ELECTRICALLY INITIATED SECURITY DEVICE AND SYSTEM INCORPORATING SAME
    1.
    发明申请
    ELECTRICALLY INITIATED SECURITY DEVICE AND SYSTEM INCORPORATING SAME 有权
    电动起动安全装置和系统

    公开(公告)号:US20120295128A1

    公开(公告)日:2012-11-22

    申请号:US13563042

    申请日:2012-07-31

    IPC分类号: F42B3/00 B32B1/06 B32B3/28

    CPC分类号: C06B33/00 C06B45/00

    摘要: An electrically initiated security device includes a first energetic sheet, a second energetic sheet, and a corrugated energetic sheet disposed between the first energetic sheet and the second energetic sheet. A first surface of the corrugated energetic sheet defines at least one channel and a second surface of the corrugated energetic sheet defines at least one channel. The electrically initiated security device further includes a first constituent portion disposed in the at least one channel defined by the first surface and a second constituent portion disposed in the at least one channel defined by the second surface. The first constituent portion and the second constituent portion, when mixed, comprise an energetic material.

    摘要翻译: 电启动的安全装置包括第一能量片,第二能量片和布置在第一能量片和第二能量片之间的波纹能量片。 波纹能量片的第一表面限定至少一个通道,波纹能量片的第二表面限定至少一个通道。 电引发的安全装置还包括设置在由第一表面限定的至少一个通道中的第一构成部分和设置在由第二表面限定的至少一个通道中的第二构成部分。 当混合时,第一组成部分和第二组成部分包含高能材料。

    Software self-defense systems and methods
    3.
    发明申请
    Software self-defense systems and methods 审中-公开
    软件自卫系统和方法

    公开(公告)号:US20070234070A1

    公开(公告)日:2007-10-04

    申请号:US11506321

    申请日:2006-08-17

    摘要: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.

    摘要翻译: 公开了用于保护计算机程序免于未经授权的分析和修改的系统和方法。 混淆变换可以应用于计算机程序的本地结构,控制图和/或数据结构,以使程序更难于理解和/或修改。 防篡改机制可以并入计算机程序中,以检测篡改程序操作的尝试。 一旦检测到篡改计算机程序的尝试,则计算机程序将其报告给外部代理,停止正常操作,和/或反转由所尝试的篡改所做的任何修改。 计算机程序也可以加水印以便于其所有者的识别。 混淆,防篡改和水印变换可以应用于计算机程序的源代码,目标代码或可执行映像。

    Electrically initiated device and system incorporating same
    4.
    发明授权
    Electrically initiated device and system incorporating same 有权
    电子启动装置和结合相同的系统

    公开(公告)号:US08540829B2

    公开(公告)日:2013-09-24

    申请号:US13563042

    申请日:2012-07-31

    CPC分类号: C06B33/00 C06B45/00

    摘要: An electrically initiated security device includes a first energetic sheet, a second energetic sheet, and a corrugated energetic sheet disposed between the first energetic sheet and the second energetic sheet. A first surface of the corrugated energetic sheet defines at least one channel and a second surface of the corrugated energetic sheet defines at least one channel. The electrically initiated security device further includes a first constituent portion disposed in the at least one channel defined by the first surface and a second constituent portion disposed in the at least one channel defined by the second surface. The first constituent portion and the second constituent portion, when mixed, comprise an energetic material.

    摘要翻译: 电启动的安全装置包括第一能量片,第二能量片和布置在第一能量片和第二能量片之间的波纹能量片。 波纹能量片的第一表面限定至少一个通道,波纹能量片的第二表面限定至少一个通道。 电引发的安全装置还包括设置在由第一表面限定的至少一个通道中的第一构成部分和设置在由第二表面限定的至少一个通道中的第二构成部分。 当混合时,第一组成部分和第二组成部分包含高能材料。

    MODULAR CONNECTOR SYSTEM
    5.
    发明申请
    MODULAR CONNECTOR SYSTEM 有权
    模块式连接器系统

    公开(公告)号:US20110294348A1

    公开(公告)日:2011-12-01

    申请号:US12791657

    申请日:2010-06-01

    IPC分类号: H01R13/648

    摘要: A connector system includes a first connector comprising a housing holding a plurality of contacts, a second connector comprising a housing holding a plurality of contacts, and a metal shield having walls defining a shielded chamber. The first and second connectors are configured to be mounted to a circuit board in a stacked arrangement next to one another. The first and second connectors are configured to be arranged in a shielded configuration in which the first and second connectors are positioned within the shielded chamber and mounted to the circuit board with the metal shield. The first and second connectors are also configured to be arranged in an unshielded configuration in which the first and second connectors are mounted to the circuit board without the metal shield.

    摘要翻译: 连接器系统包括:第一连接器,包括容纳多个触点的壳体;第二连接器,包括容纳多个触点的壳体;以及具有限定屏蔽室的壁的金属屏蔽。 第一和第二连接器被配置为以彼此相邻的堆叠布置安装到电路板。 第一和第二连接器被配置为布置成屏蔽结构,其中第一和第二连接器位于屏蔽室内并且用金属屏蔽件安装到电路板。 第一和第二连接器还被配置为以非屏蔽配置布置,其中第一和第二连接器安装到没有金属屏蔽的电路板。

    Software self-defense systems and methods
    6.
    发明申请
    Software self-defense systems and methods 有权
    软件自卫系统和方法

    公开(公告)号:US20050204348A1

    公开(公告)日:2005-09-15

    申请号:US11129106

    申请日:2005-05-13

    IPC分类号: G06F9/44 G06F9/45 G06F21/00

    摘要: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.

    摘要翻译: 公开了用于保护计算机程序免于未经授权的分析和修改的系统和方法。 混淆变换可以应用于计算机程序的本地结构,控制图和/或数据结构,以使程序更难于理解和/或修改。 防篡改机制可以并入计算机程序中,以检测篡改程序操作的尝试。 一旦检测到篡改计算机程序的尝试,则计算机程序将其报告给外部代理,停止正常操作,和/或反转由所尝试的篡改所做的任何修改。 计算机程序也可以加水印以便于其所有者的识别。 混淆,防篡改和水印变换可以应用于计算机程序的源代码,目标代码或可执行映像。

    Modular connector system
    7.
    发明授权
    Modular connector system 有权
    模块化连接器系统

    公开(公告)号:US08123560B2

    公开(公告)日:2012-02-28

    申请号:US12791657

    申请日:2010-06-01

    IPC分类号: H01R13/648

    摘要: A connector system includes a first connector comprising a housing holding a plurality of contacts, a second connector comprising a housing holding a plurality of contacts, and a metal shield having walls defining a shielded chamber. The first and second connectors are configured to be mounted to a circuit board in a stacked arrangement next to one another. The first and second connectors are configured to be arranged in a shielded configuration in which the first and second connectors are positioned within the shielded chamber and mounted to the circuit board with the metal shield. The first and second connectors are also configured to be arranged in an unshielded configuration in which the first and second connectors are mounted to the circuit board without the metal shield.

    摘要翻译: 连接器系统包括:第一连接器,包括容纳多个触点的壳体;第二连接器,包括容纳多个触点的壳体;以及具有限定屏蔽室的壁的金属屏蔽。 第一和第二连接器被配置为以彼此相邻的堆叠布置安装到电路板。 第一和第二连接器被配置为布置成屏蔽结构,其中第一和第二连接器位于屏蔽室内并且用金属屏蔽件安装到电路板。 第一和第二连接器还被配置为以非屏蔽配置布置,其中第一和第二连接器安装到没有金属屏蔽的电路板。