会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Magnetic stripe reader having digital peak detector
    • 具有数字峰值检测器的磁条阅读器
    • US07837110B1
    • 2010-11-23
    • US11139415
    • 2005-05-28
    • Mark HessRaymond O. Chock
    • Mark HessRaymond O. Chock
    • G06K7/08
    • G06K7/08G06K7/084
    • A point of sale terminal includes a microcontroller integrated circuit. In one aspect, a regulator within the IC receives power from a supply voltage terminal and/or a battery terminal. If the regulator does not receive adequate power from either terminal, then energy stored on-chip in a capacitor is used to erase secure memory. In another aspect, pulses of current are made to pulse through conductors of a conductive mesh. A tamper condition is detected if an improper voltage is detected on the IC terminal through which the pulse is conducted. In another aspect, each vendor signs his/her firmware with his own vendor ID. A bootloader uses the vendor ID to lookup a public key that is then used to verify a private key supplied by the firmware to be executed. In another aspect, a magnetic card reader includes a digital peak detector circuit involving programmable positive and negative thresholds.
    • 销售点终端包括微控制器集成电路。 在一个方面,IC内的调节器从电源电压端子和/或电池端子接收电力。 如果调节器没有从任一端子接收到足够的电力,则使用存储在电容器中的片上电能来擦除安全存储器。 在另一方面,电流脉冲通过导电网的导体脉冲。 如果在通过其进行脉冲的IC端子上检测到不正确的电压,则检测到篡改状况。 另一方面,每个供应商都使用自己的供应商ID来签署他/她的固件。 引导加载程序使用供应商ID查找公钥,然后用于验证由要执行的固件提供的专用密钥。 在另一方面,磁卡阅读器包括涉及可编程正和负阈值的数字峰值检测器电路。
    • 5. 发明授权
    • Performing optical recognition on a picture of a remote to identify an associated codeset
    • 对遥控器的图片执行光学识别,以识别相关的代码集
    • US08094875B1
    • 2012-01-10
    • US12148475
    • 2008-04-18
    • Steven M. PopeRaymond O. ChockNorman G. Sheridan
    • Steven M. PopeRaymond O. ChockNorman G. Sheridan
    • G06K9/00H04H20/71H04B1/02H04B1/06
    • H04B1/202
    • A home entertainment device eliminates the need to use multiple remotes. The device is connected (by wired and/or wireless links) to electronic consumer devices (ECDs) to be controlled. A user uses a portable display device to view pages served by the device, and thereby to communicate with the device and indirectly control the ECDs. In a first aspect, a HDMI-CEC communication is used to identify a codeset from a codeset database. In a second aspect, the codeset of a remote is identified by serving pictures of remotes to the user. The user selects a picture and the system looks up its codeset. In a third aspect, keys on an illustration of a remote are dragged and dropped to create a new custom remote. In a fourth aspect, the user supplies a digital photograph of a remote. The system performs optical recognition and identifies the type of remote and its codeset.
    • 家庭娱乐设备消除了使用多个遥控器的需要。 设备通过有线和/或无线链路连接到要控制的电子消费设备(ECD)。 用户使用便携式显示设备来查看由设备服务的页面,从而与设备通信并间接地控制ECD。 在第一方面,HDMI-CEC通信用于从代码集数据库中识别代码集。 在第二方面,通过向用户提供遥控器的图片来识别远程的代码集。 用户选择图片,系统查找其代码集。 在第三方面,遥控器的图示上的按键被拖放以创建新的定制遥控器。 在第四方面,用户提供遥控器的数字照片。 系统执行光学识别并识别远程及其代码集的类型。
    • 6. 发明授权
    • Communicating codeset information as part of a native application
    • 将代码集信息作为本机应用程序的一部分进行通信
    • US08260283B2
    • 2012-09-04
    • US12283947
    • 2008-09-16
    • Steven M. PopeRaymond O. Chock
    • Steven M. PopeRaymond O. Chock
    • H04M3/00
    • H04M1/72575G06Q30/06G06Q30/0601G08C19/28G08C2201/21G08C2201/93
    • A native application includes codeset information. The native application, if loaded into a cellular telephone, allows the cellular telephone and a novel associated Operational Signal Generating Device (OSGD) to be usable as a remote control device. An on-line media store provides the native application for purchase and download. A user uses the cellular telephone to download the native application into the cellular telephone. The codeset information is transferred into the OSGD. The OSGD has a mechanism for using codeset information to generate IR operational signals of the type used to control electronic consumer devices. Execution of the native application causes a keypad to appear on the cellular telephone display. If the user presses a key of the keypad, the cellular telephone detects the key press and sends a communication to the OSGD which causes the OSGD to use the codeset information to generate and transmit an appropriate IR operational signal.
    • 本地应用程序包括代码集信息。 本地应用程序(如果加载到蜂窝电话中)允许蜂窝电话和新颖的相关联的操作信号发生设备(OSGD)可用作遥控设备。 在线媒体商店提供购买和下载的本机应用程序。 用户使用蜂窝电话将本地应用下载到蜂窝电话中。 代码集信息被传送到OSGD中。 OSGD具有使用代码集信息来产生用于控制电子消费者设备的类型的IR操作信号的机制。 本地应用程序的执行导致键盘出现在蜂窝电话显示器上。 如果用户按下键盘的键,则蜂窝电话机检测到按键,并向OSGD发送通信,使得OSGD使用代码集信息来产生和发送适当的IR操作信号。
    • 7. 发明授权
    • Secure transaction microcontroller with tamper control circuitry
    • 安全事务微控制器,具有篡改控制电路
    • US07953989B1
    • 2011-05-31
    • US12074326
    • 2008-03-03
    • Peter C. HsiangRaymond O. ChockMark Hess
    • Peter C. HsiangRaymond O. ChockMark Hess
    • G06F11/30
    • G06F21/86G06F21/572G06F21/71G06F2221/2143Y10S257/922
    • A high security microcontroller (such as in a point of sale terminal) includes tamper control circuitry for detecting vulnerability conditions: a write to program memory before the sensitive financial information has been erased, a tamper detect condition, the enabling of a debugger, a power-up condition, an illegal temperature condition, an illegal supply voltage condition, an oscillator fail condition, and a battery removal condition. If the tamper control circuitry detects a vulnerability condition, then the memory where the sensitive financial information could be stored is erased before boot loader operation or debugger operation can be enabled. Upon power-up if a valid image is detected in program memory, then the boot loader is not executed and secure memory is not erased but rather the image is executed. The tamper control circuitry is a hardware state machine that is outside control of user-loaded software and is outside control of the debugger.
    • 高安全性微控制器(例如销售点终端)包括用于检测漏洞状况的篡改控制电路:在敏感财务信息被擦除之前写入程序存储器,篡改检测条件,调试器的使能,电源 在这种情况下,非法的温度条件,非法供电电压条件,振荡器故障条件和电池去除条件。 如果篡改控制电路检测到漏洞状况,则可以启动引导加载程序操作或调试器操作之前可以存储敏感财务信息的存储器。 如果在程序存储器中检测到有效图像,则在上电时,引导加载程序不被执行,并且安全存储器不被擦除,而是执行图像。 篡改控制电路是一种硬件状态机,它不受用户加载软件的控制,并且在调试器的外部控制之外。
    • 8. 发明申请
    • Communicating codeset information as part of a native application
    • 将代码集信息作为本机应用程序的一部分进行通信
    • US20100069056A1
    • 2010-03-18
    • US12283947
    • 2008-09-16
    • Steven M. PopeRaymond O. Chock
    • Steven M. PopeRaymond O. Chock
    • H04M3/00G06Q30/00
    • H04M1/72575G06Q30/06G06Q30/0601G08C19/28G08C2201/21G08C2201/93
    • A native application includes codeset information. The native application, if loaded into a cellular telephone, allows the cellular telephone and a novel associated Operational Signal Generating Device (OSGD) to be usable as a remote control device. An on-line media store provides the native application for purchase and download. A user uses the cellular telephone to download the native application into the cellular telephone. The codeset information is transferred into the OSGD. The OSGD has a mechanism for using codeset information to generate IR operational signals of the type used to control electronic consumer devices. Execution of the native application causes a keypad to appear on the cellular telephone display. If the user presses a key of the keypad, the cellular telephone detects the key press and sends a communication to the OSGD which causes the OSGD to use the codeset information to generate and transmit an appropriate IR operational signal.
    • 本地应用程序包括代码集信息。 本地应用程序(如果加载到蜂窝电话中)允许蜂窝电话和新颖的相关联的操作信号发生设备(OSGD)可用作遥控设备。 在线媒体商店提供购买和下载的本机应用程序。 用户使用蜂窝电话将本地应用下载到蜂窝电话中。 代码集信息被传送到OSGD中。 OSGD具有使用代码集信息来产生用于控制电子消费者设备的类型的IR操作信号的机制。 本地应用程序的执行导致键盘出现在蜂窝电话显示器上。 如果用户按下键盘的键,则蜂窝电话机检测到按键,并向OSGD发送通信,使得OSGD使用代码集信息来产生和发送适当的IR操作信号。
    • 10. 发明授权
    • Secure transaction microcontroller with secure boot loader
    • 安全的启动加载程序的安全事务微控制器
    • US07343496B1
    • 2008-03-11
    • US10918272
    • 2004-08-13
    • Peter C. HsiangRaymond O. ChockMark Hess
    • Peter C. HsiangRaymond O. ChockMark Hess
    • G06F11/30
    • G06F21/86G06F21/572G06F21/71G06F2221/2143Y10S257/922
    • A high security microcontroller (such as in a point of sale terminal) includes tamper control circuitry for detecting vulnerability conditions: a write to program memory before the sensitive financial information has been erased, a tamper detect condition, the enabling of a debugger, a power-up condition, an illegal temperature condition, an illegal supply voltage condition, an oscillator fail condition, and a battery removal condition. If the tamper control circuitry detects a vulnerability condition, then the memory where the sensitive financial information could be stored is erased before boot loader operation or debugger operation can be enabled. Upon power-up if a valid image is detected in program memory, then the boot loader is not executed and secure memory is not erased but rather the image is executed. The tamper control circuitry is a hardware state machine that is outside control of user-loaded software and is outside control of the debugger.
    • 高安全性微控制器(例如销售点终端)包括用于检测漏洞状况的篡改控制电路:在敏感财务信息被擦除之前写入程序存储器,篡改检测条件,调试器的使能,电源 在这种情况下,非法的温度条件,非法供电电压条件,振荡器故障条件和电池去除条件。 如果篡改控制电路检测到漏洞状况,则可以启动引导加载程序操作或调试器操作之前可以存储敏感财务信息的存储器。 如果在程序存储器中检测到有效图像,则在上电时,引导加载程序不被执行,并且安全存储器不被擦除,而是执行图像。 篡改控制电路是一种硬件状态机,它不受用户加载软件的控制,并且在调试器的外部控制之外。