会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 141. 发明申请
    • WIRELESS COMMUNICATION DEVICE MANAGEMENT
    • 无线通信设备管理
    • US20110136469A1
    • 2011-06-09
    • US12795306
    • 2010-06-07
    • Spencer A. RathusJohn W. Olivo, JR.
    • Spencer A. RathusJohn W. Olivo, JR.
    • H04M3/16
    • H04B1/082H04W8/005H04W48/04
    • A method and system that limits the use of a communication device present in an area controlled by an intelligent controller. The intelligent controller detects any present communication devices in the area and conducts an inventory providing information about each detected device. The intelligent controller compares that information to a standard of use data, which specifies the conditions need to be present for allowing the usage of a communication device. If such conditions are not met, the intelligent controller sends commands to the communication device to restrict its functionality. Else if, the intelligent controller is incapable of restricting the communication device, it can notify authorities of unauthorized usage of a communication device in the restricted area.
    • 限制由智能控制器控制的区域中存在的通信设备的使用的方法和系统。 智能控制器检测该区域中的任何当前通信设备,并进行有关每个检测到的设备的清单提供信息。 智能控制器将该信息与使用数据标准进行比较,该标准规定了允许使用通信设备所需要的条件。 如果不符合这些条件,智能控制器向通信设备发送命令以限制其功能。 否则,如果智能控制器不能限制通信设备,则可以在限制区域通知当局未经授权使用通信设备。
    • 143. 发明申请
    • NETWORK ACCESS CONTROL
    • 网络访问控制
    • US20110086612A1
    • 2011-04-14
    • US12576728
    • 2009-10-09
    • Mark MontzMichael Kelly
    • Mark MontzMichael Kelly
    • H04M3/16G06F15/16H04M1/00
    • H04M3/382H04L63/083H04M2207/18H04W12/06
    • According to one embodiment of the present invention, there is provided a method of authorizing a communication device to connect to a network. The method comprises receiving, at a processor, a communication device identifier and a subscriber identifier, determining, by the processor, whether the received communication device identifier is associated with the received subscriber identifier in a data store. Where it is determined that the received identifiers are not so associated the method further comprise requesting, by the processor, a security token associated with the communication device, receiving, at the processor, a security token, determining, by the processor, whether the received security token matches a stored security token associated with the received communication device identifier in the data store, and where it is so determined, authorizing the communication device to connect to the network.
    • 根据本发明的一个实施例,提供了一种授权通信设备连接到网络的方法。 该方法包括在处理器处接收通信设备标识符和订户标识符,由处理器确定所接收的通信设备标识符是否与数据存储器中接收到的订户标识符相关联。 在确定所接收的标识符不是如此关联的情况下,该方法还包括由处理器请求与通信设备相关联的安全令牌,在处理器处接收安全令牌,由处理器确定接收到的标识符 安全令牌匹配与数据存储器中接收到的通信设备标识符相关联的存储的安全令牌,并且如此确定,授权通信设备连接到网络。
    • 147. 发明授权
    • Method for managing an executable code downloaded in a reprogrammable on-board system
    • 用于管理在可重新编程的车载系统中下载的可执行代码的方法
    • US07840814B2
    • 2010-11-23
    • US10553348
    • 2004-04-02
    • Alexandre BenoitLudovic Rousseau
    • Alexandre BenoitLudovic Rousseau
    • H04L9/32H04L9/00G06F11/30G06F15/16H04M3/16G06F9/45G06F15/76G07F7/10G07F7/12G06K19/06
    • G07F7/1008G06Q20/3552
    • A method for managing an original executable code downloaded into a reprogrammable computer on-board system such as a microprocessor card. The code includes a cryptographic signature and is executable by the microprocessor once the validity of the signature has been checked. Off the card, a modified executable code corresponding to the original code and adapted to a pre-defined specific use is identified. A software component is calculated, which when applied to the original code, enables the modified code to be reconstructed. The software component is signed, and the signed original code and the signed software component are downloaded into the card. On the card, the signature of the original code and the software component are checked, and the software component is applied to the original code in order to reconstruct the modified code for the execution of the same by the microprocessor.
    • 一种用于管理下载到诸如微处理器卡的可再编程计算机板载系统中的原始可执行代码的方法。 该代码包括加密签名,并且一旦已经检查了签名的有效性,就可以由微处理器执行。 关闭卡,识别与原始代码对应并适应于预定义的特定用途的经修改的可执行代码。 计算软件组件,当应用于原始代码时,可以重建修改后的代码。 软件组件已经签名,并将签名的原始代码和签名的软件组件下载到卡中。 在卡上,检查原始代码和软件组件的签名,并将软件组件应用于原始代码,以便重建用于由微处理器执行该代码的修改代码。