Software modem with hidden authentication commands
A technology of identification codes and program instructions, applied in modulation carrier systems, instruments, electrical components, etc., to solve problems such as the inability of the target to move, the inability to use it normally, and the inability to use the subscriber line.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] Specific embodiments of the present invention will be described below. In order to simplify the description, not all features of an actual application are described in this specification. It is certainly expected that in the development of any such embodiment, various application-oriented decisions must be determined in advance in order to achieve the developer's specific goals, such as compatibility with related systems and related business constraints, which will vary from application to application. different. Again, while such developmental work is complex and time consuming, it would nevertheless become routine for those skilled in the art given the benefit of this invention.
[0032] refer to figure 1 , a block diagram of the communication system 10 is shown in the figure. The communication system 10 includes a subscriber base station 20 that can communicate with a central base station 30 through a communication channel 40 . In the illustrated embodiment, subs...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
