会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • WIRELESS DEVICE SERVICE ACTIVATION FROM THE WIRELESS DEVICE
    • 无线设备的无线设备服务激活
    • WO2006019599A3
    • 2008-01-03
    • PCT/US2005024142
    • 2005-07-07
    • CINGULAR WIRELESS II LLCWHITE CHRISTOPHERCANNON JAMES L
    • WHITE CHRISTOPHERCANNON JAMES L
    • H04M3/00H04W8/26
    • H04M3/382H04M2207/18H04W8/265
    • A method and system for facilitating activation of a mobile device by an end user, where the end user may initiate the activation from the mobile device. Prior to activation, the mobile device is configured with a permanent identifier that is known by a select network service provider. The inactive mobile device sends a request for access that is ultimately received at a system of the service provider. The request includes the permanent identifier. Based on the permanent identifier, if the service provider recognizes the mobile device as having an inactive status, it provides the mobile device with access to an activation component portion of the system. Once the mobile device has access to the activation component, the end user of the mobile device can provide the activation component with activation information so that the mobile device can be activated and have increased access to the system.
    • 一种用于促使终端用户激活移动设备的方法和系统,其中最终用户可以从移动设备启动激活。 在激活之前,移动设备配置有由选择网络服务提供商已知的永久标识符。 非活动移动设备发送最终在服务提供商的系统处接收到的访问请求。 该请求包括永久标识符。 基于永久标识符,如果服务提供商将移动设备识别为具有非活动状态,则其向移动设备提供对系统的激活组件部分的访问。 一旦移动设备能够访问激活组件,则移动设备的最终用户可以向激活组件提供激活信息,使得移动设备可以被激活并且增加对系统的访问。
    • 9. 发明专利
    • Secure transmission of audio signals
    • GB2388279A
    • 2003-11-05
    • GB0313658
    • 2003-06-12
    • COURTNEY PETERWHITE CHRISTOPHER
    • COURTNEY PETERWHITE CHRISTOPHERBAKER ANDREW JOHN
    • H04K1/00H04L1/00H04L12/56H04L29/06H04M1/60H04W12/02H04W84/18H04W88/18
    • In a headset 14 audio speech signals are picked up by the microphone 25, where they are digitally sampled before being encoded by a vocoder 26. The coded speech data is then provided to a CRC module 27, where error correction data is added before the resulting data is encrypted by an encryption module 22. The resulting encrypted data is transmitted using a Bluetooth radio interface 24, by which the headset is connected wirelessly to a mobile telephone (Figure 1). Received data is decrypted by a decryption module 23, error corrected by an error correction module 28 and decoded by a decoder 29, with the resulting audio signals then being reproduced at a speaker 30. When a user wants to instigate a telephone call with another telephone, the headset 14 is caused to send a control signal to the mobile telephone instructing it to enter a data mode. A data call is then set up and, once established, the CPU 20 controls the setting up of a 128 bit encryption key which is subsequently used for communications between the headset 14 and a corresponding device associated with the recipient of the call. Encryption and decryption are performed only at the headset 14. This provides increased security since even if the call can be intercepted, the interceptor will need to decrypt the signals before being able to reproduce the audio signals. The encryption key comprises a session key which may be periodically changed by selection of a new key from a catalogue of keys and transmitting the new session key to the recipient in encrypted form.
    • 10. 发明申请
    • ACCESSING NETWORK TRAFFIC DATA AT MULTIPLE TIME SCALES AND LEVELS OF DETAIL
    • 在多个时间尺度和细节级别访问网络流量数据
    • WO2012122435A3
    • 2013-05-16
    • PCT/US2012028382
    • 2012-03-08
    • RIVERBED TECHNOLOGY INCDEGIOANNI LORISMCCANNE STEVENWHITE CHRISTOPHERVLACHOS DIMITRI
    • DEGIOANNI LORISMCCANNE STEVENWHITE CHRISTOPHERVLACHOS DIMITRI
    • G06F15/16G16H10/60
    • H04L43/022H04L43/026H04L43/04H04L43/10H04L43/12H04L63/30H04L67/1097Y02D50/30
    • Network traffic information from multiple sources, at multiple time scales, and at multiple levels of detail are integrated to more easily identify relevant network information. The network monitoring system stores and manipulates low-level and higher-level network traffic data separately to enable efficient data collection and storage. Packet traffic data is collected, stored, and analyzed at multiple locations. The network monitoring locations communicate summary and aggregate data to central modules, which combine this data to provide an end-to-end description of network traffic at coarser time scales. The network monitoring system enables users to zoom in on high-level, coarse time scale network performance data to one or more lower levels of network performance data at finer time scales. When high-level network performance data of interest is selected, corresponding low-level network performance data is retrieved from the appropriate distributed network monitoring locations to provide additional detailed information.
    • 来自多个源,多个时间尺度和多个细节级别的网络流量信息被集成以更容易地识别相关的网络信息。 网络监控系统分别存储和操纵低级别和更高级别的网络流量数据,以实现有效的数据收集和存储。 在多个位置收集,存储和分析数据包流量数据。 网络监控位置将汇总和汇总数据传送到中央模块,将这些数据组合在一起,以更粗糙的时间尺度提供端到端的网络流量描述。 网络监控系统使用户能够在更精细的时间尺度上将高级,粗糙的时间尺度网络性能数据放大到一个或多个较低级别的网络性能数据。 当选择感兴趣的高级网络性能数据时,从适当的分布式网络监控位置检索相应的低级网络性能数据,以提供额外的详细信息。