Patents Assigned to LOTS Technology
-
Patent number: 10993001Abstract: The present invention provides a gas meter fault prompting method and Internet of Things (IoT) system based on a compound IoT, and relates to the field of an IoT. Each of object sub-platforms is configured to check its own operation state information in real time for a fault; a management platform is configured to inquire a fault type and a fault solution according to the operation state information and preset fault inquiry table, and send the fault type and solution to a corresponding user sub-platform via the service platform to display, so that a user can know and view the fault type and solution of a gas meter at the user sub-platform in a timely manner and thus may repair some simple faults of the gas meter independently; and therefore, the time cost and the labor cost are saved.Type: GrantFiled: January 13, 2020Date of Patent: April 27, 2021Assignee: Chengdu Qinchuan loT Technology Co., Ltd.Inventor: Zehua Shao
-
Patent number: 10977750Abstract: The present invention relates to the field of Internet of Things (IoT), and provides a gas pricing method based on a compound IoT and an IoT system. The method is applied to the system. The system includes a user platform, a service platform, a plurality of management sub-platforms, a sensor network platform and a plurality of object sub-platforms; and each of the object sub-platforms includes a gas meter. According to the gas pricing method based on the compound IoT and the IoT system, a user can sense the benefit of gas saving directly from a fee, thereby helping push a gas-saving social morality.Type: GrantFiled: February 27, 2019Date of Patent: April 13, 2021Assignee: Chengdu Qinchuan loT Technology Co., Ltd.Inventor: Zehua Shao
-
Publication number: 20170373845Abstract: A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.Type: ApplicationFiled: August 18, 2017Publication date: December 28, 2017Applicant: M2M and loT Technologies, LLCInventor: John A. Nix
-
Publication number: 20170302447Abstract: Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications. A wireless module operating in a wireless network and with access to the Internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (PLMN) that supports wireless wide area network technology including 3rd generation (3G) and 4th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state.Type: ApplicationFiled: July 5, 2017Publication date: October 19, 2017Applicant: M2M and loT Technologies, LLCInventor: John A. Nix
-
Publication number: 20170237561Abstract: Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.Type: ApplicationFiled: May 1, 2017Publication date: August 17, 2017Applicant: M2M and loT Technologies, LLCInventor: John A. Nix
-
Publication number: 20160270000Abstract: Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications. A wireless module operating in a wireless network and with access to the Internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (PLMN) that supports wireless wide area network technology including 3rd generation (3G) and 4th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state.Type: ApplicationFiled: May 23, 2016Publication date: September 15, 2016Applicant: M2M and loT Technologies, LLCInventor: John A. Nix
-
Publication number: 20160269386Abstract: A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC). The network can send a first network module identity, a first key K, and an encrypted second key K for an eUICC profile to an eUICC subscription manager. The second key K can be encrypted with a symmetric key. The module can receive and activate the eUICC profile, and the network can authenticate the module using the first network module identity and the first key K. The network can (i) authenticate the user of the module using a second factor, and then (ii) send the symmetric key to the module. The module can decrypt the encrypted second key K using the symmetric key. The network can authenticate the module using the second key K. The module can comprise a mobile phone.Type: ApplicationFiled: May 23, 2016Publication date: September 15, 2016Applicant: M2M and loT Technologies, LLCInventor: John A. Nix
-
Publication number: 20160234020Abstract: A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.Type: ApplicationFiled: April 15, 2016Publication date: August 11, 2016Applicant: M2M and loT Technologies, LLCInventor: John A. Nix
-
Publication number: 20160159434Abstract: A center-mounted control system for a bicycle includes a torsion detector, a torque transducer, first and second wireless transceiving units, and a control unit. The torsion detector is sleeved on a crank shaft and detects a torque signal of the crank shaft and transmit the detected torque signal to the torque transducer; the torque transducer is fixedly connected to the torsion detector and senses the torque signal transmitted from the torsion detector and sends the torque signal to the first wireless transceiving unit; the control unit receives and processes the torque signal and controls an electrical motor according to the processed torque signal; and a first clutch of the bicycle is sleeved on the crank shaft and is fixedly connected to one end, close to a chain ring, of the torsion detector, and the first clutch of the bicycle is fixedly connected to the chain ring.Type: ApplicationFiled: August 8, 2014Publication date: June 9, 2016Applicant: Suzhou Tergar lot Technology Co., ltdInventors: Fuming Huang, Yunfei Li, Junning Huang, Hualin Cai, Qiang Zhang
-
Publication number: 20160164678Abstract: Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module can include a sensor and/or actuator. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private/public keys using cryptographic algorithms and a set of parameters. A server can use a shared secret key to authenticate the submission of derived public keys with an associated module identity. For the very first submission of a public key derived the module, the shared secret key can comprise a pre-shared secret key which can be loaded into the module using a pre-shared secret key code.Type: ApplicationFiled: February 12, 2016Publication date: June 9, 2016Applicant: M2M and loT Technologies, LLCInventor: John A. Nix
-
Publication number: 20160149709Abstract: Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.Type: ApplicationFiled: January 29, 2016Publication date: May 26, 2016Applicant: M2M and loT Technologies, LLCInventor: John A. Nix
-
Publication number: 20110297741Abstract: An automobile auction system to receive scanned automobile bar codes and function bar codes along with location data and to process the scanned bar codes. The system includes a first interface for receiving scanned bar codes, GPS coordinates, scanner ID, and time of scan from a custom scanning device. A second interface is to receive a map of an auto auction facility from a map source. A server is to process the bar codes and the GPS coordinates received from the scanning device and to associate the GPS coordinates to the map of the auto auction facility received from the map source. The system may process bar codes associated with functions, such as employees, shops or staging operations, specific tasks, and work orders. The function bar codes may, for example, assign scanners to employees, record tasks being performed, record employee performing the tasks, and record shop or staging operations opened/completed.Type: ApplicationFiled: June 7, 2011Publication date: December 8, 2011Applicant: INTERACTIVE LOT TECHNOLOGIES INC.Inventor: Sergey Naumovsky
-
Publication number: 20110297747Abstract: A custom location identifying scanner device that is ergonomically designed to be carried around, is easy to use, and is relatively cheap so that they may be utilized on a wider scale (e.g., a majority of automobile auction facility employees). The device may be used to scan bar codes associated with automobiles and record the GPS coordinates, scanner ID, and time of scan along with the automobile information. The device may also be used to scan bar codes associated with functions, such as employees, shops or staging operations, specific tasks, and work orders. Bar codes associated with functions may have a pre-fix to differentiate them from regular automobile ID scans. The function bar codes may be scanned to, for example, assign scanners to employees, record tasks being performed, record employee performing the tasks, and record shop or staging operations opened/completed.Type: ApplicationFiled: June 7, 2011Publication date: December 8, 2011Applicant: INTERACTIVE LOT TECHNOLOGIES INC.Inventor: Sergey Naumovsky
-
Patent number: 6545968Abstract: An apparatus for generating a two dimensional array of modulated light beams. A laser and a collimator are used to generate a single collimated light beam. This collimated light beam is passed through a two dimensional holographic beam splitter. Thereupon, the holographic beam splitter produces a two dimensional divergent array of diffraction limited collimated light beams. These light beams are then independently modulated by a two dimensional modulator array.Type: GrantFiled: January 18, 1994Date of Patent: April 8, 2003Assignee: Lots Technology, Inc.Inventor: William S. Oakley
-
Patent number: 6525867Abstract: Micro fabricated arrays of optical modulators of both a surface electrode and machined mesa nature where the small structure size and low capacitance electrical connections permit each modulator element to be individually electrically addressed thus providing modulator optical rise and fall response times in the low and sub nanosecond range. Both sparsely spaced and closely packed arrays are achieved.Type: GrantFiled: June 22, 2000Date of Patent: February 25, 2003Assignee: Lots Technology, Inc.Inventors: William S. Oakley, Mahdad Manavi, Qi-Ze Shu
-
Patent number: 6483797Abstract: A read-after-write system for optical recording systems includes a mirror used to direct read beams to a desired position on a recording medium relative to write beams impinging on the recording medium. The mirror may be adjustable to direct the read beams through a range of possible positions.Type: GrantFiled: August 17, 2000Date of Patent: November 19, 2002Assignee: Lots Technology, Inc.Inventors: William S. Oakley, Mahdad Manavi, A. Joel Mannion
-
Patent number: 6141301Abstract: In an optical storage system, an apparatus for focussing a light beam onto a recording medium. A light source generates a light beam which is modulated by a thin-film PLZT modulator array. A beamsplitter is used to direct the modulated light beam to an objective lens which focuses the modulated light beam onto the recording medium. The light reflected back from the recording medium is directed by the beamsplitter to a focus detector which generates an electrical signal corresponding to a degree of focus of the modulated light beam in reference to the recording medium. A focus actuator is placed in close proximity to the modulator, wherein the focus actuator has a mirrored surface for reflecting the light beam to the beamsplitter. By moving the focus actuator in an optical axis according to the electrical signal generated by the focus detector, a high bandwidth servo loop can be closed about the focal position.Type: GrantFiled: January 21, 1994Date of Patent: October 31, 2000Assignee: Lots Technology, Inc.Inventor: William S. Oakley
-
Patent number: 5528414Abstract: A two-dimensional modulator array for modulating a plurality of light beams. The modulator array is comprised of a plurality of stacked wafer layers. Each of the wafer layers have a linear array of transversely driven Pockels modulators. The Pockels modulators are formed by placing a plurality of electrodes over a top surface of an optical material and extending the electrodes over a beveled edge of the optical material. A ground plane resides on the bottom surface of the optical material. Conductive end reflectors are associated with each of the modulator electrodes. These end reflectors reflect the light beams back through the wafer. Electrical attachments are connected to the ends of each electrode for controlling the modulation for each electrode. Thereby, separate light beams can be individually modulated.Type: GrantFiled: May 5, 1994Date of Patent: June 18, 1996Assignee: LOTS TechnologyInventor: William S. Oakley