COMBINED DEVICE AND SERVICE DISCOVERY TECHNIQUE IN STATIONS SUPPORTING TUNNELED DIRECT LINK SETUP (TDLS)
    41.
    发明申请
    COMBINED DEVICE AND SERVICE DISCOVERY TECHNIQUE IN STATIONS SUPPORTING TUNNELED DIRECT LINK SETUP (TDLS) 有权
    支持隧道直接链路建立(TDLS)的站点中的组合设备和服务发现技术

    公开(公告)号:US20100246502A1

    公开(公告)日:2010-09-30

    申请号:US12415636

    申请日:2009-03-31

    IPC分类号: H04W72/00 H04L12/66

    摘要: A tunneled direct link set-up (TDLS) capable wireless network may comprise a router such as an access point (AP) and a plurality of stations (STA) including service consumer and service provider station. A service consumer station may generate and send a layer-2 query frame to the plurality of stations. A service provider station may generate a layer-2 service frame in response to receiving the layer-2 query frame. The service consumer station may discover the service provider station and the services offered by the service provider station based on the layer-2 service frame. Also, the service consumer may discover the service provider station using layer-2 query frame and may discover the services offered by the service provider station using higher layer service discovery procedure.

    摘要翻译: 具有无线网络的隧道直接链路建立(TDLS)可以包括诸如接入点(AP)的路由器和包括服务用户和服务提供商站在内的多个站(STA)。 服务使用者站可以生成并向多个站发送第二层查询帧。 响应于接收到第二层查询帧,服务提供商站可以生成二层服务帧。 服务使用者站可以基于第二层服务帧发现服务提供商站和由服务提供商站提供的服务。 此外,服务使用者可以使用第二层查询帧发现服务提供商站,并且可以使用更高层服务发现过程来发现由服务提供商站提供的服务。

    System and method for integrating and controlling audio/video devices
    42.
    发明授权
    System and method for integrating and controlling audio/video devices 失效
    用于集成和控制音频/视频设备的系统和方法

    公开(公告)号:US07047554B1

    公开(公告)日:2006-05-16

    申请号:US09208064

    申请日:1998-12-09

    申请人: Victor B. Lortz

    发明人: Victor B. Lortz

    IPC分类号: H04N7/173

    摘要: A processor integrating and controlling at least two A/V devices by constructing a control model, referred to as a filter graph, of the at least two A/V devices as a function of a physical connection topology of the at least two A/V devices and a desired content to be rendered by one of the at least two A/V devices. The filter graph may be constructed as a function of at least two device filters corresponding to the at least two A/V devices, in which the device filters include certain characteristics of the at least two A/V device. These characteristics may include the input or output pins for each device, the media type that the A/V device may process, the type of functions that the device may serve, etc. The desired content may be received as a user input which is entered via a keyboard, mouse or other comparable input devices. In addition, the user input may be entered as a voice command, which may be parsed by the processor using conventional speech recognition algorithms or natural language processing to extract the necessary information. Once the filter graph is constructed, the processor may control the at least two A/V devices via the filter graph by invoking predetermined operations on the filter graph resulting in the appropriate commands being sent to the at least two A/V devices, thereby results in the rendering of the desired content.

    摘要翻译: 一种处理器,其通过根据所述至少两个A / V设备的物理连接拓扑结构构建所述至少两个A / V设备的称为滤波器图形的控制模型来集成和控制至少两个A / V设备 设备和由所述至少两个A / V设备之一呈现的期望内容。 滤波器图可以被构造为与至少两个A / V设备相对应的至少两个设备滤波器的功能,其中设备滤波器包括至少两个A / V设备的某些特性。 这些特征可以包括每个设备的输入或输出引脚,A / V设备可以处理的媒体类型,设备可以服务的功能的类型等。期望的内容可以作为输入的用户输入被接收 通过键盘,鼠标或其他类似的输入设备。 此外,用户输入可以作为语音命令输入,其可以由处理器使用常规语音识别算法或自然语言处理来解析以提取必要的信息。 一旦构建了滤波器图,处理器可以通过调用滤波器图上的预定操作经由滤波器图来控制至少两个A / V设备,导致适当的命令被发送到至少两个A / V设备,从而得到结果 在所需内容的呈现中。

    Method for assembling authorization certificate chains

    公开(公告)号:US08769266B2

    公开(公告)日:2014-07-01

    申请号:US12504009

    申请日:2009-07-16

    申请人: Victor B. Lortz

    发明人: Victor B. Lortz

    IPC分类号: H04L9/32 H04L29/06

    摘要: A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access.

    NEAR FIELD CONTACTLESS SYSTEM AND METHOD FOR ONLINE TRANSACTIONS
    44.
    发明申请
    NEAR FIELD CONTACTLESS SYSTEM AND METHOD FOR ONLINE TRANSACTIONS 审中-公开
    近场联动系统及在线交易方法

    公开(公告)号:US20140081860A1

    公开(公告)日:2014-03-20

    申请号:US13621474

    申请日:2012-09-17

    IPC分类号: G06Q20/32

    摘要: Systems, methods, and apparatuses are directed to conducting online transactions by virtue of a near field communication (NFC) reading mechanism configured to contactlessly read NFC-compliant provisioning information including a monetary value. Moreover, logic is configured to initiate establishment of a communication link, automatically send a request message to confirm the read provisioning information via the communication link, store at least a portion of the provisioning information in a secure memory unit, and based on the confirmation of the provisioning information, automatically present on a display unit, the monetary value, selectable transaction options, and an online information resource link to accommodate execution of a selected transaction option.

    摘要翻译: 系统,方法和装置旨在通过配置成非接触地读取包括货币值的NFC兼容供应信息的近场通信(NFC)读取机制来进行在线交易。 此外,逻辑被配置为启动通信链路的建立,通过通信链路自动发送请求消息以确认读取的供应信息,将安全信息的至少一部分存储在安全存储器单元中,并且基于确认 自动呈现在显示单元上的供应信息,货币价值,可选交易选项以及在线信息资源链接以适应所选交易选项的执行。

    METHOD AND SYSTEM FOR DECODING SMALL SIZED BARCODES FROM BLURRED IMAGES
    45.
    发明申请
    METHOD AND SYSTEM FOR DECODING SMALL SIZED BARCODES FROM BLURRED IMAGES 有权
    用于从BLEDI图像中解码小尺寸条形码的方法和系统

    公开(公告)号:US20140001265A1

    公开(公告)日:2014-01-02

    申请号:US13538958

    申请日:2012-06-29

    IPC分类号: G06K7/10 G06K7/12

    摘要: An apparatus, system, and method to identify a region of an image including a barcode based on, at least in part, an entity specific feature associated with the barcode; detect a codeword boundary for the barcode based on, at least in part, an adaptive boundary determination mechanism; and decode the codeword based on, at least in part, a plurality of metrics associated with the entity.

    摘要翻译: 至少部分地基于与条形码相关联的实体特定特征来识别包括条形码的图像的区域的装置,系统和方法; 至少部分地基于自适应边界确定机构来检测条形码的码字边界; 并且至少部分地基于与所述实体相关联的多个度量来解码所述码字。

    METHOD FOR ASSEMBLING AUTHORIZATION CERTIFICATE CHAINS FOR SIGNED XML
    46.
    发明申请
    METHOD FOR ASSEMBLING AUTHORIZATION CERTIFICATE CHAINS FOR SIGNED XML 有权
    组合用于签名XML的授权证书链的方法

    公开(公告)号:US20090282242A1

    公开(公告)日:2009-11-12

    申请号:US12504009

    申请日:2009-07-16

    申请人: Victor B. Lortz

    发明人: Victor B. Lortz

    IPC分类号: H04L9/32

    摘要: A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access.

    摘要翻译: 在授权者,客户端和第三方之间组合授权证书链的方法允许客户端保持对第三方访问的控制。 客户机从授权者存储提供对受保护资源的访问的第一个证书,并将第一个证书中的一些或全部权限委托给第二个证书中的第三方。 客户端存储与第一证书和第三方相关联的通用资源标识符(URI),并将第二证书和URI提供给第三方。 第三方通过提供第二证书和URI来访问受保护的资源,而不知道或拥有第一个证书。 当授权者访问URI时,客户端向授权者提供第一个证书,以便客户端保留对第三方访问的控制权。

    Extension of device driver objects
    47.
    发明授权
    Extension of device driver objects 有权
    扩展设备驱动程序对象

    公开(公告)号:US06694378B1

    公开(公告)日:2004-02-17

    申请号:US09218919

    申请日:1998-12-22

    申请人: Victor B. Lortz

    发明人: Victor B. Lortz

    IPC分类号: G06F1310

    CPC分类号: G06F9/4492

    摘要: Extending driver objects, such as device driver objects. In one embodiment, a system including a driver object, an auto-aggregator object, and a driver extension object. The driver object has a set of at least one standard interface. The auto-aggregator object is aggregated to the driver object by a blind aggregation mechanism. The driver extension object is aggregated to the driver object by an auto-aggregation mechanism invoked by the auto-aggregator object to provide a custom interface for the driver object. In another embodiment, an aggregation map is used to map the driver object to the driver extension object.

    摘要翻译: 扩展驱动程序对象,如设备驱动程序对象。 在一个实施例中,包括驱动器对象,自动聚合器对象和驱动器扩展对象的系统。 驱动对象有一组至少一个标准接口。 自动聚合器对象通过盲聚合机制聚合到驱动对象。 驱动程序扩展对象通过自动聚合机制调用的自动聚合机制聚合到驱动程序对象,为驱动程序对象提供自定义界面。 在另一个实施例中,聚合映射用于将驱动器对象映射到驱动器扩展对象。

    Method and apparatus to use smart phones to securely and conveniently monitor intel pcs remotely
    49.
    发明授权
    Method and apparatus to use smart phones to securely and conveniently monitor intel pcs remotely 有权
    使用智能手机远程监控英特尔PC的方法和设备

    公开(公告)号:US09521552B2

    公开(公告)日:2016-12-13

    申请号:US13977569

    申请日:2011-12-27

    摘要: Techniques for monitoring information technology (IT) assets using mobile devices are described herein. The mobile device is configured to wirelessly communicate with the IT asset using a near field communications (NFC) standard used to communicate over short distances. The IT asset is configured to include a monitoring device that is operable in a low power mode as well as in a normal power mode to monitor security related parameters. An alarm is generated in response to detecting a breach in security of the IT asset and the mobile device is notified of the alarm. A user may use the mobile device to send an encrypted message to the IT asset and instruct it to operate in a lockout mode, thereby protecting the digital assets accessible via the IT asset from unauthorized use.

    摘要翻译: 本文描述了使用移动设备监视信息技术(IT)资产的技术。 移动设备被配置为使用用于短距离通信的近场通信(NFC)标准与IT资产进行无线通信。 IT资产被配置为包括可在低功率模式以及正常功率模式下操作的监视设备,以监视安全性相关参数。 响应于检测到IT资产的安全性的违反而产生警报,并且向移动设备通知警报。 用户可以使用移动设备将加密的消息发送到IT资产并指示其以锁定模式操作,从而保护通过IT资产可访问的数字资产免于未经授权的使用。

    Establishing network security using internet protocol security policies
    50.
    发明授权
    Establishing network security using internet protocol security policies 有权
    使用互联网协议安全策略建立网络安全

    公开(公告)号:US08955098B2

    公开(公告)日:2015-02-10

    申请号:US13619811

    申请日:2012-09-14

    IPC分类号: G06F9/00 H04L29/06

    CPC分类号: H04L63/164 H04L63/102

    摘要: Techniques for configuring network security include obtaining non-packet flow information, evaluating a policy rule based on the obtained information, and proposing a security arrangement based on the evaluation. The non-packet flow information can include, for example, authentication information obtained during an Internet Key Exchange protocol session or information obtained from a layered service provider. Therefore, policies such as Internet Protocol security (IPsec) policies can be defined and implemented so that they more accurately reflect the network's security requirements.

    摘要翻译: 用于配置网络安全的技术包括获得非分组流信息,基于所获得的信息来评估策略规则,以及基于评估提出安全布置。 非分组流信息可以包括例如在因特网密钥交换协议会话期间获得的认证信息或从分层服务提供商获得的信息。 因此,可以定义和实现诸如因特网协议安全(IPsec)策略之类的策略,从而更准确地反映网络的安全需求。