Y04S40/20

Secure power supply for an industrial control system

A power supply is disclosed for an industrial control system or any system including a distributed power supply network. In embodiments, the power supply comprises: a battery module including a battery cell and a battery monitor configured to monitor the battery cell; and a self-hosted server operatively coupled with the battery module, the self-hosted server being configured to receive diagnostic information from the battery monitor and provide network access to the diagnostic information. In implementations, the diagnostics stored by the self-hosted server can be broadcast to or remotely accessed by enterprise control/monitoring systems, application control/monitoring systems, or other remote systems via a secured network (e.g., secured access cloud computing environment).

System and method for securely connecting to a peripheral device

A device connectable between a host computer and a computer peripheral over a standard bus interface is disclosed, used to improve security, and to detect and prevent malware operation. Messages passing between the host computer and the computer peripherals are intercepted and analyzed based on pre-configured criteria, and legitimate messages transparently pass through the device, while suspected messages are blocked. The device communicates with the host computer and the computer peripheral using proprietary or industry standard protocol or bus, which may be based on a point-to-point serial communication such as USB or SATA. The messages may be stored in the device for future analysis, and may be blocked based on current or past analysis of the messages. The device may serve as a VPN client and securely communicate with a VPN server using the host Internet connection.

Method and apparatus for tertiary control of microgrids with integrated over-current protection
11539217 · 2022-12-27 · ·

A method and apparatus for tertiary control with over-current protection. In one embodiment, the method comprises calculating at least one unconstrained optimal net intertie target for an area of a power network; calculating, for each resource within the area, optimal scheduled current to achieve the at least one unconstrained optimal net intertie target; calculating, using the optimal scheduled currents and a plurality of stress coefficients, net scheduled current for each power line segment within the area; comparing the net scheduled currents to corresponding stress thresholds to identify any stress violations; reducing, when the comparing step identifies one or more stress violations, the optimal scheduled current for one or more resources contributing to the one or more stress violations; and calculating, when the comparing step identifies the one or more stress violations, updated optimal scheduled current for one or more resources not contributing to the one or more stress violations.

Compound transmission security (TRANSEC) for military-grade fifth generation (5G) radio systems
11540123 · 2022-12-27 · ·

A multi-user (MU) multiple-input/multiple-output (MU MIMO) module for a fifth-generation (5G) software-defined radio (SDR) network environment is disclosed. In embodiments, the MU MIMO module of a transmitting SDR system of a 5G mobile ad hoc network (MANET) or other peer-to-peer directional network receives feedback from a receiving SDR system based on a prior or current frame and generates, based on the feedback, a compound transmission security (TRANSEC) encryption key for a subsequent frame. The compound TRANSEC encryption key encrypts the transmission of the subsequent frame through a combination of frequency-hopping encryption codes, orthogonality-hopping encryption codes, and dynamic pseudorandom distribution of transmitting power among antenna elements to simulate multipath hopping. The SDR system may include an antenna controller capable of managing dynamic power distribution according to the compound TRANSEC encryption keys as well as directionality shifts and beamforming operations to evade jammers detected within the 5G network environment.

OBTAINING INSTRUCTIONS WITHIN A WIND POWER PLANT PRIVATE NETWORK

Obtaining within a private network of a power plant one or more instructions for controlling the power plant, wherein the power plant includes one or more wind turbine generators, and wherein one or more instructions for controlling the power plant are received at an external digital storage device placed externally with respect to the private network. The one or more instructions are stored in a queue in the external digital storage device. The one or more instructions are fetched from the queue independent with respect to events initiated externally with respect to the private network.

SPATIO-TEMPORAL PROBABILISTIC FORECASTING OF WIND POWER OUTPUT

A method for forecasting wind power output of a target wind farm. The method includes normalizing, wind power output data for each wind farm of a group of wind farms, based, at least in part, on a respective installed capacity; transforming, the normalized power output data to yield transformed normalized wind power output data. Fitting, by the temporal module, each temporal model of at least one temporal model to model input data for each wind farm. The model input data corresponds to normalized wind power output data or transformed normalized wind power output data. The method further includes fitting, by a spatial module, a DVINE copula model for the group of wind farms, based, at least in part, on at least one residual value. Each residual value is determined based, at least in part on a selected fitted temporal model for each wind farm in the group.

AD-HOC AUTHENTICATED GROUP DISCOVERY
20220408257 · 2022-12-22 ·

Techniques are provided for ad-hoc authenticated group discovery and data sharing in a mesh network. A group of devices is created without leaving a security gap due to the open communication needed to establish the discovery of the devices forming the group. The group can be authenticated autonomously following network discovery of the devices. Instead of requiring global pre-assigned keys for authentication, the devices in the group are authenticated with signatures and certificate passing thereby providing strong security. The efficiency of data sharing between the devices of the network, such as a mesh network, can also be increased. One or more devices may act as a bridge device between devices of a same group that are not in direct wireless communication with each other to reduce re-broadcasts within the mesh network.

Secure communication channel with token renewal mechanism
11533297 · 2022-12-20 · ·

One embodiment of the present invention includes a server machine configured to establish a secure communication channel with a client machine via renewable tokens. The server machine receives a plurality of messages from a client machine over a secure communication channel, where the plurality of messages includes a first message that includes at least two of user authentication data, entity authentication data, first key exchange data, and encrypted message data. The server machine transmits, to the client machine, a second message that includes a master token comprising second key exchange data associated with the first key exchange data and at least one of a renewal time and an expiration time.

Building system with probabilistic forecasting using a recurrent neural network sequence to sequence model

A building system for building data point prediction, the building system comprising one or more memory devices configured to store instructions, that, when executed by one or more processors, cause the one or more processors to receive first building data for a building data point of a building and generate training data, the training data comprising a probability distribution sequence comprising a first probability distribution for the building data point. The instructions cause the one or more processors to train a prediction model based on the training data, receive second building data for the building data point, and predict, for one or more time-steps into the future, one or more second probability distributions with the second building data based on the prediction model, each of the one or more second probability distributions being a probability distribution for the building data point at one of the one or more time-steps.

METHOD FOR GRID IMPEDANCE AND DYNAMICS ESTIMATION
20220399721 · 2022-12-15 ·

Estimating components of a grid impedance, Z, of a power grid being coupled to a power generating unit at a point of interconnection is disclosed. A voltage, Vmeas, across the point of interconnection; an active current, IP, and/or an active power, P, delivered by the power generating unit to the power grid; and a reactive current, IQ, and/or a reactive power, Q, delivered by the power generating unit are determined. A parameter estimation vector is estimated using a recursive adaptive filter algorithm, and on the basis of Vmeas, IP, P, IQ and/or Q. A model representation of the power grid is created on the basis of the parameter estimation vector, and a system DC gain vector for the power grid is calculated, using the model representation. Finally, Z, and/or a resistance, R, of Z, and/or a reactance, X, of Z, is derived from the system DC gain vector.