会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • PROXIMITY TAG
    • 临近标签
    • WO2013023091A2
    • 2013-02-14
    • PCT/US2012050195
    • 2012-08-09
    • ACCO BRANDS CORPCAVACUITI JOHNFENNIG KELLYGUTIERREZ GERALD
    • CAVACUITI JOHNFENNIG KELLYGUTIERREZ GERALD
    • G08B21/24H04B7/24
    • H04W12/02G08B13/1427G08B21/0213H04L63/0853H04M1/04H04M1/67H04M1/7253H04M1/72575H04W4/20H04W12/06
    • A system and method for securing a portable consumer device is disclosed. One embodiment of the present invention may be directed to a security system comprising a first wireless apparatus for use with a mobile communication device and a second wireless apparatus configured to removably and electrically couple to the mobile communication device. The second wireless apparatus comprising a second processor, a mobile communication device interface element, and a second computer readable medium coupled to the second processor and comprising code executable by the second processor to implement a method comprising determining whether the second wireless apparatus is within a particular distance from the first wireless apparatus, and locking the mobile communication device from use if the second wireless apparatus is not within the particular distance from the first wireless apparatus. Some embodiments may lock the mobile communication device from use if a tamper switch has been triggered.
    • 公开了一种用于固定便携式消费设备的系统和方法。 本发明的一个实施例可以涉及一种安全系统,其包括用于与移动通信设备一起使用的第一无线设备和被配置为可移除地和电耦合到移动通信设备的第二无线设备。 第二无线设备包括第二处理器,移动通信设备接口元件和耦合到第二处理器的第二计算机可读介质,并且包括可由第二处理器执行的代码,以实现一种方法,包括确定第二无线设备是否在特定的 距离第一无线设备的距离,并且如果第二无线设备不在距离第一无线设备的特定距离内,则锁定移动通信设备不被使用。 如果已经触发了篡改开关,一些实施例可以将移动通信设备锁定使用。
    • 6. 发明专利
    • PROXIMITY TAG
    • CA2843482A1
    • 2013-02-14
    • CA2843482
    • 2012-08-09
    • ACCO BRANDS CORP
    • CAVACUITI JOHNFENNIG KELLYGUTIERREZ GERALD
    • G08B21/24H04B7/24
    • A system and method for securing a portable consumer device is disclosed. One embodiment of the present invention may be directed to a security system comprising a first wireless apparatus for use with a mobile communication device and a second wireless apparatus configured to removably and electrically couple to the mobile communication device. The second wireless apparatus comprising a second processor, a mobile communication device interface element, and a second computer readable medium coupled to the second processor and comprising code executable by the second processor to implement a method comprising determining whether the second wireless apparatus is within a particular distance from the first wireless apparatus, and locking the mobile communication device from use if the second wireless apparatus is not within the particular distance from the first wireless apparatus. Some embodiments may lock the mobile communication device from use if a tamper switch has been triggered.