DETERMINING THE PRECISE GEOLOCATION OF A WIRELESS INTERNET TARGET
    1.
    发明申请
    DETERMINING THE PRECISE GEOLOCATION OF A WIRELESS INTERNET TARGET 审中-公开
    确定无线互联网目标的精细化

    公开(公告)号:WO2015138971A1

    公开(公告)日:2015-09-17

    申请号:PCT/US2015/020555

    申请日:2015-03-13

    Inventor: SHUE, Craig

    Abstract: The techniques herein describe an approach that can quickly geolocate Internet users that are connected through a wireless (e.g., WiFi) network. To do so, one or more embodiments herein send specially-crafted signals to the user's IP address. When these signals are broadcast by the user's wireless router to the user's wireless device, they have a discernible signature. Other geolocation efforts may then be used to scope the Internet user's location (e.g., to the appropriate city or section of a city). A user or automated device may then physically traverse (e.g., drive through) the search area listening on wireless channels for the discernible wireless signature. Once it is located, directional antennas and triangulation may be used to exactly locate the user.

    Abstract translation: 这里的技术描述了一种可以快速地定位通过无线(例如,WiFi)网络连接的互联网用户的方法。 为此,本文中的一个或多个实施例将特制信号发送到用户的IP地址。 当这些信号被用户的无线路由器广播到用户的无线设备时,它们具有可识别的签名。 然后可以使用其他地理位置工作来限制因特网用户的位置(例如,到城市的适当的城市或部分)。 用户或自动化设备然后可以物理地遍历(例如,驱动)在无线信道上侦听无线签名的搜索区域。 一旦定位,可以使用定向天线和三角测量来精确定位用户。

    METHOD AND APPARATUS FOR PROVIDING ISOLATED ASSET ACCESS IN A LAYERED SECURITY SYSTEM

    公开(公告)号:WO2023044020A1

    公开(公告)日:2023-03-23

    申请号:PCT/US2022/043825

    申请日:2022-09-16

    Abstract: Embodiments of the innovation relate to a server device, comprising a controller having a memory and a processor, the controller configured to establish a first secure environment with a client device, the first secure environment having an associated server asset policy; provide the asset to the client device via the first secure environment; receive a request from the client device, via the first secure environment, to utilize the asset with a user-selected application according to a user-selected asset policy; establish a second secure environment with the client device, the second secure environment having the user-selected application and the associated user-selected asset policy and the second secure environment isolated from the first secure environment; and provide the asset to the client device via the second secure environment.

Patent Agency Ranking