Abstract:
An emitter and a plurality of sensors and are used to detect the relative positions between an elevator platform and landing sill. The emitters radiate energy through a reflection duct formed between the elevator platform and the landing sill. The plurality of sensors monitor the reflection duct so that radiated energy is detected. The sensors provide level signals in response to the radiated energy. A means responsive to the level signals determines when the platform is level with respect to the landing sill.
Abstract:
Accurate location information about a mobile telecommunication transceiver is used to generate advertising content responsive to a user approaching the location of a business. This advertising content is tailored to the user's preferences and the particular business involved. Once the advertising content is delivered, the position of the user is monitored to track the effectiveness of the advertisement. If the user enters the business' store and/or makes a purchase, the advertisement is logged as having been successful. If the user does not enter the store within a predetermined period of time or moves away from the store, the advertisement is considered to have been ineffective.
Abstract:
The pseudorandom process iteratively applies a selected CRC encryption process on the information to be encrypted. The encryption process is selected by testing one of the digits comprising the number to be encrypted. A first encryption process is used if the tested digit is a 1; a second encryption process is used if the tested digit is a 0. The process is repeated a plurality of times, e.g. once for each digit in the number to be encrypted, resulting in a highly encrypted value that is not easily reverse engineered by chosen or known plaintext attack.
Abstract:
An automobile door lock receiver module (30) and a plurality of keychain fob transmitter units (16) contain identification numbers, secret initial values, and secret feedback masks so as to authenticate encrypted messages from any of the assigned fobs, indicative of commands registered by closing switches on the fob. Each fob is synchronized with the receiving module by means of a truly random number concatenated with a secret initial value and encrypted, through a linear feedback shift register or other operations. A second secret initial value is encrypted and command bits are exclusive ORed into the low order bit positions; the two encrypted numbers are concatenated and encrypted to form a key word which is transmitted with the fob ID. Synchronization includes decrypting to recover the truly random number and the secret initial value concatenated therewith; the truly random number is compared with previously received random numbers in order to avoid copying of recently transmitted synchronization commands. Successive lock-related commands utilize the number encrypted from the truly random number and the second secret initial value as starting values, employing a pseudorandom number of encryption iterations. A half-second delay between responses mitigates gaining access through numerical trials. An authenticated panic alarm command operates the headlights and horn of the vehicle but does not alter the synchronization.
Abstract:
An automobile door receiver module (30) and a plurality of keychain fob transmitter units (16) contain identification numbers, secret initial values, and secret feedback masks so as to authenticate encrypted messages from any of the assigned fobs, indicative of commands registered by closing switches on the fob. Each fob is synchronized with the receiving module by means of a truly random number concatenated with a secret initial value and encrypted, through a linear feedback shift register or other operations. A second secret initial value is encrypted and command bits are exclusive ORed into the low order bit positions; the two encrypted numbers are concatenated and encrypted to form a key word which is transmitted with the fob ID. Synchronization includes decrypting to recover the truly random number and the secret initial value concatenated therewith; the truly random number is compared with previously received random numbers in order to avoid copying of recently transmitted synchronization commands. Successive lock-related commands utilize the number encrypted from the truly random number and the second secret initial value as starting values, employing a pseudorandom number of encryption iterations. A half-second delay between responses mitigates gaining access through numerical trials. An authenticated panic alarm command operates the headlights and horn of the vehicle but does not alter the synchronization.
Abstract:
A wireless vehicle door assembly includes a conductive layer sandwiched between two nonconductive layers. An input terminal provides a connection between the conductive layer and a plurality of wires from another portion of the vehicle. A plurality of connectors couple a plurality of loads to the conductive layer. Electrical power and signals are propagated along the conductive layer to control the various loads.
Abstract:
The present invention teaches a method of generating a secret identification number from a random digital data stream. The method comprises the step of initially selecting a first and a second group of bytes from the random digital data stream, wherein the first and second groups of bytes have a first and second numerical value. Subsequently, a first maximal length LFSR feedback term is looked up from a list in response to said first numerical value, while a second maximal length LFSR feedback term is looked up from the list in response to said second numerical value. The method additionally comprises the step of generating a cyclic redundancy code feedback term in response to executing a cyclic redundancy code check on a third group of bytes selected from the random digital data stream. Moreover, the method comprises the step of forming the secret identification number from the first and second maximal length LFSR feedback terms, the cyclic redundancy code feedback term, and a fourth group of bytes from the random digital data stream.
Abstract:
A computer is provided as an add-on processor for attachment to a host computer. Included are a single data bus, a 32-bit arithmetic logic unit, a data stack, a return stack, a main program memory, data registers, program memory addressing logic, micro-program memory, and a micro-instruction register. Each machine instruction contains an opcode as well as a next address field and subroutine call/return or unconditional branching information. The return address stack, memory addressing logic, program memory, and microcoded control logic are separated from the data bus to provide simultaneous data operations with program control flow processing and instruction fetching and decoding. Subroutine calls, subroutine returns, and unconditional branches are processed with a zero execution time cost. Program memory may be written as either bytes or full words without read/modify/write operations. The top of data stack ALU register may be exchanged with other registers in two clock cycles instead of the normal three cycles. MVP-FORTH is used for programming a microcode assembler, a cross-compiler, a set of diagnostic programs, and microcode.
Abstract:
A method and system for determining a billing rate of a telecommunications connection is disclosed. The method and system may be used in a location aware telecommunications system that can determine the location of a telecommunications unit (TU) being used within the system. The geographic location of a mobile unit (MU) is determined, and compared to a list a predetermined subsidized zones. When the MU initiates or receives a call from within a subsidized zone, and the MU is otherwise responsible for paying a predetermined billing rate associated with the call, the predetermined rate is subsidized for at least the portion of the call made while the MU is located within the subsidized zone.
Abstract:
A method and system for selectively connecting proximately located telecommunications units are disclosed. The method and system may be used in a location aware telecommunications system that can determine the location of a telecommunications unit (TU) being used within the system. Proximately located TUs within a predefined group may be connected when an initiating TU requests a group connection. A predetermined number of group TUs located within a predetermined distance of the initiating TU may be connected together with the initating TU in a single telecommunications connection.