会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Pierced earring
    • 穿孔耳环
    • US06260382B1
    • 2001-07-17
    • US09355418
    • 1999-09-17
    • Hidetoshi Ishikawa
    • Hidetoshi Ishikawa
    • A44C700
    • A44C7/001A44C7/00
    • A pierced earring having an earring body with an open space between a top end and another end. The top end is elongated to serve as a pin, which is inserted into a hole in the pierced earlobe. The earring body has the pin in a U-shape design for ornamental purposes, while a shaft base is provided on the bottom end. A clasp is held by a shaft in this shaft base and the tip of the clasp is slipped on the U-shape pin to keep it from falling off. Since this pierced earring makes it impossible for the clasp to be opened easily from the pin of the earring body, it provides a pierced earring which, once it is fixed to the earlobe, will be certain to never slip off the hole in the pierced earlobe. Also, a pierced earring is provided in which the clasp can be easily fixed to or released from the earring body.
    • 耳环具有在顶端和另一端之间具有开放空间的耳环体。 顶端是细长的,用作销钉,插入穿孔的耳垂孔中。 耳环体具有用于装饰目的的U形设计的销,而在底端设置有轴底。 在该轴座中由一个轴固定一个扣环,并且该扣环的尖端在U形销上滑动以防脱落。 由于这种刺穿的耳环使得耳环不可能从耳环的针头容易地打开,所以它提供了一个刺穿的耳环,一旦固定在耳垂上,就一定不会从穿孔的耳朵中的孔中滑落 。 此外,提供了一种刺穿的耳环,其中扣环可以容易地固定到耳环体或从耳环体释放。
    • 7. 发明授权
    • Authentication vector generation device, subscriber identity module, mobile communication system, authentication vector generation method, calculation method, and subscriber authentication method
    • 认证向量生成装置,用户识别模块,移动通信系统,认证向量生成方法,计算方法和用户认证方法
    • US08141137B2
    • 2012-03-20
    • US11167108
    • 2005-06-28
    • Hidetoshi Ishikawa
    • Hidetoshi Ishikawa
    • H04L29/06
    • H04W12/06H04L63/0853H04M3/382H04M2207/18H04W12/04
    • Authentication of a subscriber identity module issued by IMT-2000 network operator is performed with no decrease in the confidentiality of calculation processing, even in cases such as when a roaming network is a GSM network. An HLR of an IMT-2000 mobile communication network comprises an algorithm information attachment unit for attaching, to a RAND field of an authentication vector used to authenticate a USIM, information specifying an algorithm to be used in the authentication calculation. The USIM, which is mounted on a mobile equipment, comprises an algorithm storage unit storing in advance a plurality of algorithms for use in the authentication calculation, a specification unit for specifying the algorithm to be used in the calculation from among the plurality of algorithms stored in the algorithm storage unit by referring to the algorithm-specifying information included in received data, and a calculation unit for performing the calculation on the basis of the specified algorithm using the received data.
    • 即使在漫游网络是GSM网络的情况下,也可以不进行IMT-2000网络运营商发行的用户识别模块的认证,而不会降低计算处理的机密性。 IMT-2000移动通信网络的HLR包括用于将用于认证USIM的认证向量的RAND字段附加到用于认证计算中使用的算法的信息的算法信息附加单元。 安装在移动设备上的USIM包括预先存储用于认证计算中的多种算法的算法存储单元,用于从存储的多个算法中指定要用于计算的算法的指定单元 在算法存储单元中通过参考包括在接收数据中的算法指定信息,以及计算单元,用于使用接收到的数据基于指定的算法来执行计算。