Abstract:
A method is described of safeguarding electronic devices ( 1, 2, 3, 4 ) against unauthorized removal, in which one device ( 1 ) of the devices ( 1, 2, 3, 4 ) is automatically selected as the security device (SG) which transmits a security signal (SS) periodically and/or following receipt of an inquiry signal (RS) from one of the other devices ( 2, 3, 4 ). If one of the other devices ( 2, 3, 4 ) receives no security signal (SS) after a particular time and/or following transmission of an inquiry signal (RS), a security reaction is triggered by that device ( 2, 3, 4 ). A corresponding security system and an electronic device which can be safeguarded in said security system are also described.
Abstract:
Unidad (10, 10') de iluminación, que comprende: - un elemento ( 12) de iluminación para generar luz, - una unidad (14) de control de iluminación para controlar la salida de luz de dicho elemento (12) deiluminación, - una unidad (16, 16') de comunicación para enviar y recibir señales de comunicación a través de un mediode comunicación, - un receptor (18) óptico para recibir la luz desde otras unidades (10, 10') de iluminación, y - una unidad (20) de controlador conectada a dicho receptor (18) óptico, unidad (16, 16') de comunicación yunidad (14) de control de iluminación, - caracterizada por estar configurada para establecer un enlace óptico, que permite el envío y/o recepciónde datos mediante dicha unidad (10, 10') de iluminación además de la comunicación a través de dichomedio de comunicación.
Abstract:
A lighting system, a lighting unit and a method for controlling a plurality of light sources are described. A lighting system comprises an intelligent electrical current supply 12 to supply an electrical current with modulated command data. A plurality of lighting units 4, 6, 8 are connected in series to the current supply 12. Each lighting unit comprises a light source 22, a controllable bypassing switch 24 to selectively bypass the light source and a control unit 26. The control unit receives the modulated command data and controls the bypassing switch 24 accordingly.
Abstract:
System for configuring and powering a wireless batteryless device, the system comprising: a wireless batteryless device (A) comprising : a built-in harvester (12) for harvesting energy from a first energy source, for example ambient energy, means for communicating wirelessly, - and an external device (B) comprising : - a second power source (16), - means (17) for converting energy supplied by the second power source into energy suitable for being harvested in the harvester of the batteryless device, means (18) for wirelessly supplying the batteryless device with the converted energy via the built-in harvester, and means for communicating with the batteryless device. The invention also relates to an external device therefore, and a method for configuring and powering a batteryless device.
Abstract:
The present invention relates to security systems for communication networks. More precisely, the invention relates to a method for generating a shared key between a first node (D1) and a second node (D2) for secure communication in a network (1), the first node storing a first node keying material share based on a root keying material and the method comprising the following steps: a) the first node receiving an identifier of the second node, b) the first node evaluating the first node keying material share at a second node's identifier, to generate the shared key, wherein the first node keying material share is a polynomial-based keying material over a finite field Fq and step b) comprises: bl) the first node applying a Homer's rule to factorize the first node keying material under the form of a combination of monomials, b2) the first node computing the result of each monomial operation by evaluating at a predetermined point a polynomial of degree r-1 with coefficients in a sub-field of Fq. The invention also relates to a network and a computer program thereof.
Abstract:
The invention relates to composing a lighting atmosphere from an abstract description for example a lighting atmosphere specified in XML, wherein the lighting atmosphere is generated by several lighting devices, by automatically rendering the desired lighting atmosphere from the abstract description. The abstract description describes the type of light with certain lighting parameters desired at certain semantic locations at certain semantic times. This abstract atmosphere description is automatically transferred to a specific instance of a lighting system (14, 16, 18). The invention has the main advantage that it allows to create light scenes and lighting atmospheres at a high level of abstraction without requiring the definition of a lighting atmosphere or scene by setting the intensity, color, etc. for single lighting units or devices which can be very time consuming and cumbersome, particularly with large and complex lighting systems comprising many lighting devices.
Abstract:
A lighting system with a base station and a plurality of lighting units, as well as a method for controlling a lighting system are described. Each lighting unit (12) has a light source (14), a controller unit (18) and associated configuration data. A receiver (20) receives control commands over a medium shared by the lighting units (12), e. g. wireless. A base station (10) comprises a configuration memory unit (34) to store configuration data. A central processing unit (24) uses a transmitter (38) to transmit control commands to the lighting units (12). The lighting units (12) are addressed using data stored in the configuration memory unit. The lighting units (12) are operated sequentially.
Abstract:
The invention relates to a node (100) for a network such as a wireless control network or the like. In this network, each node (100) comprises a identifier (104) and keying material (102), means for authenticating (112) the node's identifier based on the node's keying material and means for checking (114) the access control rights of the node in a distributed manner based on the node's multidimensional identity and access rights corresponding to the node's identity. Additionally, the invention allows the node to generate a common key with any other node in the network that can be used to enable further secure communications.
Abstract:
The invention relates to a method of accommodating a network apparatus (2) in an existing network (A), wherein a user (1) supplies characteristic biometrical data to the apparatus (2) as well as to the apparatuses of the network (A) via a biometry module. A network identifier and/or a configuration key can then be derived from the biometrical data. The network identifier can ensure that the new apparatus (2) is correctly assigned to the desired network (A), also when there are still other networks (B) within its range. The configuration key can be used for securing the information exchanged during the configuration phase from interception.
Abstract:
The invention relates to a method for assigning addresses to nodes of a communication network tree structure, wherein each node corresponds to a network device of the communication network, comprising a step of determining first tree parameters (C m , R m , L m ), a step of assigning node addresses to nodes in a first section of the tree, i.e. (41, 42, 43, 44a, 44b) directly descending a first node (40), based on a predetermined assignment algorithm and the first tree parameters, a step of determining a first number of available descendent nodes for a particular node (44a, 44b), based on the predetermined assignment algorithm and the first tree parameters, a step of determining second tree parameters (C1112, R m2 , L m2 ) for the particular node, such that a second number of available descendent nodes for the particular node, being determined based on the predetermined assignment algorithm and the second tree parameters, is equal or smaller than the first number of available descendent nodes, and a step of assigning node addresses to nodes in a second section of a tree (45 a, 45b, 46a, 46b) directly descending the particular node, based on the predetermined assignment algorithm and the second tree parameters.