Abstract:
As system for locating a network node may be implemented as a static network device for determining location of a mobile node. The system includes a transceiver for receiving a device identifier over a public network from the mobile node, the device identifier based on a user-configurable parameter and a non-user-configurable parameter of the mobile node, and a processor coupled to the transceiver and to memory containing executable code. When executed, the code effects method steps for: accessing, in response to the transceiver receiving the device identifier, a database of authorized device identifiers corresponding to known mobile nodes, establishing, in response to the device identifier matching one of the authorized device identifiers, a secure private network with the mobile node, and communicating with two additional static network devices, the three static network devices implementing triangulation to determine a location of the mobile node.
Abstract:
A system for content delivery operates as a static network device for delivering content to a mobile node. The system includes a transceiver adapted to receive a device identifier over a public network from the mobile node, the device identifier based on a combination of user-configurable and non-user-configurable parameters of the mobile node, a processor operatively coupled to the transceiver and to memory storing executable code. Executed, the code enables the processor to access a database of authorized device identifiers corresponding to known mobile nodes, establish, in response to the received device identifier matching one of the authorized device identifiers, a secure private network (SPN) with the mobile node, the established SPN tunneling across a segment of the public network, obtain the content for the mobile node, and send the content to the mobile node via the SPN.
Abstract:
A method for reducing piracy in software activation may be implemented on a computer readable medium storing software instructions that execute the method, which includes steps for receiving a media identifier of a media and a device identifier from a first remote device executing the media, the device identifier being based on a combination of a user-configurable parameter and a non-user-configurable parameter of the first remote device, granting a usage license for the media to the first remote device, correlating the usage license with the media identifier and the device identifier, generating a sale metric for the media based on a number of usage license granted, determining a piracy metric of the media based on availability of illegal copies of the media, and charging a publisher of the media a fee based on the sale and piracy metrics.
Abstract:
As system for locating a network node may be implemented as a static network device for determining location of a mobile node. The system includes a transceiver for receiving a device identifier over a public network from the mobile node, the device identifier based on a user-configurable parameter and a non-user-configurable parameter of the mobile node, and a processor coupled to the transceiver and to memory containing executable code. When executed, the code effects method steps for: accessing, in response to the transceiver receiving the device identifier, a database of authorized device identifiers corresponding to known mobile nodes, establishing, in response to the device identifier matching one of the authorized device identifiers, a secure private network with the mobile node, and communicating with two additional static network devices, the three static network devices implementing triangulation to determine a location of the mobile node.
Abstract:
A slope sensitive pitch adjustor for a bicycle seat includes a rotatable seat support, a gravity sensor mounted thereto, a means for rotating the rotatable seat support, and an automated controller configured to drive the rotating means in response to an acceleration signal received from the gravity sensor. The automated controller stores data representing an initial condition of a pitch angle of the rotatable seat support with respect to horizontal and executes a control algorithm to maintain the initial condition when the bicycle is ridden over changing gradients.
Abstract:
A method for protecting software from tampering includes steps for processing, using a computer, first compiled software stored in a computer memory to generate a cryptographic key, the first compiled software configured to perform software protection functions and defined second functions distinct from the software protection functions when executed by a computer processor, the cryptographic key consisting of a first portion of the first compiled software comprising executable code compiled from the software protection functions, encrypting a second portion of the first compiled software using the cryptographic key to produce second compiled software comprising the first portion in unencrypted form and the second portion encrypted with the cryptographic key, wherein the second portion comprises executable code compiled from the defined second functions, and storing the second compiled software in a computer memory for distribution to a client device.
Abstract:
A system for securing an electronic communication comprises a gateway server configured to receive and store a device identifier and a network address from a first computing device. The device identifier identifies the first computing device, and the network address is associated with the first computing device. Thereafter, the gateway server receives from a second computing device the network address of the first computing device and an encryption key request. The gateway server derives from the device identifier for the first computing device an encryption key and sends the encryption key to the second computing device. A communication from the second computing device to the first computing device may thereafter be secured using the encryption key. A related method of securing an electronic communication is also disclosed.
Abstract:
A method achieves secure mobile communications by authenticating a mobile device seeking communication with a secure server. The method prescribes steps for generating a code to indicate a plurality of portions of a digital fingerprint to request from the mobile device, each portion representing a different parameter of the mobile device, sending the code to the mobile device, receiving from the mobile device a response code representing the requested plurality of portions of the digital fingerprint, comparing each portion of the received plurality of portions with one or more predetermined codes, and granting the mobile device an access privilege when results of the comparison satisfy a predetermined minimum accuracy.
Abstract:
A method for protecting software from tampering includes steps for processing first compiled software stored in a computer memory to generate a first key part, the first compiled software configured to perform software protection functions and defined second functions distinct from the software protection functions when executed, and the first key part consisting of a first portion of the first compiled software comprising executable code compiled from the software protection functions, generating an identifier and a second key part for each of the defined second functions, generating a cryptographic key determined from the first key part and the second key part, encrypting a second portion of the first compiled software using the cryptographic key to produce second compiled software comprising the first portion in unencrypted form and the second portion encrypted with the cryptographic key, wherein the second portion comprises executable code compiled from the defined second functions, and storing the second compiled software in a computer memory for distribution to a client device.
Abstract:
A system for activating the use of software on a computing device comprises an activation server configured so that in response to a communication link being available between the activation server and the computing device, the activation server (1) receives from the computing device, via the communication link, an activation request including (a) a software identifier identifying the software, (b) a device identifier identifying the computing device, and (c) a digital media identifier identifying a digital media, wherein the software is delivered to a user on the digital media, (2) accesses a database storing known software identifiers, device identifiers, and digital media identifiers, (3) determines an activation instruction through a comparison between the activation request and known software identifiers, device identifiers, and digital media identifiers, and (4) sends the activation instruction to the computing device. A related method for activating the use of software is also disclosed.