Interface and communication protocol for a mobile device with a smart battery
    1.
    发明授权
    Interface and communication protocol for a mobile device with a smart battery 有权
    具有智能电池的移动设备的接口和通信协议

    公开(公告)号:US08670799B2

    公开(公告)日:2014-03-11

    申请号:US13600400

    申请日:2012-08-31

    摘要: Various embodiments are described herein for a mobile communication device that utilizes a smart battery. The mobile device includes a main processor for controlling the operation of the mobile communication device. The smart battery is coupled to the main processor and provides supply power. The smart battery includes a battery processor for controlling the operation of the smart battery and communicating with the main processor, and a battery module having one or more batteries for providing the supply power. A battery interface is provided for coupling between the main processor and the battery processor for providing communication therebetween. The battery interface comprises a data communication line and protection circuitry for protecting the main processor from electrostatic discharge. A communication protocol is also provided for communication between the main processor and the battery processor.

    摘要翻译: 这里描述了利用智能电池的移动通信设备的各种实施例。 移动设备包括用于控制移动通信设备的操作的主处理器。 智能电池耦合到主处理器并提供电源。 智能电池包括用于控制智能电池的操作并与主处理器通信的电池处理器,以及具有用于提供电源的一个或多个电池的电池模块。 提供电池接口用于在主处理器和电池处理器之间耦合以在其间提供通信。 电池接口包括用于保护主处理器免受静电放电的数据通信线路和保护电路。 还提供了用于主处理器和电池处理器之间的通信的通信协议。

    Authentication for transmission control protocol
    2.
    发明授权
    Authentication for transmission control protocol 有权
    传输控制协议认证

    公开(公告)号:US07788715B2

    公开(公告)日:2010-08-31

    申请号:US10733666

    申请日:2003-12-10

    申请人: Amir Naftali

    发明人: Amir Naftali

    摘要: An embodiment of the invention incorporates, or encapsulates, authentication mechanisms into an initiation phase of a transmission protocol session. In a preferred embodiment, Extensible Authentication Protocol (EAP) authentication steps are included in the three-way handshake of a request to establish a Transmission Control Protocol/Internet Protocol TCP/IP) session. An EAP authentication session request can be designated within the standard Transmission Control Protocol (TCP) segment by using unused flags in the segment header. Another way to designate the request is to include a predefined option value in the header.

    摘要翻译: 本发明的实施例将认证机制并入或封装到传输协议会话的启动阶段。 在优选实施例中,可扩展认证协议(EAP)认证步骤包括在建立传输控制协议/因特网协议TCP / IP)请求的三次握手中。 可以通过使用段标题中的未使用的标志,在标准传输控制协议(TCP)段内指定EAP认证会话请求。 指定请求的另一种方法是在标题中包含预定义的选项值。

    Security restrictions on binary behaviors
    3.
    发明授权
    Security restrictions on binary behaviors 有权
    对二进制行为的安全限制

    公开(公告)号:US07743425B2

    公开(公告)日:2010-06-22

    申请号:US10836417

    申请日:2004-04-29

    CPC分类号: H04L63/105

    摘要: A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.

    摘要翻译: 安全模型基于识别的安全区域限制机器上的二进制行为。 二进制行为可以附加到文档,网页或电子邮件的元素。 二进制行为可能威胁到本地机器上的安全性。 安全管理员拦截下载请求和/或执行请求,识别所请求的二进制行为的安全区域,并限制基于安全区域的访问。 二进制行为可以根据相关URL识别安全区域。 在一个示例中,与安全区域相关联的所有二进制行为被相同地处理。 在另一个示例中,允许的二进制行为的列表与安全区域相关联,使得仅允许指定的二进制行为被访问。 在另一个示例中,不允许的二进制行为的列表与安全区域相关联,使得在列表中找到的二进制行为不能启动访问。

    Software license authorization system
    4.
    发明授权
    Software license authorization system 有权
    软件许可授权系统

    公开(公告)号:US07703142B1

    公开(公告)日:2010-04-20

    申请号:US10840317

    申请日:2004-05-06

    摘要: An authorization system is described that includes a first interface, a processing system, and a second interface. The first interface is configured to receive an authorization instruction from an enterprise and receive an authorization request from a user device. The authorization instructions indicate authorization parameters. The user device transfers the authorization request each time the application is selected for execution. The authorization instructions are based on a license obtained by the enterprise for an application and wherein a user device operated by a user has the application. The processing system is configured to process the authorization request and authorization parameters to determine if the execution of the application is authorized. The second interface is configured to transfer an authorized message to the user device if the execution of the application is authorized and transfer an unauthorized message to the user device if the execution of the application is not authorized.

    摘要翻译: 描述了包括第一接口,处理系统和第二接口的授权系统。 第一接口被配置为从企业接收授权指令并从用户设备接收授权请求。 授权说明指示授权参数。 每当应用程序被选择执行时,用户设备传送授权请求。 授权指令基于企业针对应用获得的许可证,并且其中由用户操作的用户设备具有应用。 处理系统被配置为处理授权请求和授权参数以确定应用的执行是否被授权。 第二接口被配置为如果应用的执行被授权则将授权的消息传送到用户设备,并且如果应用的执行未被授权则将未经授权的消息传送到用户设备。