会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Hacker-resistant denial of wireless device operation in restricted areas
    • 禁止黑客拒绝在限制区域的无线设备操作
    • US09531865B2
    • 2016-12-27
    • US14920842
    • 2015-10-22
    • Kristine A. WilsonKelce S. WilsonEdward A. Wilson
    • Kristine A. WilsonKelce S. WilsonEdward A. Wilson
    • H04M3/16H04M1/725H04K3/00H04W4/12H04W64/00H04W12/08H04W12/06
    • H04M1/72577H04K3/65H04K3/84H04K2203/16H04M1/72519H04M1/72572H04W4/12H04W12/06H04W12/08H04W64/00
    • A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions. Jamming is not required.
    • 用于限制无线设备(例如手机)的操作的系统包括控制器和多个传感器。 系统限制设备使用,同时允许紧急电话,例如911呼叫。 传感器从设备接收传输,并使用传输来进行识别并确定设备是否在限制区域内。 一种公开的方法是使用在传感器处的传输到达时间的三角测量。 如果设备在区域内,控制器将设备标识和可能的定制限制请求发送到远程节点,例如蜂窝电话网络运营商的控制节点。 然后,操作员使用其网络资源来实现所请求的限制。 控制器和远程节点之间的通信是安全的,可能是加密的,以最小化恶意干扰。 无线控制可以定义区域的顶点,并且免除某些设备的限制。 不需要干扰
    • 4. 发明申请
    • Page Substitution Verification Preparation
    • 页面替换验证准备
    • US20160357989A1
    • 2016-12-08
    • US15243657
    • 2016-08-22
    • Kelce S. Wilson
    • Kelce S. Wilson
    • G06F21/64H04N1/32
    • G06F21/64G07D7/202H04N1/32133H04N1/32272H04N2201/3236Y10S707/99952
    • A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering, where such security was previously unavailable, for example, documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can extend, by many years, the useful life of currently-trusted integrity verification algorithms, such as hash functions, even when applied to binary executable files. Embodiments can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.
    • 公开了一种系统和方法,用于使公开的文件变为明显的。 实施例中,文档类别具有加密级别安全性或检测到篡改,其中此类安全性以前不可用,例如,使用没有特殊纸张或墨水的普通打印机打印的文档。 实施例可以证明文件内容的日期,而不需要昂贵的第三方归档,包括自创建以来所保存的文件,完全在秘密或不可信的环境中,例如易于更改的,可公开访问的因特网站点。 实施例可以延长许多年来即使当应用于二进制可执行文件时,现有可靠的完整性验证算法(例如散列函数)的使用寿命。 实施例可以有效地识别多个文档版本是否基本相似,即使它们不相同,从而潜在地减少存储空间要求。