摘要:
FIG. 1 is a front perspective view of the silencer tube body of the present invention; FIG. 2 is a top plan view thereof; FIG. 3 is a front view thereof; FIG. 4 is a rear view thereof; FIG. 5 is a left-side view thereof; and, FIG. 6 is a right-side view thereof. The broken lines are for purposes of illustrating portions of the silencer tube body that form no part of the claimed design.
摘要:
Systems and methods may provide for wirelessly charging an electronic device powered by a rechargeable battery. The wireless charging device may simultaneously charge one or more electronic devices regardless of location and spatial orientation relative to the wireless charging device by inducing at least one electromagnetic field into a charging platform having a concave cross-section.
摘要:
A broadband receiving apparatus includes an antenna to receive a radio signal having a plurality of modulation frequencies. An amplifier drives a laser source from the broadband radio signal to produce an optical signal having a plurality of spectral components. A diffraction grating transforms the optical signal into its spectral components. An array of photo-detectors converts the spectral components into electronic signals corresponding to the plurality of modulation frequencies. A transmitting apparatus includes an array of coherent laser emitters driven by electronic signals corresponding to a plurality of modulation frequencies to produce optical signals corresponding to a plurality of spectral components. A diffraction grating inverse transforms the spectral components into a composite optical signal. A photo-detector converts the composite optical signal into a composite electronic signal including the plurality of modulation frequencies. An amplifier amplifies the composite electronic signal for transmission as a broadband radio signal.
摘要:
A system and method for the detection of fraudulent use of a wireless telephone system includes a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint of the unauthenticated wireless telephone. The system maintains a valid destination list specific for each authorized wireless telephone. Each valid destination list contains destinations considered to be valid for that particular authorized wireless telephone. When an unauthenticated wireless telephone transmits a call request containing a destination, the system classifies the call as valid when the destination is in the valid destination list for the authorized wireless telephone regardless of whether the fingerprint analyzer identifies the unauthenticated wireless telephone as fraudulent. The system may bypass or terminate the fingerprint analysis, or simply ignore the result of the fingerprint analysis by the fingerprint analyzer. The system also maintains an invalid destination list specific for each authorized wireless telephone with destinations considered to be invalid for that particular authorized wireless telephone. Calls to such destinations are blocked. The system further maintains a suspicious destination list containing destinations considered to be potentially fraudulent. When the destination contained in the call request is in the suspicious destination list, the fingerprint analysis is performed with a higher threshold to require a closer match between a fingerprint of the unauthenticated wireless telephone and a stored fingerprint of the corresponding authorized wireless telephone.
摘要:
A method and apparatus which provide the ability to disrupt normal completion of a specific call made through a wireless telephone system. The specified call can be forced to be immediately ended, re-routed immediately to a selectable destination, or linked to a local voice frequency interface. The disruption of the call can occur at any point in time over the duration of the call. The decision to disrupt the call, as well as which action to take against the call, can be selected manually by a human or automatically through a standard data interface provided. The call disruption apparatus can be interfaced to the wireless system through a circuit physically connected to the wireless telephone system equipment, or through a modulated radio frequency interface.
摘要:
A system and method extracts a portion of a transmitted waveform and compares the transmission characteristics of the extracted waveform to determine if they match a stored fingerprint associated with the transmitter, such as a cellular telephone. The system adaptively creates fingerprint data by storing a plurality of waveforms believed to be from a particular transmitter and calculates the variability of the individual transmissions with respect to a composite mean waveform of the transmission characteristics. The system emphasizes the variability between the individual waveforms and the composite mean waveform and determines variability values for each of the individual waveforms in the fingerprint. When the system receives an additional unidentified transmission purported to be from the transmitter with the stored fingerprint, the system determines whether the variability of the unidentified waveform fits within the predetermined margins of variability for the fingerprint. If the variability of the unidentified waveform is less than a predetermined variability threshold, the system considers the waveforms to be a suitable match. The system can adaptively include new waveforms in the fingerprint by determining whether the newly-received transmission characteristics meet a series of criteria for inclusion in the fingerprint. In addition, the system analyzes the newly-received waveform and all waveforms forming the fingerprint to determine if any of the waveforms exceed a predetermined maximum variability value. A waveform that exceeds the maximum variability value is eliminated from the fingerprint. The system is easily automated, thus providing a useful analysis technique for communications network such as cellular telephone systems where a large population of transmitters with similar transmission characteristics are operating at any given time.
摘要:
Some demonstrative embodiments include apparatuses, systems and/or methods of wireless power transfer. For example, an apparatus may include a controller to control a Wireless Power Transmitter (WPT) to transmit a sequence of probes during a detection period, to detect a Wireless Power Receiver (WPR) based on a detected induced load on the WPT during transmission of probe of the sequence of probes, and, upon detection of the WPR, to control the WPT to transmit a wireless charging signal to the WPR.
摘要:
Some demonstrative embodiments include apparatuses, systems and/or methods of wireless power transfer. For example, an apparatus may include a wireless power controller to communicate between a Wireless Power Receiver (WPR) and a Wireless Power Transmitter (WPT) an indication of a requested amount of power to be provided from the WPT to the WPR via a wireless power signal, said indication is in the form of a load modulation event within a predefined time interval, said load modulation event comprises a change in a level of a magnetic field of said wireless power signal, a duration of said load modulation event is based on the requested amount of power to be provided from the WPT to the WPR.