Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 207419. Отображено 100.
05-01-2012 дата публикации

Identification Processing Apparatus and Mobile Device Using the Same

Номер: US20120001725A1
Автор: Chien-Sheng Chen
Принадлежит: MStar Semiconductor Inc Taiwan

An identification processing apparatus is provided for performing an identification procedure according to a smart card, including a storage unit for storing a first password; and an authentication unit for determining whether to perform the identification procedure according to a second password and the first password.

Подробнее
05-01-2012 дата публикации

System and method for providing secure identification solutions

Номер: US20120001726A1
Принадлежит: Neology Inc

The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader.

Подробнее
05-01-2012 дата публикации

Setup and Configuration of Relay Nodes

Номер: US20120002594A1
Принадлежит: Individual

Systems and methods for the configuration of network nodes without a secured connection in a telecommunications system are described herein. These network nodes can be wireless network nodes which are part of the network infrastructure, such as, wireless relays, wireless repeaters and self-back-hauled eNodeBs.

Подробнее
05-01-2012 дата публикации

Multi-service vpn network client for mobile device

Номер: US20120002813A1
Принадлежит: Juniper Networks Inc

An integrated, multi-service network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network devices to provide integrated services including secure enterprise virtual private network (VPN) connectivity, acceleration, security management including monitored and enforced endpoint compliance, and collaboration services. Once installed on the cellular mobile device, the multi-service client integrates with an operating system of the device to provide a single entry point for user authentication for secure enterprise connectivity, endpoint security services including endpoint compliance with respect to anti-virus and spyware software, and comprehensive integrity checks. That is, the multi-service client provides a common user interface to the integrated services, and provides a VPN handler that interfaces with the operating system to provide an entry point for network traffic to which the integrated services can be seamlessly applied.

Подробнее
27-09-2011 дата публикации

СИСТЕМА ДЛЯ ОБЕСПЕЧЕНИЯ ОБЩЕЙ БЕЗОПАСНОСТИ МОБИЛЬНЫХ УСТРОЙСТВ

Номер: RU0000108896U1

1. Система безопасности мобильных устройств, которая включает: модуль безопасности, связанный с модулем конфигурирования, при этом модуль безопасности предназначен для выполнения задач безопасности на мобильном устройстве и передачи информации, связанной с задачами безопасности, на другие мобильные устройства; упомянутый модуль конфигурирования предназначен для настройки модуля безопасности в зависимости от данных, полученных от связанных с модулем конфигурирования модуля подсчета рисков и модуля подсчета вычислительных ресурсов; упомянутый модуль подсчета рисков предназначен для определения рисков, связанных с безопасностью мобильного устройства; упомянутый модуль подсчета вычислительных ресурсов предназначен для определения используемых аппаратных ресурсов мобильного устройства. 2. Система по п.1, в которой задачами безопасности являются: а) предотвращение попадания нежелательной информации на мобильное устройство; б) обнаружение и удаление нежелательной информации на мобильном устройстве; в) предотвращение угроз. 3. Система по п.1, в которой в состав модуля безопасности входят: а) сетевой экран; б) фильтр сообщений; в) антивирус; г) модуль восстановления; д) модуль предотвращения вторжений. 4. Система по п.1, в которой в состав модуля безопасности входят: а) модуль соединения с сервером безопасности, предназначенный для передачи данных для исполнения задач безопасности на удаленном компьютере; б) модуль групповой безопасности, предназначенный для определения уровня безопасности в составе группы; в) модуль координации групповых задач, предназначенный для выбора и определения задач безопасности для выполнения на мобильных устройствах. 5. Система по п.3, в которой группой считается набор мобильных устройств, объединенных в смешанную сеть и имеющих возможность безопасной передачи данных между собой. 6. Система по п.1, в которой модуль подсчета рисков содержит: а) модуль отслеживания поведения пользователя, предназначенный для определения соответствия поведения ...

Подробнее
20-06-2012 дата публикации

СЕРВЕР ЦЕНТРАЛИЗОВАННОГО ХРАНЕНИЯ И ОБРАБОТКИ РАЗНОРОДНЫХ ДАННЫХ С ОБЕСПЕЧЕНИЕМ ИДЕНТИФИКАЦИИ И АУТЕНТИФИКАЦИИ ПОЛЬЗОВАТЕЛЕЙ ПО БИОМЕТРИЧЕСКИМ ПАРАМЕТРАМ

Номер: RU0000117243U1

1. Сервер централизованного хранения и обработки разнородных данных с обеспечением идентификации и аутентификации пользователей по биометрическим параметрам, содержащий высокопроизводительный сервер с установленным на нем web-сервером и системой управления базами данных, источник бесперебойного питания, соединенный по выходу с высокопроизводительным сервером, а по входу с сетью первичного электропитания - 220 В, 50 Гц, отличающийся тем, что он дополнительно содержит последовательно соединенные маршрутизатор и аппаратно-программный комплекс шифрования, причем первый вход-выход маршрутизатора соединен с первым выходом-входом высокопроизводительного сервера, а второй выход-вход аппаратно-программного комплекса шифрования с глобальной или выделенной IP-сетью, а входы электропитания маршрутизатора и аппаратно-программного комплекса шифрования с выходами источника бесперебойного питания. 2. Сервер по п.1, отличающийся тем, что он использует в качестве механизма авторизации биометрические методы идентификации и аутентификации. 3. Сервер по п.1, отличающийся тем, что он обеспечивает возможность удаленной идентификации и аутентификации пользователей по биометрическим параметрам и последующий обмен данными с авторизованными пользователями из глобальной сети или специализированной выделенной IP-сети. РОССИЙСКАЯ ФЕДЕРАЦИЯ (19) RU (11) (13) 117 243 U1 (51) МПК H04W 12/00 (2009.01) G06F 1/18 (2006.01) G06F 1/32 (2006.01) ФЕДЕРАЛЬНАЯ СЛУЖБА ПО ИНТЕЛЛЕКТУАЛЬНОЙ СОБСТВЕННОСТИ (12) ОПИСАНИЕ (21)(22) Заявка: ПОЛЕЗНОЙ МОДЕЛИ К ПАТЕНТУ 2012109033/08, 11.03.2012 (24) Дата начала отсчета срока действия патента: 11.03.2012 (45) Опубликовано: 20.06.2012 Бюл. № 17 (73) Патентообладатель(и): Открытое акционерное общество "Научнопроизводственное предприятие "Рубин" (ОАО "НПП "Рубин") (RU) 1 1 7 2 4 3 R U Формула полезной модели 1. Сервер централизованного хранения и обработки разнородных данных с обеспечением идентификации и аутентификации пользователей по биометрическим параметрам, содержащий ...

Подробнее
10-01-2013 дата публикации

УСТРОЙСТВО ВЫЯВЛЕНИЯ УЯЗВИМОСТЕЙ В БЕСПРОВОДНЫХ СЕТЯХ ТИПА WI-FI

Номер: RU0000124102U1

Устройство выявления уязвимостей в беспроводных сетях типа Wi-Fi, содержащее блок беспроводного интерфейса, выход которого соединен с входом блока инвентаризации сети, блок захвата трафика сети, первый вход которого соединен с первым выходом блока инвентаризации сети, а выход соединен с входом блока анализа трафика сети, выход блока анализа трафика сети соединен с первым входом блока памяти, выход которого соединен с первым входом блока проведения атак на протоколы аутентификации, выход блока проведения атак на протоколы аутентификации соединен с первым входом блока индикации, второй вход которого соединен с пятым выходом блока управления, первый выход которого соединен с входом блока генерации пакетов, выход блока генерации пакетов соединен с входом блока беспроводного интерфейса, вход блока управления соединен со вторым выходом блока инвентаризации сети, второй, третий и четвертый выходы блока управления соединены со вторыми входами блока захвата трафика сети, блока памяти и блока проведения атак на протоколы аутентификации соответственно, при этом блок управления дает команду блоку генерации пакетов на генерацию трафика в сеть, использующую протокол шифрования WEP, осуществляет выбор сети, чей трафик будет захвачен в блоке захвата трафика сети, дает команды на чтение/запись в блок памяти, осуществляет выбор типа атаки в зависимости от используемого протокола шифрования, а также перенаправляет информацию, полученную в блоке инвентаризации сети, на блок индикации. РОССИЙСКАЯ ФЕДЕРАЦИЯ (19) RU (11) (13) 124 102 U1 (51) МПК H04W 12/00 (2009.01) ФЕДЕРАЛЬНАЯ СЛУЖБА ПО ИНТЕЛЛЕКТУАЛЬНОЙ СОБСТВЕННОСТИ (12) ОПИСАНИЕ (21)(22) Заявка: ПОЛЕЗНОЙ МОДЕЛИ К ПАТЕНТУ 2012130036/08, 17.07.2012 (24) Дата начала отсчета срока действия патента: 17.07.2012 (45) Опубликовано: 10.01.2013 Бюл. № 1 (73) Патентообладатель(и): Закрытое Акционерное Общество "НаучноПроизводственное Объединение "Эшелон" ЗАО "НПО "Эшелон" (RU) 1 2 4 1 0 2 R U Формула полезной модели Устройство выявления ...

Подробнее
20-03-2013 дата публикации

СИСТЕМА ТРАНСКОНТИНЕНТАЛЬНОЙ ЭЛЕКТРОКАРДИОГРАФИИ

Номер: RU0000125832U1

1. Система диагностики состояния сердечно-сосудистой системы человека, содержащая портативные системы сбора кардиометрических данных, связанные каналами передачи данных вычислительной сети с системой обработки данных, при этом каждая портативная система сбора кардиометрических данных содержит электроды, соединенные через многоканальный усилитель с входами многоканального устройства аналого-цифрового преобразования, выход которого связан с микропроцессорным устройством мобильного телефона, к которому подключены устройство отображения информации, выполненное в виде дисплея мобильного телефона, и устройство связи с вычислительной сетью, система обработки данных выполнена с возможностью автоматической или автоматизированной обработки кардиометрических данных, поступающих от портативных систем сбора кардиометрических данных, выполненных с возможностью отображения получаемых от системы обработки данных результатов обработки, система диагностики состояния сердечно-сосудистой системы человека выполнена с возможностью идентификации пользователя портативных систем сбора кардиометрических данных, отличающаяся тем, что портативные системы сбора кардиометрических данных выполнены с возможностью ввода идентификационных данных пользователя и их передачи в систему обработки данных. 2. Система по п.1, отличающаяся тем, что портативные системы сбора кардиометрических данных выполнены с возможностью ввода пользователем имени пользователя и пароля в качестве идентификационных данных пользователя. 3. Система по п.2, отличающаяся тем, что в качестве устройства ввода имени пользователя и пароля в портативных системах сбора кардиометрических данных используется клавиатура мобильного телефона. 4. Система по п.2, отличающаяся тем, что в качестве устройства ввода имени пользователя и пароля в портативных системах сбора кардиометрических данных используется сенсорный экран мобильного телефона. 5. Система по п.1, отличающаяся тем, что в качестве идентификационных данных пользователя портативной ...

Подробнее
10-05-2013 дата публикации

МОДЕМ ДЛЯ БЕЗОПАСНЫХ КОММУНИКАЦИЙ В КОМПЬЮТЕРНЫХ СЕТЯХ

Номер: RU0000128055U1

Модем для безопасных коммуникаций в компьютерных сетях, содержащий собственную память увеличенного объема, отличающийся тем, что в нем по меньшей мере ее часть, локализованная в отдельной микросхеме флэш-памяти, смонтированной на печатной плате модема, реализована с атрибутами доступа «Read Only» и/или «Hidden», защищающими ее от несанкционированных изменений. РОССИЙСКАЯ ФЕДЕРАЦИЯ (19) RU (11) (13) 128 055 U1 (51) МПК H04W 12/00 (2009.01) ФЕДЕРАЛЬНАЯ СЛУЖБА ПО ИНТЕЛЛЕКТУАЛЬНОЙ СОБСТВЕННОСТИ (12) ОПИСАНИЕ (21)(22) Заявка: ПОЛЕЗНОЙ МОДЕЛИ К ПАТЕНТУ 2012134587/08, 14.08.2012 (24) Дата начала отсчета срока действия патента: 14.08.2012 (72) Автор(ы): Конявский Валерий Аркадьевич (RU) (73) Патентообладатель(и): Конявский Валерий Аркадьевич (RU) R U Приоритет(ы): (22) Дата подачи заявки: 14.08.2012 (45) Опубликовано: 10.05.2013 Бюл. № 13 (54) МОДЕМ ДЛЯ БЕЗОПАСНЫХ КОММУНИКАЦИЙ В КОМПЬЮТЕРНЫХ СЕТЯХ U 1 1 2 8 0 5 5 R U Стр.: 1 U 1 Формула полезной модели Модем для безопасных коммуникаций в компьютерных сетях, содержащий собственную память увеличенного объема, отличающийся тем, что в нем по меньшей мере ее часть, локализованная в отдельной микросхеме флэш-памяти, смонтированной на печатной плате модема, реализована с атрибутами доступа «Read Only» и/или «Hidden», защищающими ее от несанкционированных изменений. 1 2 8 0 5 5 Адрес для переписки: 115114, Москва, 2-й Кожевнический пер., 8, (ВНИИПВТИ), В.А. Конявскому RU 5 10 15 20 25 30 35 40 45 128 055 U1 Полезная модель относится к области компьютерной техники и информационных технологий. В указанной области техники актуальна проблема обеспечения безопасности коммуникаций при беспроводном подключении компьютера к сетям, в особенности, к Интернету, через каналы сотовой связи с помощью предназначенных для этого компактных USB-устройств - модемов. Модемы, построенные в соответствии с действующими стандартами сотовой связи, в частности, 3G (3G-модемы) серийно выпускаются множеством фирм и находят широкое применение. Наряду с ...

Подробнее
05-01-2012 дата публикации

Group handover method and apparatus in broadband wireless communication system that supports mobile relay station

Номер: US20120003962A1

Group handover method and apparatus in a broadband wireless communication system which supports a mobile relay station are provided. A method of a serving base station for group handover of the mobile relay station includes when receiving a measurement report message from a relay station, determining whether the relay station is a mobile relay station of a simple type which forwards a signal; collecting handover related information of the mobile relay station and mobile terminals belonging to the mobile relay station, from pre-stored information; requesting handover of the mobile relay station and the mobile terminals by transmitting the collected handover related information to a target base station; and receiving a message indicating whether the handover of the mobile relay station and the mobile terminals is approved, from the target base station.

Подробнее
20-04-2015 дата публикации

АВТОМАТИЗИРОВАННОЕ РАБОЧЕЕ МЕСТО ДЛЯ АУДИТА ЗАЩИЩЕННОСТИ БЕСПРОВОДНОЙ ЛОКАЛЬНОЙ СЕТИ

Номер: RU0000151859U1

Автоматизированное рабочее место для аудита защищенности беспроводных локальных сетей, содержащее программную и аппаратную платформы, отличающееся тем, что включает в себя десять модулей, первый из которых модуль управления, второй модуль работа с базой данных анкет, третий модуль работа с базой данных оборудования, четвертый модуль анкетирование, пятый модуль инвентаризация оборудования, шестой модуль оценка уровня защищенности, седьмой модуль оценка рисков, восьмой модуль работа с базой данных списка угроз, девятый модуль выработка рекомендаций, десятый модуль формирование отчета, причем первый модуль управления связан двусторонней связью с четвертым модулем анкетирование, с входом пятого модуля инвентаризация оборудования и выходом десятого модуля формирование отчета, второй модуль работа с базой данных анкет связан с входом четвертого модуля анкетирование, третий модуль работа с базой данных оборудования связан с входом пятого модуля инвентаризация оборудования, четвертый модуль анкетирование связан с выходом второго модуля работа с базой данных анкет и двусторонней связью с первым модулем управления, с входом седьмого модуля оценка рисков и с входом шестого модуля оценка уровня защищенности; пятый модуль инвентаризация оборудования связан с выходом первого модуля управления, с выходом третьего модуля работа с базой данных оборудования, с входом шестого модуля оценка уровня защищенности и с входом седьмого модуля оценка рисков; шестой модуль оценка уровня защищенности связан с выходами пятого модуля инвентаризация оборудования и четвертого модуля анкетирование, связан с входом девятого модуля выработка рекомендаций; седьмой модуль оценка рисков связан с выходом пятого модуля инвентаризация оборудования, с выходом четвертого модуля анкетирование и с выходом восьмого модуля работа с базой данных списка угрозы, а также связан со входом девятого модуля выработка рекомендаций, восьмой модуль работа с базой данных списка угроз связан односторонней связью со входом ...

Подробнее
17-02-2021 дата публикации

ЦЕНТРАЛЬНЫЙ СЕРВЕР ПРЕДОТВРАЩЕНИЯ НЕСАНКЦИОНИРОВАННОГО КОПИРОВАНИЯ ДАННЫХ С УСТРОЙСТВ ВЫВОДА ВИЗУАЛЬНОЙ ИНФОРМАЦИИ

Номер: RU0000202421U1

Полезная модель относится к области информационных технологий, а именно к устройствам защиты информационных систем от утечек данных. Технический результат направлен на предотвращение несанкционированного копирования данных с устройств вывода визуальной информации. Центральный сервер предотвращения несанкционированного копирования данных с устройств вывода визуальной информации, включающий блок подключения внешних датчиков, в общем случае совместно реализующих функцию мультиспектральной съемки в различных диапазонах электромагнитных волн, блок обработки данных с внешних датчиков, включающий по меньшей мере одно высокопроизводительное графическое процессорное устройство для обработки мультиспектральных данных, полученных от упомянутых внешних датчиков, блок подключения внешних устройств, реализующих функцию подавления канала утечки данных с целью нарушить условия фото- и видеосъемки устройства для вывода визуальной информации, блок подключения автоматизированного рабочего места (АРМ) оператора службы безопасности (СБ). 14 з.п. ф-лы, 2 ил. РОССИЙСКАЯ ФЕДЕРАЦИЯ (19) RU (11) (13) 202 421 U1 (51) МПК G06F 21/00 (2013.01) H04W 12/02 (2009.01) ФЕДЕРАЛЬНАЯ СЛУЖБА ПО ИНТЕЛЛЕКТУАЛЬНОЙ СОБСТВЕННОСТИ (12) ОПИСАНИЕ ПОЛЕЗНОЙ МОДЕЛИ К ПАТЕНТУ (52) СПК G06F 21/121 (2021.01); H04W 12/009 (2021.01); H04W 4/023 (2021.01) (21)(22) Заявка: 2020133583, 13.10.2020 (24) Дата начала отсчета срока действия патента: (73) Патентообладатель(и): Акционерное общество "ЭЛВИС-НеоТек" (RU) Дата регистрации: 17.02.2021 (45) Опубликовано: 17.02.2021 Бюл. № 5 2 0 2 4 2 1 R U (54) ЦЕНТРАЛЬНЫЙ СЕРВЕР ПРЕДОТВРАЩЕНИЯ НЕСАНКЦИОНИРОВАННОГО КОПИРОВАНИЯ ДАННЫХ С УСТРОЙСТВ ВЫВОДА ВИЗУАЛЬНОЙ ИНФОРМАЦИИ (57) Реферат: Полезная модель относится к области обработки данных с внешних датчиков, информационных технологий, а именно к включающий по меньшей мере одно устройствам защиты информационных систем от высокопроизводительное графическое утечек данных. Технический результат направлен процессорное устройство для ...

Подробнее
05-01-2012 дата публикации

Optimized interface between two network elements operating under an authentication, authorization and accounting protocol

Номер: US20120005356A1
Автор: Vesa Pauli HELLGREN
Принадлежит: NOKIA SIEMENS NETWORKS OY

According to several embodiments of the present invention, a single session according to an authentication, authorization and accounting protocol, with a network element carrying out a policy and charging rule function is created, wherein the specific session may be used to manage and/or report policy and/or charging control rules.

Подробнее
05-01-2012 дата публикации

Communication between a host device and an accessory via an intermediate device

Номер: US20120005395A1
Принадлежит: Apple Inc

A host device and an accessory exchange information (e.g., commands and data) via an intermediate device. The host device and accessory can each connect to the intermediate device through a direct wired path and can exchange commands and data with the intermediate device. The host device and the accessory can also “tunnel” information to each other through the intermediate device, by packaging the tunneled information as a payload of a command recognizable by the intermediate device; the intermediate device can repackage and forward the payload. In some embodiments, the tunneled information relates to configuring a wireless link (e.g., a Bluetooth pairing) between the host device and the accessory.

Подробнее
10-06-2021 дата публикации

Система удаленной регистрации абонентов сети связи с использованием мобильного устройства

Номер: RU0000204787U1

Полезная модель относится к области автоматики и вычислительной технике, в частности к системе удаленной регистрации абонентов сети связи с использованием мобильного устройства. Техническим результатом является упрощение системы путем исключения необходимости применения специальных сенсорных экранов для ввода данных абонентами сетей связи и использования для этих целей типовых мобильных устройств. Технический результат достигается тем, что система содержит модуль 1 приема запросов на регистрацию абонентов сети связи, модуль 2 селекции адресов абонентов, модуль 3 управления выборкой данных абонентов, модуль 4 формирования сигналов записи и считывания данных абонентов, модуль 5 верификации изображений визуального фото лица пользователя и фото лица пользователя из паспорта, модуль 6 приема данных абонентов из базы данных сервера, модуль 7 идентификации реквизитов паспортных данных пользователей, модуль 8 выдачи транзакций абонентам сети связи. 6 ил. РОССИЙСКАЯ ФЕДЕРАЦИЯ (19) RU (11) (13) 204 787 U1 (51) МПК H04W 12/06 (2009.01) G06K 9/62 (2006.01) ФЕДЕРАЛЬНАЯ СЛУЖБА ПО ИНТЕЛЛЕКТУАЛЬНОЙ СОБСТВЕННОСТИ (12) ОПИСАНИЕ ПОЛЕЗНОЙ МОДЕЛИ К ПАТЕНТУ (52) СПК H04W 12/06 (2021.02); G06K 9/62 (2021.02) (21)(22) Заявка: 2021100924, 18.01.2021 (24) Дата начала отсчета срока действия патента: Дата регистрации: 10.06.2021 (45) Опубликовано: 10.06.2021 Бюл. № 16 (54) Система удаленной регистрации абонентов сети связи с использованием мобильного устройства (57) Реферат: Полезная модель относится к области регистрацию абонентов сети связи, модуль 2 автоматики и вычислительной технике, в селекции адресов абонентов, модуль 3 управления частности к системе удаленной регистрации выборкой данных абонентов, модуль 4 абонентов сети связи с использованием формирования сигналов записи и считывания мобильного устройства. данных абонентов, модуль 5 верификации Техническим результатом является упрощение изображений визуального фото лица системы путем исключения необходимости пользователя и фото лица ...

Подробнее
24-08-2021 дата публикации

Устройство для создания беспроводной многоканальной связи

Номер: RU0000206119U1

Полезная модель относится к области беспроводной связи. Технический результат заключается в обеспечении защиты передаваемых данных в беспроводной ячеистой сети. Устройство для создания беспроводной многоканальной связи содержит беспроводную сетевую карту, оперативную память, флэш-память, малогабаритный микрокомпьютер, имеющий возможность реализации сетевого протокола передачи данных, аккумулятор для возможности автономной работы устройства, оценочную плату, выполненную с возможностью реализации алгоритма шумоподавления при организации голосовой связи между узлами-маршрутизаторами сети, датчик температуры, дисплей, причем для обеспечения защиты передаваемых данных в ячеистой сети малогабаритным микрокомпьютером использован алгоритм шифрования на основе троек Штейнера. 2 ил. РОССИЙСКАЯ ФЕДЕРАЦИЯ (19) RU (11) (13) 206 119 U1 (51) МПК H04W 40/04 (2009.01) ФЕДЕРАЛЬНАЯ СЛУЖБА ПО ИНТЕЛЛЕКТУАЛЬНОЙ СОБСТВЕННОСТИ (12) ОПИСАНИЕ ПОЛЕЗНОЙ МОДЕЛИ К ПАТЕНТУ (52) СПК H04W 12/03 (2021.05); H04W 40/04 (2021.05) (21)(22) Заявка: 2021104671, 24.02.2021 (24) Дата начала отсчета срока действия патента: Дата регистрации: 24.08.2021 Приоритет(ы): (22) Дата подачи заявки: 24.02.2021 (45) Опубликовано: 24.08.2021 Бюл. № 24 2 0 6 1 1 9 R U (54) УСТРОЙСТВО ДЛЯ СОЗДАНИЯ БЕСПРОВОДНОЙ МНОГОКАНАЛЬНОЙ СВЯЗИ (57) Реферат: Полезная модель относится к области возможности автономной работы устройства, беспроводной связи. Технический результат оценочную плату, выполненную с возможностью заключается в обеспечении защиты передаваемых реализации алгоритма шумоподавления при данных в беспроводной ячеистой сети. организации голосовой связи между узламиУстройство для создания беспроводной маршрутизаторами сети, датчик температуры, многоканальной связи содержит беспроводную дисплей, причем для обеспечения защиты сетевую карту, оперативную память, флэшпередаваемых данных в ячеистой сети память, малогабаритный микрокомпьютер, малогабаритным микрокомпьютером имеющий возможность реализации сетевого использован ...

Подробнее
12-01-2012 дата публикации

Method and handheld electronic device for detecting and providing notification of a device drop

Номер: US20120007745A1
Принадлежит: Research in Motion Ltd

A method and handheld electronic device for detecting and providing notification of a device drop are provided. In accordance with one embodiment, there is provided a method for providing notification of a device drop on an electronic device having a processor coupled to a memory and an accelerometer, the method comprising: receiving an input from the accelerometer; and issuing an alert when the input indicates a freefall event and at least one secondary indication of a device drop exists.

Подробнее
12-01-2012 дата публикации

Wireless communication apparatus

Номер: US20120008776A1
Принадлежит: Panasonic Corp

Influence on a key used between a user equipment and a base station, which will be imposed by unsecured updating of a key between the base station and a relay node when a relay node is being introduced is diminished. An HO request processing unit ( 202 ) extracts user equipment information from an HO request input from a receiver ( 201 ). A user equipment information determination section ( 204 ) determines a mode of handover from the user equipment information, and outputs a determination result to a key generator ( 205 ) and an HO command generator ( 207 ). In relation to a determination about a mode of handover on the basis of user equipment information, it is determined whether the handover is handover from a relay node to a base station, handover from a base station to a relay node, handover relating to relay nodes subordinate to the same base station, and the like. Then, preparation of handover command, updating of a key, and the like are performed in conformance with the mode of handover

Подробнее
12-01-2012 дата публикации

Secure configuration of a wireless sensor network

Номер: US20120008783A1
Автор: Gabriel E. Montenegro
Принадлежит: Oracle International Corp

A method for secure configuration of a sensor system involves identifying a new sensor not activated within the sensor system, the new sensor including a new sensor identifier, establishing a first transmission link between the new sensor and a sensor controller, transmitting the new sensor identifier between the sensor and the sensor controller, generating a key pair for the sensor controller, the key pair including a controller public key and a controller private key, generating a key pair for the new sensor, the key pair including a sensor public key and a sensor private key, transmitting the controller public key to the new sensor and the sensor public key to the sensor controller, and generating a pairwise key within the sensor controller and the new sensor.

Подробнее
12-01-2012 дата публикации

Apparatus and method for applying ciphering in a universal mobile telecommunications system

Номер: US20120009910A1
Автор: Nicola Funnell
Принадлежит: Research in Motion Ltd

Apparatus and a method for ciphering messages in mobile telecommunications system user equipment and network are disclosed. The apparatus is arranged to store a plurality of current ciphering configurations and/or a plurality of old (previously applied) ciphering configurations and/or a plurality of new (future) ciphering configurations. Thus different ciphering configuration may be applied at different times and for different radio bearers.

Подробнее
12-01-2012 дата публикации

Method and system for transmitting delay media information in ip multimedia subsystem

Номер: US20120011368A1
Принадлежит: ZTE Corp

The present invention provides a method and a system for transmitting delay media information in an IP multimedia subsystem, the system includes: a sending party of media information, a receiving party of the media information, a KMS and a mailbox server of the receiving party of the media information. The method and system of the present invention establishes an end-to-end security association between the sending party and the receiving party of the media information to encrypt the media information between them, without any need for the KMS to store the media key; at the same time, the security association is also established between the sending party and the mailbox server of the receiving party, and between the mailbox server of the receiving party and the receiving party, to perform an integrity protection and a mutual authentication between them, thus the security transmission of the IMS delay media information can be realized.

Подробнее
12-01-2012 дата публикации

Method of performing a secure application in an nfc device

Номер: US20120011572A1
Автор: Charles Walton, Gary Chew
Принадлежит: Inside Secure SA

The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is established between first and second NFC devices, the first NFC device transmits by the contactless link an identifier of a secure processor of the first NFC device, the second NFC device transmits by the contactless link an application identifier, the secure processor transmits by the contactless link first authentication data allowing the authentication of the secure processor of the first NFC device, the second NFC device transmits to an application server the first authentication data, the application server transmits to an authentication server the first authentication data and second authentication data) to authenticate the application and authorizes the two NFC devices to execute the application only if the secure processor and the application are authenticated.

Подробнее
19-01-2012 дата публикации

Method for transmitting and receiving group deletion information

Номер: US20120014287A1
Принадлежит: LG ELECTRONICS INC

A method for transmitting and receiving group configuration information on a user equipment is disclosed. The user equipment receives information on group deletion of the user equipment from a base station. The user equipment transmits an acknowledgement (ACK) signal about the received information on the group deletion to the base station. In this case, the information on the group deletion is configured as a separate extended header type or a type that an extended header is piggybacked on a specific downlink packet to be transmitted to the user equipment. Preferably, the user equipment decodes the received information on the group deletion of the user equipment. The user equipment successfully decodes the information on the group deletion and is then able to transmit the acknowledgement (ACK) signal about the received information on the group deletion to the base station.

Подробнее
19-01-2012 дата публикации

Methods and apparatus to discover authentication information in a wireless networking environment

Номер: US20120017267A1
Принадлежит: Individual

Example methods and apparatus to discover authentication information in a wireless networking environment are disclosed. A disclosed example method involves transmitting, during network discovery, a Generic Advertisement Services (GAS) request to a network access point, the GAS request requesting authentication information, the authentication information being indicative of a credential required from a wireless terminal. In addition, a response to the GAS request is received from the network access point. The response includes the authentication information.

Подробнее
26-01-2012 дата публикации

Method for acquiring information for media independent handover

Номер: US20120020329A1
Принадлежит: LG ELECTRONICS INC

This document is related to a method for acquiring information for media independent handover. More specifically the method comprises: submitting a media independent handover (MIH) query to a base station (BS) by sending a first request message, and receiving a response to the MIH query. Because the first request message is used for authorization, preferably the PKM message, the MS can acquire information for handover between heterogeneous networks before the MS finishes the network entry.

Подробнее
02-02-2012 дата публикации

Ad hoc service provider's ability to provide service for a wireless network

Номер: US20120027001A1
Принадлежит: Qualcomm Inc

Exemplary embodiments are directed to devices and methods for supporting a wireless access point for one or more mobile clients. A mobile device may include a first module for supporting access to a network via a first wireless access protocol. The device may further include a second module for supporting a wireless access point for the one or more mobile clients to the network using a second wireless access protocol.

Подробнее
02-02-2012 дата публикации

Method of identifying telematics calls

Номер: US20120028656A1
Принадлежит: GENERAL MOTORS LLC

A method of identifying telematics calls includes the steps of receiving at a vehicle telematics unit a paging message used to connect a call over a wireless carrier system; determining at the vehicle telematics unit if the paging message used to connect the call includes a Mobile Identification Number (MIN) or a Mobile Equipment Identifier (MEID); and establishing the call and, if the vehicle telematics unit determines that the paging message includes the MEID, entering into a mode in which the vehicle telematics unit uses a modem for receipt and transmission of data

Подробнее
02-02-2012 дата публикации

Relay device, wireless communications device, network system, program storage medium, and method

Номер: US20120030466A1
Автор: Satoru Yamaguchi
Принадлежит: BUFFALO INC

A relay device first uses latest authentication data to determine whether request-authentication data transmitted from a wireless communications device is valid. If the latest authentication data is used to determine that the request-authentication data is valid, the relay device carries out relayed communications with the wireless communications device. If the latest authentication data is used to determine that the request-authentication data is invalid, the relay device next uses a former authentication data to determine whether the request-authentication data is valid. If the former authentication data is used to determine that the request-authentication data is valid, the relay device provides the wireless communications device with the latest authentication data to update authentication data in the wireless communications device.

Подробнее
02-02-2012 дата публикации

Accessing resources of a secure computing network

Номер: US20120030733A1
Принадлежит: Raytheon Co

According to one embodiment of the present invention, a method for accessing resources of a secure computing network may be provided. The method may include receiving a request to allow a user to access a secure computing network. The user may be associated with an avatar that has a unique set of one or more identifiers that are associated with the user. A security clearance level of the avatar may be determined from the unique set of identifiers of the avatar. The avatar may be authorized to access one or more virtual compartments of the secure computing network according to the security clearance level of the avatar. The virtual compartment may comprise one or more resources of the secure computing network. The method may further include facilitating display of one or more resources of a virtual compartment accessed by the avatar.

Подробнее
09-02-2012 дата публикации

System and Method for Simultaneous Infrastructure and Ad Hoc Networked Communications

Номер: US20120033652A1
Принадлежит: Texas Instruments Inc

A method and a system are disclosed for maintaining a simultaneous communication between a first wireless station and both an access point and a second wireless station. The first and second wireless stations are associated with the access point, or only one of the wireless stations, but not both, is associated with the access point. The first wireless station gains an instance of medium access by using applicable medium access protocols. Once the first wireless station gains an instance of medium access, it transmits frames to the access point on an infrastructure network and to the second wireless station on the same infrastructure network or an ad hoc network. The overall air time must not exceed the maximum air time allowed for the instance of medium access. All transmitted frames must have a user priority mapped to the access category for which the instance of medium access was obtained.

Подробнее
09-02-2012 дата публикации

Methods and systems for securely managing virtualization platform

Номер: US20120036561A1
Принадлежит: Individual

Virtualization platforms and management clients therefor are communicatively coupled to one another via a control layer logically disposed therebetween. The control layer is configured to proxy virtualization management commands from the management clients to the virtualization platforms, but only after successful authentication of users (which may include automated agents and processes) issuing those commands and privileges of those users as defined by access control information accessible to the control layer. The control layer may be instantiated as an application running on a physical appliance logically interposed between the virtualization platforms and management clients, or a software package running on dedicated hardware logically interposed between the virtualization platforms and management clients, or as an application encapsulated in a virtual machine running on a compatible virtualization platform logically interposed between the virtualization platforms and management clients.

Подробнее
09-02-2012 дата публикации

Provisioning device

Номер: US20120036568A1
Автор: Kazutoshi Kodama
Принадлежит: Yokogawa Electric Corp

There is provided a provisioning device which provides, in advance, setting information necessary for joining in a wireless network to a first field device which is to newly join the wireless network to exchange data with an existing field device that is installed in a plant. The provisioning device includes: a storage unit that stores a white list which contains unique information of the first field device and the setting information such that the unique information and the setting information are correlated with each other; a device information acquiring unit that acquires the unique information from the first field device by wireless communication; an extracting unit that extracts, from the white list, the setting information that is correlated with the acquired unique information; and a setting unit that sends the extracted setting information to the first field device by wireless communication.

Подробнее
16-02-2012 дата публикации

Security Connection Establishing Method and Related Wireless Device and Wireless Host

Номер: US20120040617A1
Принадлежит: PixArt Imaging Inc

A security connection establishing method for a wireless device and a wireless host is disclosed. The security connection establishing method includes the steps of allowing the wireless device to generate a trigger signal, allowing the wireless host to receive the trigger signal, allowing the wireless host to generate an accepting signal according to the trigger signal, allowing the wireless device and the wireless host to directly establish a security connection according to the accepting signal, and providing a connection result.

Подробнее
16-02-2012 дата публикации

Method and apparatus for secure immediate wireless access in a telecommunications network

Номер: US20120040658A1
Автор: Eran Netanel
Принадлежит: Individual

A wireless telephone and messaging system provides Secure Immediate Wireless Access (SIWA) to wireless telephones onto existing wireless networks. The SIWA protocol uses existing wireless network messaging to exchange information between wireless devices and a network server, referred to herein as an Intelligent Service Manager (ISM). The ISM acts as a gateway between wireless devices and wireless service provider, and provides the wireless devices with an immediate limited or unlimited access to the wireless network. The ISM can also deny access to the wireless network from unauthorized wireless devices.

Подробнее
16-02-2012 дата публикации

Method and Apparatus for Implementing Address Privacy in Communications Networks

Номер: US20120042098A1
Принадлежит: Nokia Oyj

Various methods for implementing address privacy in communications networks are provided. One method may include receiving a lower layer address block. The lower layer address block may include a random component and a lower layer solution component. The random component may include a random value and the lower layer solution component may be based at least in part on the random value and a shared key. The method may also include verifying the lower layer address block via the random value and the shared key. The method may further include receiving a higher layer address block. The higher layer address block may include a higher layer solution component. The higher layer solution component may be based at least in part on the random value and a shared key. The method may further include verifying the higher layer address block via the random value and the shared key. Similar apparatuses and computer program products are also provided.

Подробнее
16-02-2012 дата публикации

System and method for monitoring and analyzing multiple interfaces and multiple protocols

Номер: US20120042382A1
Автор: Kevin Mahaffey
Принадлежит: LookOut Inc

The present invention is a system and method for providing security for a mobile device by analyzing data being transmitted or received by multiple types of networks. The invention can provide security for many types of network interfaces on a mobile device, including: Bluetooth, WiFi, cellular networks, USB, SMS, infrared, and near-field communication. Data is gathered at multiple points in a given processing pathway and linked by a protocol tracking component in order to analyze each protocol present in the data after an appropriate amount of processing by the mobile device. Protocol analysis components are utilized dynamically to analyze data and are re-used between multiple data pathways so as to be able to support an arbitrary number of network data pathways on a mobile device without requiring substantial overhead.

Подробнее
23-02-2012 дата публикации

Key Distribution Scheme for Networks of Information

Номер: US20120045064A1
Принадлежит: Individual

A method for control ling information object ( 102 ) usage in a network of information ( 100 ) wherein information objects ( 102 ) are identified by information object identities and locations of the information objects ( 102 ) are indicated by location pointing information, the method comprising receiving ( 5 b ) an encrypted information object ( 102 ), sending ( 7 ) to a resolution node (D 200 ) a request for location pointing information of a key issuing node (D300), the request comprising an identity of the received information object ( 102 ), receiving ( 8 ) the location pointing information of the key issuing node (D 300 ), sending ( 9 ) to the key issuing node (D 300 ) a request for an access key ( 104 ) for decrypting the encrypted information object ( 102 ), the request comprising the identity of the received information object ( 102 ), receiving ( 11 ) the access key ( 104 ), and decrypting ( 12 ) the received encrypted information object ( 102 ) with the received access key ( 104 ).

Подробнее
23-02-2012 дата публикации

Mobile Device Having Increased Security That Is Less Obtrusive

Номер: US20120046012A1
Принадлежит: Qualcomm Inc

Disclosed is an apparatus and method for a mobile device to provide increased security that is less obtrusive. A mobile device includes a display device, a user interface, and a processor. The processor may be configured to execute instructions to: implement a monitoring function to monitor the operation of the mobile device and to implement a plurality of monitor functions; and implement an authentication process to compare the plurality of monitor functions to a time period to determine an authentication value, wherein if the authentication value exceeds a threshold, a lock screen is implemented on the display device, and a user is required to enter a valid passcode through the user interface for authentication. Each monitor function may be associated with a pre-determined weight such that different monitor functions are given different priorities.

Подробнее
23-02-2012 дата публикации

Systems, methods, and computer program products for providing device updates to a mobile device operating in a wireless telecommunications network

Номер: US20120046022A1
Принадлежит: AT&T MOBILITY II LLC

Systems, methods, and computer program products are for generating a file including a set of instructions for handling a device update for the mobile device and a uniform resource locator (URL) of a server configured to host the device update and handle the device update in accordance with the instructions for handling the device update, and sending the file to the mobile device, whereat the file is redirected by the mobile device to the server based upon the URL included in the file.

Подробнее
23-02-2012 дата публикации

System and Method for Wireless Pairing via Wired Connection

Номер: US20120047289A1
Принадлежит: Snap On Inc

Methods, devices, and computer-readable media related to establishing wireless connections using a wired connection are disclosed. A remote device is communicatively coupled via a wired connection. The remote device receives, via the wired connection, an initialization request to initialize a wireless connection to the remote device. A search of remote device data stored in the remote device is performed. The remote device data can store authentication data related to one or more wireless connections. At the remote device, an initialization response to the initialization request is determined based on the search. The remote device sends the initialization response via the wired connection. The initialization response can indicate whether the initialization response is accepted or rejected. If the initialization response is accepted, the wireless connection to the remote device can be subsequently established and the wired connection can be subsequently closed.

Подробнее
01-03-2012 дата публикации

Intelligent pairing of electronic devices

Номер: US20120050153A1
Принадлежит: Apple Inc

An intelligent pairing between a first device and a target second device is described. The intelligent pairing can use information provided by a plurality of second devices responding to a connection request by the first device where only one of the plurality of responding second devices is the target second device. The information can include a motion signature, a first device identifier, and a second device identifier.

Подробнее
01-03-2012 дата публикации

Station device and wireless communication method thereof and mobile device and wireless communication method thereof

Номер: US20120051324A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

A station device includes: a communication unit wirelessly communicating with a mobile device that forms a subnet with the station device; a user input unit that receives a user command input for terminating a connection with a first access point and connecting to a second access point; and a controller that controls the communication unit so as to transmit, to the mobile device, connection change information for changing a connection of the mobile device in response to the user command.

Подробнее
01-03-2012 дата публикации

Enterprise network and femtocell thereof

Номер: US20120052840A1
Автор: Jung-Tao Liu
Принадлежит: Jung-Tao Liu

An enterprise network is disclosed. The enterprise network includes at least one site. The site includes an authorizing unit, an enterprise private branch exchange (PBX), and a plurality of femtocells. After a first femtocell of the plurality of femtocells receives a voice/data signal from an enterprise-authenticated handset and the authorizing unit authorizes the voice/data signal, the first femtocell distinguishes a destination of the voice/data signal and routes the voice/data signal to the destination.

Подробнее
01-03-2012 дата публикации

Method and apparatus determining certificate revocation status

Номер: US20120054487A1
Принадлежит: Cisco Technology Inc

A method is disclosed for obtaining certificate revocation information from a server, obtaining from a client a request for a revocation status of a certificate and notifying the client when the certificate identified in the client request has been revoked. The method may be performed by a networking device that is separate from the server and the client.

Подробнее
08-03-2012 дата публикации

Method and system for optimizing authentication procedures in media independent hanodver services

Номер: US20120057706A1
Автор: Anirudh Bhatt
Принадлежит: SAMSUNG ELECTRONICS CO LTD

A method and system for establishing security association mechanism between a Mobile Node (MN) and a plurality of Point of Services (PoS) are provided. The method includes sending a first request from primary PoS to secondary PoS. The primary PoS then receives a first response along with a derived first key. The first key is derived at the secondary PoS. The method further includes receiving a second request from the MN at the primary PoS. The method then derives a second key based on a MN identity and the derived first key. Thereafter, the method sends a second response along with a second key from the primary PoS to the MN. Further, the method establishes communication between the MN and secondary PoS based on the second key received by the MN and the second key generated at the secondary PoS.

Подробнее
08-03-2012 дата публикации

Direct, gesture-based actions from device's lock screen

Номер: US20120060128A1
Принадлежит: Google LLC

Embodiments enable a mobile device to execute an action analogous to a user-defined action in response to receipt of a gesture analogous to a user-defined gesture. In a first embodiment, a computer-implemented method executes an action on a mobile device. A lock screen view is displayed on the mobile device to prevent unauthorized and inadvertent access to the mobile device's data. While the mobile device is locked, a touch gesture having a pre-defined shape is detected on a touch screen of the mobile device independently of the initial position of the touch gesture on the touch screen. In response to detection of the touch gesture, a particular action is executed on the mobile device while the mobile device stays locked. The particular action determined according to the pre-defined shape. In this way, detection of the touch gesture causes the particular action to execute while keeping the mobile device locked.

Подробнее
15-03-2012 дата публикации

Radio-frequency identification tiles

Номер: US20120062366A1
Принадлежит: TRIMBLE NAVIGATION LTD

The present disclosure is directed to methods and systems for a modular, configurable radio frequency identification (RFID) system receiving RFID communications and packaged in a casing for incorporation into a host object. The RFID system may interact with other systems based on the received RFID communications, and may include an antenna. An RFID receiver may receive RFID communications from an RFID tag via the antenna. A memory element may store a configuration for the system, which may be specific to a context of the host object and specify interactions with a second system in response to the received RFID communications. A processor may retrieve from the memory element the configuration responsive to receiving the RFID communications. A transmitter may transmit, via a second communications protocol, a request to the second system based on the interactions specified by the retrieved configuration.

Подробнее
22-03-2012 дата публикации

Method and Apparatus for Negotiation Control of Quality of Service Parameters

Номер: US20120069763A1
Автор: Jie Zhao, Shuhui Hu, Xin Zhong
Принадлежит: Huawei Technologies Co Ltd

A method and an apparatus for negotiation control of Quality of Service (QoS) parameters are provided. The method includes: obtaining, by a High Rate Packet Data (HRPD) Serving Gateway (HSGW), static QoS parameters of a User Equipment (UE), where the static QoS parameters include static QoS parameters related to an Access Point Name (APN); establishing, by the HSGW, a Packet Data Network (PDN) connection corresponding to the APN with the UE; and sending, by the HSGW, static QoS parameters related to the APN corresponding to the PDN to an access network to enable the access network to perform QoS authorization, according to the static QoS parameters related to the APN corresponding to the PDN, for establishing an air interface bearer for the UE.

Подробнее
22-03-2012 дата публикации

Selection of supplemental content for wireless communication devices based on device status

Номер: US20120072228A1
Принадлежит: Sprint Communications Co LP

What is disclosed is a method of operating a wireless communication system. The method includes receiving a registration request from a wireless communication device, and in response, monitoring device status and updating a data structure with device status data for the wireless communication device. The method also includes processing the device status data to determine if a first device status condition is met by the device status data, and if the first device status condition is met by the device status data, selecting a supplemental content provider from a plurality of supplemental content providers based on the first device status condition. The method also includes receiving a content request from the wireless communication device for primary content from a primary content provider, and in response, determining an anonymous key associated with the wireless communication device and transferring the anonymous key for delivery to the selected supplemental content provider. The method also includes receiving supplemental content transferred by the selected supplemental content provider responsive to the transferred anonymous key, receiving the primary content transferred by the primary content provider, and transferring the primary content and the supplemental content to the wireless communication device.

Подробнее
22-03-2012 дата публикации

Multitenant-aware protection service

Номер: US20120072716A1
Принадлежит: Microsoft Corp

Implementing a data protection service. One method includes receiving a request to provision a first tenant among a plurality of tenants managed by a single data protection service. A tenant is defined as an entity among a plurality of entities. A single data protection service provides data protection services to all tenants in the plurality of tenants. A first encryption key used to decrypt the first tenant's data at the data store is stored. The first encryption key is specific to the first tenant and thus cannot be used to decrypt other tenants' data at the data store from among the plurality of tenants. Rather each tenant in the plurality of tenants is associated with an encryption key, not usable by other tenants, used at the data store to decrypt data on a tenant and corresponding key basis.

Подробнее
29-03-2012 дата публикации

Security system providing temporary personnel access based upon near-field communication and related methods

Номер: US20120075059A1
Принадлежит: Research in Motion Ltd

A security system may include a plurality of electronic devices, each having a unique identification (ID) associated therewith and configured to generate a temporary security code based upon the unique ID. The system may further include at least one mobile wireless communications device including a first Near-Field Communication (NFC) circuit, and a mobile controller configured to receive the temporary security code from a given electronic device from among the plurality of electronic devices. The system may also include an access control device associated with a personnel access position and including a second NFC sensor and a security controller. The security controller may be configured to receive the temporary security code from the first NFC sensor via NFC communications, selectively grant personnel access based upon the received temporary security code, and determine the unique ID associated with the given electronic device.

Подробнее
29-03-2012 дата публикации

Operator control of resources for roaming subscribers

Номер: US20120076125A1
Автор: Dirk Kopplin
Принадлежит: Telefonaktiebolaget LM Ericsson AB

The present invention relates to a solution for handling visiting subscribers in a visited communication network ( 109 ) with wireless access for user equipment ( 110 ) and enforcing policy and charging rules for the visited subscriber home operator. Operator specific policy and charging rules are stored in the visited communication network, for instance using a policy and charging rules function ( 104 ) in the visited communication network and operator specific rules may be stored in a separate database ( 105 ) in the visited communication and in communication with the policy and charging rules function.

Подробнее
29-03-2012 дата публикации

Method, device, and system for deriving keys

Номер: US20120077501A1
Принадлежит: Huawei Technologies Co Ltd

Method, device, and system for deriving keys are provided in the field of mobile communications technologies. The method for deriving keys may be used, for example, in a handover process of a User Equipment (UE) from an Evolved Universal Terrestrial Radio Access Network (EUTRAN) to a Universal Terrestrial Radio Access Network (UTRAN). If a failure occurred in a first handover, the method ensures that the key derived by a source Mobility Management Entity (MME) for a second handover process of the UE is different from the key derived for the first handover process of the UE. This is done by changing input parameters used in the key derivation, so as to prevent the situation in the prior art that once the key used on one Radio Network Controller (RNC) is obtained, the keys on other RNCs can be derived accordingly, thereby enhancing the network security.

Подробнее
29-03-2012 дата публикации

Method And System For Enabling Rendering Of Electronic Media Content Via A Secure Ad Hoc Network Configuration Utilizing A Handheld Wireless Communication Device

Номер: US20120079112A1
Принадлежит: Broadcom Corp

A handheld wireless communication device (HWCD) establishes an ad hoc network comprising interconnected networks for a user. The HWCD gains access to content on a first device and controls communication of the content from the first device via the HWCD to a second device. The HWCD enables the second device to consume the content. The content may be streamed from the first device via the HWCD to the second device. The first device is a service provider network device or other network device. The access may be authenticated and/or secure. Secure access to the content is extended from the first device to the second device. The ad hoc network is configured and/or reconfigured until communication is complete. The HWCD comprises multiple wireless interfaces. The ad hoc network comprises a PAN, WLAN, WAN and/or cellular network. The HWCD may hand-off among base stations during communication of the content.

Подробнее
29-03-2012 дата публикации

System and method for managing user token in client device on network

Номер: US20120079572A1
Принадлежит: Hon Hai Precision Industry Co Ltd

A user token management system in a client device on a network comprises an obtaining module, a web controller and a processing module. The obtaining module obtains a user token from a database in response to a retrieving request for retrieving authorization of a web service provider on the network. The web controller transmits an authenticating request for authenticating the user token to the web service provider and receives an authentication result authenticating the user token. The processing module deletes the user token from the database when that user token is not authenticated by the web service provider.

Подробнее
29-03-2012 дата публикации

Mobile communication system and mobile terminal having function of inactivating mobile communication viruses, and method thereof

Номер: US20120079597A1
Автор: Ki Chul An
Принадлежит: PANTECH CO LTD

A mobile communication system for inactivating a virus includes: a database associated with the mobile communication system, for storing at least one virus vaccine program; and a virus monitoring unit associated with the mobile communication system, for checking virus infection of received data, analyzing virus information, choosing one of virus vaccine programs that are stored in the database and inactivating the virus. Virus vaccine programs are timely updated over the air (OTA) whenever a new version of vaccine program is available.

Подробнее
29-03-2012 дата публикации

Selectively wiping a remote device

Номер: US20120079603A1
Принадлежит: Research in Motion Ltd

A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an authorization level indicated in a command. A command is received at a client device comprising an authorization level indicator. Based on at least one predefined rule, which may be implemented in an IT policy stored at the client device, each of the plurality of data types to be secured is determined, and then the data corresponding to those types is secured. The data may be secured by encrypting and/or deleting the data at the client device. The predefined rules associated with each authorization level may be configured by a user or administrator having an authorization level that exceeds the associated authorization level.

Подробнее
05-04-2012 дата публикации

Wireless accessory device pairing transfer between multiple host devices

Номер: US20120083208A1
Принадлежит: Apple Inc

A wireless communications system includes an accessory device and multiple host devices. A host device pairs wirelessly with an accessory device using a unique link key, detects a primary trigger event and responds by transferring automatically its pairing with the accessory device to a second host device while all devices remain within wireless range of each other. The pairing transfer involves communicating the link key to the second host device, unpairing the accessory device from the first host device, and establishing a wireless pairing of the accessory device to the second host device. The primary trigger event can involve establishing a ported connection between host devices. A secondary trigger event results in the first host device automatically reclaiming its pairing with the accessory device. An accessory device can also select and pair with one of multiple host devices in response to a specific user gesture detected by the accessory device.

Подробнее
05-04-2012 дата публикации

Femtocell approved user list management via short message service (sms)

Номер: US20120083270A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A system and methodology that facilitates user friendly and/or dynamic femtocell access provisioning based on Short Message Service (SMS) communication is provided. In particular, the system can enable users to update and/or view a femto access control list associated with a femtocell by employing SMS messages. Moreover, the system can receive a SMS message from a user equipment (UE) requesting an action (e.g., add, remove, and/or view an entry within a femto access control list) associated with femtocell access and identify a femtocell associated with the UE. Further, the system can analyze the SMS, request confirmation to perform the action, and execute the action on receiving confirmation from the UE.

Подробнее
05-04-2012 дата публикации

Dynamic selection of packet data network gateways

Номер: US20120084449A1
Принадлежит: VERIZON PATENT AND LICENSING INC

A device receives a PDN connection request from a UE, and exchanges, with a HSS, authentication and authorization information associated with the UE. The device also constructs an APN FQDN based on the authentication and authorization information, and sends a query, that includes the APN FQDN, to a DNS server. The device further receives, from the DNS server, PGW FQDNs that contain the APN FQDN, and compares the PGW FQDNs with a FQDN associated with a SGW. The device determines, based on the comparison, a PGW, associated with a PGW FQDN that is a closest match to the FQDN associated with the SGW, to be a primary PGW for the PDN connection request. The device also determines, based on the comparison, one or more PGWs, residing within a predetermined distance of the SGW, to be one or more backup PGWs for the PDN connection request.

Подробнее
05-04-2012 дата публикации

Device and method for secure access to a remote server

Номер: US20120084849A1
Принадлежит: Morpho SA

The device and method described herein relates to the field of computer security and, specifically, to the field of protecting confidential personal information which enables encrypted access to the remote server. A device and a method for securing confidential user information and secure exchanges of such information with the servers that host the services is provided. The device and method are based on personalising a smartcard containing the information. The chip card, connected to the user terminal, has a connection enabling the terminal to appear as a standalone host of the user's local network. An encrypted connection is then established directly between the chip card and the server hosting the service for the transmission of confidential data. The data, stored on the chip card, are then exchanged with the server via the encrypted connection. The data are never accessible in plain text on the user terminal.

Подробнее
12-04-2012 дата публикации

Authentication of personal data over telecommunications system

Номер: US20120088473A1
Автор: Olli Matti Jussila
Принадлежит: TELIASONERA AB

An additional service that authenticates personal information of a second person by using the mobile identification service in response to a first person requesting authentication is provided. As a result, the authenticated personal information of the second person is shown to the first person.

Подробнее
12-04-2012 дата публикации

Object delivery authentication

Номер: US20120089836A1
Принадлежит: TP Lab Inc

A method and system for authenticating delivery including the steps of receiving by a receiver a delivery information package from a deliverer over a network during a communication between the receiver and the deliverer, wherein the delivery package includes deliverer identity information, sending an authentication request of the received delivery package from the receiver to an authentication module having a hardware processor, over at least one of a call network and an additional network, and authenticating the received delivery package using the deliverer identity information.

Подробнее
12-04-2012 дата публикации

System and method for controlling data communications between a server and a client device

Номер: US20120089840A1
Принадлежит: Research in Motion Ltd

A system and method for controlling data communications between a server and a client device, such as a mobile device. Embodiments relate generally to a technique where stop data is provided to the client device. This stop data can be transmitted (e.g. by the client device) to the server. When processed by the server, the stop data indicates to the server that at least some of the encrypted data received by the client device from the server was not decrypted using the second key (e.g. as may be the case when the second key has been deleted). Upon receiving the stop data, the server may, for example, withhold the transmission of data encrypted with the first key to the client device until the second key is restored on the client device. In one embodiment, the stop data is provided to the client device in an encoded (e.g. encrypted) form.

Подробнее
19-04-2012 дата публикации

Near-field communication (nfc) system providing nfc tag geographic position authentication and related methods

Номер: US20120094596A1
Автор: Piotr Tysowski
Принадлежит: Research in Motion Ltd

A near-field communication (NFC) system may include an NFC tag comprising a memory configured to store geo-position data corresponding to a geographic position of the NFC tag, and a first NFC sensor coupled to the memory and configured to initiate a transaction based upon NFC communications. The NFC system may further include a mobile wireless communications device comprising a second NFC sensor and a controller coupled thereto. The controller may be configured to establish NFC communications with the first NFC sensor when in proximity thereto and retrieve the geo-position data therefrom, authenticate a geographic position of the NFC tag based upon the retrieved geo-position data, and perform the transaction with the NFC tag if the geographic position of the NFC tag is authenticated.

Подробнее
19-04-2012 дата публикации

Method, system and apparatus for locking information

Номер: US20120094636A1
Принадлежит: Huawei Technologies Co Ltd

A method, system, and apparatus are described for locking information. Specifically, a server sends a lock message carrying lock object information to a mobile terminal; the mobile terminal locks a lock object according to the lock message, the lock object corresponding to the lock object information. With the solutions provided in the embodiments of the invention, a server may lock information for a mobile terminal, so as to prevent other servers from manipulating the information.

Подробнее
19-04-2012 дата публикации

Methods for handling apparatus originated communication requests and communication apparatuses utilizing the same

Номер: US20120094678A1
Принадлежит: MediaTek Inc

A communication apparatus is provided. A first subscriber identity card camps on a first cell belonging to a first wireless network via a radio transceiver module and stores first contact entries each having a destination address. A second subscriber identity card camps on a second cell belonging to a second wireless network via the radio transceiver module and stores second contact entries each having a destination address. A processor receives an apparatus originated communication request with a destination address, determines whether the received destination address is currently stored in one of the first contact entries of the first subscriber identity card or one of the second contact entries of the second subscriber identity card, and transmits the apparatus originated communication request to the cell that the determined subscriber identity card camps on to establish a wireless communication with a peer device associated with the received destination address.

Подробнее
19-04-2012 дата публикации

Method and Device for Managing Authentication of a User

Номер: US20120096529A1
Принадлежит: France Telecom SA

A method and apparatus are provided for managing authentication of a user of a telecommunications network of an operator. The method includes the following steps: on receipt of a request for access to a service provided by the operator of this network by the user, issuing a request for identification of an authentication server destined for an authentication location server, the request including at least one identifier of the user; and on receipt of a response comprising an identifier of an authentication server associated with the identifier of the user, issuing a request for authentication of the user at the server identified for the requested service.

Подробнее
19-04-2012 дата публикации

Wireless intrusion prevention system and method

Номер: US20120096539A1
Принадлежит: Juniper Networks Inc

A wireless intrusion prevention system and method to prevent, detect, and stop malware attacks is presented. The wireless intrusion prevention system monitors network communications for events characteristic of a malware attack, correlates a plurality of events to detect a malware attack, and performs mitigating actions to stop the malware attack.

Подробнее
19-04-2012 дата публикации

Data integrity protecting and verifying methods, apparatuses and systems

Номер: US20120096564A1
Автор: JI Li
Принадлежит: Sony Corp

The disclosure provides data integrity protecting and verifying methods, apparatuses and systems. A data integrity protecting method include: calculating a Hash value of each of the data blocks by using a first Hash function, to obtain a plurality of block Hash values which form a first series of Hash values; calculating a second series of Hash values based on the first series of Hash values, the second series of Hash values comprising a plurality of chain Hash values, each of which being associated with a corresponding block Hash value in the first series of Hash values and being associated with a neighbor chain Hash value in the second series of Hash values, wherein the first series of Hash values and the second series of Hash values used as integrity information of the data; and generating verification information of the data by using a last chain Hash value.

Подробнее
26-04-2012 дата публикации

System and Method for Providing User Notifications

Номер: US20120101952A1
Принадлежит: HEADWATER PARTNERS I LLC

A process includes storing on an end user device (EUD) one or more notification actions corresponding to one or more notification requests, the EUD being associated with a service plan having a network service usage limit; performing a device action that reflects a past or intended use of the one or more network services; receiving by the EUD one of the one or more notification requests from a network element in response to the device action; performing by the EUD one of the one or more notification actions in response to the one of the one or more notification requests, the one of the one or more notification actions causing the EUD to retrieve a notification message portion associated with a status of the use, the portion being separate from the one of the one or more notification requests; and presenting the notification message on an EUD user interface.

Подробнее
26-04-2012 дата публикации

Method for Managing Application Information Implemented by a Mobile Phone and Application Manager

Номер: US20120101988A1
Принадлежит: ZTE Corp

The present invention discloses a method for implementing management of application information in a mobile phone and an application manager, wherein, the method includes: after the mobile phone is powered on, its application manager reading application information from a file system and caching the application information in background. In the present invention, when the user starts up the application manager, the cached application information can be directly read and displayed, and does not need to be loaded from the file system, thus greatly improving the speed of displaying the application information, and thereby greatly enhancing the user's experience. In addition, when the user updates the application and inserts a memory card into the mobile phone, the information is synchronously updated in background by the application manager to be provided to the user for obtaining and displaying at any time.

Подробнее
03-05-2012 дата публикации

System and method for consolidating network and identification functions on a communication device

Номер: US20120108296A1
Автор: Paul D. Coppinger
Принадлежит: Apriva LLC

The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification. Specifically, the device is configured to meet the physical and electrical specification for commercially available mobile devices utilizing a standard Subscriber Identity Module (SIM) for network access. The device combines the features of the SIM with Common Access Card or Personal Identity Verification card features to allow a network subscriber to invoke secure payment transactions over a carrier's network. The system includes data storage for maintaining a plurality of network and transaction instrument profiles and a profile gateway for receiving transaction information from a payment gateway, sending an authorization request to a user's mobile device, receiving a transaction authorization from the mobile device, and sending transaction information to a payment gateway to finalize the payment transaction.

Подробнее
03-05-2012 дата публикации

Techniques for mobile device authentication

Номер: US20120110329A1
Принадлежит: Individual

A user authenticates a mobile device (MD) to a network-based service (NBS) for initial authentication. Policy is pushed from the NBS to the MD and the MD automatically obtains details about devices and attributes that are near or accessible to the MD in accordance with the policy. The details are pushed as a packet from the MD to the NBS and multifactor authentication is performed based on the details and the policy. If the multifactor authentication is successful, access privileges are set for the MD for accessing the NBS and perhaps for accessing local resources of the MD.

Подробнее
03-05-2012 дата публикации

Method and system for detecting characteristics of a wireless network

Номер: US20120110635A1
Принадлежит: MCI Communications Services Inc

Characteristics about one or more wireless access devices in a wireless network, whether known or unknown entities, can be determined using a system and method according to the present invention. An observation is made of the activity over a Wireless Area Network (WLAN). Based on this activity, changes in state of wireless access devices within the WLAN can be observed and monitored. These changes in state could be indicative of normal operation of the WLAN, or they may indicate the presence of an unauthorized user. In the latter case, an alert can be sent so that appropriate action may be taken. Additionally, ad hoc networks can be detected that may be connected to a wireless access point.

Подробнее
10-05-2012 дата публикации

Management of multiple connections to a security token access device

Номер: US20120117636A1
Автор: Neil P. Adams
Принадлежит: Research in Motion Ltd

An electronic device, system and method for automatically managing wireless connections with a plurality of other devices are provided. The electronic device may be a security token access device and may be adapted to wirelessly pair and optionally securely pair with other devices. Connection information, which may comprise security information, is maintained at the electronic device for each connected device. When a connected device becomes stale, the electronic device implements one or more steps to manage the stale device's connection.

Подробнее
17-05-2012 дата публикации

System and method for providing wireless networks as a service

Номер: US20120122424A1
Принадлежит: BelAir Networks Inc

A wireless network system is provided. The system comprises a wireless network controller and a plurality of access points and/or femtocells. The wireless network controller is in communication with each of the plurality of access points and/or femtocells via an access data network, and is configured to perform one or more network control functions for the benefit of the plurality of access points and/or femtocells. The network control functions may be selected from management and operation, client authentication, mobility, and per-user administration. The wireless network controller is remotely located and operated with respect to the plurality of access points and/or femtocells.

Подробнее
17-05-2012 дата публикации

Systems and Methods for Integrating Local Systems with Cloud Computing Resources

Номер: US20120124129A1
Принадлежит: SAP SE

In one embodiment the present invention includes systems and methods for integrating local systems with cloud computing resources. In one embodiment, shared security information is stored on a local system and on a cloud computer system to allow secure communications between software applications on the two systems. In another embodiment, a tunnel agent client on a local system and a tunnel agent server on a cloud computer system are used to establish a secure connection point between the two systems.

Подробнее
17-05-2012 дата публикации

Method for detecting and preventing a ddos attack using cloud computing, and server

Номер: US20120124666A1
Принадлежит: Ahnlab Inc

A method for detecting and preventing a Distributed Denial of Service (DDoS) attack in a cloud computing environment including a plurality of clients connected to a server, the method includes collecting, by the server, file deoxyribonucleic acid (DNA) extracted from a file currently being executed by each of the clients and traffic information about network traffic caused by the file, from each client by using an agent that is installed in the client and that monitors the file currently being executed by the client. Further, the method includes analyzing, by the server, a risk level of a DDoS attack based on whether the file DNA of the file is malicious or unidentified and based on the traffic information. Furthermore, the method includes sending a command related to whether to block the file to the client according to the analyzed risk level.

Подробнее
17-05-2012 дата публикации

Quick payment using mobile device binding

Номер: US20120124676A1
Принадлежит: Individual

Methods and systems are provided for secure device binding that provides user convenience through avoiding repetitive logging in when changing apps or moving from website to website. A mobile device undergoes binding to an account so that customers do not always have to enter their password when going through a financial transaction process, on a known (e.g., registered) mobile device. A device may be bound during an initial login, and once logged in, the user can select an option to be “remembered” so that the user need not re-login on the same device for future visits with an app or to a website that shares the service provider library.

Подробнее
24-05-2012 дата публикации

Method, Apparatus and System for Processing Security Key when Reestablishing Radio Resource Control (RRC) Connection

Номер: US20120129499A1
Автор: Jinglan Li
Принадлежит: ZTE Corp

A method for processing a security key when a Radio Resource Control (RRC) connection is reestablished is provided, which comprises: receiving a Radio Resource Control connection reestablishment request from a user equipment by a node B; the node B judging whether there is a need to generate a new access layer security key, and generating the new access layer security key or using an original access layer security key based on this judgment result; and sending corresponding Radio Resource Control connection reestablishment information to the user equipment by the node B, so that the user equipment carries out the connection reestablishment. The method adds in the judgment steps into the process of generating an access layer security key, and thus solving the problem in the conventional method that a new key is generated regardless of the situation, thereby saving a large number of computation process of generating the key and reducing the time delay of the systems.

Подробнее
24-05-2012 дата публикации

Servicing attributes on a mobile device

Номер: US20120129514A1

Enabling remote customer service and maintenance using a visual identifier is disclosed. In response to a user enrolling in a service capability associated with a mobile device, the process utilizes a visual identifier to associate the service capability with the customer account, the service and the mobile device. The system allocates a visual identifier for each service capability and enables customer service agents to identify the service capability and mobile device, verify the user and retrieve information for the service interaction.

Подробнее
24-05-2012 дата публикации

Transaction verification on rfid enabled payment and transaction instruments

Номер: US20120130905A1
Автор: Ersin Uzun, Gene Tsudik
Принадлежит: UNIVERSITY OF CALIFORNIA

A display enabled RFID tag (DERT) receives transaction details from the reader. DERT verifies that the details match their counterparts in the reader public key certificate. The process is aborted in case of a mismatch. DERT extracts and displays user-verifiable data. It then enters a countdown stage that lasts for a predetermined duration. A user observes the transaction information and, if the transaction amount and other details are deemed correct, presses an accept button provided on the DERT before the timer runs out. DERT signs the time-stamped transaction statement and sends it to the reader. This signed statement is then sent to the payment gateway and eventually to the financial institution that issued the payment DERT.

Подробнее
24-05-2012 дата публикации

Secure Information Storage and Delivery System and Method

Номер: US20120131656A1
Принадлежит: Intersections Inc

A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault is configured to receive at least one data entry. A mobile vault server coupled to the vault repository creates a mobile vault on a mobile device based on the secure vault and is capable of authenticating the mobile device based on user authentication information. The mobile vault server includes a mobile device handler that communicates with the mobile device. A synchronization utility determines whether the at least one data entry on the secure vault is transferable to or storable on the mobile vault. and transfers the data entry from the secure vault to a corresponding data entry on the mobile vault if the at least one data entry on the secure vault is determined to be transferable to or storable on the mobile vault.

Подробнее
24-05-2012 дата публикации

Mobile Posture-based Policy, Remediation and Access Control for Enterprise Resources

Номер: US20120131685A1
Принадлежит: MobileIron Inc

A mobile device management system that monitors the security state of one or more mobile devices and sets indicators related to such security state. Enterprise network applications, such as an email application, can access the security state information when making access control decisions with respect to a given mobile device.

Подробнее
31-05-2012 дата публикации

Method of controlling sharing of participant identity in a group communication session

Номер: US20120135775A1
Принадлежит: Motorola Inc

A system and methods for increasing the granularity of privacy control in a group communication session are presented. A privacy rule is established for a participant in the session. The privacy rule specifies for different identity sharing triggers whether the participant identity is to be shared with other participants in the session. The privacy of the participant is able to be different dependent on the particular identity sharing trigger. The privacy rule is set by participant initiating the session, a separate server, or the participant. In the last case, the participant is able to specify privacy for a media or data stream when requesting the floor to transmit the stream. The identity of the participant is automatically modified dependent on session context information.

Подробнее
07-06-2012 дата публикации

System for preventing establishment of unauthorized communication

Номер: US20120139691A1
Автор: Hiroshi Mori
Принадлежит: Tokai Rika Co Ltd

A system that prevents unauthorized establishment of wireless bidirectional communication between a communication master and a communication terminal. The system includes a strength measurement signal transmission circuit that transmits a received signal strength measurement signal, which is used to measure received signal strength at the communication terminal, a number of times with different transmission strengths during a single wireless bidirectional communication session. A received signal strength measurement circuit measures the received signal strength of the received signal strength measurement signal whenever the received signal strength measurement signal is received by the communication terminal. A measurement result transmission circuit transmits received signal strength measurement results as a single response signal to the communication master from the communication terminal during the single communication session. A check circuit checks whether the current bidirectional communication is authorized based on the received signal strength measurement results from the communication terminal.

Подробнее
07-06-2012 дата публикации

Cross-component message encryption

Номер: US20120140927A1
Принадлежит: Research in Motion Ltd

Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, encrypt and sign the composite message. Conveniently, security considerations are maintained even in view of bandwidth optimization measures.

Подробнее
07-06-2012 дата публикации

System and Method of Wireless Communication

Номер: US20120142327A1
Автор: Robert E. Urbanek
Принадлежит: Sprint Communications Co LP

A method of providing wireless communication service to a mobile phone is provided. The method comprises identifying common mobile phone applications and selectively supported mobile phone applications, installing the common mobile phone applications and the selectively supported mobile phone applications in read only memory of the mobile phone, each of the selectively supported applications associated with a selection switch initially disabled. The method further comprises, when activating the mobile phone, enabling at least one of the selection switches and writing at least one reference to branded content to a random access memory of the mobile phone based on a service plan associated with the mobile phone.

Подробнее
07-06-2012 дата публикации

Communication apparatus, control method for communication apparatus, and program

Номер: US20120144199A1
Автор: Toshifumi Hamachi
Принадлежит: Canon Inc

A communication apparatus of the present invention is a communication apparatus that communicates with a plurality of other communication apparatuses, and starts processing for setting an address for the communication apparatus using encrypted communication when encrypted communication with the plurality of communication apparatuses becomes possible by sharing encryption keys for encrypting communication with the other communication apparatuses.

Подробнее
14-06-2012 дата публикации

Method and apparatus for providing a subsidy-lock unlock procedure

Номер: US20120149329A1
Принадлежит: MOTOROLA MOBILITY LLC

A method and apparatus for providing a secure subsidy-lock unlock procedure for a wireless device is disclosed. A security subsidy-lock unlock password is received. Registration of the wireless device is initiated when the received password is determined to be correct. Notification of a registration status is received. Network access is restricted or allowed based on the registration status.

Подробнее
14-06-2012 дата публикации

Methods, systems, and computer program products for role- and locale-based mobile user device feature control

Номер: US20120149337A1
Принадлежит: Armstrong Quinton Co LLC

Methods, systems, and computer program products for role- and locale-based mobile user device feature control are disclosed. According to one aspect, a method for controlling at least one feature of a mobile user device based on a locale and a role of a user of the mobile user device is disclosed. The method includes storing, in a database, role information defining a plurality of different roles assigned to different user types and corresponding locale-based mobile user device feature control policies. In response to a mobile user device being within the locale, a role of the mobile user device is determined. A policy corresponding to the role is selected from a database. At least one feature of the mobile user device is controlled based on the locale-based feature control policy.

Подробнее
14-06-2012 дата публикации

System, method and computer program for anonymous localization

Номер: US20120149415A1
Принадлежит: Anthea Wain Sy Au, Chen Feng, Shahrokh Valaee

The present invention provides a system, method and computer program for anonymous localization. The location of a mobile device can be determined based on received signal strength (RSS) from one or more access points (APs) and a radio map. A radio map can be generated by measuring RSS at a set of fingerprints, which are a finite set of reference points within the area to be mapped.

Подробнее
14-06-2012 дата публикации

Method of Handling Access Control for Software and Application Control Management Object Client

Номер: US20120150947A1
Автор: Chun-Ta Yu, Yin-Yeh Tseng
Принадлежит: HTC Corp

A method of handling access control for a software and application control management object (SACMO) client is disclosed. The method comprises executing a transaction activated by a SACMO server; checking an access control list of a target node of a management object before executing the MO; and determining whether to execute the MO according to a checking result.

Подробнее
14-06-2012 дата публикации

Mobile electronic device configured to establish secure wireless communication

Номер: US20120151519A1
Автор: Olivier Guichard
Принадлежит: GEMALTO SA

The invention relates to a method for configuring a mobile device capable of reproducing, for a user, multimedia content previously provided by a remote content server. The invention relates to using a client installed on said electronic device to relay authentication requests between a card, preferably complying with the provisions of the Mobile Commerce Extension standard, and an authentication server that is accessible via an access point.

Подробнее
21-06-2012 дата публикации

Intelligent data network with power management capabilities

Номер: US20120155353A1
Принадлежит: FitSense Tech Inc

In one embodiment, a method for implementing two-way communication between at least first and second devices comprises steps of: (a1) during finite time periods following transmission of respective first messages from the first device to the second device, using the first device to listen for second messages transmitted from the second device to first device; and (a2) after each of the finite time periods following the transmission of the respective first messages from the first device to the second device, ceasing to use the first device to listen for second messages transmitted from the second device to the first device until after the first device transmits another first message to the second device.

Подробнее
21-06-2012 дата публикации

Method for conrolling access of subscribers in wireless communication system supporting femto cell and apparatus for the same

Номер: US20120157051A1

Disclosed is a method for controlling access of subscribers of a gateway in a communication system supporting a femto cell, the method including: by user equipment (UE), receiving a first access request message, which makes a request to access a femto base station (BS), from the femto BS; directly acquiring a business subscriber database (DB), which includes a list of UE admittable to access the femto BS, from a DB module; and determining whether to admit the access of the UE on the basis of the business subscriber DB, wherein the determining whether to admit the access of the UE includes admitting the access of the UE if a user equipment identifier (UE ID) for identifying the UE is included in the list of UE.

Подробнее
21-06-2012 дата публикации

Method for transmitting data in a sensor network, sensor node and central processor

Номер: US20120158903A1
Принадлежит: SIEMENS AG

A method for transmitting data in a sensor network, which comprises at least one sensor node and a central processor, is provided. The at least one sensor node repeatedly transmits a status message comprising at least one unique identifier associated with the sensor node and a data value determined by the sensor node to the central processor. Furthermore, at least one secure value range message is provided to the central processor for the at least one sensor node, which message is valid for a particular time span and comprises at least bounds for valid data values. The value contained in the status message is further processed by the central processor only if the data value is within the bounds indicated in the value range message.

Подробнее
21-06-2012 дата публикации

Evolved Packet System Non Access Stratum Deciphering Using Real-Time LTE Monitoring

Номер: US20120159151A1
Принадлежит: Tektronix Inc

A monitoring system is coupled to interfaces in an LTE network and passively captures packets from the network interfaces. First data packets associated with an authentication and key agreement procedure are captured on a first interface. Second data packets associated with the authentication and key agreement procedure are captured on a second interface. Individual ones of the first data packets are correlated to individual ones of the second data packets based upon a same parameter. An authentication vector table is created comprising information from the correlated first data packets and second data packets, wherein entries in the table comprise authentication data for a plurality of security contexts. A cipher key is identified to decipher additional packets for the user. The cipher key can also be identified in case of Inter Radio Access Technology Handover by the user equipment.

Подробнее
21-06-2012 дата публикации

Message-handling server and method for handling secure message attachments for a mobile device

Номер: US20120159164A1
Принадлежит: Individual

A secure message that includes an attachment is received at a server. The secure message may have a secure layer that indicates that the secure message is at least digitally signed. The secure message may be provided without the attachment to the mobile device over a wireless network. A request may be received from the mobile device to access the attachment. The request may include an attachment identifier (ID) that identifies the attachment in accordance with a message-attachment indexing system. In response to the request to access the attachment, the server may perform an index lookup to find the attachment based upon the attachment ID, may look through the secure layer of the secure message in order to locate the attachment within the secure message, and may render at least an initial portion of the attachment by the server in a format for viewing by the mobile device.

Подробнее