GRANULAR ASSET TRACKING USING LANDMARK TAGS
    52.
    发明申请
    GRANULAR ASSET TRACKING USING LANDMARK TAGS 审中-公开
    颗粒资产跟踪使用地标标签

    公开(公告)号:WO2015069523A3

    公开(公告)日:2015-08-06

    申请号:PCT/US2014062949

    申请日:2014-10-29

    Applicant: QUALCOMM INC

    Abstract: An example method of asset tracking includes receiving, from each of one or more positioning devices, a corresponding position identification (ID) value, determining a tier value associated with each received position ID value, determining asset position information based on each received position ID value and each determined tier value, and transmitting the determined asset position information to a receiver.

    Abstract translation: 资产跟踪的示例方法包括从一个或多个定位设备中的每一个接收对应的位置标识(ID)值,确定与每个接收到的位置ID值相关联的层级值,基于每个接收到的位置ID值确定资产位置信息 以及每个确定的层级值,并将确定的资产位置信息发送到接收机。

    VARIABLE LISTEN DURATION AND SYNCHRONIZED WAKE-UP OF ASSET TAGS
    54.
    发明申请
    VARIABLE LISTEN DURATION AND SYNCHRONIZED WAKE-UP OF ASSET TAGS 审中-公开
    不同的收听时间和资产标签的同步唤醒

    公开(公告)号:WO2014209614A3

    公开(公告)日:2015-03-05

    申请号:PCT/US2014041954

    申请日:2014-06-11

    Applicant: QUALCOMM INC

    Abstract: A method of obtaining information for locating an asset includes: listening, at an asset tag, for a first listen duration for landmark messages; receiving, at the asset tag during the first listen duration, at least one landmark message from each of one or more landmark tags; selecting a synched landmark tag from the one or more landmark tags; abstaining from listening, at the asset tag, for landmark messages until approximately a subsequent transmission time of a synched landmark message corresponding to the synched landmark tag; and waking up at approximately the subsequent transmission time of the synched landmark message to listen, at the asset tag, for landmark messages for a second listen duration such that the asset tag listens for the landmark messages during the subsequent transmission time; wherein the first listen duration is longer than the second listen duration.

    Abstract translation: 获取用于定位资产的信息的方法包括:在资产标签处收听用于地标性消息的第一监听持续时间; 在第一监听期间的资产标签处接收来自一个或多个地标标签中的每一个的至少一个地标消息; 从一个或多个地标标签中选择同步的地标标签; 避免在资产标签处收听地标消息,直到与同步的地标标签相对应的同步地标消息的后续传输时间; 并且在所述同步的地标消息的后续发送时间醒来,在所述资产标签处收听用于第二监听持续时间的地标消息,使得所述资产标签在随后的发送时间期间监听所述地标消息; 其中所述第一监听持续时间长于所述第二监听持续时间。

    DISTANCE-BASED SECURITY
    56.
    发明申请
    DISTANCE-BASED SECURITY 审中-公开
    基于距离的安全

    公开(公告)号:WO2007121334A3

    公开(公告)日:2008-06-19

    申请号:PCT/US2007066588

    申请日:2007-04-13

    Abstract: Various operations may be performed based on distance-related functions associated with two or more devices. For example, one or more distance-based functions may be used to control whether a device is allowed to request another device to perform one or more functions. Similarly, one or more distance-based functions may be used to control whether a device may perform one or more functions requested by another device. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.

    Abstract translation: 可以基于与两个或更多个设备相关联的距离相关功能来执行各种操作。 例如,可以使用一个或多个基于距离的功能来控制是否允许设备请求另一个设备执行一个或多个功能。 类似地,可以使用一个或多个基于距离的功能来控制设备是否可以执行另一设备请求的一个或多个功能。 距离相关功能可以采取各种形式,包括例如设备之间的距离,设备之间的两个或更多个距离,设备之间的相对距离的变化率,设备之间的相对加速度,或两个或更多个 这些距离相关功能。

    MOBILE COMMERCE AUTHENTICATION AND AUTHORIZATION SYSTEMS
    57.
    发明申请
    MOBILE COMMERCE AUTHENTICATION AND AUTHORIZATION SYSTEMS 审中-公开
    移动商务认证和授权系统

    公开(公告)号:WO2010141456A2

    公开(公告)日:2010-12-09

    申请号:PCT/US2010036884

    申请日:2010-06-01

    CPC classification number: G06Q20/32 G06Q20/20 G06Q20/204 G06Q20/425

    Abstract: Mobile commerce authentication and authorization systems enable currently existing point-of-sale devices that are neither structurally nor systemically altered to conduct financial transactions with a customer using an access terminal across a wireless communications system. The point-of-sale devices receive an input from a payment instrument replacement, which identifies the transaction to the point-of-sale device as a transaction including an access terminal. Authentication of the user of the access terminal is achieved at least by application of position and/or location determinable features of the access terminal, the position and/or location of a point-of-sale device of a vendor or merchant where the customer seeks to purchase goods or services, and the payment sum entered on the point-of-sale device. A payment matching server may assist in processing the location data and the payment sum amount across communications network.

    Abstract translation: 移动商务认证和授权系统使得当前现有的销售点设备既不在结构上也不是系统地改变,以便通过无线通信系统使用接入终端与客户进行金融交易。 销售点设备从支付工具替换中接收输入,其将该交易标识到销售点设备作为包括接入终端的交易。 至少通过应用接入终端的位置和/或位置确定特征,客户寻找的供应商或商家的销售点设备的位置和/或位置来实现接入终端的用户的认证 购买商品或服务,以及在销售点设备上输入的付款金额。 支付匹配服务器可以协助处理跨通信网络的位置数据和支付金额。

    INITIAL SEED MANAGEMENT FOR PSEUDORANDOM NUMBER GENERATOR
    58.
    发明申请
    INITIAL SEED MANAGEMENT FOR PSEUDORANDOM NUMBER GENERATOR 审中-公开
    PSEUDORANDOM NUMBER GENERATOR的初步种子管理

    公开(公告)号:WO2008131444A3

    公开(公告)日:2009-04-23

    申请号:PCT/US2008061341

    申请日:2008-04-23

    CPC classification number: G06F7/582 G06F7/588 H04L9/0869

    Abstract: A secure seeding and reseeding scheme is provided for pseudorandom number generators by using a pre-stored initialization seed. This scheme initializes a pseudorandom number generator into an unknown state even when entropy collection is unavailable. A primary seed file and a shadow seed file are maintained with initialization seed information in a secure file system. If the primary seed file is corrupted, the pseudorandom number generator is seeded with the content of the shadow seed file. Additionally, a trusted timer or clock may be mixed with the pre-stored initialization seed to add entropy even when the pre-stored seed information has been compromised.

    Abstract translation: 通过使用预先存储的初始化种子为伪随机数发生器提供安全的种子和再种植方案。 即使熵收集不可用,该方案将伪随机数发生器初始化为未知状态。 在安全文件系统中,使用初始化种子信息维护主种子文件和影子种子文件。 如果主种子文件被破坏,则伪随机数生成器被种子与影子种子文件的内容。 此外,即使预先存储的种子信息已被破坏,可信任的定时器或时钟可以与预先存储的初始化种子混合以添加熵。

    METHOD FOR SECURELY EXTENDING KEY STREAM TO ENCRYPT HIGH-ENTROPY DATA
    59.
    发明申请
    METHOD FOR SECURELY EXTENDING KEY STREAM TO ENCRYPT HIGH-ENTROPY DATA 审中-公开
    用于安全地延长关键流道以加强高入侵数据的方法

    公开(公告)号:WO2008049046A3

    公开(公告)日:2008-10-09

    申请号:PCT/US2007081737

    申请日:2007-10-18

    CPC classification number: H04L9/0662 H04L2209/30

    Abstract: A stream stretcher is provided for securely expanding a key stream to match the length of a data block to be encrypted and/or decrypted. A key stream is obtained having a length of L Z bits. A length LD corresponding to a data block to be encrypted/decrypted is obtained, where L D > L Z . L D -L Z new bits are recursively generated by combining at least two bits of the key stream. The L D -L Z new bits are appended to the key stream to generate a stretched key stream. The data block may then be encrypted/decrypted with the stretched key stream. The at least two bits are selected to have offsets that form a full positive difference set.

    Abstract translation: 提供了流担架,用于安全地扩展密钥流以匹配要加密和/或解密的数据块的长度。 获得具有长度为L个Z位的密钥流。 获得对应于要加密/解密的数据块的长度LD,其中L L1> Z Z。 通过组合密钥流的至少两个比特递归地生成新的比特。 新的比特被添加到密钥流中以产生延伸的密钥流。 然后可以用拉伸的密钥流对数据块进行加密/解密。 选择至少两个位以具有形成完全正差分集的偏移。

    COMBINATIONAL COMBINER CRYPTOGRAPHIC METHOD
    60.
    发明申请
    COMBINATIONAL COMBINER CRYPTOGRAPHIC METHOD 审中-公开
    组合器密码方法

    公开(公告)号:WO2008076861A3

    公开(公告)日:2008-08-21

    申请号:PCT/US2007087526

    申请日:2007-12-14

    CPC classification number: H04L9/065 H04L2209/08

    Abstract: Another feature provides an efficient encryption method that safeguards the security of encrypted symbols. Each plaintext symbol is encrypted by using a separate pseudorandomly selected translation table. Rather than pre-storing every possible permutation of symbols as translation tables, the translation tables may be efficiently generated on-the-fly based on a pseudorandom number and a symbol shuffling algorithm. A receiving device may similarly generate reverse translation tables on-the-fly to decrypt received encrypted symbols.

    Abstract translation: 另一项功能提供了一种有效的加密方法,可以保护加密符号的安全。 每个明文符号都使用单独的伪随机选择的转换表进行加密。 基于伪随机数和符号混洗算法,可以有效地生成转换表,而不是预先存储符号的每个可能的置换作为转换表。 接收设备可以类似地即时生成反向转换表来解密接收到的加密符号。

Patent Agency Ranking