会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method for permitting two parties to establish connectivity with both parties behind firewalls
    • 允许双方与防火墙背后的双方建立连接的方法
    • US07992199B1
    • 2011-08-02
    • US10749651
    • 2003-12-31
    • Steven J. WinickWilliam R. BlumPiotr Romanczyk
    • Steven J. WinickWilliam R. BlumPiotr Romanczyk
    • G06F9/00
    • H04L41/0806H04L63/0209
    • A communications scheme enables a central communications station to assist two communications systems located behind firewalls that prevent communication initiated from an external data network to establish direct communication with each other. In one embodiment, the systems separately establish communications with the central communications station and obtain from it the connection information (e.g., IP address, port, etc.) of the other. The systems then directly communicate with each other using the obtained connection information while pretending to be the central communications station. In another embodiment in which the firewalls include NAT devices that implement network address translation, the systems exchange connection information for establishing a new connection through the central communications station and then complete a three-way handshake with the assistance of the central communications station, thereby allowing the central communications station to remove itself from the communication.
    • 通信方案使得中央通信站能够帮助位于防火墙之后的两个通信系统,防止从外部数据网络发起的通信建立彼此的直接通信。 在一个实施例中,系统单独建立与中央通信站的通信,并从其获得另一个的连接信息(例如,IP地址,端口等)。 然后,这些系统在假装成为中央通信站的同时使用所获得的连接信息彼此直接通信。 在其中防火墙包括实现网络地址转换的NAT设备的另一实施例中,系统通过中央通信站交换用于建立新连接的连接信息,然后在中央通信站的协助下完成三次握手,从而允许 中央通信站从通信中删除。
    • 8. 发明申请
    • Camera theft detection system
    • 相机盗窃检测系统
    • US20050226338A1
    • 2005-10-13
    • US10818413
    • 2004-04-05
    • Lance WestonPiotr RomanczykTony Li
    • Lance WestonPiotr RomanczykTony Li
    • G08B13/196H04N7/12
    • G08B13/19676G08B13/19645G08B13/19669
    • Image data from a video surveillance camera is moved from a volatile memory such as a circular buffer to a non-volatile memory such as a flash memory when a loss of signal from the camera is detected. The loss of signal may occur when an intruder disables the system such as by cutting a cable, by vandalizing the camera so that it no longer can transmit image data, or removing the camera altogether. The loss of signal is detected by determining whether a signal portion such as a start of active video code, end of active video code, or horizontal or vertical blanking interval, is present on a communication path of the camera. The system ensures that an image of the intruder is captured and stored before the system is disabled. Analog signals from the camera may be digitized for storage.
    • 当检测到来自相机的信号丢失时,来自视频监控摄像机的图像数据从诸如循环缓冲器的易失性存储器移动到诸如闪存的非易失性存储器。 当入侵者通过切断电缆来禁用系统时,可能会发生信号丢失,通过破坏摄像机,使其不再能够传输图像数据,或完全删除摄像机。 通过确定在相机的通信路径上是否存在诸如活动视频码的开始,活动视频码的结束或水平或垂直消隐间隔的信号部分来检测信号的丢失。 系统确保在系统被禁用之前捕获和存储入侵者的图像。 来自相机的模拟信号可以被数字化以便存储。