-
公开(公告)号:MY169605A
公开(公告)日:2019-04-22
申请号:MYPI2010002929
申请日:2010-06-21
Applicant: MIMOS BERHAD
Inventor: MASURI OTHMAN , AYMEN M KARIM , WAN ADIL BIN WAN JAMIL , AIRUL AZHA BIN ABD RAHMAN
Abstract: The present invention relates generally to a method and apparatus for predicting steady state response of a slow sensor reaction by utilising at least one batch of initial measured data for efficient data acquisition thereby saving time, energy and cost.
-
公开(公告)号:MY169586A
公开(公告)日:2019-04-22
申请号:MYPI2010000266
申请日:2010-01-19
Applicant: MIMOS BERHAD
Inventor: HON HOCK WOON
Abstract: The present invention provides for an imaging apparatus, which is used in a novel visual processing device. which provides assistance in parking or obstacle avoidance to the vehicle user. wherein the vehicle assist system comprising at least one imaging device for capturing video signals of an area surrounding a vehicle; an visual processing device for receiving the captured video signals from the imaging device; and a visual display device for displaying the processed video signal from the visual processing device, wherein the visual signal captured by the imaging device are mirror reflected video, signal captured by a single panoramic camera.
-
133.
公开(公告)号:MY169542A
公开(公告)日:2019-04-22
申请号:MYPI20071562
申请日:2007-09-18
Applicant: MIMOS BERHAD
Inventor: AHMAD HELMI BIN ABDUL HALIM
Abstract: The present invention relates to an apparatus and methodology of location based air interface/wireless protocol selector characterized in that wherein the apparatus comprises of at least one receiver (10), at least one transmitter (12), an antenna switch (14), a decoder or controller (16), a base station or SSID station (18) for storing ID database, a means power supply (20), a processing unit (22) and a master antenna (24) and wherein optionally, the above set of devices could be provided in duplicate and wherein all processing is done intelligently via the processing unit (22).
-
公开(公告)号:MY169097A
公开(公告)日:2019-02-18
申请号:MYPI2014702902
申请日:2014-10-01
Applicant: MIMOS BERHAD
Inventor: ALWYN GOH , POH GEONG SEN , MOESFA SOEHEILA MOHAMAD , CHOONG KHONG NENG
Abstract: The present invention provides a method for secure network establishment, via authentication of single-use passwords, or equivalent credentials, between a plurality of nodes (602, 702) undertaking a basic embodiment (602), a hardened embodiment (702) and a mixture of both basic and hardened embodiments. In the basic embodiment, particular node is designated a trusted party (601) with the method comprising previous provision, by the trusted party (501), of a single-use public key (612, 613) for use by any node in plurality thereof to confirm present use of a single-use password or credential (621) as subject to acknowledgment (624) by the trusted party in present instance of secure connectivity; verification (631) by any node in plurality thereof of such acknowledgement; and then independent computation of a session-key (632) also by any node in plurality thereof, with which to establish present instance of secure connectivity by means of Zero-Knowledge (ZK) integration of presently applicable password; previously received single-use public-key; and further provision, by the trusted party, of a subsequent single-use public-key for use by any node in the plurality thereof to confirm use of a subsequent single-use password or credential (523), as presently unknown, for a subsequent instance of secure connectivity. In the hardened embodiment, the method further comprises reciprocal previous provision, by particular node in plurality thereof, of a single-use public-key (717, 718) for use to undertake commitment (740) prior to establishment of present instance of secure connectivity by means of Zero-Knowledge (ZK) integration of presently applicable password or credential; previously transmitted single-use public-key; fine-grained context of commitment; and further provision, by particular node undertaking commitment, of a subsequent single-use public-key to undertake commitment in relation to subsequent instance of secure connectivity. Trusted party is able, by means of undertaking verification (750) of such commitments as received from plurality of nodes, to detect replay of passwords or credentials, or alternatively misuse of node-associated private-keys, by an unauthorized node seeking to participate in present instance of secure connectivity; and thereafter to undertake sanction, on such node that had attempted replay of password or credential, or misuse of private-key.
-
135.
公开(公告)号:MY168892A
公开(公告)日:2018-12-04
申请号:MYPI2012003072
申请日:2012-07-05
Applicant: MIMOS BERHAD
Inventor: DR ETTIKAN KANDASAMY A/L KARU
Abstract: The present invention provides a system for preemptive address conflict resolution in heterogeneous network environment, comprising a user device (12) and a conflict resolver (11) communicating with the user device. The conflict resolver comprises of a network address conflict verification and detection unit (14) for detecting address conflicts between network address of newly joined network device and existing addresses, wherein during verification, the network address of newly joined network device is verified against a network database (17) storing all existing network addresses, including both active and non-active network address. The conflict resolver (11) further comprises a conflict analysis list (18) that stores all detected conflict information. The system is operationally adapted to preemptively resolve any potential conflict address. Method for preemptive address conflict resolution is also provided herewith. (FIG. 1)
-
公开(公告)号:MY168819A
公开(公告)日:2018-12-04
申请号:MYPI2013702273
申请日:2013-11-27
Applicant: MIMOS BERHAD
Abstract: THE PRESENT INVENTION RELATES TO A METHOD FOR COORDINATING MULTIPLE ATTACKING DEVICES IN A WIRELESS COMMUNICATION NETWORK TO ATTACK A TARGET ACCESS POINT (AP), ONE AT A TIME WITHOUT JAMMING ANY FREQUENCY. THE METHOD IS CHARACTERIZED BY THE STEPS OF: SELECTING AN ATTACKING DEVICE FROM A LIST OF ATTACKING DEVICES (101); CONNECTING THE ATTACKING DEVICE TO THE TARGET AP (102); ALTERING TRANSMISSION PROTOCOL IN THE TARGET AP TO IDLE MODE (103), THEREAFTER DISENGAGING THE ATTACKING DEVICE FROM THE TARGET AP (104); NOTIFYING THE NEXT ATTACKING DEVICE SELECTED FROM THE LIST OF ATTACKING DEVICES TO CONNECT TO THE TARGET AP WHILE THE TARGET AP IS STILL IN THE IDLE MODE (105); AND REPEATING THE STEPS UNTIL EACH OF THE ATTACKING DEVICES IN THE LIST HAS ITS TURN ATTACKING THE TARGET AP (106). BEST ILLUSTRATIVE FIGURE: FIGURE 1
-
公开(公告)号:MY168771A
公开(公告)日:2018-12-04
申请号:MYPI2012005110
申请日:2012-11-27
Applicant: MIMOS BERHAD
Inventor: CHOONG KHONG NENG , POH GEONG SEN
Abstract: A SYSTEM AND METHOD FOR SECURE COMMUNICATION OVER WIRELESS NETWORK IS PROVIDED BY UTILIZING DUTY-SHARED AUTHENTICATED GROUP KEY TRANSPORT TO ENABLE SYMMETRIC-BASED AUTHENTICATED GROUP COMMUNICATION OVER WIRELESS NETWORK. THE SYSTEM (100) INCLUDES AN INITIATOR (102) CONFIGURED TO EXECUTE A SECURE GROUP MANAGER MODULE (108) IN ANNOUNCING GROUP SESSIONS, AUTHENTICATING AND DISTRIBUTING AUTHENTICATED SESSION TOKENS. A PARTICIPANT (104) IS CONFIGURED TO EXECUTED A SECURE GROUP HANDLER MODULE (112) IN AUTHENTICATING, RECEIVING A GROUP SESSION KEY AND JOINING SAID GROUP. A TRUSTED AUTHORITY (106) IS IN COMMUNICATION WITH THE INITIATOR (102) AND PARTICIPANT (104). THE TRUSTED AUTHORITY (106) IS CONFIGURED TO EXECUTE A SECURE GROUP ADMINISTRATOR MODULE (110) IN MEDIATING AND PROVIDING AUTHENTICATED SESSION TOKENS. THE INITIATOR HOST DOES NOT REQUIRE ANY SPECIFIC CONFIGURATION AND CAN BE ANY OF THE PARTICIPANTS. THE SECURE GROUP MANAGER MODULE GENERATES THE GROUP KEY WHILE THE SECURE GROUP ADMINISTRATOR MODULE MONITORS THE SESSION WHICH PROVIDES FOR SEPARATION OF DUTY (INITIATOR-ASSISTED). ENCRYPTION OF THE NONCE AND GROUP SESSION KEY IS PROVIDED BY UTILIZING AUTHENTICATED ENCRYPTION WITH FRESHNESS OF DYNAMIC CREDENTIAL ASSIGNMENT (SESSION IDs). THE MOST ILLUSTRATIVE DRAWING IS FIG. 1.
-
公开(公告)号:MY168041A
公开(公告)日:2018-10-11
申请号:MYPI2012003706
申请日:2012-08-16
Applicant: MIMOS BERHAD
Inventor: FAZRCIL AMREEN BIN ABDUL JALIL , SAFURAH BINTI HARUN
IPC: H04W8/24
Abstract: THE PRESENT INVENTION PROVIDES A VERSIONING MANAGER THAT IS TO BE IMPLEMENTED INTO A MOBILE COMPUTING DEVICE (105) AND IS CONFIGURED TO ENABLE THE MOBILE COMPUTING DEVICE (105) TO PERFORM THE FOLLOWING TASKS, INCLUDING: BACKING-UP MULTIPLE VERSIONED CONFIGURATION PROFILES THEREOF INTO A REMOTE REPOSITORY (115’), SELECTING ONE OF STORED MULTIPLE VERSIONED CONFIGURATION PROFILES IN THE REMOTE REPOSITORY (115’) USING A ROLLBACK MECHANISM FOR CONFIGURATION PROFILE RESTORATION, AND MUTUALLY EXCHANGING THE CONFIGURATION PROFILE THEREOF WITH AT LEAST ONE ANOTHER MOBILE DEVICE (105). THE MOBILE COMPUTING DEVICE (105) IS OPERATIVELY COMMUNICATED WITH THE REMOTE REPOSITORY (115’) VIA A NETWORK (100).
-
公开(公告)号:MY167959A
公开(公告)日:2018-10-08
申请号:MYPI2013701910
申请日:2013-10-10
Applicant: MIMOS BERHAD
Inventor: KOW WENG ONN , ARUN ANAND SADANANDAN , BENJAMIN CHU MIN XIAN , DICKSON LUKOSE , DANIEL BAHLS
IPC: G06F17/27
Abstract: The present invention relates to a system and method for semantic level sentiment analysis. The system (100) comprises of a graph generator component (10), a semantic sentiment analyser component (20), a sentiment processor component (30), a sentiment dictionary (40), a sentiment taxonomy (50), a semantic sentiment patterns repository (60) and a propagation rules repository (70). The system (100) accepts text data as input and analyses sentiment in the text. The method enables semantically valid sentiment in terms of the entire text as well as the individual entities in the text. The most illustrative drawing:
-
140.
公开(公告)号:MY167956A
公开(公告)日:2018-10-08
申请号:MYPI2014701658
申请日:2014-06-19
Applicant: MIMOS BERHAD
Inventor: WONG CHIN WEE
IPC: H04L12/24
Abstract: A SYSTEM AND METHOD FOR DETECTING AND RECOVERING LOST SIMPLE NETWORK MANAGEMENT PROTOCOL TRAPS The present invention relates to a system for monitoring transmission of Simple Network Management Protocol (SNMP) traps from a network element (10) to the network management station (20) and recovering SNMP traps which are lost, said SNMP trap is created by the network element (10) upon detecting an event affecting the network element (10). The network element (10) generates and maintains a sequence number for the SNMP trap, appends an identifier of the previously transmitted SNMP traps. A trap transmission database (13) stores the transmitted SNMP traps. A trap reception management module (22) provided identifies any lost SNMP trap according to the sequence number of the SNMP trap received, extracts the identifier of the lost SNMP trap, and requests lost SNMP trap retransmission from the network element. A trap reception database (23) is provided for storing the received SNMP trap. Best illustrative figure: Figure 1
-
-
-
-
-
-
-
-
-