External activation of quiescent device

Information

  • Patent Grant
  • 12250099
  • Patent Number
    12,250,099
  • Date Filed
    Wednesday, September 8, 2021
    3 years ago
  • Date Issued
    Tuesday, March 11, 2025
    2 months ago
Abstract
After installation, a device may be not yet powered. It may be awakened by receiving a flash of light of sufficient frequency and amplitude. After waking, the device decodes the message to determine its next action, and, upon request sends an authentication message. This enables a single user action to wake the device up and set it up with networking credentials. The same process may be used to wake the device outside of a normal sleep-wake cycle.
Description
FIELD

The present disclosure relates to turning on sleeping devices. More specifically, the present disclosure relates to signaling a device to wake it up, and sending the device encoded information which gives it instructions.


SUMMARY

This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description section. This summary does not identify required or essential features of the claimed subject matter.


In embodiments, a light detection circuit adapted to receive a light signal from a light source is disclosed. This light detection circuit comprises: a high pass filter coupled to the light detection circuit that when receiving light of at least a given intensity produces a spike; a power manager chip coupled to the light detection circuit that upon receipt of the spike enables power to the microcontroller; a timer that measures a time between spikes; and executable instructions in memory that upon execution by the microcontroller perform the following actions: detect a spike; increment a spike counter; use the timer to measure time between spikes; when the time between spikes exceeds an “END OF WORD” length, clear the spike counter; and when the spike counter reaches a wakeup threshold then interpret subsequent spikes and delay lengths as a transmitted message.


In embodiments, the wakeup threshold is of sufficient length to allow the microcontroller to boot.


In embodiments, the transmitted message is in modified morse code.


In embodiments, in the modified morse code a DOT is a delay of 1 time duration, a DASH is a delay of 3 time durations, an END OF PART OF A LETTER is a delay of 1 time duration, an END OF LETTER is a delay of 5 time durations, and an END OF WORD is a delay of 9 time durations.


In embodiments, the transmitted message comprises a message portion and an authentication portion.


In embodiments, the delay of one time duration is about 8 ms.


In embodiments, the light detection circuit adapted to receive a light signal from a light source is adapted to receive a transmitted message as the light signal.


In embodiments, the transmitted message is stored in memory.


In embodiments, the light detection circuit adapted to receive a light signal from a light source is adapted to receive multiple messages from the light signal.


In embodiments, the executable instructions that upon execution by the microcontroller further perform the following actions: receiving an out-of-bound authentication request; and transmitting contents of a buffer in the memory.


In embodiments, the light detection circuit is adapted to generate a spike based off of the light signal.


In embodiments, a device with a microcontroller, memory, and transmitter is disclosed, comprising: a light detection circuit operationally able to receive a light signal from a light source, and operationally able to use the light signal to signal a power management circuit; the power management circuit operationally able to boot up the microcontroller; the microcontroller operationally able to scan the light signal for a message; and the transmitter operationally able to transmit at least a portion of the message.


In embodiments, the message is encoded in modified morse code wherein a DOT is a signal of one time duration, a DASH is a signal of 3 time durations, and END OF PART OF A LETTER is a signal of 2 time durations, an END OF LETTER is a signal of 5 time durations; and an END OF WORD is a signal of 9 time durations.


In embodiments, one time duration comprises a time=>10 ms.


In embodiments, one time duration comprises a time <10 ms.


In embodiments, the message comprises a message portion followed by an authentication portion.


In embodiments, the device further comprises a filter, wherein the filter is a high pass filter.


In embodiments, a method is disclosed, whereby a device is externally activated, implemented by a device with one or more computers with memory, one or more processors, a light detection circuit, a high pass filter, and a transmitter comprising: receiving a light signal by the light detection circuit; the light detection circuit passing the light signal to a filter, the filter producing a series of spikes of at least a threshold intensity when the light signal is of sufficient intensity, the spikes a multiple of a base time apart; and powering the one or more processors upon a receipt of the spike.


In embodiments, the method further comprises: scanning the light signal to detect a spike; measuring a delay length between the spike and a subsequent spike; when the spike is detected, incrementing a spike counter; when the delay length exceeds an “END OF WORD” delay, clearing the spike counter; and when the spike counter reaches a wakeup threshold then interpreting subsequent spike-delay lengths as a transmitted message.


In embodiments, the transmitted message is two letters in modified morse code and a third authentication letter in modified morse code.


These, and other, aspects of the invention will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. The following description, while indicating various embodiments of the embodiments and numerous specific details thereof, is given by way of illustration and not of limitation. Many substitutions, modifications, additions or rearrangements may be made within the scope of the embodiments, and the embodiments includes all such substitutions, modifications, additions or rearrangements.





BRIEF DESCRIPTION OF THE FIGURES

Non-limiting and non-exhaustive embodiments of the present embodiments are described with reference to the following FIGURES, wherein like reference numerals refer to like parts throughout the various views unless otherwise specified.



FIG. 1 discloses a computing system in conjunction with which described embodiments can be implemented.



FIG. 2 discloses methods that may be used to power a processor that may be used with embodiments disclosed herein.



FIG. 3 discloses methods that may be used to read a message that may be used with embodiments disclosed herein.



FIG. 4 discloses embodiments that may be used to detect a message start, as used in embodiments described herein.



FIG. 5 describes a current morse code chart.



FIG. 6 discloses a modified morse code chart, as used in embodiments described herein.



FIGS. 7A and 7B disclose exemplary messages that may be sent to the device 100.



FIG. 8 discloses exemplary system behavior when an out of band authentication message is sent, as used in embodiments described herein.



FIG. 9 discloses a digital signal generated by a light circuit without a high pass filter.



FIG. 10 discloses a digital signal generated by a light circuit with a high pass filter, as used in embodiments described herein.



FIG. 11 discloses a digital signal from the perspective of a device receiving the signal through a high pass filter, as used in embodiments described herein.





Corresponding reference characters indicate corresponding components throughout the several views of the drawings. Skilled artisans will appreciate that elements in the FIGURES are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments. Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of these various embodiments.


DETAILED DESCRIPTION

Disclosed below are representative embodiments of methods, computer-readable media, and systems having particular applicability to external activation of quiescent devices.


In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present embodiments. It will be apparent, however, to one having ordinary skill in the art that the specific detail need not be employed to practice the present embodiments. In other instances, well-known materials or methods have not been described in detail in order to avoid obscuring the present embodiments.


Reference throughout this specification to “one embodiment”, “an embodiment”, “one example” or “an example” means that a particular feature, structure or characteristic described in connection with the embodiment or example is included in at least one embodiment of the present embodiments. Thus, appearances of the phrases “in one embodiment”, “in an embodiment”, “one example” or “an example” in various places throughout this specification are not necessarily all referring to the same embodiment or example. Furthermore, the particular features, structures or characteristics may be combined in any suitable combinations and/or sub-combinations in one or more embodiments or examples.


Embodiments in accordance with the present embodiments may be implemented as an apparatus, method, or computer program product. Accordingly, the present embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.), or an embodiment combining software and hardware aspects. Furthermore, the present embodiments may take the form of a computer program product embodied in any tangible medium of expression having computer-usable program code embodied in the medium.


Any combination of one or more computer-usable or computer-readable media may be utilized. For example, a computer-readable medium may include one or more of a portable computer diskette, a hard disk, a random access memory (RAM) device, a read-only memory (ROM) device, an erasable programmable read-only memory (EPROM or Light memory) device, a portable compact disc read-only memory (CDROM), an optical storage device, and a magnetic storage device. Computer program code for carrying out operations of the present embodiments may be written in any combination of one or more programming languages.


Embodiments may be implemented in edge computing environments where the computing is done within a network which, in some implementations, may not be connected to an outside internet, although the edge computing environment may be connected with an internal internet. This internet may be wired, wireless, or a combination of both. Embodiments may also be implemented in cloud computing environments. A cloud model can be composed of various characteristics (e.g., on-demand self-service, broad network access, resource pooling, rapid elasticity, measured service, etc.), service models (e.g., Software as a Service (“SaaS”), Platform as a Service (“PaaS”), Infrastructure as a Service (“IaaS”), and deployment models (e.g., private cloud, community cloud, public cloud, hybrid cloud, etc.).


The flowchart and block diagrams in the flow diagrams illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present embodiments. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It will also be noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, may be implemented by general or special purpose hardware-based systems that perform the specified functions or acts, or combinations of general and special purpose hardware and computer instructions. These computer program instructions may also be stored in a computer-readable medium that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable medium produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks.


As used herein, the terms “comprises,” “comprising,” “includes,” “including,” “has,” “having,” or any other variation thereof, are intended to cover a non-exclusive inclusion. For example, a process, article, or apparatus that comprises a list of elements is not necessarily limited to only those elements but may include other elements not expressly listed or inherent to such process, article, or apparatus.


Further, unless expressly stated to the contrary, “or” refers to an inclusive or and not to an exclusive or. For example, a condition A or B is satisfied by any one of the following: A is true (or present) and B is false (or not present), A is false (or not present) and B is true (or present), and both A and B are true (or present).


Additionally, any examples or illustrations given herein are not to be regarded in any way as restrictions on, limits to, or express definitions of any term or terms with which they are utilized. Instead, these examples or illustrations are to be regarded as being described with respect to one particular embodiment and as being illustrative only. Those of ordinary skill in the art will appreciate that any term or terms with which these examples or illustrations are utilized will encompass other embodiments which may or may not be given therewith or elsewhere in the specification and all such embodiments are intended to be included within the scope of that term or terms. Language designating such non-limiting examples and illustrations includes, but is not limited to: “for example,” “for instance,” “e.g.,” and “in one embodiment.”


I. Overview

A quiescent device (in a state where it is currently not harvesting data or sending data, though it may be on schedule such that it will harvest data or send data at a known later time) is waken up by flashing an encoded message at it. The device may have never been turned on, such as when it is originally commissioned. The device is first woken up by a series of external light signals sent by an external device. These external light flashes make up a message in modified morse code that is sent to the device. The light signals trigger a power management circuit that boots a processor. The light signals are also sent through a process that transfers the light flash into a voltage spike upon sufficient brightness and sufficient speed of activation. When the device fully wakes up, the message is read. Upon request from another device, the sensor sends an authentication code that was provided in the message. This enables a single user action to wake the device up and set it up with networking credentials.


II. Exemplary System Embodiments

With reference to FIG. 1, a device is disclosed that may be used, in whole, or in part, in any of the embodiments disclosed herein. The device 100 may be any sort of device that will be woken up from a sleep state. For example, the device 100 may be initially being installed, and so needs to be commissioned. The device 100 may be in a sleep state and may be wakened from it out of its normal schedule. The device 100 may be a low power device, such as a low power sensor. The device 100 may comprise a light detection circuit 105, and/or a filter 110. The filter 110 may be comprised of a frequency filter 112, which passes light of a certain frequency and rejects other frequencies. This frequency filter 112 may be a band-pass filter, a notch filter, a high pass filter, etc. In some embodiments, the light detection circuit 105 and the filter 110 may be integrated. The light detection circuit 105 may be adapted to receive a light signal from a light source. The light detection circuit 105 may produce voltage when photodiodes in the circuit are hit by a flash of light. The intensity of the voltage may rely on the intensity of the light that hits the photodiodes. For example, the frequency filter 112 may only allow voltage equivalent to a light of 45 lumens or higher through. The voltage produced by the light detection circuit 105 may be dependent upon specifics of the light detection circuit 105 and the frequency filter 112.


In some embodiments, the light may also be sent through an amplitude filter 114 that only passes light though that is of a certain amplitude (brightness). This filter may be a digital threshold. The pairing of the frequency filter 112 and the amplitude filter 114 may allow a light pulse through that has a fast-enough frequency with a sufficiently high light level. The frequency filter 112 and amplitude filter 114 may be a passive high pass filter coupled with a digital gate which turns the voltage signal into either a “1” or “0”. The “1” may be a very narrow pulse with a rising and trailing edge that appears to be a spike. This digital gate 114 may convert the analog signal output from the frequency filter 112 to a digital circuit. The digital circuit may then be received by a power management circuit 140.


In some embodiments, one purpose of the filter may be to guard against saturation of the photodiodes. The filter may also guard against varying light levels causing false positives and/or false negatives. For example, the filter 110 may filter out noise that does not meet a digital threshold (dependent on the voltage, which itself is dependent on the intensity of the light), and may filter out low frequency noise. Thus, ambient light in a space that the device is in may not trigger the device 100. Slowly rising light may not trigger the device, random flashes of light, such as from lamps being turned on may not produce a complete message so the device 100 is not turned on, etc. A timer 175 may keep track of the time between successive spikes. A spike (e.g., processed by the filter 110) followed by the time to the next spike may be referred to as a “pulse.” This pulse may be a time that indicates the time from one spike to the next. A power manager circuit 140 maybe operationally able to send power to an processor/MCU upon receipt of a spike that has passed through frequency filter 112 and been digitized by a digital gate, which may be a or a portion of an amplitude filter 114. The amplitude filter 114 may be part of the frequency filter 112, part of the power management circuit 140, or a separate component.


A transmitter 115 may allow the device 100 to send device data 120 to another entity, such as a personal computing device such as a cell phone, a controller that controls the device 100, a device 100, or a different entity. The transmitter may be wired, wireless, some combination, etc. The transmitter may be a bluetooth mesh, a 2-wire multidrop, a 3-wire multidrop, some combination of the above, a different sort of transmitter altogether, and so on. The device data 120 may be stored in memory.


A solar panel and/or a battery 130 may be included. In some embodiments, the solar panel may be configured to also function as the light detection circuit 105. The memory 155 may comprise a spike counter 160, which holds an internal value of how many spikes have been received. The memory 155 may also comprise a wakeup threshold 165, which determines the number of spikes which should be received before a message is read. A buffer 170 may be part of the memory 155 that holds messages or parts of messages that have been sent to the device 100. A power manager circuit 140 may be powered in part by the voltage from the light detection circuit, the power manager circuit may use the voltage as a signal to connect a processor 145 to the battery 130. The processor may comprise high-efficiency signal processing, low power, low cost, or may have other features. The processor may be a microcontroller. The processor 145 may have executable instructions on board which can make certain decisions, such as when to send a message. These executable instructions 150 may be embedded within firmware, within software, within hardware or within some combination of two or three of them. The executable instructions 150 may also decode received messages, make calculations, and so on. The device may also have device components 135 which provide other services of the device 100.


III. Method Embodiments

With reference to FIG. 2, a flowchart 200 discloses methods that may be used with embodiments disclosed herein. The operations of method 200 presented below are intended to be illustrative. In some embodiments, method 200 may be accomplished with one or more additional operations not described, and/or without one or more of the operations discussed. Additionally, the order in which the operations of method 200 are illustrated in FIG. 2 and described below is not intended to be limiting. In some embodiments, method 200 may be implemented in one or more processing devices (e.g., a digital processor such as the processor 145), an analog processor, a digital circuit designed to process information, an analog circuit designed to process information, a state machine, and/or other mechanisms for electronically processing information). The one or more processing devices may include one or more devices executing some or all of the operations of method 200 in response to instructions stored electronically on an electronic storage medium. The one or more processing devices may include one or more devices configured through hardware, firmware, and/or software to be specifically designed for execution of one or more of the operations of method 200.


At operation 205, a flash light encoder sends a message to the device 100. The flash light encoder is a device that is able to flash messages of types described herein. At operation 210, photodiodes in the light detection circuit receives the light and generate voltage based on the intensity of the light received. When the light is of sufficient intensity, the light detection circuit 105 is triggered 210. In some embodiments, when the light detection circuit 105 is triggered, one or more transistors in the light detection circuit switch between a lower voltage and a higher voltage to produce a voltage spike. In some embodiments, the size of the spike is proportional to the intensity of the light. In some embodiments, the voltage size is the spike height. At operation 215, the spike is passed through a filter. In some embodiments, this is a band-pass filter that only allows voltages of a certain frequency or higher through. This filters out low frequency waves, such as the light in a room getting suddenly brighter when, for example, the sun appears from under a cloud. In some embodiments, after the band-pass filter, the voltage is passed through an amplitude filter 114. These two filters may be used so that only light of a certain intensity above a certain frequency will trigger the power manager to, e.g., prevent random light from starting up the processor 145. In some embodiments, the spike is then elongated to signal to the power manager chip 140 that it should enable power to the MCU 145. This elongation may satisfy a debouncer in the power manager circuit. At operation 220, the power manager 140 (in some instances elongated into a pulse with a leading and a trailing edge), is awakened by a spike that was able to make it through the filter 110. After being awakened, the power manager connects the battery 130 to the processor 145, powering it. At operation 220, the power manager chip 140 enables power to the MCU. At operation 225, the processor 145 boots a kernel, which may be a Zephyr kernel. The interrupt handlers are also registered to respond to interrupts on the MCU I/O lines. After this process is complete, an MCU interrupt is produced for each rising edge of the incoming signal spike and interrupt handler code is run. This process requires time to complete before a message may be accurately received. Thus, a wakeup sequence that lasts for some duration of time is ideally used to allow the MCU to receive power and for it to fully boot before attempting to receive its eventual message.


The signal has already gone through a filter 110. To avoid triggering a message decode on a false trigger, the spikes of the wakeup sequence are counted and the message is not decoded until a specified threshold of spikes has been received. If a delay between signal spikes that is greater than the modified morse code part of speech “END OF WORD” is received, then the spike counter is cleared. This is to ensure that the wakeup signal spikes are received in a timely manner that would suggest a deliberate wake up of the device, and as such, prevents a message decode being triggered by random noise, such as by turning on the lights in the room where the device is located, even if it is done multiple times.


After the wakeup threshold is met, i.e., the spike counter reaches the wakeup threshold, the code running on the processor 145 waits for a delay the length of the “END OF WORD” part of speech before beginning to interpret subsequent spikes and delays as part of the transmitted message. After meeting the wakeup threshold and receiving a delay that translates, in part, to an “END OF WORD” part of speech, subsequent spikes and delays will be interpreted as part of the transmitted message until another delay “END OF WORD” part of speech is received.


The above ideas may be incorporated in many different algorithms. One that may be used is shown with reference to FIG. 3. FIG. 3 discloses a method of the processor 145 reading a message. With reference to FIG. 3, a flowchart 300 discloses methods that may be used with embodiments disclosed herein. The operations of method 300 presented below are intended to be illustrative. In some embodiments, method 300 may be accomplished with one or more additional operations not described, and/or without one or more of the operations discussed. Additionally, the order in which the operations of method 300 are illustrated in FIG. 3 and described below is not intended to be limiting. In some embodiments, method 300 may be implemented in one or more processing devices (e.g., a digital processor such as the microcontroller 145), an analog processor, a digital circuit designed to process information, an analog circuit designed to process information, a state machine, and/or other mechanisms for electronically processing information). The one or more processing devices may include one or more devices executing some or all of the operations of method 300 in response to instructions stored electronically on an electronic storage medium. The one or more processing devices may include one or more devices configured through hardware, firmware, and/or software to be specifically designed for execution of one or more of the operations of method 300.


The first time the message is transmitted, the entire message more than likely will not be received because of the delay it takes to power the processor 145 and start running the executable instructions 150. Therefore, the message may be sent multiple times to ensure that the processor 145 is fully booted up before the last message sent has begun to be received. On subsequent message transmits, the message will be eventually received, as the wakeup threshold will have been met by a previous transmission of one of the messages and the signal “END OF WORD” part of speech will have been received. In some embodiments, a spike counter holds the number of spikes that have been received. In embodiments, to ensure that the whole message can be received, the processor 145 may wait for a certain time (e.g., measured in a number of spike counters), to have passed since the message began to be sent prior to decoding the message. In some embodiments, the processor may wait for a certain time measured in actual time. In some embodiments, the processor may measure the time to wait in a different way. In embodiments, the spike counter is reset when a delay after a spike is detected that is longer than the “END OF WORD” part of speech and a spike threshold has not yet been achieved. This threshold may be some number of signal spikes, such as 5, 9, etc., that is long enough to ensure that the processor has time to boot. At operation 305, the processor 145 is powered on. At operation 315, the processor boots up 310. While the processor is powering on and booting up, a message is continually sent until the processor is fully booted up, at which point the whole message can be read. At operation 315, the processor receives a spike. At operation 320, the processor measures the time between this spike and a previous spike received. If, at decision point 325, the measured time is a message start time, then at decision point 325 it is determined if a valid message start has been detected. If so, then at operation 330, the message is read. If the message start has not been detected, then back at operation 315, the processor again checks for another spike to be received.


With reference to FIG. 4, a flowchart 400 discloses methods that may be used with embodiments disclosed herein. This flowchart 400 describes embodiments that may be used to detect a message start. At operation 402, a device wakes up. At operation 405 a light signal is scanned. At decision point 410 it is determined if a spike is detected. If so, then at decision point 415 a spike counter is incremented. The spike count has a wake-up threshold 165. This threshold may be a non-zero integer that is set long enough to ensure that the processor 145 has sufficient time to boot up. Examples may be 5, 4, 3, 10, etc. At decision point 420, the value of the spike counter is checked. At decision point 420, the length of the delay that follows the pulse is measured. If it is greater or equal to the length of a start message, then at operation point 425 the spike counter is cleared. In some embodiments, if the delay length exceeds the “END OF WORD” length in modified morse code (as discussed with reference to FIGS. 5 and 6), then the spike counter is cleared. This ensures that if insufficient spikes have been detected but the message detected is at the end (meaning spikes have been missed), a message will not be read. At decision point 430, the value of the spike counter is checked. If it is at a wakeup threshold value 165, then at operation 435, the next pulse is fetched. At operation 440 the spike and delay is decoded. At decision point 445 it is determined if the delay is the same length as END OF WORD delay. If not, then at operation 435, a next spike and delay is fetched. If so (an END OF WORD delay has been detected), at operation 450, the message is determined to be finished.


Once a message start has been discovered, subsequent signal pulses are interpreted as part of the transmitted message. The time between signal spikes is measured. This is discussed with reference to FIGS. 9, 10, and 11. The processor 145 decodes the delays between the spikes using the modified morse. In embodiments, the sequence of delays decoded into time units are buffered 170 in sequential order, in LIFO order, etc. In some embodiments the sequence of delays decoded into time units are partially stored in a buffer. In some embodiments, the buffer 170 is a designated location, in some embodiments, the buffer location is determined on the fly. In embodiments, single word messages are received. In some embodiments, when an “END OF WORD” delay is found, a decode of the buffer 170 (that the message may have been stored in) is performed and a message is produced. The produced message may be stored in the same buffer (e.g., 170) or a different buffer that is overwritten with subsequent messages received. This ensures that the last message received is the message stored. In some embodiments, other methods are used. For example, multiple words may be in a message. In such cases, an end of message signal part of speech may be defined. When the end of message signal part of speech is found, a decode of the parts of speech buffer 170 may be performed, with a message being produced. Multiple buffers (e.g., 170) may be used, etc.


Turning now to FIGS. 5 and 6, an embodiment of message coding and decoding is disclosed. FIG. 5 at 500 describes a current International Morse Code chart. International Morse Code specifies duration, some on rising edges and some on trailing edges. For example, the durations for a DOT and DASH are durations between a rising edge and a trailing edge. The “END OF PART OF A LETTER”, “END OF LETTER”, and “END OF WORD” parts of speech are durations for when the morse code signal is low, and therefore the duration between the falling edge and rising edge. For example, FIG. 9 at 905 shows a DOT, e.g., a rising edge followed by a duration of 1 time unit. An END OF PART OF A LETTER 910 is a trailing edge followed by one time unit.



FIG. 6 at 600 discloses a modified morse code chart, similarly, that describes the delays for each as used in embodiments described herein. In this modified morse code, there are only single signal spikes. As such, the term “delay” is used to describe the elapses between spikes where that duration also corresponds to a morse code part of speech. In normal morse code, a base time duration may be of one time unit. The DOT(1) 505 and DASH(3) 510 indicate that a delay for a DOT is 1× the base unit, and the DASH is a delay that is 3× the base unit. In an exemplary embodiment, a delay of one time duration is around 8 ms. There may be a threshold such that one time unit has some give on each side, hence the “around.” The give on each side may be dependent on other implementation details. The matrices shown in FIGS. 5 and 6 are the combinations of resulting on/off parts of speech. In traditional morse code, the signal on duration and the signal off duration are measured, with each used to decode the specific part of speech. Modified morse code disclosed herein only tracks the delays between rising edges. The rising edge may be defined by a spike. This creates combinations in traditional International Morse code that cannot be distinguished. For example, a DASH/END OF PART OF A LETTER 515 and DOT/END OF LETTER 520 that are both 4× the base unit. This is significant, as in an exemplary embodiment disclosed here, only an edge and a delay to the next edge is generated, rather than a leading edge, a trailing edge, and a delay. As such the duration of the signal on plus the length of the signal off is the information that is available. This is discussed with reference to FIGS. 10, 11, and 12. With traditional morse code, if a duration of 4× between signal spikes appeared, there is no way to know if the signal desired was a DASH/END OF PART OF A LETTER 515 or a DOT/END OF LETTER 520.



FIG. 6 at 600 discloses a modified morse code chart. To avoid combination collisions, the multiples of the base timing unit that are assigned to each part of speech are adjusted to be unique. As such, the END OF LETTER signal 605 equals 5 time durations. The END OF WORD signal 610 equals 9 time durations. These time durations are added to the DOT or DASH time duration to produce a unique time duration. As an example, the DOT (1) followed by an END OF PART OF A LETTER (1) 615 will take 2× the base unit, a DASH (3) followed by End of Letter (5) will take 8× the base unit 620, a DASH (3) followed by an END OF WORD(9) 625 will take 12× the base unit, etc.



FIGS. 7A at 700A and 7B at 700B disclose creation of messages using modified morse code in greater detail. Different letter combinations specify different commands. In some embodiments, the message comprises a series of letters 705A that specify the message followed by a series of letters or other characters that are used for authentication 710A. The message will be followed by an END OF WORD 610, when the message is a single word. In some exemplary embodiments a message will comprise two message letters 715A, 720A, followed by an authentication character 725A unrelated to the message (and possibly generated randomly by the signaling device) that will be passed back to the signaling device to be used, e.g., for network authentication.


In some embodiments, these messages are generated by a processor/MCU in a light encoder as strings of letters and are then converted to modified morse code parts of speech. In some embodiments, the messages are created directly as modified morse code parts of speech. The modified morse code parts of speech may then be signaled to the device 100 using a light source. In some instances a light on a device that allows the specific on/off timing of the light to be programmed or otherwise specified is used. In some embodiments, a personal computing device, such as a phone with a flashlight is used. As previously discussed, a message may be originally output multiple times. For example, a message may be output for two seconds to be sure that the device 100 may boot up and that the wakeup threshold 165 (a specified number of pulses) can be met to avoid triggering a message decode on a false trigger. The message may be used as both a preamble to turn on the device 100 and as the actual message that instructs the device 100 in its next action. In some embodiments, the number of times a message is output depends on the length of the message.



FIG. 7A at 700 shows the international morse code for a message “PRE”. This message comprises a message part—“PR” 705 (which may stand for “provision”), and an authentication part chosen at random—“E” 710. FIG. 7B discloses the message translated into a form that may be sent to wake up a device. The P signal 735B in international morse code is . - - . 715A. More completely, this works out to spike 737B followed by a delay equal to DOT (1 time period)+Part of Word (1 time period) to produce 2 time periods 705B, spike 739B, DASH (three time periods)+Part of Word (1 time period) to produce 4 time periods 710B, spike 742B, DASH (three time periods)+Part of Word (1 time period) to produce 4 time periods 715B, spike, DOT (1 time period+END OF LETTER (5 time periods) to produce 6 time periods 720B. The R 720A is a DOT DASH DOT, which corresponds to spike 739B, DOT (1 time period+END OF LETTER (5 time periods) to produce 6 time periods 720B. The R signal 740B in international morse code is DOT DASH DOT 720. The signal that represents the modified morse code letter R 740B is the set of spikes and delays 725B corresponding to a spike followed by a delay of 2 time periods (DOT followed by an End of Part of Letter), a spike followed by a delay of 4 time periods (DASH followed by an End of Part of Letter), and a spike followed by a delay of 6 time durations (DOT followed by an END OF LETTER). The last letter in the word, E 725A is a DOT (1 time duration), but because it is the last letter in the word, it is followed by an END OF WORD signal 610, which corresponds to (1+9) 10 time durations. This results in a spike 742B followed by a delay of 10 time periods 730B, 745B. With the receipt of the END OF WORD, in some embodiments, this message is known to be finished. Some messages may be longer than a single word, in which case, the modified morse code table may be extended.


In some embodiments, these messages are generated by a light encoder 205 as strings and are then converted to morse code parts of speech. In some embodiments, the messages are created directly as morse code parts of speech. The morse code parts of speech may then be signaled to the device 100 using a light source. In some instances a light on a device that allows the specific on/off timing of the light to be programmed or otherwise specified is used. In some embodiments, a personal computing device, such as a phone with a flashlight is used. As previously discussed, a message may be originally output multiple times. For example, a message may be output for two seconds to be sure that the device 100 may boot up and that the wakeup threshold 165 (a specified number of pulses) can be met to avoid triggering a message decode on a false trigger. The message is used as both a preamble to turn on the device 100 and as the actual message that instructs the device 100 in its next action. In some embodiments, the number of times a message is output depends on the length of the message.


The message itself instructs the sensor to perform some action. Some possible states are: Wakeup—The light source is used to pull the device out of a super-low-power state (shipping-sleep); Communication—The sequence/pattern emitted by the light source is used to set the state that the device wakes up in. i.e. provisioning mode, device firmware upgrade mode, diagnostics mode, etc.; Out-of-Band (OOB) Security—the sensor and the signaling device may use the flight as an additional communication medium to obfuscate the network onboarding process even further. This may be sent during the network setup in provisioning, etc.



FIG. 8 at 800 discloses exemplary system behavior when an out of band authentication message is sent. At operation 805, a request is received to provide an out of band authentication message. This message may have originally been sent by a flash light encoder 205. At operation 810, an authentication message may be transmitted, e.g., using the transmitter 115. In some implementations this authentication message may be the last letter sent to the device, which is not part of the message portion. In some embodiments, the authentication message 710A may be a message generated by the device 100, or determined by the device 100 using an algorithm. In some embodiments, the authentication message may be multiple characters long. In some embodiments, the authentication message may be stored in a buffer 170.


The authentication portion of a memory, such as the last character sent, may be stored in a buffer 170 stored in memory 155. Transmitting an authentication code may comprise transmitting the contents of an authentication buffer stored in memory 155 which holds the authentication portion of a message. When the authentication code is a single letter, such as E 725A, the E 725A may be stored in a buffer 170 and then sent when an authentication request is received. In some embodiments, a character as decoded may be stored in a buffer 170 that holds a single character; in such a system, the last letter in the message will be the one in the buffer that is then sent as the authentication code in response to the authentication request. In some embodiments, a buffer 170 may hold and send multiple characters. In some embodiments, a buffer may be used to hold the time between signals, such that an entire message may be stored prior to decoding.



FIG. 9 at 900 discloses a digital signal generated by a light circuit without a high pass filter. FIG. 9 at 900 specifically discloses a modified international morse code “A”. The pulses in FIGS. 9, 10, and 11 are measured in ms 930, with a standard time duration of 10 ms. “A” is a DOT DASH, which is a pulse 905 (rising and training edge) of one time duration followed by an END OF PART OF LETTER 910 (a signal low of one time duration) followed by a DASH 915 of 3 time durations, followed by an END OF PART OF WORD 920 of 9 time durations. The next rising signal appears at 925. The signal that produces the A in morse code is not shown, but it may take many forms, as long as it is of sufficient amplitude. For example, it may appear similar to sine waves with pauses between them, a square digital signal, etc. If the signal is analog, it may then may be passed into a frequency filter 112, such as a high pass filter, digitized by the light detection circuit 105. The signal that is output from the frequency filter 112 may then be converted from an analog signal to a digital signal by, e.g., an amplitude filter 114, an analog to digital converter, etc.



FIG. 10 at 1000 discloses a digital signal generated by a light circuit with a high pass filter, as used in embodiments described herein. Only the rising edge of each pulse makes it through the filter 110. As such, the time between rising edges is measured. This gives spike 1005, which corresponds to the rising edge of the DOT; spike 1010, which corresponds to the rising edge of the DASH, and spike 1015, which corresponds to the next rising edge received. As shown with reference to FIGS. 5 and 6, the morse parts of speech base unit multiples have been adjusted such that each combination of morse high and morse low will produce a unique time duration.



FIG. 11 at 1100 discloses a digital signal from the perspective of a device receiving the signal through a high pass filter, as used in embodiments described herein. Two time measurements are decoded, the time from the rising edge of the DOT (transformed into a spike) to the rising edge of the DASH (transformed into a spike) 1105, which is 20 ms long, and time from the rising edge of the DASH (transformed into a spike) to the next rising edge (transformed into a spike) 1110, which is 80 ms long. Using the table 600, a DOT followed by an end of a part of letter is 2 base units long 615, and the base unit is 10 ms, so the time 1105 indicates a morse signal DOT followed by a morse signal END OF PART OF LETTER. The time 1110 measured between the rising edges (transformed into spikes) 1010 and 1015 is 8 base units long (10 ms*8), and so is a morse signal DASH followed by an END OF LETTER (8 units long). The letter is DOT DASH, which encodes to an “A”.


In view of the many possible embodiments to which the principles of the technology may be applied, it should be recognized that the illustrated embodiments are examples and should not be taken as a limitation on the scope of the invention. For instance, various components of systems and tools described herein may be combined in function and use. We, therefore, claim as our invention all subject matter that comes within the scope and spirit of these claims.

Claims
  • 1. A device capable of external activation comprising: a light detection circuit adapted to receive a light signal from a light source;a high pass filter coupled to the light detection circuit that when receiving light of at least a given intensity produces a spike;a power manager chip coupled to the light detection circuit that upon receipt of the spike enables power to a microcontroller;a component capable of inhabiting: a detection state in which:a spike is detected; and when a spike is found, a spike counter is incremented;a timer that measures a time between spikes; wherein when the time between spikes exceeds an END OF WORD length, the spike counter is cleared;wherein when the spike counter reaches a wakeup threshold then subsequent spikes and delay lengths are interpreted as a transmitted message; andwherein the wakeup threshold is of sufficient length to allow the microcontroller to boot.
  • 2. The device of claim 1, wherein the transmitted message is in modified morse code.
  • 3. The device of claim 2, wherein in the modified morse code a DOT is a delay of 1 time duration, a DASH is a delay of 3 time durations, and END OF PART OF A LETTER is a delay of 1 time duration, an END OF LETTER is a delay of 5 time durations, and an END OF WORD is a delay of 9 time durations.
  • 4. The device of claim 3, wherein the transmitted message comprises a message portion and an authentication portion.
  • 5. The device of claim 4, wherein the delay of one time duration is about 8 ms.
  • 6. The device of claim 5, wherein the light detection circuit adapted to receive a light signal from a light source is adapted to receive multiple spikes separated in time as the light signal.
  • 7. The device of claim 6, wherein the transmitted message is at least partially stored in a buffer.
  • 8. The device of claim 6, wherein the light detection circuit adapted to receive a light signal from a light source is adapted to receive multiple messages as the light signal.
  • 9. The device of claim 8, further comprising the component capable of inhabiting: receiving an out-of-bound authentication request; andtransmitting contents of the buffer in the memory.
  • 10. The device of claim 1, wherein the light detection circuit is adapted to generate a spike based on the light signal.
  • 11. A device with a microcontroller, memory, and transmitter comprising: a light detection circuit operationally able to receive a light signal from a light source, and operationally able to use the light signal to signal a power management circuit;
  • 12. The device of claim 11, wherein one time duration comprises a time of about 8 ms.
  • 13. The device of claim 12, wherein one time duration comprises a time of about 10 ms.
  • 14. The device of claim 13, wherein the message comprises a message portion followed by an authentication portion.
  • 15. The device of claim 14, further comprising a filter, wherein the filter is a high pass filter.
  • 16. A method implemented by a device with one or more computers with memory, one or more processors, a light detection circuit, a high pass filter, and a transmitter comprising: receiving a light signal by the light detection circuit;the light detection circuit passing the light signal to a filter, the filter producing a series of spikes of at least a threshold intensity when the light signal is of sufficient intensity, the spikes a multiple of a base time apart; reading a message upon a receipt of one of the series of spikes; andwherein the message is encoded in modified morse code; wherein a DOT is a signal of one time duration, a DASH is a signal of 3 time durations, an END OF LETTER is a signal of 5 time durations; and an END OF WORD is a signal of 9 time durations.
  • 17. The method of claim 16, wherein the message comprises a message portion and an authentication portion.
  • 18. The method of claim 16, further comprising: detecting a spike;measuring a delay length between a single spike and a subsequent spike;when the spike is detected, incrementing a spike counter;when the delay length exceeds the END OF WORD, clearing the spike counter, andwhen the spike counter reaches a wakeup threshold then interpreting subsequent spike-delay lengths as a transmitted message.
  • 19. The method of claim 18, wherein the transmitted message is two letters in modified morse code and a third authentication letter in modified morse code.
  • 20. The method of claim 18, wherein a high-pass filter is applied to the spike.
US Referenced Citations (143)
Number Name Date Kind
3021516 Spitz Feb 1962 A
3037566 Pasco Jun 1962 A
3668684 Johnson Jun 1972 A
4316276 Koehler Feb 1982 A
4651158 Nelson Mar 1987 A
5220681 Belgin Jun 1993 A
5787133 Marchetto Jul 1998 A
5835458 Bischel Nov 1998 A
5959537 Banting Sep 1999 A
6289207 Hudecek Sep 2001 B1
6571343 Johnson May 2003 B1
6686731 Tacconi Feb 2004 B2
7257053 Fujiune Aug 2007 B2
7418620 Tormasov Aug 2008 B1
7786907 Monro Aug 2010 B2
7791513 Monro Sep 2010 B2
7864086 Monro Jan 2011 B2
7917232 McCoy et al. Mar 2011 B2
7944652 Fukumoto May 2011 B2
8024054 Mairs et al. Sep 2011 B2
8067894 Katsu Nov 2011 B2
8099178 Mairs et al. Jan 2012 B2
8327048 Mao Dec 2012 B2
8352652 Mao Jan 2013 B2
8429436 Fillingim Apr 2013 B2
8503943 Spanhake Aug 2013 B2
8604746 Lee Dec 2013 B2
8629790 Oh Jan 2014 B2
8738908 Lee May 2014 B2
8782619 Wu Jul 2014 B2
8848757 Joseph Sep 2014 B2
8925358 Kasper Jan 2015 B2
9037307 Kaji May 2015 B2
9049582 Hassan Jun 2015 B1
9265425 Ando Feb 2016 B2
9280748 Nugent Mar 2016 B2
9383447 Schmitt Jul 2016 B2
9456776 Ando Oct 2016 B2
9589238 Nugent Mar 2017 B2
9743837 Ando Aug 2017 B2
9843229 Leabman Dec 2017 B2
9847669 Leabman Dec 2017 B2
9857238 Malhotra et al. Jan 2018 B2
9860961 Chemel et al. Jan 2018 B2
9953260 Nugent Apr 2018 B1
10089516 Popovich Oct 2018 B2
10094586 Pavlovski Oct 2018 B2
10135295 Leabman Nov 2018 B2
10199849 Bell Feb 2019 B1
10216061 Popovich Feb 2019 B2
10333305 Imai Jun 2019 B2
10386544 Yuan Aug 2019 B2
10388085 Harish Aug 2019 B2
10423813 Popovich Sep 2019 B2
10459311 Popovich Oct 2019 B2
10650336 Kopp May 2020 B2
10775824 Main Sep 2020 B2
10782782 DeSalvo Sep 2020 B1
10811544 Ota Oct 2020 B2
10892946 Correia e Costa Jan 2021 B2
10918872 Parker Feb 2021 B2
10942871 Cawse Mar 2021 B2
10943444 Boyd Mar 2021 B2
10966068 Tramiel Mar 2021 B2
10976173 Harish Apr 2021 B2
11073697 Sharma Jul 2021 B1
11088989 Gao Aug 2021 B2
11237556 Nugent Feb 2022 B2
11309440 Ota Apr 2022 B2
11448937 Brown Sep 2022 B2
11469835 Kim Oct 2022 B2
11598862 Henderson Mar 2023 B2
11726184 Ferreira Aug 2023 B2
11743764 Lee Aug 2023 B2
20060056363 Ratiu Mar 2006 A1
20060103545 Tsou May 2006 A1
20060233485 Allen Oct 2006 A1
20070112273 Rogers May 2007 A1
20070258337 Fujiune Nov 2007 A1
20080296979 Kato Dec 2008 A1
20090135753 Veillette May 2009 A1
20090167195 Katsu Jul 2009 A1
20090217063 Tomita Aug 2009 A1
20090273738 Fukumoto Nov 2009 A1
20100134285 Holmquist Jun 2010 A1
20100269383 Nifenecker Oct 2010 A1
20120066439 Fillingim Mar 2012 A1
20130232361 Nishii Sep 2013 A1
20140143566 Asano May 2014 A1
20140215446 Araya Jul 2014 A1
20140304542 Rogers Oct 2014 A1
20150077737 Belinsky Mar 2015 A1
20150121684 Kuutti May 2015 A1
20150185819 Saito Jul 2015 A1
20150198938 Steele Jul 2015 A1
20160020854 Engel Jan 2016 A1
20160062753 Champagne Mar 2016 A1
20160086191 Fonzi et al. Mar 2016 A1
20160092427 Bittmann Mar 2016 A1
20160124495 Kim May 2016 A1
20160203382 Gardiner Jul 2016 A1
20160248251 Tinnakornsrisuphap Aug 2016 A1
20170049407 Ando Feb 2017 A1
20170217390 Curtis et al. Aug 2017 A1
20170299210 Nyamjav Oct 2017 A1
20170342920 Pirjaberi et al. Nov 2017 A1
20180132340 Correa May 2018 A1
20180224819 Noboa Aug 2018 A1
20180375720 Yang Dec 2018 A1
20190020197 Ahn Jan 2019 A1
20190074990 Reimer Mar 2019 A1
20190147154 Das May 2019 A1
20190156443 Hall May 2019 A1
20190190308 Miyoshi Jun 2019 A1
20190220077 Tuan Jul 2019 A1
20190258251 Ditty Aug 2019 A1
20190357096 Warashina Nov 2019 A1
20190364502 Agerstam Nov 2019 A1
20190393969 Kim Dec 2019 A1
20190394776 Lee Dec 2019 A1
20200120202 Jakobsson Apr 2020 A1
20200284883 Ferreira Sep 2020 A1
20200326563 Suess Oct 2020 A1
20210157312 Cella May 2021 A1
20210298363 Daugherty Sep 2021 A1
20210334187 Sewani Oct 2021 A1
20220036724 Gupta Feb 2022 A1
20220066528 Harvey Mar 2022 A1
20220095084 Evans et al. Mar 2022 A1
20220110181 Miao Apr 2022 A1
20220117314 Daugherty Apr 2022 A1
20220187847 Cella Jun 2022 A1
20220193915 Marinkovich Jun 2022 A1
20220196889 Marinkovich Jun 2022 A1
20220197246 Cella Jun 2022 A1
20220197247 Cella Jun 2022 A1
20220197306 Cella Jun 2022 A1
20220245574 Cella Aug 2022 A1
20220271809 Raghavan Aug 2022 A1
20220305735 Cella Sep 2022 A1
20220318707 Cella Oct 2022 A1
20230007724 Li Jan 2023 A1
20230071312 Preciado Mar 2023 A1
Foreign Referenced Citations (78)
Number Date Country
3125718 Oct 2023 CA
1219239 Jun 1999 CN
1797490 Jul 2006 CN
100386782 May 2008 CN
201830288 May 2011 CN
103099603 May 2013 CN
103926912 Jul 2014 CN
104138249 Nov 2014 CN
105581783 May 2016 CN
206002869 Mar 2017 CN
106717124 May 2017 CN
104486944 Oct 2018 CN
105975136 Mar 2019 CN
110073301 Jul 2019 CN
209085657 Jul 2019 CN
110139235 Aug 2019 CN
113302952 Aug 2021 CN
113424461 Sep 2021 CN
113906821 Jan 2022 CN
69737857 Feb 2008 DE
102008031681 Jan 2010 DE
112011103348 Jul 2013 DE
102020002236 Oct 2020 DE
112019006074 Aug 2021 DE
112020001131 Jan 2022 DE
2297594 Sep 2016 EP
2783549 Nov 2017 EP
3294042 Mar 2018 EP
3753766 Dec 2020 EP
2729235 Jul 1996 FR
2839363 Nov 2003 FR
2585437 Jan 2021 GB
2000022514 Jan 2000 JP
3692149 Sep 2005 JP
2005316724 Nov 2005 JP
2007026487 Feb 2007 JP
2007141928 Jun 2007 JP
4607742 Jan 2011 JP
2013122443 Jun 2013 JP
5520937 Jun 2014 JP
2014239871 Dec 2014 JP
2015181122 Oct 2015 JP
2015194504 Nov 2015 JP
2016190052 Nov 2016 JP
2018033257 Mar 2018 JP
2018097874 Jun 2018 JP
2018157387 Oct 2018 JP
6673497 Mar 2020 JP
2020034522 Mar 2020 JP
6929671 Sep 2021 JP
2124353 Jun 2020 KR
20200092074 Aug 2020 KR
200820750 May 2008 TW
200919210 May 2009 TW
200926033 Jun 2009 TW
202113392 Apr 2021 TW
202119946 Jun 2021 TW
WO-9740381 Oct 1997 WO
WO-0035548 Jun 2000 WO
WO-0125681 Apr 2001 WO
WO-03019222 Mar 2003 WO
WO-2005050156 Jun 2005 WO
2008016500 Mar 2008 WO
WO-2010000751 Jan 2010 WO
WO-2014145030 Sep 2014 WO
WO-2015188268 Dec 2015 WO
WO-2018084268 May 2018 WO
WO-2018087608 May 2018 WO
WO-2019245297 Dec 2019 WO
WO-2020045124 Mar 2020 WO
WO-2020106813 May 2020 WO
WO-2020125839 Jun 2020 WO
WO-2020167857 Aug 2020 WO
WO-2020182591 Sep 2020 WO
WO-2021108680 Jun 2021 WO
WO-2021195455 Sep 2021 WO
WO-2022081785 Apr 2022 WO
WO-2023039070 Mar 2023 WO
Non-Patent Literature Citations (18)
Entry
J. Holleman, A. Mishra, C. Diorio and B. Otis, “A micro-power neural spike detector and feature extractor in . 13μm CMOS,” 2008 IEEE Custom Integrated Circuits Conference, San Jose, CA, USA, 2008, pp. 333-336, doi: 10.1109/CICC.2008.4672089. (Year: 2008).
Anastasi et al., Ad Hoc Networks 7 (2009) 537-568.
Cao et al., Towards Energy-efficient Wireless Networking in the Big Data Era: a Survey, IEEE Communications Surveys & Tutorials, vol. 20, No. 1, First Quarter 2018.
de Meester et al., SERIF:A Semantic Exercise Interchange FormatConference: Proceedings of the 1st International Workshop on LINKed EDucation, Oct. 2015.
Khan et al., Energy management in Wireless Sensor Networks: a survey. Computers and Electrical Engineering, Elsevier, 2014, vol. 41, Jan. 2015, p. 159-176.
Mouser Electronics News Release, Aug. 16, 2018.
Ouf et al., Effectiveness of using WiFi technologies to detect and predict building occupancy, Sust. Buildi. 2, 7 (2017).
RadioMaze, Inc., “WiFi signals enable motion recognition throughout the entire home,” Dec. 4, 2017.
sensorswarm, 2018.
Serale G., et al., Model Predictive Control (MPC) for Enhancing Building and HVAC System Energy Efficiency: Problem Formulation, Applications and Opportunities, Energies 2018, 11, 631; doi:10.3390, Mar. 12, 2018.
Dai, Wenbin, et al. “Toward self-manageable and adaptive industrial cyber-physical systems with knowledge-driven autonomic service management.” IEEE Transactions on Industrial Informatics 13.2 (2016)L pp. 725-736. (Year: 2016).
González-Briones, Alfonso, et al. “Energy optimization using a case-based reasoning strategy.” Sensor 18.3 (2018): pp. 1-27. (Year: 2018).
Jayakumar, Geetha, and Ganapathy Gopinath. “Ad hoc mobile wireless networks routing protocols—a review.” Journal of Computer Science 3.8 (2007): pp. 574-582. (Year: 2007).
International Search Report for International application No. PCT/US22/36676, Dec. 5, 2022.
International Search Report for PCT/US22/42915, Feb. 23, 2023.
Chowdhury, M. E. H., et al., “A Low-Cost Closed-loop Solar Tracking System Based o the Sun Position Algorithm”, Journal of Sensors, vol. 2019, Article ID 3681031, 11 pp.
Kreider, D., and Lahr, D., “Trapezoidal Rule and Simpson's Rule”, 2002, 2008, 2010.
Written Opinion of the International Searching Authority for PCT/US22/36676, Dec. 5. 2022.
Related Publications (1)
Number Date Country
20230071312 A1 Mar 2023 US