ANCHOR PIN LEAD FRAME
    2.
    发明申请
    ANCHOR PIN LEAD FRAME 审中-公开
    锚链引脚框架

    公开(公告)号:WO2010068577A3

    公开(公告)日:2010-08-19

    申请号:PCT/US2009066929

    申请日:2009-12-07

    Inventor: PON HARRY

    Abstract: In some embodiments, a surface mount component includes a housing and one or more leads extending from the housing, wherein the one or more leads define respective voids through respective ends of the one or more leads. For example, the one or more leads may define a through-hole at respective ends of the one or more leads. For example, the fixing material may include solder. For example, the solder may form a pin which helps secure the surface mount component to the printed circuit board. Other embodiments are disclosed and claimed.

    Abstract translation: 在一些实施例中,表面安装部件包括壳体和从壳体延伸的一个或多个引线,其中所述一个或多个引线通过所述一个或多个引线的相应端部限定相应的空隙。 例如,一个或多个引线可以在一个或多个引线的相应端部处限定通孔。 例如,固定材料可以包括焊料。 例如,焊料可以形成销钉,其有助于将表面安装部件固定到印刷电路板。 其他实施例被公开和要求保护。

    THEFT PROTECTION OF A WIRELESS DEVICE AND CONTENT PROTECTION ON THE DEVICE
    3.
    发明申请
    THEFT PROTECTION OF A WIRELESS DEVICE AND CONTENT PROTECTION ON THE DEVICE 审中-公开
    无线设备的保护和设备上的内容保护

    公开(公告)号:WO2006044746A3

    公开(公告)日:2006-08-31

    申请号:PCT/US2005037170

    申请日:2005-10-13

    Abstract: A wireless device, such as a laptop computer or a cellular phone, may contain confidential information which may be secured by an internal security system. When the device is stolen, the user can provide a portion of a kill code to a wireless service provider. The wireless service provider provides its own portion of the kill code and combines it with the user's supplied code. Then, the service provider may transmit the combined kill code to the wireless device. Upon receipt, the wireless device may erase all confidential information on the device. In other embodiments, it may erase any unlocked block of memory. As still another alternative, the system may also, upon receipt of the combined kill code, disable the operating system.

    Abstract translation: 诸如膝上型计算机或蜂窝电话的无线设备可以包含可由内部安全系统保护的机密信息。 当设备被盗时,用户可以向无线服务提供商提供杀死代码的一部分。 无线服务提供商提供自己的杀死代码部分,并将其与用户提供的代码组合。 然后,服务提供商可以将组合的杀死代码发送到无线设备。 收到后,无线设备可能会清除设备上的所有机密信息。 在其他实施例中,它可以擦除任何未锁定的存储块。 作为另一替代方案,系统还可以在接收到组合的杀死代码时禁用操作系统。

Patent Agency Ranking