会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 82. 发明授权
    • Technique for establishing a virtual backbone in an ad hoc wireless network
    • 在自组织无线网络中建立虚拟骨干网的技术
    • US06839541B2
    • 2005-01-04
    • US10006943
    • 2001-12-04
    • Khaled Muhyeddin M. AlzoubiPeng-Jun WanOphir Frieder
    • Khaled Muhyeddin M. AlzoubiPeng-Jun WanOphir Frieder
    • H04L12/715H04L12/751H04B5/00
    • H04W84/18H04L45/02H04L45/46H04W8/26H04W40/246H04W40/32H04W84/20
    • An algorithm on a computer readable medium for efficiently creating a message efficient virtual backbone in a wireless ad hoc network utilizes three phases to establish an efficient network among the independent transceivers of a wireless ad hoc network. Independent transceivers within the transmission range of each other are neighbors. A leader election and tree construction phase constructs a tree of neighboring transceivers with one transceiver being designated the root and with each transceiver establishing and recording its location in the tree structure and the identifiers of its neighbors; and reporting when the tree is established. A level calculation phase determines the level of each transceiver away from the root transceiver, with each transceiver recording the level of its neighbors. Precedence for each transceiver is established with consideration of each transceiver's tree level and identifier, with tree level being paramount in deciding precedence; and reporting when the levels of the tree are established. A backbone construction phase establishes all transceivers as a dominator or a dominatee, with the dominators forming the network backbone and the dominatees all being neighbors to a dominator. Within the network each transceiver only needs to know the information of its neighboring transceivers.
    • 在无线自组织网络中有效地创建消息有效的虚拟骨干网的计算机可读介质上的算法利用三个阶段来在无线自组织网络的独立收发机之间建立有效的网络。 在彼此的传输范围内的独立收发机是邻居。 领导选举和树建设阶段构建了一个相邻收发器的树,一个收发器被指定为根,并且每个收发器建立并记录其在树结构中的位置及其邻居的标识符; 并报告树何时建立。 电平计算阶段确定每个收发器远离根收发器的电平,每个收发器记录其相邻电平。 考虑每个收发器的树级和标识符建立每个收发器的优先级,树级别在决定优先级中至关重要; 并报告何时建立树的级别。 骨干建设阶段将所有收发器建立为统治者或统治者,统治者组成网络骨干,统治者都是统治者的邻居。 在网络内,每个收发器只需要知道其相邻收发器的信息。
    • 85. 发明授权
    • Method and system for tracking a mobile user
    • 跟踪移动用户的方法和系统
    • US09338759B2
    • 2016-05-10
    • US14051089
    • 2013-10-10
    • Abdur ChowdhuryChris CarellaBen CherryOphir FriederEric JensenTyler HowarthMatt Sanford
    • Abdur ChowdhuryChris CarellaBen CherryOphir FriederEric JensenTyler HowarthMatt Sanford
    • H04W4/02H04W64/00
    • H04W64/00G01S5/0263G01S19/34H04W4/021
    • A method, system, and/or apparatus for automatically tracking a mobile user using the user's mobile device. This invention is particularly useful in the field of social media, such as for detecting and tracking the location and activity of a user and her community. The method or implementing software application uses or relies upon location information available on the mobile device from any source, such as cell phone usage and/or other device applications. The method provides a tracking functionality that uses less battery power than a GPS system. The method includes a location module configured to receive location transmissions, places the location module into a sleep mode when possible, awakens the location module upon receipt of a location transmission, and determines a location with the location module and the location transmission. These steps are desirably repeated to continually and automatically track the mobile user. The location transmission can be provided by WiFi triangulation and/or a cellular phone system upon crossing a boundary between antennae cells and/or a boundary between a plurality of established and contiguous geofences.
    • 一种用于使用用户的移动设备自动跟踪移动用户的方法,系统和/或装置。 本发明在社交媒体领域特别有用,例如用于检测和跟踪用户及其社区的位置和活动。 该方法或实施软件应用程序使用或依赖于移动设备上可用于来自诸如手机使用和/或其他设备应用的任何来源的位置信息。 该方法提供的跟踪功能比GPS系统使用更少的电池电量。 该方法包括配置为接收位置传输的定位模块,在可能时将位置模块置于睡眠模式中,在接收到位置传输时唤醒位置模块,并且利用定位模块和位置传输来确定位置。 期望重复这些步骤以连续和自动地跟踪移动用户。 位置传输可以通过WiFi三角测量和/或蜂窝电话系统在穿过天线单元之间的边界和/或多个建立和连续的地理围栅之间的边界时提供。
    • 89. 发明授权
    • Automated forensic document signatures
    • 自动取证文件签名
    • US08280905B2
    • 2012-10-02
    • US11963186
    • 2007-12-21
    • Thomas Clay ShieldsOphir FriederMarcus A. Maloof
    • Thomas Clay ShieldsOphir FriederMarcus A. Maloof
    • G06F7/00G06F17/30
    • H04L63/1425G06F21/55
    • Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital signatures are generated proactively for a specified target. The digital signature represents a digest of the content of the target, and can be readily stored. Searching and comparing digital signatures allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allow more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.
    • 提供方法和系统用于计算机取证调查的主动方法。 本发明允许组织预期法医分析的需要提前准备。 为指定的目标主动生成数字签名。 数字签名表示目标内容的摘要,并且可以容易地存储。 搜索和比较数字签名可以快速准确地识别具有相同或相似内容的目标。 提前计算和存储成本,这样可以进行更有效的计算机取证调查。 本发明可应用于计算机取证证据采集,误用检测,网络入侵检测,未经授权的网络流量检测与预防等众多应用。