会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明申请
    • METHOD FOR EXCHANGING STRONG ENCRYPTION KEYS BETWEEN DEVICES USING ALTERNATE INPUT METHODS IN WIRELESS PERSONAL AREA NETWORKS (WPAN)
    • 在无线个人网络(WPAN)中使用替代输入方法的设备之间交换强加密密钥的方法
    • US20140310525A1
    • 2014-10-16
    • US14156686
    • 2014-01-16
    • Tobias M. KohlenbergSelim Aissi
    • Tobias M. KohlenbergSelim Aissi
    • H04L29/06
    • H04L63/061H04L9/0838H04L63/08H04L63/18H04L2209/80H04W12/04
    • A method for exchanging strong encryption keys between devices using alternate input methods. At least two devices that want to communicate with one another are set in key exchange mode. The at least two devices are to communicate with one another using a short range radio or personal area network. The at least two devices negotiate with one another to determine which of the at least two devices will generate an encryption key, wherein device A represents the negotiated device and device B represents the non-negotiated device. Device A generates the encryption key and transmits the encryption key to device B using an out-of band transmission channel. The out-of-band transmission channel may be transmitting the encryption key via audio tones. A validation process determines whether the transmission of the encryption key via the out-of-band transmission channel was successful. If the encryption key has been successfully validated, the at least two devices are enabled to automatically accept communications between them over the short range radio or personal area network.
    • 一种使用替代输入法在设备之间交换强加密密钥的方法。 在密钥交换模式下设置至少两个想要彼此通信的设备。 至少两个设备将使用短距离无线电或个人区域网络彼此通信。 所述至少两个设备彼此协商以确定所述至少两个设备中的哪一个将生成加密密钥,其中设备A表示协商的设备,设备B表示未协商的设备。 设备A生成加密密钥,并使用带外传输通道将加密密钥发送到设备B. 带外传输信道可以经由音频音调发送加密密钥。 验证过程确定经由带外传输信道的加密密钥的传输是否成功。 如果加密密钥已被成功验证,则至少两个设备能够通过短距离无线电或个人区域网络自动接受它们之间的通信。
    • 6. 发明申请
    • METHODS AND APPARATUS TO AUTOMATE HAGGLING BEFORE PHYSICAL POINT-OF-SALE COMMERCE
    • 在物理销售点之前自动化的方法和装置
    • US20130297424A1
    • 2013-11-07
    • US13996648
    • 2011-08-19
    • Jim S. BacaSelim AissiMark H. PriceDavid StanasolovichBurges M. Karkaria
    • Jim S. BacaSelim AissiMark H. PriceDavid StanasolovichBurges M. Karkaria
    • G06Q30/06
    • G06Q30/0611G06Q30/06
    • In one example embodiment of a method for automating business negotiations, a vendor offers a product for sale at an original price. Subsequently, an automated haggling system receives a counteroffer to buy the product from a mobile device controlled by a shopper. The counteroffer proposes a second price for the product. In response to the counteroffer, the automated haggling system automatically determines whether the second price is acceptable. This determination may be based on data from a negotiation database with data identifying acceptable reduced prices. If the counteroffer proposes an acceptable price, the automated haggling system sends a message to the mobile device of the shopper to signify acceptance the counteroffer. In response to a determination that the shopper is purchasing the product at a point-of-sale (POS) station, the POS station automatically charges the shopper the negotiated price tier the product. Other embodiments are described and claimed.
    • 在用于自动商业谈判的方法的一个示例实施例中,供应商以原始价格提供要出售的产品。 随后,自动化系统收到从购物者控制的移动设备购买产品的代理商。 该产品为该产品提出了第二个价格。 响应于反补贴,自动交易系统自动确定第二个价格是否可以接受。 该确定可以基于来自具有识别可接受的降低价格的数据的协商数据库的数据。 如果反驳提出了可接受的价格,则自动交易系统向购物者的移动设备发送消息来表示验收。 为了响应购物者在销售点(POS)站购买产品的确定,POS站自动向购物者收取协商价格层的产品。 描述和要求保护其他实施例。
    • 8. 发明授权
    • Device, system, and method for processor-based data protection
    • 用于基于处理器的数据保护的设备,系统和方法
    • US09569633B2
    • 2017-02-14
    • US13538142
    • 2012-06-29
    • Gyan PrakashJason M. FungCris RhodesSelim Aissi
    • Gyan PrakashJason M. FungCris RhodesSelim Aissi
    • G06F21/72G06F21/78G06F21/62
    • H04L63/0435G06F21/6218G06F21/72G06F21/78H04L63/061H04L2209/127
    • A device, system, and method for providing processor-based data protection on a mobile computing device includes accessing data stored in memory with a central processing unit of the mobile computing device and determining that the accessed data is encrypted data based on a data included in one or more control registers of the central processing unit. If the data is determined to be encrypted data, the central processing unit is to decrypt the encrypted data using a cryptographic key stored in the central processing unit. The encrypted data may also be stored on a drive of the mobile computing device. The encryption state of the data stored on the drive is maintained in a drive encryption table, which is used to update a memory page tables and the one or more control registers.
    • 一种用于在移动计算设备上提供基于处理器的数据保护的设备,系统和方法包括:利用所述移动计算设备的中央处理单元访问存储在存储器中的数据,并且基于所包含的数据确定所访问的数据是加密数据 中央处理单元的一个或多个控制寄存器。 如果数据被确定为加密数据,则中央处理单元使用存储在中央处理单元中的加密密钥来解密加密数据。 加密数据也可以存储在移动计算设备的驱动器上。 存储在驱动器上的数据的加密状态保存在用于更新存储器页表和一个或多个控制寄存器的驱动器加密表中。