VEHICLE PARKING AND OBSTACLE AVOIDANCE SYSTEM USING A SINGLE PANORAMIC CAMERA

    公开(公告)号:MY169586A

    公开(公告)日:2019-04-22

    申请号:MYPI2010000266

    申请日:2010-01-19

    Applicant: MIMOS BERHAD

    Inventor: HON HOCK WOON

    Abstract: The present invention provides for an imaging apparatus, which is used in a novel visual processing device. which provides assistance in parking or obstacle avoidance to the vehicle user. wherein the vehicle assist system comprising at least one imaging device for capturing video signals of an area surrounding a vehicle; an visual processing device for receiving the captured video signals from the imaging device; and a visual display device for displaying the processed video signal from the visual processing device, wherein the visual signal captured by the imaging device are mirror reflected video, signal captured by a single panoramic camera.

    AN APPARATUS AND METHODOLOGY OF LOCATION BASED AIR INTERFACE/WIRELESS PROTOCOL SELECTOR

    公开(公告)号:MY169542A

    公开(公告)日:2019-04-22

    申请号:MYPI20071562

    申请日:2007-09-18

    Applicant: MIMOS BERHAD

    Abstract: The present invention relates to an apparatus and methodology of location based air interface/wireless protocol selector characterized in that wherein the apparatus comprises of at least one receiver (10), at least one transmitter (12), an antenna switch (14), a decoder or controller (16), a base station or SSID station (18) for storing ID database, a means power supply (20), a processing unit (22) and a master antenna (24) and wherein optionally, the above set of devices could be provided in duplicate and wherein all processing is done intelligently via the processing unit (22).

    METHOD FOR SECURE NETWORK ESTABLISHMENT VIA AUTHENTICATION OF SINGLE-USE PASSWORDS WITH COUNTER MEASURES AGAINST PASSWORD REPLAY

    公开(公告)号:MY169097A

    公开(公告)日:2019-02-18

    申请号:MYPI2014702902

    申请日:2014-10-01

    Applicant: MIMOS BERHAD

    Abstract: The present invention provides a method for secure network establishment, via authentication of single-use passwords, or equivalent credentials, between a plurality of nodes (602, 702) undertaking a basic embodiment (602), a hardened embodiment (702) and a mixture of both basic and hardened embodiments. In the basic embodiment, particular node is designated a trusted party (601) with the method comprising previous provision, by the trusted party (501), of a single-use public key (612, 613) for use by any node in plurality thereof to confirm present use of a single-use password or credential (621) as subject to acknowledgment (624) by the trusted party in present instance of secure connectivity; verification (631) by any node in plurality thereof of such acknowledgement; and then independent computation of a session-key (632) also by any node in plurality thereof, with which to establish present instance of secure connectivity by means of Zero-Knowledge (ZK) integration of presently applicable password; previously received single-use public-key; and further provision, by the trusted party, of a subsequent single-use public-key for use by any node in the plurality thereof to confirm use of a subsequent single-use password or credential (523), as presently unknown, for a subsequent instance of secure connectivity. In the hardened embodiment, the method further comprises reciprocal previous provision, by particular node in plurality thereof, of a single-use public-key (717, 718) for use to undertake commitment (740) prior to establishment of present instance of secure connectivity by means of Zero-Knowledge (ZK) integration of presently applicable password or credential; previously transmitted single-use public-key; fine-grained context of commitment; and further provision, by particular node undertaking commitment, of a subsequent single-use public-key to undertake commitment in relation to subsequent instance of secure connectivity. Trusted party is able, by means of undertaking verification (750) of such commitments as received from plurality of nodes, to detect replay of passwords or credentials, or alternatively misuse of node-associated private-keys, by an unauthorized node seeking to participate in present instance of secure connectivity; and thereafter to undertake sanction, on such node that had attempted replay of password or credential, or misuse of private-key.

    SYSTEM AND METHOD FOR PRE-EMPTIVE ADDRESS CONFLICT RESOLUTION IN AUTOMATIC DEVICE ADDRESS ASSIGNMENTS

    公开(公告)号:MY168892A

    公开(公告)日:2018-12-04

    申请号:MYPI2012003072

    申请日:2012-07-05

    Applicant: MIMOS BERHAD

    Abstract: The present invention provides a system for preemptive address conflict resolution in heterogeneous network environment, comprising a user device (12) and a conflict resolver (11) communicating with the user device. The conflict resolver comprises of a network address conflict verification and detection unit (14) for detecting address conflicts between network address of newly joined network device and existing addresses, wherein during verification, the network address of newly joined network device is verified against a network database (17) storing all existing network addresses, including both active and non-active network address. The conflict resolver (11) further comprises a conflict analysis list (18) that stores all detected conflict information. The system is operationally adapted to preemptively resolve any potential conflict address. Method for preemptive address conflict resolution is also provided herewith. (FIG. 1)

    METHOD FOR COORDINATING MULTIPLE ATTACKING DEVICES IN A WIRELESS COMMUNICATION NETWORK

    公开(公告)号:MY168819A

    公开(公告)日:2018-12-04

    申请号:MYPI2013702273

    申请日:2013-11-27

    Applicant: MIMOS BERHAD

    Abstract: THE PRESENT INVENTION RELATES TO A METHOD FOR COORDINATING MULTIPLE ATTACKING DEVICES IN A WIRELESS COMMUNICATION NETWORK TO ATTACK A TARGET ACCESS POINT (AP), ONE AT A TIME WITHOUT JAMMING ANY FREQUENCY. THE METHOD IS CHARACTERIZED BY THE STEPS OF: SELECTING AN ATTACKING DEVICE FROM A LIST OF ATTACKING DEVICES (101); CONNECTING THE ATTACKING DEVICE TO THE TARGET AP (102); ALTERING TRANSMISSION PROTOCOL IN THE TARGET AP TO IDLE MODE (103), THEREAFTER DISENGAGING THE ATTACKING DEVICE FROM THE TARGET AP (104); NOTIFYING THE NEXT ATTACKING DEVICE SELECTED FROM THE LIST OF ATTACKING DEVICES TO CONNECT TO THE TARGET AP WHILE THE TARGET AP IS STILL IN THE IDLE MODE (105); AND REPEATING THE STEPS UNTIL EACH OF THE ATTACKING DEVICES IN THE LIST HAS ITS TURN ATTACKING THE TARGET AP (106). BEST ILLUSTRATIVE FIGURE: FIGURE 1

    A SYSTEM AND METHOD FOR DUTY-SHARED AUTHENTICATED GROUP KEY TRANSPORT

    公开(公告)号:MY168771A

    公开(公告)日:2018-12-04

    申请号:MYPI2012005110

    申请日:2012-11-27

    Applicant: MIMOS BERHAD

    Abstract: A SYSTEM AND METHOD FOR SECURE COMMUNICATION OVER WIRELESS NETWORK IS PROVIDED BY UTILIZING DUTY-SHARED AUTHENTICATED GROUP KEY TRANSPORT TO ENABLE SYMMETRIC-BASED AUTHENTICATED GROUP COMMUNICATION OVER WIRELESS NETWORK. THE SYSTEM (100) INCLUDES AN INITIATOR (102) CONFIGURED TO EXECUTE A SECURE GROUP MANAGER MODULE (108) IN ANNOUNCING GROUP SESSIONS, AUTHENTICATING AND DISTRIBUTING AUTHENTICATED SESSION TOKENS. A PARTICIPANT (104) IS CONFIGURED TO EXECUTED A SECURE GROUP HANDLER MODULE (112) IN AUTHENTICATING, RECEIVING A GROUP SESSION KEY AND JOINING SAID GROUP. A TRUSTED AUTHORITY (106) IS IN COMMUNICATION WITH THE INITIATOR (102) AND PARTICIPANT (104). THE TRUSTED AUTHORITY (106) IS CONFIGURED TO EXECUTE A SECURE GROUP ADMINISTRATOR MODULE (110) IN MEDIATING AND PROVIDING AUTHENTICATED SESSION TOKENS. THE INITIATOR HOST DOES NOT REQUIRE ANY SPECIFIC CONFIGURATION AND CAN BE ANY OF THE PARTICIPANTS. THE SECURE GROUP MANAGER MODULE GENERATES THE GROUP KEY WHILE THE SECURE GROUP ADMINISTRATOR MODULE MONITORS THE SESSION WHICH PROVIDES FOR SEPARATION OF DUTY (INITIATOR-ASSISTED). ENCRYPTION OF THE NONCE AND GROUP SESSION KEY IS PROVIDED BY UTILIZING AUTHENTICATED ENCRYPTION WITH FRESHNESS OF DYNAMIC CREDENTIAL ASSIGNMENT (SESSION IDs). THE MOST ILLUSTRATIVE DRAWING IS FIG. 1.

    A CONFIGURATION PROFILE MANAGEMENT SYSTEM FOR MOBILE DEVICES

    公开(公告)号:MY168041A

    公开(公告)日:2018-10-11

    申请号:MYPI2012003706

    申请日:2012-08-16

    Applicant: MIMOS BERHAD

    Abstract: THE PRESENT INVENTION PROVIDES A VERSIONING MANAGER THAT IS TO BE IMPLEMENTED INTO A MOBILE COMPUTING DEVICE (105) AND IS CONFIGURED TO ENABLE THE MOBILE COMPUTING DEVICE (105) TO PERFORM THE FOLLOWING TASKS, INCLUDING: BACKING-UP MULTIPLE VERSIONED CONFIGURATION PROFILES THEREOF INTO A REMOTE REPOSITORY (115’), SELECTING ONE OF STORED MULTIPLE VERSIONED CONFIGURATION PROFILES IN THE REMOTE REPOSITORY (115’) USING A ROLLBACK MECHANISM FOR CONFIGURATION PROFILE RESTORATION, AND MUTUALLY EXCHANGING THE CONFIGURATION PROFILE THEREOF WITH AT LEAST ONE ANOTHER MOBILE DEVICE (105). THE MOBILE COMPUTING DEVICE (105) IS OPERATIVELY COMMUNICATED WITH THE REMOTE REPOSITORY (115’) VIA A NETWORK (100).

    SYSTEM AND METHOD FOR SEMANTIC-LEVEL SENTIMENT ANALYSIS OF TEXT

    公开(公告)号:MY167959A

    公开(公告)日:2018-10-08

    申请号:MYPI2013701910

    申请日:2013-10-10

    Applicant: MIMOS BERHAD

    Abstract: The present invention relates to a system and method for semantic level sentiment analysis. The system (100) comprises of a graph generator component (10), a semantic sentiment analyser component (20), a sentiment processor component (30), a sentiment dictionary (40), a sentiment taxonomy (50), a semantic sentiment patterns repository (60) and a propagation rules repository (70). The system (100) accepts text data as input and analyses sentiment in the text. The method enables semantically valid sentiment in terms of the entire text as well as the individual entities in the text. The most illustrative drawing:

    A SYSTEM AND METHOD FOR DETECTING AND RECOVERING LOST SIMPLE NETWORK MANAGEMENT PROTOCOL TRAPS

    公开(公告)号:MY167956A

    公开(公告)日:2018-10-08

    申请号:MYPI2014701658

    申请日:2014-06-19

    Applicant: MIMOS BERHAD

    Inventor: WONG CHIN WEE

    Abstract: A SYSTEM AND METHOD FOR DETECTING AND RECOVERING LOST SIMPLE NETWORK MANAGEMENT PROTOCOL TRAPS The present invention relates to a system for monitoring transmission of Simple Network Management Protocol (SNMP) traps from a network element (10) to the network management station (20) and recovering SNMP traps which are lost, said SNMP trap is created by the network element (10) upon detecting an event affecting the network element (10). The network element (10) generates and maintains a sequence number for the SNMP trap, appends an identifier of the previously transmitted SNMP traps. A trap transmission database (13) stores the transmitted SNMP traps. A trap reception management module (22) provided identifies any lost SNMP trap according to the sequence number of the SNMP trap received, extracts the identifier of the lost SNMP trap, and requests lost SNMP trap retransmission from the network element. A trap reception database (23) is provided for storing the received SNMP trap. Best illustrative figure: Figure 1

Patent Agency Ranking