G06F21/81

SYSTEM FOR MONITORING BATTERY LIFE OF A BATTERY OF A USER DEVICE TO FACILITATE SELECTION OF COMMUNICATION SCHEMES

In some implementations, a system may receive a notification related to a battery life of a battery of a user device. The system may determine, based on the notification, a battery level of the battery of the user device. The system may select based on the battery level of the battery of the user device, a particular communication scheme, of a plurality of communication schemes, for communicating with a user of the user device. The system may transmit at least one message according to the particular communication scheme.

SECURITY SYSTEM, VEHICLE, SECURITY DEVICE, AND VALIDITY DETERMINATION METHOD

A security system includes an information transmission device, and a security device to which a target device is connectable. The information transmission device and the security device are connected to each other via a network. The information transmission device transmits, to the security device, generation information to be used for generating reference identification information. The security device generates the reference identification information by using the generation information received from the information transmission device via the network. The security device acquires identification information of the target device connected to the security device. The security device compares the acquired identification information with the generated reference identification information, and determines validity of the target device connected thereto, based on a result of comparison.

Location-based asset usage control
11558744 · 2023-01-17 · ·

A lighting device includes a light source configured to emit a light and a sensor configured to receive identification information from an asset tag of a physical asset. The lighting device further includes a processor configured to send the identification information received from the asset tag and location information of the lighting device to a control device. The processor is further configured to receive a usage control message from the control device and transmit the usage control message, where the usage control message controls whether the physical asset is used at a location indicated by the location information.

Location-based asset usage control
11558744 · 2023-01-17 · ·

A lighting device includes a light source configured to emit a light and a sensor configured to receive identification information from an asset tag of a physical asset. The lighting device further includes a processor configured to send the identification information received from the asset tag and location information of the lighting device to a control device. The processor is further configured to receive a usage control message from the control device and transmit the usage control message, where the usage control message controls whether the physical asset is used at a location indicated by the location information.

Systems and methods for detecting an attack on a battery management system

Systems and methods for detecting and/or identifying an attack on a battery management system (BMS) or a battery system. The voltage and/or state of charge (SOC) of the BMS or battery system can be monitored, and one or more datasets can be obtained. A principal component analysis (PCA) based unsupervised k-means approach can be applied on the one or more datasets to monitor for irregularities that indicate an attack.

VOLTAGE OVERRIDE DEVICE FOR PHYSICAL INTRUSION PREVENTION ON A DATA BUS

An apparatus for preventing physical intrusion on a data bus includes a data bus state sensor coupled to the data bus for monitoring a state of the data bus, a power circuit for generating multiple voltages supplied to functional circuitry in the apparatus, and a variable override circuit. The variable override circuit receives one or more voltages from the power circuit and selectively gates the voltages onto the data bus as a function of one or more control signals. A controller coupled to the variable override circuit, the power circuit and the state sensor receives state information from the state sensor and generates the control signals in response to detection of physical intrusion on the data bus. The controller controls a voltage level of at least one of the voltages generated by the power circuit for overriding the data bus when physical intrusion is detected on the data bus.

VOLTAGE OVERRIDE DEVICE FOR PHYSICAL INTRUSION PREVENTION ON A DATA BUS

An apparatus for preventing physical intrusion on a data bus includes a data bus state sensor coupled to the data bus for monitoring a state of the data bus, a power circuit for generating multiple voltages supplied to functional circuitry in the apparatus, and a variable override circuit. The variable override circuit receives one or more voltages from the power circuit and selectively gates the voltages onto the data bus as a function of one or more control signals. A controller coupled to the variable override circuit, the power circuit and the state sensor receives state information from the state sensor and generates the control signals in response to detection of physical intrusion on the data bus. The controller controls a voltage level of at least one of the voltages generated by the power circuit for overriding the data bus when physical intrusion is detected on the data bus.

Communicating an event to a remote entity
11568045 · 2023-01-31 · ·

An example method includes detecting an event in an electronic system. The electronic system includes an electronic component and a switched mode power supply. The electronic component draws an amount of power from the switched mode power supply during operation. In response to detecting the event, the electronic component is operated to cause the electronic component to change the amount of power that the electronic component draws from the switched mode power supply. The change in the amount of power that the electronic component draws causes the switched mode power supply to output a signal that is evidence of the event.

Information processing apparatus and control method for selectively supplying power and clocks to module circuits used for verification
11698668 · 2023-07-11 · ·

A power supply control unit controls supply and stoppage of power to a plurality of blocks having two or more modules. A clock control unit controls supply and stoppage of clocks to the two or more modules in the plurality of blocks. A first control unit verifies validity of a program stored in a storage unit. A second control unit executes the program determined to be valid as a result of verification by the first control unit. While the program is verified by the first control unit, the power supply control unit supplies power to a block including a module required for the verification, and the clock control unit stops a clock to a module not required for the verification of the block including a module required for the verification.

Communications module for technology asset connectivity
11553429 · 2023-01-10 · ·

A wireless communication module of a technology asset device is operable to derive power from a power source without instruction by the technology asset device to direct power flow from the power source to the wireless communication module. The wireless communication module can connect to a wireless network and receive from an asset management system an instruction regarding a responsive action to be performed by the wireless communication device that relates to a condition.