会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Methods for identifying wireless devices connected to potentially threatening devices
    • 识别连接到潜在威胁设备的无线设备的方法
    • US08755770B2
    • 2014-06-17
    • US12538662
    • 2009-08-10
    • James D Haverty
    • James D Haverty
    • H04M1/66
    • H04K3/92H04K3/45H04K3/65H04K2203/16H04K2203/24H04W8/22H04W48/02
    • Techniques for determining whether a cellular device is suspect, i.e., perhaps serving as an activator for a device such as a bomb. One way of doing this with cellular telephones that are in the idle state is to use a baiting beacon to bait and automatically call all the cellular telephones in an area that are in the idle state. If the call to a given cellular telephone is not answered by a human voice, the cellular telephone is suspect. Another way of doing this with cellular telephones that are in the traffic state is to use surgical analysis to examine the DTX pattern for the telephone. If it indicates persistent silence, the cellular telephone is suspect. The surgical analysis may also be used to trace the DTX pattern back to another telephone that is controlling the suspect cellular device.
    • 用于确定蜂窝设备是否可疑的技术,即可能用作诸如炸弹的设备的激活器。 使用处于空闲状态的蜂窝电话的一种方法是使用诱饵信标来诱饵并自动呼叫处于空闲状态的区域中的所有蜂窝电话。 如果对给定蜂窝电话的呼叫没有被人的语音应答,那么蜂窝电话是可疑的。 处于交通状态的蜂窝电话的另一种方式是使用手术分析来检查电话的DTX模式。 如果它表示持续的沉默,那么蜂窝电话是可疑的。 手术分析也可以用于将DTX模式跟踪到另一个正在控制可疑蜂窝设备的电话。
    • 3. 发明授权
    • Methods for surreptitious manipulation of CDMA 2000 wireless devices
    • CDMA 2000无线设备的隐蔽操纵方法
    • US08477727B2
    • 2013-07-02
    • US12846633
    • 2010-07-29
    • James D Haverty
    • James D Haverty
    • H04W4/00H04B7/216H04K3/00H04M1/66G06F7/04
    • H04W60/04H04L63/30H04W12/02H04W48/12
    • Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices.
    • 用于生成可以控制CDMA频道上的目标无线设备的行为的同步信标的技术,而不会明显地改变共享目标无线设备的实时信标的频道的非目标无线设备的行为。 互屏信标是覆盖实况信标的导频信道的超控信标,以及控制消息可以在其上寻址到目标无线设备的代码信道上的控制消息。 覆盖信标仅在目标无线设备响应于重写控制消息所需的时间内提供重写导频和重写控制消息。 为覆盖信标产生覆盖导频和覆盖控制消息的时间段很短,只有目标无线设备才能对辅助无线设备产生不明显的影响。
    • 4. 发明授权
    • Enhanced methods of cellular environment detection when interoperating with timed interfers
    • 与定时接口进行互操作时,增强蜂窝环境检测的方法
    • US08767595B2
    • 2014-07-01
    • US12538604
    • 2009-08-10
    • James D Haverty
    • James D Haverty
    • H04B3/20
    • H04K3/65H04K3/22H04K3/28H04K3/45H04K2203/16
    • Techniques for performing analysis of a cellular telephone signaling environment in the presence of interferers. The techniques do the analysis by employing a receiver to listen to the cellular environment during holes in the interference. The holes have a timing which differs from that used by the cellular telephone signaling environment and will thus over time overlap with structures of interest in the cellular telephone environment. The holes may be smaller than the structure of interest. The signals which the receiver hears in the holes are analyzed and combined to reproduce the structure. The combination may involve statistical methods and weighted decoding. The analysis obtains information which permits surgical attacks on individual wireless devices which are in the traffic state. Example applications of the techniques are given for the GSM and CDMA cellular telephone standards.
    • 在存在干扰源的情况下执行蜂窝电话信令环境的分析的技术。 这些技术通过在干扰的孔中采用接收机来监听蜂窝环境来进行分析。 这些孔具有与蜂窝电话信令环境使用的时间不同的定时,并且因此将随着时间与蜂窝电话环境中感兴趣的结构重叠。 孔可以小于感兴趣的结构。 接收器在孔中听到的信号被分析并组合以再现结构。 组合可能涉及统计方法和加权解码。 分析获得允许对处于交通状态的各个无线设备进行手术攻击的信息。 给出了GSM和CDMA蜂窝电话标准的技术应用示例。
    • 5. 发明授权
    • Using code channel overrides to suppress CDMA wireless devices
    • 使用代码通道覆盖来抑制CDMA无线设备
    • US08526395B2
    • 2013-09-03
    • US12877064
    • 2010-09-07
    • James D Haverty
    • James D Haverty
    • H04W4/00H04B7/216H04K3/00H04M1/66G06F17/30H04W36/00H04W84/04H04W12/12H04L29/06
    • H04K3/65H04K2203/00H04L63/08H04L63/30H04W12/02H04W12/12H04W36/0005H04W48/12H04W60/04H04W76/30H04W84/042
    • Techniques for generating an interloping beacon which can control the behavior of a target wireless device on a CDMA frequency channel without noticeably altering the behavior of non-target wireless devices which share the frequency channel of the target wireless device's live beacon. The interloping beacon is an override beacon which overrides the live beacon's pilot channel and a control message on a code channel on which control messages may be addressed to the target wireless device. The override beacon provides the overriding pilot and the overriding control message only as long as is required for the target wireless device to respond to the overriding control message. The period of time during which the overriding pilot and the overriding control message are generated for the override beacon is so short that only the target wireless device responds without noticeable effect on collateral wireless devices.
    • 用于生成可以控制CDMA频道上的目标无线设备的行为的同步信标的技术,而不会明显地改变共享目标无线设备的实时信标的频道的非目标无线设备的行为。 互屏信标是覆盖实况信标的导频信道的超控信标,以及控制消息可以在其上寻址到目标无线设备的代码信道上的控制消息。 覆盖信标仅在目标无线设备响应于重写控制消息所需的时间内提供重写导频和重写控制消息。 为覆盖信标产生覆盖导频和覆盖控制消息的时间段很短,只有目标无线设备才能对辅助无线设备产生不明显的影响。