features
From the ground up, Econais’ philosophy has been to provide a full set of software features that support both legacy and evolving standards. This approach helps designers and developers get their devices and applications up and running in a very short period of time with a high degree of confidence in the foundation upon which they are building. Econais software supports:

Standard Features

  • Serial to WiFi
  • SoftAP (legacy AP)
  • WPS 2.0
  • WPA/WPA2-PSK
  • Web Configuration
  • HTTPS/SSL
  • TCP/IP stack with IPV4 support

Advanced Features

  • DLNA Renderer & Server
  • OTA FW Upgrade
  • Application programming in MCU
  • Fast Soft/Hard Cut Roaming (18.4 ms)
  • WPA/WPA2 Enterprise (TLS, TTLS, PEAP, certificates)
  • Xively integration
  • Wi-Fi Direct
  • MQTT
  • Bonjour
  • RTOS

Unique Features

  • ProbMe
  • Power management engine




Econais unique approach is to develop high level software inside the modules. A thin layer of core software is used to support different hardware architectures. That’s the only “firmware” part of the modules. The heart of the Econais solution is the powerful middleware which is hardware agnostic, completely modular and looks and feels no different that the software that is developed for desktop systems. This gives us the opportunity to easily integrate new protocols and solutions as they introduced to the market and most importantly create new functionality by implementing our ideas right away without having to think about the hardware. The middleware exports a number of well documented APIs so that the next level of abstraction can take over, the Applications. The Applications reside inside our modules (but can be extended in the cloud as well) take the advantage of all the cool features from middleware and provide ready to go examples of real life use cases.


ProbMe

Econais_ProbMe_graphic_Aug2014_v3b
Econais ProbMe provides an easy, fast and secure way to add new devices to a network. With ProbMe, after the user unpacks and turns on their new device, the device “quietly listens” until the user activates it – no one else knows it is there. This helps prevent hackers from identifying and attacking new and un-configured devices. The user simply sends out a configuration code from their computer, tablet, laptop or smart phone. The devices are immediately connected and configured. (Read more…)