최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0667060 (2015-03-24) |
등록번호 | US-10223903 (2019-03-05) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 0 인용 특허 : 782 |
An integrated security system that includes a security coprocessor coupled to a conventional security system panel and an interactive security system. The integrated security system enables conventional security system features as well as the consumer-oriented interactive features and functions of a
An integrated security system that includes a security coprocessor coupled to a conventional security system panel and an interactive security system. The integrated security system enables conventional security system features as well as the consumer-oriented interactive features and functions of an interactive security system without sacrificing reliability or the significant burden and cost associated with frequent software updates associated with conventional security systems. The integrated security system also minimizes or eliminates the need for new battery backup circuitry or larger batteries.
1. An apparatus comprising: one or more processors; andmemory storing instructions that, when executed by the one or more processors, cause the apparatus to: determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of a
1. An apparatus comprising: one or more processors; andmemory storing instructions that, when executed by the one or more processors, cause the apparatus to: determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein the apparatus is in communication with the plurality of devices, and wherein the SMA network and the apparatus are located at a premises;determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices;compare the first computing resource usage and the second computing resource usage; andmodify, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations associated with the first subset of the plurality of devices without modifying operations associated with the second subset of the plurality of devices. 2. The apparatus of claim 1, wherein the comparing the first computing resource usage and the second computing resource usage comprises determining if one or more of the first computing resource usage or the second computing resource usage exceeds a computing resource usage threshold. 3. The apparatus of claim 1, wherein the one or more operations associated with the first subset of the plurality of devices comprise at least one of: receiving, by the apparatus, status data indicating a status of at least one of the first subset of the plurality of devices,processing, by the apparatus, status data indicating the status of the at least one of the first subset of the plurality of devices, orsending, by the apparatus and to the at least one of the first subset of the plurality of devices, command data. 4. The apparatus of claim 1, wherein: the first computing resource usage comprises at least one of memory usage or processor usage, andthe second computing resource usage comprises at least one of memory usage or processor usage. 5. The apparatus of claim 1, wherein: the first subset of the plurality of devices comprises devices of a first type, wherein the first type comprises at least one of a camera, a thermostat control, an energy control, a door locking mechanism, or a lighting control, andthe second subset of the plurality of devices comprises devices of a second type different from the first type, wherein the second type comprises at least one of a door sensor, a window sensor, a motion sensor, a glass break detector, a smoke detector, a fire sensor, or a flood sensor. 6. The apparatus of claim 1, wherein the modifying the one or more operations associated with the first subset of the plurality of devices is further based on a wattage of a power supply. 7. The apparatus of claim 6, wherein the one or more operations associated with the first subset of the plurality of devices comprises an operation executed by at least one of the first subset of the plurality of devices. 8. The apparatus of claim 1, wherein: the comparing comprises determining that the first computing resource usage is greater than the second computing resource usage, andthe modifying the one or more operations associated with the first subset of the plurality of devices comprises terminating the one or more operations associated with the first subset of the plurality of devices. 9. The apparatus of claim 1, wherein the first computing resource usage and the second computing resource usage are associated with power usage. 10. The apparatus of claim 9, wherein the apparatus is configured to modify the one or more operations associated with the first subset of the plurality of devices by reducing the first computing resource usage. 11. The apparatus of claim 9, wherein the apparatus is configured to modify the one or more operations associated with the first subset of the plurality of devices by modifying power usage of at least one of the first subset of the plurality of devices or the second subset of the plurality of devices. 12. The apparatus of claim 9, wherein the apparatus is configured to modify the one or more operations associated with the first subset of the plurality of devices by modifying power supplied to at least one of the first subset of the plurality of devices or the second subset of the plurality of devices. 13. An apparatus comprising: one or more processors; andmemory storing instructions that, when executed by the one or more processors, cause the apparatus to: determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with transmissions between the apparatus and a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein the SMA network and the apparatus are located at a premises;determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with transmissions between the apparatus and a second subset of the plurality of devices;compare the first computing resource usage and the second computing resource usage; andmodify, based on the comparing the first computing resource usage and the second computing resource usage, operations of the apparatus associated with the transmissions between the apparatus and the first subset of the plurality of devices without modifying operations of the apparatus associated with the transmissions between the apparatus and the second subset of the plurality of devices. 14. The apparatus of claim 13, wherein the comparing the first computing resource usage and the second computing resource usage comprises determining if one or more of the first computing resource usage or the second computing resource usage exceeds a computing resource usage threshold. 15. The apparatus of claim 13, wherein: the first computing resource usage comprises at least one of memory usage or processor usage, andthe second computing resource usage comprises at least one of memory usage or processor usage. 16. The apparatus of claim 13, wherein the modifying the operations of the apparatus associated with the transmissions between the apparatus and the first subset of the plurality of devices is further based on a wattage of a power supply. 17. The apparatus of claim 13, wherein the operations associated with the transmissions between the apparatus and the first subset of the plurality of devices comprise at least one of: receiving, by the apparatus, status data indicating a status of at least one of the first subset of the plurality of devices,processing, by the apparatus, status data indicating the status of the at least one of the first subset of the plurality of devices, orsending, by the apparatus and to the at least one of the first subset of the plurality of devices, command data. 18. The apparatus of claim 13, wherein: the first subset of the plurality of devices comprises devices of a first type, wherein the first type comprises at least one of a camera, a thermostat control, an energy control, a door locking mechanism, or a lighting control, andthe second subset of the plurality of devices comprises devices of a second type different from the first type, wherein the second type comprises at least one of a door sensor, a window sensor, a motion sensor, a glass break detector, a smoke detector, a fire sensor, or a flood sensor. 19. A method comprising: determining, by an apparatus, a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein the apparatus is in communication with the plurality of devices, and wherein the SMA network and the apparatus are located at a premises;determining, by the apparatus, a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices;comparing the first computing resource usage and the second computing resource usage; andmodifying, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations associated with the first subset of the plurality of devices without modifying operations associated with the second subset of the plurality of devices. 20. The method of claim 19, wherein the comparing the first computing resource usage and the second computing resource usage comprises determining if one or more of the first computing resource usage or the second computing resource usage exceeds a computing resource usage threshold. 21. The method of claim 20, wherein: the first computing resource usage comprises at least one of memory usage or processor usage; andthe second computing resource usage comprises at least one of memory usage or processor usage. 22. The method of claim 19, wherein: the first subset of the plurality of devices comprises devices of a first type, wherein the first type comprises at least one of a camera, a thermostat control, an energy control, a door locking mechanism, or a lighting control, andthe second subset of the plurality of devices comprises devices of a second type different from the first type, wherein the second type comprises at least one of a door sensor, a window sensor, a motion sensor, a glass break detector, a smoke detector, a fire sensor, or a flood sensor. 23. The method of claim 19, wherein: the comparing comprises determining that the first computing resource usage is greater than the second computing resource usage, andthe modifying the one or more operations associated with the first subset of the plurality of devices comprises terminating the one or more operations associated with the first subset of the plurality of devices. 24. The method of claim 19, wherein the comparing the first computing resource usage and the second computing resource usage comprises comparing the first computing resource usage to the second computing resource usage. 25. The method of claim 19, wherein the modifying the one or more operations associated with the first subset of the plurality of devices comprises reducing at least one of the first computing resource usage or the second computing resource usage such that the one or more of the first computing resource usage or the second computing resource usage complies with the computing resource usage threshold. 26. The method of claim 19, wherein the modifying the one or more operations associated with the first subset of the plurality of devices is further based on a priority of the first subset of the plurality of devices and the second subset of the plurality of devices. 27. The method of claim 19, wherein the modifying comprises overriding resource requests from at least one device of at least one of the first subset of the plurality of devices or the second subset of the plurality of devices. 28. The method of claim 19, wherein the modifying comprises allocating a computing resource associated with the apparatus amongst the first subset of the plurality of devices and the second subset of the plurality of devices. 29. A system, comprising: a security, monitoring, and automation (SMA) network comprising a plurality of devices located at a premises; andan apparatus located at the premises and in communication with the plurality of devices, wherein the apparatus is configured to: control operations associated with the plurality of devices;determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of the plurality of devices;determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices;compare the first computing resource usage and the second computing resource usage; andmodify, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations associated with the first subset of the plurality of devices without modifying operations associated with the second subset of the plurality of devices. 30. The system of claim 29, wherein: the first computing resource usage comprises at least one of memory usage or processor usage, andthe second computing resource usage comprises at least one of memory usage or processor usage. 31. The system of claim 29, wherein the comparing the first computing resource usage and the second computing resource usage comprises determining if one or more of the first computing resource usage or the second computing resource usage exceeds a computing resource usage threshold. 32. The system of claim 29, wherein the one or more operations associated with the first subset of the plurality of devices comprises at least one of: receiving, by the apparatus, status data indicating a status of at least one of the first subset of the plurality of devices,processing, by the apparatus, status data indicating the status of the at least one of the first subset of the plurality of devices, orsending, by the apparatus and to the at least one of the first subset of the plurality of devices, command data. 33. The system of claim 29, wherein: the first subset of the plurality of devices comprises devices of a first type, wherein the first type comprises at least one of a camera, a thermostat control, an energy control, a door locking mechanism, or a lighting control, andthe second subset of the plurality of devices comprises devices of a second type different from the first type, wherein the second type comprises at least one of a door sensor, a window sensor, a motion sensor, a glass break detector, a smoke detector, a fire sensor, or a flood sensor. 34. The system of claim 29, wherein the modifying the one or more operations associated with the first subset of the plurality of devices is further based on a wattage of a power supply. 35. The system of claim 29, wherein the one or more operations associated with the first subset of the plurality of devices comprises an operation executed by at least one of the first subset of the plurality of devices. 36. The system of claim 29, wherein the apparatus is configured to control a supply of power to at least one of the first subset of the plurality of devices or the second subset of the plurality of devices. 37. The system of claim 36, wherein at least one of the first computing resource usage or the second computing resource usage is associated with the supply of power. 38. The system of claim 29, wherein at least one of the first subset of the plurality of devices or the second subset of the plurality of devices is configured to receive power from a supply of power controlled by the apparatus. 39. The system of claim 38, wherein the at least one of the first computing resource usage or the second computing resource usage is associated with the supply of power. 40. An apparatus comprising: one or more processors; andmemory storing instructions that, when executed by the one or more processors, cause the apparatus to: determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein the apparatus is in communication with the plurality of devices, and wherein the SMA network and apparatus are located at a premises;determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices;compare the first computing resource usage and the second computing resource usage; andmodify, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations of the first subset of the plurality of devices without modifying operations of the second subset of the plurality of devices. 41. The apparatus of claim 40, wherein the comparing the first computing resource usage and the second computing resource usage comprises determining if one or more of the first computing resource usage or the second computing resource usage exceeds a computing resource usage threshold. 42. The apparatus of claim 40, wherein the one or more operations of the first subset of the plurality of devices comprises at least one of: sending, by at least one of the first subset of the plurality of devices and to the apparatus, status data indicating a status of the at least one of the first subset of the plurality of devices,determining, by the at least one of the first subset of the plurality of devices, status data indicating the status of the at least one of the first subset of the plurality of devices, orreceiving, by the at least one of the first subset of the plurality of devices and from the apparatus, command data. 43. The apparatus of claim 40, wherein: the first computing resource usage comprises at least one of memory usage or processor usage, andthe second computing resource usage comprises at least one of memory usage or processor usage. 44. The apparatus of claim 40, wherein: the first subset of the plurality of devices comprises devices of a first type, wherein the first type comprises at least one of a camera, a thermostat control, an energy control, a door locking mechanism, or a lighting control, andthe second subset of the plurality of devices comprises devices of a second type different from the first type, wherein the second type comprises at least one of a door sensor, a window sensor, a motion sensor, a glass break detector, a smoke detector, a fire sensor, or a flood sensor. 45. The apparatus of claim 40, wherein the modifying the one or more operations of the first subset of the plurality of devices is further based on a wattage of a power supply. 46. The apparatus of claim 40, wherein the one or more operations of the first subset of the plurality of devices comprises an operation executed by at least one of the first subset of the plurality of devices. 47. A method comprising: determining, by an apparatus, a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with transmissions between the apparatus and a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein the apparatus is in communication with the plurality of devices, and wherein the SMA network and the apparatus are located at a premises;determining, by the apparatus, a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with transmissions between the apparatus and a second subset of the plurality of devices;comparing the first computing resource usage and the second computing resource usage; andmodifying, based on the comparing the first computing resource usage and the second computing resource usage, operations of the apparatus associated with the transmissions between the apparatus and the first subset of the plurality of devices without modifying operations of the apparatus associated with the transmissions between the apparatus and the second subset of a plurality of devices. 48. The method of claim 47, wherein the comparing the first computing resource usage and the second computing resource usage comprises determining if one or more of the first computing resource usage and the second computing resource usage exceeds a computing resource usage threshold. 49. The method of claim 47, wherein the operations associated with the first subset of the plurality of devices comprises at least one of: receiving, by the apparatus, status data indicating a status of at least one of the first subset of the plurality of devices,processing, by the apparatus, status data indicating the status of the at least one of the first subset of the plurality of devices, orsending, by the apparatus and to the at least one of the first subset of the plurality of devices, command data. 50. The method of claim 47, wherein: the first computing resource usage comprises at least one of memory usage or processor usage, andthe second computing resource usage comprises at least one of memory usage or processor usage. 51. The method of claim 47, wherein: the first subset of the plurality of devices comprises devices of a first type, wherein the first type comprises at least one of a camera, a thermostat control, an energy control, a door locking mechanism, or a lighting control, andthe second subset of the plurality of devices comprises devices of a second type different from the first type, wherein the second type comprises at least one of a door sensor, a window sensor, a motion sensor, a glass break detector, a smoke detector, a fire sensor, or a flood sensor. 52. The method of claim 47, wherein the modifying the operations associated with the first subset of the plurality of devices is further based on a wattage of a power supply. 53. The method of claim 47, wherein: the comparing comprises determining that the first computing resource usage is greater than the second computing resource usage, andthe modifying the operations associated with the first subset of the plurality of devices comprises terminating the operations associated with the first subset of the plurality of devices. 54. An apparatus comprising: one or more processors; andmemory storing instructions that, when executed by the one or more processors, cause the apparatus to: determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein a security subnetwork of the SMA network comprises the first subset of the plurality of devices, wherein the apparatus is in communication with the first subset of the plurality of devices, and wherein the SMA network and apparatus are located at a premises,determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices of the SMA network, wherein the apparatus is in communication with the first subset of the plurality of devices, and wherein the second subset of the plurality of devices is external to the security subnetwork,compare the first computing resource usage and the second computing resource usage, andmodify, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations associated with the first subset of the plurality of devices without modifying operations associated with the second subset of the plurality of devices. 55. The apparatus of claim 54, wherein the comparing the first computing resource usage and the second computing resource usage comprises determining if one or more of the first computing resource usage or the second computing resource usage exceeds a computing resource usage threshold. 56. The apparatus of claim 54, wherein: the first subset of the plurality of devices comprises devices of a first type, wherein the first type comprises at least one of a camera, a thermostat control, an energy control, a door locking mechanism, or a lighting control, andthe second subset of the plurality of devices comprises devices of a second type different from the first type, wherein the second type comprises at least one of a door sensor, a window sensor, a motion sensor, a glass break detector, a smoke detector, a fire sensor, or a flood sensor. 57. The apparatus of claim 54, wherein the one or more operations associated with the first subset of the plurality of devices comprises at least one of: receiving, by the apparatus, status data indicating a status of at least one of the first subset of the plurality of devices,processing, by the apparatus, status data indicating the status of the at least one of the first subset of the plurality of devices, orsending, by the apparatus and to the at least one of the first subset of the plurality of devices, command data. 58. The apparatus of claim 54, wherein: the first computing resource usage comprises at least one of memory usage or processor usage, andthe second computing resource usage comprises at least one of memory usage or processor usage. 59. The apparatus of claim 54, wherein the modifying the one or more operations associated with the first subset of the plurality of devices is further based on a wattage of a power supply. 60. A system, comprising: a security, monitoring, and automation (SMA) network comprising a plurality of devices located at a premises; andan apparatus located at the premises and in communication with the plurality of devices, wherein the apparatus is configured to: control operations associated with the plurality of devices;determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with transmissions between the apparatus and a first subset of the plurality of devices;determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with transmissions between the apparatus and a second subset of the plurality of devices;compare the first computing resource usage and the second computing resource usage; andmodify, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations of the apparatus associated with the transmissions between the apparatus and the first subset of the plurality of devices without modifying operations of the apparatus associated with the transmissions between the apparatus and the second subset of the plurality of devices. 61. The system of claim 60, wherein the apparatus is configured to compare the first computing resource usage and the second computing resource usage by determining if one or more of the first computing resource usage or the second computing resource usage exceeds a computing resource usage threshold. 62. The system of claim 60, wherein: the first computing resource usage comprises at least one of memory usage or processor usage, andthe second computing resource usage comprises at least one of memory usage or processor usage. 63. The system of claim 60, wherein the apparatus is configured to modify the operations of the apparatus associated with the transmissions between the apparatus and the first subset of the plurality of devices further based on a wattage of a power supply. 64. The system of claim 60, wherein the operations of the apparatus associated with the transmissions between the apparatus and the first subset of the plurality of devices comprise at least one of: receiving status data indicating a status of at least one of the first subset of the plurality of devices,processing status data indicating the status of the at least one of the first subset of the plurality of devices, orsending, to the at least one of the first subset of the plurality of devices, command data. 65. The system of claim 60, wherein: the first subset of the plurality of devices comprises devices of a first type, wherein the first type comprises at least one of a camera, a thermostat control, an energy control a door locking mechanism, or a lighting control, andthe second subset of the plurality of devices comprises devices of a second type different from the first type, wherein the second type comprises at least one of a door sensor, a window sensor, a motion sensor, a glass break detector, a smoke detector, a fire sensor, or a flood sensor. 66. A system, comprising: a security, monitoring, and automation (SMA) network comprising a plurality of devices located at a premises; andan apparatus located at the premises and in communication with the plurality of devices, wherein the apparatus is configured to: control operations associated with the plurality of devices;determine a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of the plurality of devices, wherein a security subnetwork of the SMA network comprises the first subset of the plurality of devices;determine a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices, wherein the second subset of the plurality of devices is external to the security subnetwork;compare the first computing resource usage and the second computing resource usage; andmodify, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations associated with the first subset of the plurality of devices without modifying operations associated with the second subset of the plurality of devices. 67. The system of claim 66, wherein the apparatus is configured to compare the first computing resource usage and the second computing resource usage by determining if one or more of the first computing resource usage or the second computing resource usage exceeds a computing resource usage threshold. 68. The system of claim 66, wherein: the first subset of the plurality of devices comprises devices of a first type, wherein the first type comprises at least one of a camera, a thermostat control, an energy control, a door locking mechanism, or a lighting control, andthe second subset of the plurality of devices comprises devices of a second type different from the first type, wherein the second type comprises at least one of a door sensor, a window sensor, a motion sensor, a glass break detector, a smoke detector, a fire sensor, or a flood sensor. 69. The system of claim 66, wherein the one or more operations associated with the first subset of the plurality of devices comprises at least one of: receiving status data indicating a status of at least one of the first subset of the plurality of devices,processing status data indicating the status of the at least one of the first subset of the plurality of devices, orsending, to the at least one of the first subset of the plurality of devices, command data. 70. The system of claim 66, wherein: the first computing resource usage comprises at least one of memory usage or processor usage, andthe second computing resource usage comprises at least one of memory usage or processor usage. 71. The system of claim 66, wherein the apparatus is configured to modify the one or more operations associated with the first subset of the plurality of devices further based on a wattage of a power supply. 72. A method comprising: determining, by an apparatus, a first computing resource usage of the apparatus, wherein the first computing resource usage is associated with a first subset of a plurality of devices of a security, monitoring, and automation (SMA) network, wherein a security subnetwork of the SMA network comprises the first subset of the plurality of devices, wherein the apparatus is in communication with the first subset of the plurality of devices, and wherein the SMA network and apparatus are located at a premises;determining, by the apparatus, a second computing resource usage of the apparatus, wherein the second computing resource usage is associated with a second subset of the plurality of devices of the SMA network, wherein the apparatus is in communication with the first subset of the plurality of devices, and wherein the second subset of the plurality of devices is external to the security subnetwork;comparing the first computing resource usage and the second computing resource usage; andmodifying, based on the comparing the first computing resource usage and the second computing resource usage, one or more operations associated with the first subset of the plurality of devices without modifying operations associated with the second subset of the plurality of devices. 73. The method of claim 72, wherein the comparing the first computing resource usage and the second computing resource usage comprises determining if one or more of the first computing resource usage or the second computing resource usage exceeds a computing resource usage threshold. 74. The method of claim 72, wherein: the first subset of the plurality of devices comprises devices of a first type, wherein the first type comprises at least one of a camera, a thermostat control, an energy control, a door locking mechanism, or a lighting control, andthe second subset of the plurality of devices comprises devices of a second type different from the first type, wherein the second type comprises at least one of a door sensor, a window sensor, a motion sensor, a glass break detector, a smoke detector, a fire sensor, or a flood sensor. 75. The method of claim 72, wherein the one or more operations associated with the first subset of the plurality of devices comprises at least one of: receiving, by the apparatus, status data indicating a status of at least one of the first subset of the plurality of devices,processing, by the apparatus, status data indicating the status of the at least one of the first subset of the plurality of devices, orsending, by the apparatus and to the at least one of the first subset of the plurality of devices, command data. 76. The method of claim 72, wherein: the first computing resource usage comprises at least one of memory usage or processor usage, andthe second computing resource usage comprises at least one of memory usage or processor usage. 77. The method of claim 72, wherein the modifying the one or more operations associated with the first subset of the plurality of devices is further based on a wattage of a power supply.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.