Patent application number | Description | Published |
20080293378 | MOBILE DEVICE WITH AN OBFUSCATED MOBILE DEVICE USER IDENTITY - A mobile device identifier (such as an MSISDN) that typically accompanies a mobile device request is replaced with an “enriched” identifier that exposes the mobile device user's home operator but obfuscates the mobile device's (and, thus, the device user's) identity. In one embodiment, the identifier comprises a first part, and a second part. The first part comprises a data string that identifies (either directly or through a database lookup) the mobile device user's home operator. The second part, however, is an opaque data string, such as a one-time-use unique identifier (UID) or a value that is otherwise derived as a function of the MSISDN (or the like). The opaque data string encodes the mobile device's identity in a manner that preferably can be recovered only by the user's home operator (or an entity authorized thereby). When the mobile device user roams into a foreign network, that network receives the enriched identifier in lieu of an MSISDN. The foreign network uses the first part to identify the mobile device user's home network, e.g., to determine whether to permit the requested access (or to provide some other value-added service). The foreign network, however, cannot decode the second part; thus, the mobile device's identity (as well as the identity of the mobile device user) remains obscured. This ensures that the user's privacy is maintained, while preventing third parties from building a profile of the device based on the requests that include the MSISDN or similar identifier. | 11-27-2008 |
20080293379 | METHOD AND APPARATUS FOR ACCESSING A FOREIGN NETWORK WITH AN OBFUSCATED MOBILE DEVICE USER IDENTITY - A mobile device identifier (such as an MSISDN) that typically accompanies a mobile device request is replaced with an “enriched” identifier that exposes the mobile device user's home operator but obfuscates the mobile device's (and, thus, the device user's) identity. In one embodiment, the identifier comprises a first part, and a second part. The first part comprises a data string that identifies (either directly or through a database lookup) the mobile device user's home operator. The second part, however, is an opaque data string, such as a one-time-use unique identifier (UID) or a value that is otherwise derived as a function of the MSISDN (or the like). The opaque data string encodes the mobile device's identity in a manner that preferably can be recovered only by the user's home operator (or an entity authorized thereby). When the mobile device user roams into a foreign network, that network receives the enriched identifier in lieu of an MSISDN. The foreign network uses the first part to identify the mobile device user's home network, e.g., to determine whether to permit the requested access (or to provide some other value-added service). The foreign network, however, cannot decode the second part; thus, the mobile device's identity (as well as the identity of the mobile device user) remains obscured. This ensures that the user's privacy is maintained, while preventing third parties from building a profile of the device based on the requests that include the MSISDN or similar identifier. | 11-27-2008 |
20080293411 | METHOD AND APPARATUS FOR MANAGING OBFUSCATED MOBILE DEVICE USER IDENTITIES - A mobile device identifier (such as an MSISDN) that typically accompanies a mobile device request is replaced with an “enriched” identifier that exposes the mobile device user's home operator but obfuscates the mobile device's (and, thus, the device user's) identity. In one embodiment, the identifier comprises a first part, and a second part. The first part comprises a data string that identifies (either directly or through a database lookup) the mobile device user's home operator. The second part, however, is an opaque data string, such as a one-time-use unique identifier (UID) or a value that is otherwise derived as a function of the MSISDN (or the like). The opaque data string encodes the mobile device's identity in a manner that preferably can be recovered only by the user's home operator. The present invention describes a method and apparatus for use in a home network to manage the generation, storage and use of the unique identifiers. | 11-27-2008 |
Patent application number | Description | Published |
20130061785 | Bedding Mounting System for a Safe - An application for a safe or strong box attachment mechanism that attaches to a bed system includes a barbed plate that has barbs. The barbed plate readily inserts between a box spring and a mattress, but due to the barbs, is difficult to remove without lifting the mattress from the box spring making it at least difficult to remove by, for example, children in the home. In some embodiments, the safe (or strong box) has a revolving door that, when a proper code/combination/biometric is provided, rotatably opens to expose the contents. | 03-14-2013 |
20130340657 | System, Method and Apparatus for Securing Valuables - A safe includes a body that has an opening for receiving and holding an object. A door is rotatably interfaced to the body, whereas the door obstructs the opening in a first position of rotation, and the door provides access to the body of the safe through the opening when the door is in a second position of rotation. A locking mechanism engages between the door and the body when the door is rotated to the first position of rotation thereby holding the door in the first position of rotation until the locking mechanism is released and, upon releasing by the locking mechanism, the door is free to rotate towards the second position of rotation. | 12-26-2013 |
20140262874 | System, Method and Apparatus for Securing Valuables - A safe includes a body that has an opening for receiving and holding an object. A door is rotatably interfaced to the body by, for example, a series of pins, whereas the door obstructs the opening in a first position of rotation, and the door provides access to the body of the safe through the opening when the door is in a second position of rotation. A locking mechanism engages between the door and the body when the door is rotated to the first position of rotation thereby holding the door in the first position of rotation until the locking mechanism is released and, upon releasing by the locking mechanism, the door is free to rotate towards the second position of rotation. | 09-18-2014 |
20150114861 | System, Method and Apparatus for Securing Valuables - A safe includes a safe body that has an opening. A door is movably interfaced to the safe body such that the door selectively occludes the opening, thereby, selectively permitting access to the opening in one position and precluding access to the opening in a second position. A locking mechanism engages between the door and the safe body when the door occludes the opening. When provided with a key, the locking mechanism disengages between the door and the safe body, permitting access to the opening. An insert is positioned within the safe body. The insert has an opening formation configured to support at least one specific weapon, which is arranged to be accessed from the opening. | 04-30-2015 |