会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 21. 发明授权
    • Enhanced methods of cellular environment detection when interoperating with timed interfers
    • 与定时接口进行互操作时,增强蜂窝环境检测的方法
    • US08767595B2
    • 2014-07-01
    • US12538604
    • 2009-08-10
    • James D Haverty
    • James D Haverty
    • H04B3/20
    • H04K3/65H04K3/22H04K3/28H04K3/45H04K2203/16
    • Techniques for performing analysis of a cellular telephone signaling environment in the presence of interferers. The techniques do the analysis by employing a receiver to listen to the cellular environment during holes in the interference. The holes have a timing which differs from that used by the cellular telephone signaling environment and will thus over time overlap with structures of interest in the cellular telephone environment. The holes may be smaller than the structure of interest. The signals which the receiver hears in the holes are analyzed and combined to reproduce the structure. The combination may involve statistical methods and weighted decoding. The analysis obtains information which permits surgical attacks on individual wireless devices which are in the traffic state. Example applications of the techniques are given for the GSM and CDMA cellular telephone standards.
    • 在存在干扰源的情况下执行蜂窝电话信令环境的分析的技术。 这些技术通过在干扰的孔中采用接收机来监听蜂窝环境来进行分析。 这些孔具有与蜂窝电话信令环境使用的时间不同的定时,并且因此将随着时间与蜂窝电话环境中感兴趣的结构重叠。 孔可以小于感兴趣的结构。 接收器在孔中听到的信号被分析并组合以再现结构。 组合可能涉及统计方法和加权解码。 分析获得允许对处于交通状态的各个无线设备进行手术攻击的信息。 给出了GSM和CDMA蜂窝电话标准的技术应用示例。
    • 22. 发明授权
    • Distributed physics based training system and methods
    • 基于分布式物理学的培训体系和方法
    • US08751204B2
    • 2014-06-10
    • US13136198
    • 2011-07-26
    • Mark FalashEytan PollakYushan ChenJon Williams
    • Mark FalashEytan PollakYushan ChenJon Williams
    • G06G7/48
    • G09B9/00H04L67/38
    • A distributed simulation system is composed of simulator stations linked over a network that each renders real-time video imagery for its user from scene data stored in its data storage. The simulation stations are each connected with a physics farm that manages the virtual objects in the shared virtual environment based on their physical attribute data using physics engines, including an engine at each simulation station. The physics engines of the physics farm are assigned virtual objects so as to reduce the effects of latency, to ensure fair fight requirements of the system, and, where the simulation is of a vehicle, to accurately model the ownship of the user at the station. A synchronizer system is also provided that allows for action of simulated entities relying on localized closed loop controls to cause the entities to meet specific goal points at specified system time points.
    • 分布式仿真系统由通过网络链接的模拟器站组成,每个模拟站通过存储在其数据存储器中的场景数据为其用户呈现实时视频图像。 模拟站各自与物理场连接,物理场基于使用物理引擎(包括每个模拟站的引擎)的物理属性数据来管理共享虚拟环境中的虚拟对象。 物理场的物理引擎被分配虚拟对象,以减少延迟的影响,以确保系统的公平对抗要求,并且在模拟车辆的情况下,准确地对车站用户进行建模 。 还提供了同步器系统,其允许依赖于本地化闭环控制的模拟实体的动作使得实体在指定的系统时间点满足特定的目标点。
    • 24. 发明申请
    • INTERNET ISOLATION FOR AVOIDING INTERNET SECURITY THREATS
    • 互联网隔离以避免互联网安全威胁
    • US20130318594A1
    • 2013-11-28
    • US13981896
    • 2012-01-27
    • Robert B. HoyMark FenknerSean W. Farren
    • Robert B. HoyMark FenknerSean W. Farren
    • H04L29/06
    • H04L63/0272G06F9/45558G06F21/53G06F2009/45587H04L63/101
    • A host computer supports a virtual guest system running thereon. The host system has a firewall that prevents it from communicating directly with the Internet, except with predetermined trusted sites. The virtual guest runs on a hypervisor, and the virtual guest comprises primarily a browser program that is allowed to contact the Internet freely via an Internet access connection that is completely separate from the host computer connection, such as a dedicated network termination point with its specific Internet IP address, or by tunneling through the host machine architecture to reach the Internet without exposing the host system. The virtual guest system is separated and completely isolated by an internal firewall from the host, and the guest cannot access any of the resources of the host computer, except that the guest can initiate cut, copy and paste operations that reach the host, and the guest can also request print of documents. The host can transfer files to and from a virtual data storage area accessible by the guest by manual operator action. No other transfer of data except these user initiated actions is permitted.
    • 主计算机支持在其上运行的虚拟客机系统。 主机系统具有防火墙,防止它直接与Internet通信,除了预定的可信站点。 虚拟客户端在虚拟机管理程序上运行,虚拟客户端主要包括允许通过与主机连接完全分离的因特网访问连接自由地联系到互联网的浏览器程序,诸如具有其特定的主机计算机连接的专用网络终端点 互联网IP地址,或者通过主机架构隧道到达Internet而不会暴露主机系统。 虚拟客户机系统由内部防火墙与主机分离并完全隔离,客户端无法访问主机的任何资源,但客户端可以启动到达主机的剪切,复制和粘贴操作,而 客人还可以要求打印文件。 主机可以通过手动操作员操作将访问者可访问的虚拟数据存储区域中的文件传送到虚拟数据存储区域。 除了这些用户启动的操作之外,不允许其他数据传输。
    • 25. 发明授权
    • Heterogeneous reconfigurable agent compute engine (HRACE)
    • 异构可重配置代理计算引擎(HRACE)
    • US08589935B2
    • 2013-11-19
    • US11745558
    • 2007-05-08
    • Deepak PrasannaGerald L. Fudge
    • Deepak PrasannaGerald L. Fudge
    • G06F9/46G06F9/52
    • G06F9/52G06F9/5072Y02D10/22Y02D10/36
    • A computing system (10) includes a plurality of hardware computing resources (12-36) controlled at least in part by a plurality of autonomous computing agents (40,42,44). Each autonomous computing agent (40,42,44) includes or has access to operating information including processing information (46), resource information (48), optimization information (50), and communication information (52). The computing agents (40,42,44) collaborate to optimize performance of the system (10) and to assign computing tasks to the resources (12-36) according to a predetermined strategy. The predetermined strategy may seek to optimize speed, power, or communication efficiency of the system 10. Each agent (40,42,44) may optimize performance of the system (10) by assigning tasks to best-fit resources or by reconfiguring one or more resources. The agents (40,42,44) may collaborate to optimize performance of the system (10) by sharing resource and task information and assigning tasks to best-fit resources based on the shared information, reconfiguring one or more resources based on the shared information, or both.
    • 计算系统(10)包括至少部分由多个自主计算代理(40,42,44)控制的多个硬件计算资源(12-36)。 每个自主计算代理(40,42,44)包括或可以访问包括处理信息(46),资源信息(48),优化信息(50)和通信信息(52)的操作信息。 计算代理(40,42,44)协作以优化系统(10)的性能并根据预定策略将计算任务分配给资源(12-36)。 预定策略可以寻求优化系统10的速度,功率或通信效率。每个代理(40,42,44)可以通过将任务分配给最适合资源来优化系统(10)的性能,或者通过重新配置一个或 更多资源。 代理(40,42,44)可以通过共享资源和任务信息并基于共享信息将任务分配给最佳拟合资源来协作来优化系统(10)的性能,基于共享信息重新配置一个或多个资源 , 或两者。
    • 27. 发明授权
    • Using code channel overrides to suppress CDMA wireless devices
    • 使用代码通道覆盖来抑制CDMA无线设备
    • US08526395B2
    • 2013-09-03
    • US12877064
    • 2010-09-07
    • James D Haverty
    • James D Haverty
    • H04W4/00H04B7/216H04K3/00H04M1/66G06F17/30H04W36/00H04W84/04H04W12/12H04L29/06
    • H04K3/65H04K2203/00H04L63/08H04L63/30H04W12/02H04W12/12H04W36/0005H04W48/12H04W60/04H04W76/30H04W84/042
    • Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices.
    • 用于生成可以控制CDMA频道上的目标无线设备的行为的同步信标的技术,而不会明显地改变共享目标无线设备的实时信标的频道的非目标无线设备的行为。 互屏信标是覆盖实况信标的导频信道的超控信标,以及控制消息可以在其上寻址到目标无线设备的代码信道上的控制消息。 覆盖信标仅在目标无线设备响应于重写控制消息所需的时间内提供重写导频和重写控制消息。 为覆盖信标产生覆盖导频和覆盖控制消息的时间段很短,只有目标无线设备才能对辅助无线设备产生不明显的影响。
    • 28. 发明申请
    • External Reference Monitor
    • 外部参考监视器
    • US20130111211A1
    • 2013-05-02
    • US13665144
    • 2012-10-31
    • L-3 Communications Corporation
    • Richard Norman WinslowJerry HutchisonRobert Louis Coia, JR.
    • H04L9/32H04L9/00G06F21/00
    • H04L63/0853G06F21/57G06F2221/2103H04L9/3234H04L9/3271
    • Methods and systems for increasing the security or trust associated with an untrusted device are provided. For example, a trusted hardware component may send a request to the untrusted device. The request may indicate one or more challenges to be performed by a secure application executing on the untrusted device. The trusted hardware component may determine an expected response to the one or more challenges. The expected response may be determined at the secure hardware component based on an expected configuration of the untrusted device. The trusted hardware component may receive a response to the request from the untrusted device. The trusted hardware component may determine a security status of the untrusted device based on the expected response and the received response
    • 提供了用于增加与不受信任的设备相关联的安全性或信任的方法和系统。 例如,可信硬件组件可以向不受信任的设备发送请求。 请求可以指示由在不受信任的设备上执行的安全应用执行的一个或多个挑战。 可信硬件组件可以确定对一个或多个挑战的预期响应。 预期响应可以在安全硬件组件的基础上,基于不可信设备的预期配置来确定。 可信硬件组件可以从不可信设备接收对该请求的响应。 可信硬件组件可以基于预期响应和接收到的响应来确定不可信设备的安全状态
    • 29. 发明授权
    • Active subject privacy imaging
    • 主题隐私成像
    • US08345918B2
    • 2013-01-01
    • US10987426
    • 2004-11-12
    • Michael Fleisher
    • Michael Fleisher
    • G06K9/00
    • G06K9/00362G01N21/3563G01N21/3581G01S7/411G01S13/87G01S13/887G01S13/89G01V3/12G01V8/005G06K9/00369
    • A method of surveilling a subject including a person's body may include or an imaging system may provide interrogating the subject with electromagnetic radiation, and generating, from the interrogating, image data representative of at least a first image of at least a portion of the person's body. In some examples, a first portion of the body may be identified, and a first feature of the image may be determined based at least partially on the identified portion of the body. In some examples, the orientation of the person's body may be determined from one or more features of one or more image portions. In some examples, a portion of the image of the person's body may be replaced with a substitute image portion that may be a modified portion of the first image.
    • 可以包括监视包括人的身体的对象的方法,或者成像系统可以向询问对象提供电磁辐射,并且从询问的图像数据生成代表至少一个人身体的一部分的第一图像的图像数据 。 在一些示例中,可以识别身体的第一部分,并且可以至少部分地基于身体的识别部分来确定图像的第一特征。 在一些示例中,人的身体的取向可以由一个或多个图像部分的一个或多个特征来确定。 在一些示例中,可以用可以是第一图像的修改部分的替代图像部分来代替人的身体的图像的一部分。