Patent application number | Description | Published |
20120035965 | SYSTEMS, METHODS, AND MACHINE-READABLE STORAGE MEDIA FOR INTERFACING WITH A COMPUTER FLIGHT SYSTEM - Provided herein are systems, methods and machine-readable media for interfacing with computer flight systems. For example, one embodiment is described wherein an unknown and/or changing inventory of aircraft, potentially including aircraft owned or operated by third parties, is managed to provide flight schedules, fare structures, and reservation inventories to computer flight systems. Another embodiment is described wherein aircraft inventory is allocated dynamically and/or adjusted in real-time in response to bookings of seats on aircraft flights in the flight schedule. Another embodiment is described wherein aircraft inventory may be changed by suppliers of aircraft, including changes to costs for using a portion of the inventory (e.g., using an aircraft for a day), and a management system may modify booking class inventories on one or more flights in the flight schedule in response. | 02-09-2012 |
20120035966 | SYSTEMS, METHODS, AND MACHINE-READABLE STORAGE MEDIA FOR INTERFACING WITH A COMPUTER FLIGHT SYSTEM - Provided herein are systems, methods and machine-readable media for interfacing with computer flight systems. For example, one embodiment is described wherein an unknown and/or changing inventory of aircraft, potentially including aircraft owned or operated by third parties, is managed to provide flight schedules, fare structures, and reservation inventories to computer flight systems. Another embodiment is described wherein aircraft inventory is allocated dynamically and/or adjusted in real-time in response to bookings of seats on aircraft flights in the flight schedule. Another embodiment is described wherein aircraft inventory may be changed by suppliers of aircraft, including changes to costs for using a portion of the inventory (e.g., using an aircraft for a day), and a management system may modify booking class inventories on one or more flights in the flight schedule in response. | 02-09-2012 |
20130238374 | Systems, Methods, and Machine-Readable Storage Media for Interfacing with a Computer Flight System - Provided herein are systems, methods and machine-readable media for interfacing with computer flight systems. For example, in one embodiment, a method includes: maintaining, via a data processing system, a pool of provisional flights; receiving a bid or a booking; and in response to receiving the bid or the booking, modifying at least one booking class inventory for at least one flight in the pool of provisional flights. | 09-12-2013 |
Patent application number | Description | Published |
20090025460 | ULTRASOUND MULTIPHASE FRACTION METER AND METHOD FOR DETERMINING PHASE FRACTIONS IN A MULTIPHASE FLUID - An apparatus and method to determine fractions of various phases in a multiphase fluid. The apparatus includes main body including an interior configured receive a multiphase fluid and an exterior. The apparatus senses fluid pressure of multiphase fluid received in the interior and senses a fluid temperature of the multiphase fluid. The apparatus transmits an ultrasonic wave into the fluid and detects the transmitted wave to determine its velocity and attenuation. The apparatus may adjust the determined velocity and attenuation based on the temperature and pressure of the fluid to compensate for a difference between the sensed temperature and pressure and a standard temperature and pressure. The apparatus determines a gas fraction, water fraction, and a non-water fluid fraction of the multiphase fluid based on the sensed fluid pressure, the sensed fluid temperature, and the velocity and attenuation of the ultrasonic wave in the multiphase fluid. | 01-29-2009 |
20100268487 | ULTRASOUND MULTIPHASE FRACTION METER AND METHOD FOR DETERMINING PHASE FRACTIONS IN A MULTIPHASE FLUID - An apparatus and method to determine fractions of various phases in a multiphase fluid. The apparatus includes main body including an interior configured receive a multiphase fluid and an exterior. The apparatus senses fluid pressure of multiphase fluid received in the interior and senses a fluid temperature of the multiphase fluid. The apparatus transmits an ultrasonic wave into the fluid and detects the transmitted wave to determine its velocity and attenuation. The apparatus may adjust the determined velocity and attenuation based on the temperature and pressure of the fluid to compensate for a difference between the sensed temperature and pressure and a standard temperature and pressure. The apparatus determines a gas fraction, water fraction, and a non-water fluid fraction of the multiphase fluid based on the sensed fluid pressure, the sensed fluid temperature, and the velocity and attenuation of the ultrasonic wave in the multiphase fluid. | 10-21-2010 |
20100274503 | ULTRASOUND MULTIPHASE FRACTION METER AND METHOD FOR DETERMINING PHASE FRACTIONS IN A MULTIPHASE FLUID - An apparatus and method to determine fractions of various phases in a multiphase fluid. The apparatus includes main body including an interior configured receive a multiphase fluid and an exterior. The apparatus senses fluid pressure of multiphase fluid received in the interior and senses a fluid temperature of the multiphase fluid. The apparatus transmits an ultrasonic wave into the fluid and detects the transmitted wave to determine its velocity and attenuation. The apparatus may adjust the determined velocity and attenuation based on the temperature and pressure of the fluid to compensate for a difference between the sensed temperature and pressure and a standard temperature and pressure. The apparatus determines a gas fraction, water fraction, and a non-water fluid fraction of the multiphase fluid based on the sensed fluid pressure, the sensed fluid temperature, and the velocity and attenuation of the ultrasonic wave in the multiphase fluid. | 10-28-2010 |
Patent application number | Description | Published |
20100172494 | ENCRYPTING A PLAINTEXT MESSAGE WITH AUTHENTICAION - An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The present invention generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag without any further steps that is N times longer than the block size where N is the number of pseudorandom permutations used in the encipherment of each block. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal to N. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES. | 07-08-2010 |
20110066853 | SYSTEM AND METHOD FOR SECURELY IDENTIFYING AND AUTHENTICATING DEVICES IN A SYMMETRIC ENCRYPTION SYSTEM - The present invention describes a system and method for securely identifying and authenticating devices in a symmetric encryption system. An RFID tag can generate indicators using encryption state variables and a symmetric key. An RFID reader, after receiving the encryption state variables from the tag, may identify the tag by performing an exhaustive key search in a key database. Each key in the database may be tested by using the key and encryption state variables to perform an encryption operation similar to that performed by the tag. The result is then compared with the received tag indicators to determine if the tag has been identified. A rotor-based encryption scheme provides for a low cost key search while providing resilience against cloning, tracking, tampering and replay attacks. | 03-17-2011 |
20120008767 | SYSTEM FOR ENCRYPTING AND DECRYPTING A PLAINTEXT MESSAGE WITH AUTHENTICATION - The described system and method provide for an encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state. The size of the state is dependent on the number of pseudorandom permutations and the size of the LFSR. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal the size of the state. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES. | 01-12-2012 |
20120076293 | HYBRID MODE CRYPTOGRAPHIC METHOD AND SYSTEM WITH MESSAGE AUTHENTICATION - An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state. | 03-29-2012 |
20120087488 | CRYPTOGRAPHIC PROCESSOR WITH DYNAMIC UPDATE OF ENCRYPTION STATE - An efficient implementation of a cryptographic processor that dynamically updates the encryption state is described. The cryptographic processor can be implemented with a minimal number of gates, yet still perform cryptographic operations quickly. The cryptographic processor has an interface, a memory, a pseudorandom permutation block and control logic. The interface receives input data blocks and returns cryptographically processed data blocks. The memory is used to store an encryption state of the cryptographic processor. The pseudorandom permutation block transforms a portion of the encryption state that is modified for each input data block by at least the input data block and a previously transformed data block. The control logic routes data in the cryptographic processor to return cryptographically processed data blocks at the interface and update dynamically the encryption state stored in memory using the transformed data blocks from the pseudorandom permutation block. | 04-12-2012 |
Patent application number | Description | Published |
20120250833 | Delivery of Alarm System Event Data and Audio Over Hybrid Networks - Delivery of alarm system event data and audio over hybrid networks is described. In one embodiment, delivering alarm system event data includes detecting an alarm event and communicating alarm event data to a message processing gateway, evaluating service parameters of the alarm system and conditions of the alarm event data, forwarding the alarm event data and a voice channel code to a telecommunications switch, and opening a voice channel between the telecommunications switch and a central alarm monitoring station. In other aspects, delivering alarm system event data and connecting a voice channel further includes determining whether the voice channel remains open, forwarding a routing code to the alarm system, opening a voice channel between the alarm system and the telecommunications switch, and bridging the voice channel between the telecommunications switch and the central alarm monitoring station and the voice channel between the alarm system and the telecommunications switch. | 10-04-2012 |
20120250834 | DELIVERY OF ALARM SYSTEM EVENT DATA AND AUDIO - Delivery of alarm system event data and audio. In certain aspects, a method for delivery of alarm system event data is described, including communicating alarm event data from an alarm system to a private telecommunications switch. In turn, the alarm event data may be communicated to a message processing gateway. The message processing gateway evaluates service parameters of the alarm system and, in certain cases, instructs the private telecommunications switch to contact a central alarm monitoring station if certain service parameters are met. In additional aspects, private telecommunications switch opens a voice channel between the private telecommunications switch and the central alarm monitoring station and communicates the alarm event data. Additionally, in response to a determination that a voice channel between the private telecommunications switch and the central alarm monitoring station remains open, the private telecommunications switch may also bridge the voice channel to the alarm system. | 10-04-2012 |
20140169535 | DELIVERY OF ALARM SYSTEM EVENT DATA AND AUDIO OVER HYBRID NETWORKS - Delivery of alarm system event data and audio over hybrid networks is described. In one embodiment, delivering alarm system event data includes detecting an alarm event and communicating alarm event data to a message processing gateway, evaluating service parameters of the alarm system and conditions of the alarm event data, forwarding the alarm event data and a voice channel code to a telecommunications switch, and opening a voice channel between the telecommunications switch and a central alarm monitoring station. In other aspects, delivering alarm system event data and connecting a voice channel further includes determining whether the voice channel remains open, forwarding a routing code to the alarm system, opening a voice channel between the alarm system and the telecommunications switch, and bridging the voice channel between the telecommunications switch and the central alarm monitoring station and the voice channel between the alarm system and the telecommunications switch. | 06-19-2014 |
20140341357 | DELIVERY OF ALARM SYSTEM EVENT DATA AND AUDIO - Delivery of alarm system event data and audio. In certain aspects, a method for delivery of alarm system event data is described, including communicating alarm event data from an alarm system to a private telecommunications switch. In turn, the alarm event data may be communicated to a message processing gateway. The message processing gateway evaluates service parameters of the alarm system and, in certain cases, instructs the private telecommunications switch to contact a central alarm monitoring station if certain service parameters are met. In additional aspects, private telecommunications switch opens a voice channel between the private telecommunications switch and the central alarm monitoring station and communicates the alarm event data. Additionally, in response to a determination that a voice channel between the private telecommunications switch and the central alarm monitoring station remains open, the private telecommunications switch may also bridge the voice channel to the alarm system. | 11-20-2014 |
Patent application number | Description | Published |
20120203926 | IP Network Service Redirector Device and Method - A method for redirecting specific network traffic intended for a target device on a first data network is described. The method inserts a redirector into a first network in front of a target device and intercepting a transmission from the target device. The method then configures the network characteristics of the redirector to use the network addresses of the target device. Once configured the redirector inspects the network traffic on the first network to identify specific services, and sends the network traffic associated with the specific service to a destination device on a second network. | 08-09-2012 |
20120247984 | Secure Document Destruction Bin - A secure document bin is described that includes a bin having a lid that securely affixes to the bin to prevent unauthorized access to the contents of the bin, and an electronics module associated with the bin. The electronics module is formed in part by a location detection circuit and status sensors. The status sensors include a sensor to detect movement of the bin, a sensor to detect tampering with the bin, and a sensor to detect a relative fill level of the bin. The location and status of the secure document destruction bin is monitored by a monitoring center using wireless transmissions from the secure document destruction bin. | 10-04-2012 |
20120252357 | System and Method for Monitoring and Managing the Communications of Remote Devices - A system and method of monitoring the communications of remote devices is described. The system includes a plurality of remote devices, where each remote device has one or more sensors and a communications transceiver. A control center, which includes a historical usage database reflecting historical usage patterns for each of the plurality of remote units, analyzes the communications for each of the plurality of remote devices against the historical usage patterns for that remote device to determine when that remote device is malfunctioning or approaching a usage threshold. The control center is then operable to take appropriate corrective action in response to the analysis. | 10-04-2012 |
20120252485 | System and Method for Determining Best Available Location for a Mobile Device - A system and method for determining a location of a mobile device is described that attempts to determine the location of the mobile device using a variety of location determination technologies according to a hierarchy of location determination technologies, where the most accurate technologies are attempted before less accurate technologies until a location determination is made for the mobile device. The hierarchy of location determination technologies includes each of: autonomous GPS, assisted GPS, primary carrier network location based services, tri-lateration, secondary carrier network location based services, and serving base station location. | 10-04-2012 |
20120252501 | System and Method for Asset Tracking Using Hybrid WAN/PAN Wireless Technologies - A system for tracking mobile assets is described. The system includes a plurality of mobile asset tracking devices, where each of the tracking devices has a short range radio transmitter used to transmit identifying information to other nearby tracking devices. A subset of the plurality of mobile asset tracking devices also include location determination modules and wide area network communications transmitters, this subset of mobile asset tracking devices is operable to collect the identifying information of the nearby tracking devices without the wide area network communication transmitter and to transmit the location and identifying information of the nearby tracking devices to a monitoring center to track the plurality of mobile asset tracking devices. | 10-04-2012 |
20120254974 | Local Data Appliance for Collecting and Storing Remote Sensor Data - A system for providing local access by means of a local data appliance to data collected from remote monitors and sensors is described. The system includes a plurality of remote monitors and sensors, the remote monitors and sensors reporting data over a wide area communications network, and a data collection center receiving the data from the remote monitors and sensors, the data collection center operable to process the data and generate customer defined reports based on the data. A local data appliance placed in the customer's network operates to receive the data from the data collection center, and to process the customer data, generate reports based on the data and send instructions to the remote monitors and sensors. The appliance resides behind the customer's firewall but is separate from the customers network and data center equipment. | 10-04-2012 |
20120258659 | System and Method for Remotely Distributing Firmware Upgrades to Large Numbers of Distributed Devices - A system for sending updates to a large number of remote units is described. The system includes a plurality of remote units, each remote unit comprising one or more sensors and a communications transceiver. A control center is in communication with the remote units and includes an update database reflecting the update status of each of the plurality of remote units. The control center establishes contact with each of the plurality of remote units and sends an update when communication has been established. The update database is periodically updated to reflect the completion of the update for each mobile unit based on a completion message from each of the remote units that has successfully installed the update. | 10-11-2012 |
20130235206 | System and Method of On-Shelf Inventory Management - An inventory management system is described that includes two or more cameras mounted on a retail display space. The cameras are positioned to capture images showing the presence of items of interest in the retail display space. A hub is in communication with each of the cameras mounted on the retail display space and is operable to aggregate information from the cameras related to the items of interest in the retail display space, and to communicate data regarding the status of the item of interest to an inventory management system operable to receive the data from the hub. | 09-12-2013 |
20130244687 | Dynamic Reverse Geofencing - A system and method for determination the relative location of a mobile object is described that includes building a database of known/expected locations with the exact longitude and latitude for each location. Next, an estimated location for a mobile object is generated using information from the cellular network and an area boundary is defined around the mobile object that defines, with some probability, where the object is actually located. The known locations in the database that fall within the area boundary are then identified and a relative probability is calculated for each known location that indicates its relative likelihood of where the mobile object is actually located. From this information at least the most probable location of the mobile object is determined along with a measure of estimation confidence. | 09-19-2013 |
20130278410 | System and Method for Using Alarm System Zones for Remote Objects - An alarm system for monitoring a local premises and multiple remote objects is described. The system includes sensors in the local premises, an alarm panel connected to the sensors in the local premises, and remote objects having alarm systems in communication with the alarm panel. The remote objects are assigned a zone in the alarm panel to represent the remote object, such that an alarm condition at the remote object is reported as an alarm condition in the assigned zone. | 10-24-2013 |
20130321150 | System and Method for Alarm System Tamper Detection and Reporting - An alarm system for detecting and reporting “smash and crash” intrusions is described. The alarm system includes a plurality of intrusion sensors and a security alarm panel in communication with each of the plurality of intrusion sensors at the site of the alarm system. An alarm gateway is provided remote from the security alarm panel, the alarm gateway monitoring the status of the security alarm panel for indications of tampering. A central station is in communication with the alarm gateway and monitors the status of the alarm system, where the alarm gateway sends an alarm condition to the central station when tampering at the security alarm panel is detected. | 12-05-2013 |
20140136379 | Delivery of Security Solutions Based On-Demand - A computer can receive an alarm event data that results from detection of an event by an alarm system. The alarm event data comprises an identifier for the alarm system. In response to receiving the alarm event data, the computer can access a service subscription account associated with security services for the alarm system. Based on information maintained in the service subscription account, the computer can determine whether a processing service fee is associated with an action of forwarding the alarm event data to a central monitoring station or a mobile computing device associated with the service subscription account. If a processing service fee is associated with the forwarding action, the computer can record the alarm event data and the processing service fee in a record to support a creation of an invoice and forward the alarm event data to the central monitoring station or the mobile computing device. | 05-15-2014 |
20140300468 | Dynamic Reverse Geofencing - A system and method for determination the relative location of a mobile object is described that includes building a database of known/expected locations with the exact longitude and latitude for each location. Next, an estimated location for a mobile object is generated using information from the cellular network and an area boundary is defined around the mobile object that defines, with some probability, where the object is actually located. The known locations in the database that fall within the area boundary are then identified and a relative probability is calculated for each known location that indicates its relative likelihood of where the mobile object is actually located. From this information at least the most probable location of the mobile object is determined along with a measure of estimation confidence. | 10-09-2014 |
20150254966 | System and Method for Using Alarm System Zones for Remote Objects - An alarm system for monitoring a local premises and multiple remote objects is described. The system includes sensors in the local premises, an alarm panel connected to the sensors in the local premises, and remote objects having alarm systems in communication with the alarm panel. The remote objects are assigned a zone in the alarm panel to represent the remote object, such that an alarm condition at the remote object is reported as an alarm condition in the assigned zone. | 09-10-2015 |
20150358697 | Satellite Based Tracking and Data Device with Multi-Function Radio Frequency Interface - A remote monitoring device is described that includes a microprocessor, a location determination unit connected to the microprocessor and operable to determine a location of the remote monitoring device. One or more interfaces connect the microprocessor to one or more sensors, wherein the one or more interfaces includes a multi-function radio frequency interface to communicate with wireless sensors. A radio frequency identification (RFID) interface interacts with RFID readers using the multi-function radio frequency interface, and a configuration interface to allow a user to configure the monitoring device also uses the multi-function radio frequency interface. The monitoring device uses a transmitter to transmit the location, status and collected information. | 12-10-2015 |
Patent application number | Description | Published |
20140236673 | Systems and Methods for the Assessment of Vertical Goodwill in Social Media Performance - Described herein are systems and methods for analyzing social media data, assessing various aspects of social media performance, comparing the social media performance of a plurality of entities within a peer group, and displaying useful information to a user in a comprehensive and/or intuitive fashion. The social media performance assessment information pertaining to an asset may take into account the social media performance of a related entity and/or another asset belonging to a different hierarchical tier of a peer group, organization, or industry. A peer group, and its hierarchical tiers, may be customized or dynamically defined such that the user may specify the influence one asset's social media performance may have on another or the influence that the social media performance of a group of assets may have on one or more other assets. | 08-21-2014 |
20140236931 | Systems and Methods for Simultaneous Display of Related Social Media Analysis Within a Time Frame - Described herein are systems and methods for analyzing social media data for assets and related sub-assets, and simultaneously displaying the analysis for assets, sub-assets, and contributing social media content items to give the user insight into the analysis. The analysis may be based on user selection of a time frame, and may also include a historical timeline that plots different lines for different assets. The user may select one of the assets and cause related sub-assets and social media content items to be simultaneously displayed. | 08-21-2014 |
20140244759 | Systems and Methods for the Assessment of Social Media Performance - Described herein are systems and methods for analyzing social media data, assessing various aspects of social media performance, comparing the social media performance of a plurality of entities within a peer group, and displaying useful information to users in a comprehensive and/or intuitive fashion. The social media performance assessment information pertaining to an entity and the entity's peers may also be quantified in the form of one or more scores based on empirical data gathered from one or more social media platforms. Peer groups may be customized or dynamically defined such that the performance assessment information may be used to accurately benchmark entities against their competition or develop best practices within an industry or organization. The performance assessment information described herein may further take into consideration the effect that the social media performance of one entity may have on another. | 08-28-2014 |
20140258408 | Systems and Methods for Assessing an Asset's Contributions to the Social Media Performance of a Peer Group - Described herein are systems and methods for assessing an asset's contributions to the social media performance of a peer group and comparing those contributions against those of other peer group members. In particular, the performance of one or more social media profiles associated with a peer group comprising the asset may be assessed. Share assessments may be made as to a share or a portion of the social media performance of the peer group that may be attributable to the asset. Similar assessments may be made with respect to other entities belonging to the peer group. The peer group members, including the asset, may then be ranked in accordance with their contributions to the peer group's social media performance. Peer groups may be customized or dynamically defined by a user such that the share assessments may be used to accurately benchmark assets against their peers and/or develop best practices. | 09-11-2014 |
Patent application number | Description | Published |
20080301791 | Single sign-on system, method, and access device - A system, method, and access device enabling a user to securely access a plurality of password-protected servers with a single entry of the user's User ID and associated password. When the access device receives the User ID and password from the user, it sends only the User ID to each of the password-protected servers. The servers each return a unique index value to the access device. The access device uses each index value to retrieve different password modification information from a database or lookup table. The access device then creates a plurality of modified passwords based at least in part on the password modification information. The access device then transmits each of the modified passwords to the corresponding password-protected server. | 12-04-2008 |
20090037992 | Apparatus, system, and method for generating and authenticating a computer password - An apparatus, system, and method for constructing, transmitting, and authenticating a password utilized by an authentication device to authenticate an access device. The authentication device receives the password from the access device, authenticates the access device if the password matches stored information, and returns an acknowledgment message that includes an index value associated with a stored character set. The access device constructs and transmits the password. The access device receives from a user, a plurality of predefined characters forming a User ID. The access device also receives the acknowledgment message and index value from the authentication device. The index value is used to identify a set of password modification factors from a plurality of sets stored in a lookup table. The access device utilizes the identified set to modify a password, and transmits the password to the authentication device. | 02-05-2009 |
20090089450 | System and method providing secure access to a computer system - A system and method for providing secure access to a computer system. An access device divides the password into multiple segments and places them in data packets. In one embodiment, an authentication server has multiple addresses, and each packet is sent to a different address. The server then reassembles the password. In another embodiment, when the server receives a password, the server sends an index value back to the access device, which then accesses the server on another address indicated by the index value. Alternatively, the password is sent to multiple addresses for the server, and the server determines whether any of the received packets have been altered. The multiple password packets may be forced to follow different paths to the server, thereby denying hackers the ability to intercept all of the password characters or determine the inter-packet timing factor. The system is effective against passive and active hackers, Trojans, and phishing techniques. | 04-02-2009 |
20090089867 | System and method providing secure access to computer system - A system and method for providing secure access to a computer system. An access device divides the password into multiple segments and places them in data packets. In one embodiment, an authentication server has multiple addresses, and each packet is sent to a different address. The server then reassembles the password. In another embodiment, when the server receives a password, the server sends an index value back to the access device, which then accesses the server on another address indicated by the index value. Alternatively, the password is sent to multiple addresses for the server, and the server determines whether any of the received packets have been altered. The multiple password packets may be forced to follow different paths to the server, thereby denying hackers the ability to intercept all of the password characters or determine the inter-packet timing factor. The system is effective against passive and active hackers, Trojans, and phishing techniques. | 04-02-2009 |