摘要:
A communication system includes a base station and a service node. The service node communicates over the Internet. The base station establishes Internet connectivity over a communication link. The base station registers with the service node over the communication link and the Internet, and the service node validates the base station during registration. The base station and service node establish a tunnel over the communication link and the Internet. The base station exchanges user communications with wireless communication devices in a wireless format. The base station and service node exchange the user communications over the tunnel. The service node processes the user communications to provide a communication service to the wireless communication devices.
摘要:
A method, system, and computer-readable media are provided for transmitting wireless data across a coaxial cable. In one aspect, a set of computer-readable media provides a method that includes receiving a request from a mobile device for data and transmitting the data across a coaxial cable to a cable modem. The method further includes sending the data to the mobile device through a base station, wherein the base station communicates with the cable modem in order to receive the data.
摘要:
A cooking griddle has a burner with a valve controlling gas flow to the burner. The valve is rotatable through an increased arc for controlling flow of gas to the burner. A knob for rotating the valve includes indicia for indicating a relative position of the valve.
摘要:
Digital marks (so-called fingerprints and watermarks) serve two basic purposes: (1) Investigative: the owner reads a fingerprint to determine how the marked entity leaked; and (2) Legal: the owner must prove in court that (a) there is a watermark (a concealed copyright message), and (b) it is the owner's. The main difficulty of item (2) is that the first use of the watermark software reveals the watermarking method to the public so that hostile parties are equipped to remove or damage its watermarks. The invention uses tamper-resistant software encoding techniques to protect the digital mark extractor algorithm, frustrating the attacks of hostile parties in two ways: the resulting code is obscure (that is, its inner workings are incomprehensible; and chaotic (that is, a modification at any point will almost certainly produce a nonsense program.
摘要:
Base stations exchange information with users over first wireless communication links. A mobile switching center provides mobile telephone service. An Internet access system provides Internet access service. A data system provides a data service. An Ethernet backhaul system uses an Ethernet format to exchange the information between the base stations and the mobile switching center, the Internet access system, and the data system. Wireless interfaces are coupled to the base stations and are configured to exchange the information over second wireless links. Individual base stations detect a fault in the Ethernet backhaul system, and in response, to route the information away from the Ethernet backhaul system and to the wireless interfaces to provide service restoration.
摘要:
A video signal connection apparatus comprises an array of individual video signal connector contacts arranged in a matrix having connector contact rows and connector contact columns, the individual video signal connector contacts extending in a first connection ‘direction, a connector having individual connector contacts corresponding in number to the individual video signal connector contacts of the array, the individual connector contacts extending in a second connection direction, the second connection direction being orthogonal to the first connection direction and conductors interconnecting the individual video signal connector contacts to the individual connector contacts.
摘要:
A wireless communication system and its method of operation are disclosed. The wireless communication system comprises a subscriber system and a base station system. The subscriber system transfers a request for a communication service comprising a voice communication or web browsing. The base station system receives the request and receives traffic information for the wireless communication system. The base station selects a frame format for packets for the requested communication service based on the delivery requirements of the requested communication service and based on the traffic information. The base station system transfers an instruction to the subscriber system indicating the selected frame format for the packets. The subscriber system exchanges the packets for the requested communication service using the selected frame format with the base station system over a wireless communication link. The base station system exchanges the packets with a telephony network system or an internet system.
摘要:
Methods and systems related to increasing the cryptographic security of keys used by software with cryptographic functions. This is done by increasing the mathematical complexity of the software. The components and functions used by the software are first determined and, using these components, functions, and the data exchanged between them, the software is made more resistant to analysis. The methods used in increasing analytical resistance are grouped into 3 general types: adjusting the information exchanged between the components, replacing some components with different but related components, and adjusting the data flow between the components.
摘要:
There is a need in the computer software and data industries to protect content from unauthorized access to private information. Alphanumeric passwords have been shown to offer very weak protection. Biometrics (personal traits such as fingerprints and hand-written signatures) offer superior protection, but still have a number of weaknesses. The most significant weakness is that there is no existing way to protect the stored biometric data itself; and once a person's fingerprint data has been obtained by an attacker, the use of that fingerprint can no longer be considered secure. The invention solves the problem by securing the access software application that manages the biometric data using tamper-resistant encoding techniques. These tamper-resistant encoding techniques include: data-flow, control-flow, mass-data and white-box encoding.
摘要:
A great deal of intellectual property is currenttly handled digitally, in the from of audible, visual, or audio-visual files or data streams. With today's powerful electronic equipment and communication networks such as the internet, this digital content can be reproduced flawlessly and distributed without control. While attemps have been made to protect such digital content, none of the existing protection techniques have been successful. The invention provides a system and method of protecting digital content by integrating the digital content with an executable software package such as a digital media player, executing some sort of protection mechanism (such as password, watermark or encryption protection), and then encoding the software into a tamper-resistant form. In this way, the digital content can be used by initiating the executable software it was encoded with, but the content itself cannot be accessed, nor can the protection mechanism be cracked.