会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Supplementary services using secure media
    • 使用安全媒体的补充服务
    • US20080146192A1
    • 2008-06-19
    • US11545224
    • 2006-10-10
    • Parameswaran KumarasamySoumya KalahastiPrasad MiriyalaSandeep Singh Kohli
    • Parameswaran KumarasamySoumya KalahastiPrasad MiriyalaSandeep Singh Kohli
    • H04M1/66
    • H04L63/06H04M3/42
    • In one particular embodiment, the secure media includes information sent using secure real-time transfer protocol (sRTP). Supplementary services may include call transfers, forwards/redirects, call hold with music on hold (MOH), call hold with no MoH, call resume, call park, call pickup, call blast etc. In a call flow, a call request may be received from a first device for a second device. The call request may include at least one set of keys and be ready for establishment of an sRTP call. It is then determined that a supplementary service is needed for the call request. For example, a supplementary service may indicate that a call redirect to a third device is required. The gateway then facilitates a supplementary service call with the third device. This is facilitated without contacting the first device to generate a second key after receiving the initial call request.
    • 在一个特定实施例中,安全媒体包括使用安全实时传输协议(sRTP)发送的信息。 补充服务可能包括呼叫转移,转发/重定向,保持音乐的呼叫保持(MOH),无呼叫保持呼叫,呼叫恢复,呼叫暂停,呼叫接听,呼叫呼叫等。在呼叫流程中,呼叫请求可以是 从第一设备接收用于第二设备。 呼叫请求可以包括至少一组密钥并且准备好建立sRTP呼叫。 然后确定呼叫请求需要补充业务。 例如,补充服务可以指示需要向第三设备的呼叫重定向。 网关然后便利与第三设备的补充业务呼叫。 在接收到初始呼叫请求之后,不需要联系第一设备来产生第二密钥便是便利的。
    • 2. 发明授权
    • Supplementary services using secure media
    • 使用安全媒体的补充服务
    • US07756116B2
    • 2010-07-13
    • US11545224
    • 2006-10-10
    • Parameswaran KumarasamySoumya KalahastiPrasad MiriyalaSandeep Singh Kohli
    • Parameswaran KumarasamySoumya KalahastiPrasad MiriyalaSandeep Singh Kohli
    • H04L12/66
    • H04L63/06H04M3/42
    • In one particular embodiment, the secure media includes information sent using secure real-time transfer protocol (sRTP). Supplementary services may include call transfers, forwards/redirects, call hold with music on hold (MOH), call hold with no MoH, call resume, call park, call pickup, call blast etc. In a call flow, a call request may be received from a first device for a second device. The call request may include at least one set of keys and be ready for establishment of an sRTP call. It is then determined that a supplementary service is needed for the call request. For example, a supplementary service may indicate that a call redirect to a third device is required. The gateway then facilitates a supplementary service call with the third device. This is facilitated without contacting the first device to generate a second key after receiving the initial call request.
    • 在一个特定实施例中,安全媒体包括使用安全实时传输协议(sRTP)发送的信息。 补充服务可能包括呼叫转移,转发/重定向,保持音乐的呼叫保持(MOH),无呼叫保持呼叫,呼叫恢复,呼叫暂停,呼叫接听,呼叫呼叫等。在呼叫流程中,呼叫请求可以是 从第一设备接收用于第二设备。 呼叫请求可以包括至少一组密钥并且准备好建立sRTP呼叫。 然后确定呼叫请求需要补充业务。 例如,补充服务可以指示需要向第三设备的呼叫重定向。 网关然后便利与第三设备的补充业务呼叫。 在接收到初始呼叫请求之后,不需要联系第一设备来产生第二密钥便是便利的。
    • 10. 发明授权
    • Detecting theft and disabling stolen equipment
    • 检测盗窃和禁用被盗设备
    • US07786861B2
    • 2010-08-31
    • US11699898
    • 2007-01-29
    • Arthur G. HowarthRoland SavillePrasad MiriyalaChandrodaya Prasad
    • Arthur G. HowarthRoland SavillePrasad MiriyalaChandrodaya Prasad
    • G08B13/14
    • G06F21/88
    • Some implementations of the present invention provide methods and devices for detecting the theft of, and disabling, electronic devices such as computers and network devices. The devices may be disabled when a signal is not detected, e.g., for a predetermined period of time. For example, a radio frequency (“RF”) signal (e.g., a beacon), an Internet Protocol (“IP”) signal or the like may define a space within which the devices may be operated with complete functionality. Outside this space, the devices will be disabled, at least to some degree. The degree of disablement may depend on the length of time since the signal was last detected. Alternatively, the devices may be disabled when a signal is detected: some such implementations define “portals,” “choke points” or the like past which a device may not be transported without some degree of disablement.
    • 本发明的一些实施方案提供了用于检测诸如计算机和网络设备的电子设备的盗窃和禁用的方法和设备。 当未检测到信号时,例如在预定时间段内,可以禁用装置。 例如,射频(“RF”)信号(例如,信标),因特网协议(“IP”)信号等可以定义可以以完整功能操作设备的空间。 在这个空间之外,设备将被禁用,至少在某种程度上。 禁用程度可能取决于上次检测信号后的时间长短。 或者,当检测到信号时,可以禁用设备:一些这样的实现定义了通过哪个设备可能不被传输而没有一定程度的禁用的“门槛”,“阻塞点”等。