregate stack of IP, and to adjust the royalty stack.

NETWORK SLICE INSTANCE PROVISIONING BASED ON A PERMISSIONED DISTRIBUTED LEDGER

A method and system for deployment of services for customers. Network service templates (NSTs) are determined, from a permissioned distributed ledger that is distributed between network operator systems of one or more network operators and customer systems. The NSTs include respective descriptions of network characteristics that provide respective logical networks. A subset of the NSTs and a corresponding subset of the network operator systems are selected based on a service description of the first service for deployment of the first service. Instantiation of the subset of the NSTs is requested on the corresponding subset of network operator systems as a subset of network slice instances to form the first service deployed for the first customer.

ELECTRICAL POWER GRID VISUALIZATION

Methods, systems, and apparatus are disclosed for electrical power grid visualization. A computer-implemented method includes: obtaining power grid data including different temporal and spatially dependent characteristics of a power grid, the characteristics including a first characteristic, a second characteristic, and a third characteristic; and generating a graphical user interface (GUI) representing a visualization of the power grid data. The GUI includes a line-diagram representation of power lines in the power grid overlaid on a map of a geographic region in which the power grid is located, the line-diagram including a plurality of line segments, wherein attributes of each line segment represent the power grid data at a particular spatial location of the power grid. The attributes include a time-changing thickness of the line segment representing the first characteristic; a plurality of time-changing directional arrows on the line segment representing the second characteristic; and a color shading representing the third characteristic.

Systems and methods for detecting an attack on a battery management system

Systems and methods for detecting and/or identifying an attack on a battery management system (BMS) or a battery system. The voltage and/or state of charge (SOC) of the BMS or battery system can be monitored, and one or more datasets can be obtained. A principal component analysis (PCA) based unsupervised k-means approach can be applied on the one or more datasets to monitor for irregularities that indicate an attack.

Modular power network device
11593238 · 2023-02-28 · ·

A modular system is described which can provide high frequency monitoring of power use and responsive control as well as enabling network connectivity for centralised monitoring and operation. One modular system consists of a communications bus, end caps, and a combination of the modules providing communications, power metering, relay control and battery backup. Each modular system can be configured with a combination of modular units as needed for the application. A combination of bus communication monitoring and tilt detection provides security against external tampering after installation.

Distributed ledger for network security management

Techniques are described for managing a network through use of a security device that includes, or has access to, a blockchain node. The security device may manage a network of Internet-of-Things (IoT) devices in a home or other environment. The security device may act as an intermediary to manage secure, trusted communications between the IoT device(s) and external service(s). The security device may also provide network security features such as a network firewall. In some implementations, the security device may run a blockchain node, and the blockchain could be used to establish a verifiable home identity. The security device may interact with external resources and/or services, such as utility services, e-commerce services, and so forth, through this secure mechanism.

Modify voice calls with a moving driver to reduce distractions
20180007554 · 2018-01-04 ·

A system for reducing traffic accidents caused by distraction from a mobile telecom device. The system detects when the device is near a driver's seat of a moving vehicle. While the system is carrying a voice call between a remote voice device and the mobile device, the system modifies voice signal transmission between the devices by periodically playing a beep or other signal to remind the parties that one of them is driving and suspends voice signal transmission from the remote device to the mobile device when the system detects that circumstances affecting level of attention required for driving merit the driver paying greater attention.

AIR CONDITIONER CONNECTION SYSTEM
20180004920 · 2018-01-04 ·

An air conditioner connection system includes an air conditioner having a first device connected via a power line in a communication-capable manner, and a second device capable of performing radio communication with the air conditioner. The air conditioner includes an authentication process control unit that controls the first device to perform an authentication process when a starting request of the authentication process for performing power carrier communication is received from the second device, the first device includes an authentication process unit that performs the authentication process under the control of the air conditioner, and the second device includes an authentication start process unit that transmits the starting request of the authentication process to the air conditioner.

SECURE INDUSTRIAL CONTROL PLATFORM

According to some embodiments, an overall chain-of-trust may be established for an industrial control system. Secure hardware may be provided, including a hardware security module coupled to or integrated with a processor of the industrial control system to provide a hardware root-of-trust. Similarly, secure firmware associated with a secure boot mechanism such that the processor executes a trusted operating system, wherein the secure boot mechanism includes one or more of a measured boot, a trusted boot, and a protected boot. Objects may be accessed via secure data storage, and data may be exchanged via secure communications in accordance with information stored in the hardware security model.

BROADBAND ACCESS DEVICES HAVING A RADIO LINK
20180006719 · 2018-01-04 ·

Methods, systems, and apparatus for communicating over a radio link by devices with broadband connectivity are disclosed. In one aspect, a telecommunications device includes a first transceiver, a second transceiver, and a state monitor. The first transceiver communicates over a broadband link. The second transceiver communicates over a radio link. The radio link is a Low-Power Wide-Area Network (LPWAN) link. The state monitor includes one or more processes that monitor a state of the telecommunications device, and in response to the state of the telecommunications device being one of a plurality of pre-specified states, transmit, using the second transceiver, data specifying the state of the telecommunications device over the radio link.