Kenneth W. Conley - Mountain View CA, US Dirk Balfanz - Menlo Park CA, US Bryan A. Pendleton - Menlo Park CA, US Diana K. Smetters - San Francisco CA, US Glenn E. Durfee - San Francisco CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
H04K 1/00 H04L 9/00
US Classification:
380 33, 380270, 713150, 713168
Abstract:
A method for establishing a secondary communication channel between at least two computing devices over a network medium through use of a primary channel connects a first computing device with a first telephonic unit and a second computing device with a second telephonic unit. If the two telephonic units are in communication with each other over a primary channel, and communication channels are established between the computing devices and their respective telephonic units, then the first computing device transmits its location information to the second computing device over the primary channel. A connection is then established between the second computing device and the first computing device over a secondary communication channel.
Kenneth A. Conley - Laplata MD, US Raymond M. Gamache - King George VA, US Jason T. Drotar - King George VA, US
Assignee:
The United States of America as represented by the Secretary of the Navy - Washington DC
International Classification:
F42B 12/22 H04B 1/034
US Classification:
102293, 102494, 102509, 455 98
Abstract:
A shock-triggered warhead fragment transmitter is described. The transmitter is designed to radiate a pulse upon either detonation of the warhead or impact of the fragment with the target. The pulse energy is obtained by shock de-poling of a ferroelectric material and is radiated using a dipole antenna. Detection of the radiated pulses may be used to confirm detonation of the warhead and determine the time and location of the detonation and facilitate battle damage assessment.
System And Method For Establishing Secondary Channels
Kenneth W. Conley - Mountain View CA, US Dirk Balfanz - Menlo Park CA, US Bryan A. Pendleton - Menlo Park CA, US Diana K. Smetters - San Francisco CA, US Glenn E. Durfee - San Francisco CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
H04L 9/32
US Classification:
380 33, 713168, 713169, 709227, 709228
Abstract:
A method for establishing a secondary communication channel between at least two computing devices over a network medium through use of a primary channel connects a first computing device with a first telephonic unit and a second computing device with a second telephonic unit. If the two telephonic units are in communication with each other over a primary channel, and communication channels are established between the computing devices and their respective telephonic units, then the first computing device transmits its location information to the second computing device over the primary channel. A connection is then established between the second computing device and the first computing device over a secondary communication channel.
Systems And Methods For Authenticating Communications In A Network Medium
Dirk Balfanz - Redwood City CA, US Diana Smetters - Belmont CA, US Kenneth Conley - Mountain View CA, US Bryan Pendleton - Menlo Park CA, US Steve Cousins - San Jose CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
A system and method for sharing files securely includes server software on a first device configured to communicate with server software operating on one or more other preauthorized devices, such as a second device. The servers communicate with each other securely using cryptographic information exchanged during a preauthorization phase using a range-limited communication channel. The server on the first device obtains file information from the other preauthorized device(s) and combines the information with local file information from the first device. This combined file information is sent to client software operating on the machine, which presents the combined file information to users.
Systems And Methods For Authenticating Communications In A Network Medium
Diana Smetters - San Francisco CA, US Kenneth Conley - Mountain View CA, US Bryan Pendleton - Menlo Park CA, US Glenn Durfee - San Francisco CA, US Steve Cousins - San Jose CA, US Dirk Balfanz - Menlo Park CA, US Hadar Shemtov - Palo Alto CA, US
Assignee:
PARC INC. - Palo Alto CA
International Classification:
H04L009/00 G06F011/30
US Classification:
380277000, 713163000, 713201000
Abstract:
A location-limited channel is implemented using physical exchanges of physical tokens. The physical tokens are implemented using writeable or re-writeable storage media. Location-limited channels, when used to implement pre-authentication protocols, provide demonstrative identification and authenticity. A group originator loads pre-authentication information and a network location from a communication device onto the location-limited physical token channel. The location-limited physical token channel is passed to another participant, who copies the originator's pre-authentication information and location onto that participant's communication device. That participant then adds that participant's own pre-authentication information and network location onto the location-limited physical token channel. This is repeated until the last participant passes the location-limited physical token channel back to the group originator. The originator thus has pre-authentication information and network locations for all other participants. The originator establishes secure communications with each participant based on the originator' and that participant's shared information.
A computer-implemented method includes determining interesting moments in a video. The method further includes generating video segments based on the interesting moments, wherein each of the video segments includes at least one of the interesting moments from the video. The method further includes generating a collage from the video segments, where the collage includes at least two windows and wherein each window includes one of the video segments.
- Mountain View CA, US Matthias GRUNDMANN - San Jose CA, US Kenneth CONLEY - Mountain View CA, US
Assignee:
Google Inc. - Mountain View CA
International Classification:
G11B 27/034 G11B 27/34 G11B 27/28
Abstract:
A computer-implemented method includes determining interesting moments in a video. The method further includes generating video segments based on the interesting moments, wherein each of the video segments includes at least one of the interesting moments from the video. The method further includes generating a collage from the video segments, where the collage includes at least two windows and wherein each window includes one of the video segments.