Patents Assigned to LOTS Technology
  • Patent number: 10993001
    Abstract: The present invention provides a gas meter fault prompting method and Internet of Things (IoT) system based on a compound IoT, and relates to the field of an IoT. Each of object sub-platforms is configured to check its own operation state information in real time for a fault; a management platform is configured to inquire a fault type and a fault solution according to the operation state information and preset fault inquiry table, and send the fault type and solution to a corresponding user sub-platform via the service platform to display, so that a user can know and view the fault type and solution of a gas meter at the user sub-platform in a timely manner and thus may repair some simple faults of the gas meter independently; and therefore, the time cost and the labor cost are saved.
    Type: Grant
    Filed: January 13, 2020
    Date of Patent: April 27, 2021
    Assignee: Chengdu Qinchuan loT Technology Co., Ltd.
    Inventor: Zehua Shao
  • Patent number: 10977750
    Abstract: The present invention relates to the field of Internet of Things (IoT), and provides a gas pricing method based on a compound IoT and an IoT system. The method is applied to the system. The system includes a user platform, a service platform, a plurality of management sub-platforms, a sensor network platform and a plurality of object sub-platforms; and each of the object sub-platforms includes a gas meter. According to the gas pricing method based on the compound IoT and the IoT system, a user can sense the benefit of gas saving directly from a fee, thereby helping push a gas-saving social morality.
    Type: Grant
    Filed: February 27, 2019
    Date of Patent: April 13, 2021
    Assignee: Chengdu Qinchuan loT Technology Co., Ltd.
    Inventor: Zehua Shao
  • Publication number: 20170373845
    Abstract: A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.
    Type: Application
    Filed: August 18, 2017
    Publication date: December 28, 2017
    Applicant: M2M and loT Technologies, LLC
    Inventor: John A. Nix
  • Publication number: 20170302447
    Abstract: Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications. A wireless module operating in a wireless network and with access to the Internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (PLMN) that supports wireless wide area network technology including 3rd generation (3G) and 4th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state.
    Type: Application
    Filed: July 5, 2017
    Publication date: October 19, 2017
    Applicant: M2M and loT Technologies, LLC
    Inventor: John A. Nix
  • Publication number: 20170237561
    Abstract: Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.
    Type: Application
    Filed: May 1, 2017
    Publication date: August 17, 2017
    Applicant: M2M and loT Technologies, LLC
    Inventor: John A. Nix
  • Publication number: 20160270000
    Abstract: Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications. A wireless module operating in a wireless network and with access to the Internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (PLMN) that supports wireless wide area network technology including 3rd generation (3G) and 4th generation (4G) networks, and future generations as well. The wireless module can (i) utilize sleep and active states to monitor a monitored unit with a sensor and (ii) communicate with wireless network by utilizing a radio. The wireless module can include power control steps to reduce the energy consumed after sending sensor data by minimizing a tail period of a radio resource control (RRC) connected state.
    Type: Application
    Filed: May 23, 2016
    Publication date: September 15, 2016
    Applicant: M2M and loT Technologies, LLC
    Inventor: John A. Nix
  • Publication number: 20160269386
    Abstract: A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC). The network can send a first network module identity, a first key K, and an encrypted second key K for an eUICC profile to an eUICC subscription manager. The second key K can be encrypted with a symmetric key. The module can receive and activate the eUICC profile, and the network can authenticate the module using the first network module identity and the first key K. The network can (i) authenticate the user of the module using a second factor, and then (ii) send the symmetric key to the module. The module can decrypt the encrypted second key K using the symmetric key. The network can authenticate the module using the second key K. The module can comprise a mobile phone.
    Type: Application
    Filed: May 23, 2016
    Publication date: September 15, 2016
    Applicant: M2M and loT Technologies, LLC
    Inventor: John A. Nix
  • Publication number: 20160234020
    Abstract: A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial shared secret key for authentication with a wireless network. The module can receive a key K network token and send a key K module token to the wireless network. The module can use the key K network token, a derived module private key, and a key derivation function to derive a secret shared network key K that supports communication with the wireless network. The wireless network can use the received key K module token, a network private key, and the key derivation function in order to derive the same secret shared network key K derived by the module. The module and the wireless network can subsequently use the mutually derived key K to communicate using traditional wireless network standards.
    Type: Application
    Filed: April 15, 2016
    Publication date: August 11, 2016
    Applicant: M2M and loT Technologies, LLC
    Inventor: John A. Nix
  • Publication number: 20160159434
    Abstract: A center-mounted control system for a bicycle includes a torsion detector, a torque transducer, first and second wireless transceiving units, and a control unit. The torsion detector is sleeved on a crank shaft and detects a torque signal of the crank shaft and transmit the detected torque signal to the torque transducer; the torque transducer is fixedly connected to the torsion detector and senses the torque signal transmitted from the torsion detector and sends the torque signal to the first wireless transceiving unit; the control unit receives and processes the torque signal and controls an electrical motor according to the processed torque signal; and a first clutch of the bicycle is sleeved on the crank shaft and is fixedly connected to one end, close to a chain ring, of the torsion detector, and the first clutch of the bicycle is fixedly connected to the chain ring.
    Type: Application
    Filed: August 8, 2014
    Publication date: June 9, 2016
    Applicant: Suzhou Tergar lot Technology Co., ltd
    Inventors: Fuming Huang, Yunfei Li, Junning Huang, Hualin Cai, Qiang Zhang
  • Publication number: 20160164678
    Abstract: Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module can include a sensor and/or actuator. The module and server can utilize public key infrastructure (PKI) such as public keys to encrypt messages. The module and server can use private keys to generate digital signatures for datagrams sent and decrypt messages received. The module can internally derive pairs of private/public keys using cryptographic algorithms and a set of parameters. A server can use a shared secret key to authenticate the submission of derived public keys with an associated module identity. For the very first submission of a public key derived the module, the shared secret key can comprise a pre-shared secret key which can be loaded into the module using a pre-shared secret key code.
    Type: Application
    Filed: February 12, 2016
    Publication date: June 9, 2016
    Applicant: M2M and loT Technologies, LLC
    Inventor: John A. Nix
  • Publication number: 20160149709
    Abstract: Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.
    Type: Application
    Filed: January 29, 2016
    Publication date: May 26, 2016
    Applicant: M2M and loT Technologies, LLC
    Inventor: John A. Nix
  • Publication number: 20110297741
    Abstract: An automobile auction system to receive scanned automobile bar codes and function bar codes along with location data and to process the scanned bar codes. The system includes a first interface for receiving scanned bar codes, GPS coordinates, scanner ID, and time of scan from a custom scanning device. A second interface is to receive a map of an auto auction facility from a map source. A server is to process the bar codes and the GPS coordinates received from the scanning device and to associate the GPS coordinates to the map of the auto auction facility received from the map source. The system may process bar codes associated with functions, such as employees, shops or staging operations, specific tasks, and work orders. The function bar codes may, for example, assign scanners to employees, record tasks being performed, record employee performing the tasks, and record shop or staging operations opened/completed.
    Type: Application
    Filed: June 7, 2011
    Publication date: December 8, 2011
    Applicant: INTERACTIVE LOT TECHNOLOGIES INC.
    Inventor: Sergey Naumovsky
  • Publication number: 20110297747
    Abstract: A custom location identifying scanner device that is ergonomically designed to be carried around, is easy to use, and is relatively cheap so that they may be utilized on a wider scale (e.g., a majority of automobile auction facility employees). The device may be used to scan bar codes associated with automobiles and record the GPS coordinates, scanner ID, and time of scan along with the automobile information. The device may also be used to scan bar codes associated with functions, such as employees, shops or staging operations, specific tasks, and work orders. Bar codes associated with functions may have a pre-fix to differentiate them from regular automobile ID scans. The function bar codes may be scanned to, for example, assign scanners to employees, record tasks being performed, record employee performing the tasks, and record shop or staging operations opened/completed.
    Type: Application
    Filed: June 7, 2011
    Publication date: December 8, 2011
    Applicant: INTERACTIVE LOT TECHNOLOGIES INC.
    Inventor: Sergey Naumovsky
  • Patent number: 6545968
    Abstract: An apparatus for generating a two dimensional array of modulated light beams. A laser and a collimator are used to generate a single collimated light beam. This collimated light beam is passed through a two dimensional holographic beam splitter. Thereupon, the holographic beam splitter produces a two dimensional divergent array of diffraction limited collimated light beams. These light beams are then independently modulated by a two dimensional modulator array.
    Type: Grant
    Filed: January 18, 1994
    Date of Patent: April 8, 2003
    Assignee: Lots Technology, Inc.
    Inventor: William S. Oakley
  • Patent number: 6525867
    Abstract: Micro fabricated arrays of optical modulators of both a surface electrode and machined mesa nature where the small structure size and low capacitance electrical connections permit each modulator element to be individually electrically addressed thus providing modulator optical rise and fall response times in the low and sub nanosecond range. Both sparsely spaced and closely packed arrays are achieved.
    Type: Grant
    Filed: June 22, 2000
    Date of Patent: February 25, 2003
    Assignee: Lots Technology, Inc.
    Inventors: William S. Oakley, Mahdad Manavi, Qi-Ze Shu
  • Patent number: 6483797
    Abstract: A read-after-write system for optical recording systems includes a mirror used to direct read beams to a desired position on a recording medium relative to write beams impinging on the recording medium. The mirror may be adjustable to direct the read beams through a range of possible positions.
    Type: Grant
    Filed: August 17, 2000
    Date of Patent: November 19, 2002
    Assignee: Lots Technology, Inc.
    Inventors: William S. Oakley, Mahdad Manavi, A. Joel Mannion
  • Patent number: 6141301
    Abstract: In an optical storage system, an apparatus for focussing a light beam onto a recording medium. A light source generates a light beam which is modulated by a thin-film PLZT modulator array. A beamsplitter is used to direct the modulated light beam to an objective lens which focuses the modulated light beam onto the recording medium. The light reflected back from the recording medium is directed by the beamsplitter to a focus detector which generates an electrical signal corresponding to a degree of focus of the modulated light beam in reference to the recording medium. A focus actuator is placed in close proximity to the modulator, wherein the focus actuator has a mirrored surface for reflecting the light beam to the beamsplitter. By moving the focus actuator in an optical axis according to the electrical signal generated by the focus detector, a high bandwidth servo loop can be closed about the focal position.
    Type: Grant
    Filed: January 21, 1994
    Date of Patent: October 31, 2000
    Assignee: Lots Technology, Inc.
    Inventor: William S. Oakley
  • Patent number: 5528414
    Abstract: A two-dimensional modulator array for modulating a plurality of light beams. The modulator array is comprised of a plurality of stacked wafer layers. Each of the wafer layers have a linear array of transversely driven Pockels modulators. The Pockels modulators are formed by placing a plurality of electrodes over a top surface of an optical material and extending the electrodes over a beveled edge of the optical material. A ground plane resides on the bottom surface of the optical material. Conductive end reflectors are associated with each of the modulator electrodes. These end reflectors reflect the light beams back through the wafer. Electrical attachments are connected to the ends of each electrode for controlling the modulation for each electrode. Thereby, separate light beams can be individually modulated.
    Type: Grant
    Filed: May 5, 1994
    Date of Patent: June 18, 1996
    Assignee: LOTS Technology
    Inventor: William S. Oakley