http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2007106694-A9

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_d3055f17226671e50112881744c95dce
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_d54dd7c8b870e61f1d9d87d99e31a64b
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_f4592cccb82ca5f60f9a25d83f14e464
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-28
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K2203-16
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-44
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-42
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K2203-24
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/Y02D30-70
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W48-02
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-45
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-41
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-65
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K3-92
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W48-02
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04K3-00
filingDate 2007-03-07-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_20bbf67b70942c3b174ac4186ead4b84
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_0333275ef83afde6bd62abbd1b145a8b
publicationDate 2007-11-08-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber WO-2007106694-A9
titleOfInvention Methods of suppressing gsm wireless device threats in dynamic or wide area static environments using minimal power consumption and collateral interference
abstract Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies (509) that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons (510) to prevent the messages from reaching the wireless devices. Still another class of techniques (511) denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network.
priorityDate 2006-03-07-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID28925
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCQ7TQD2
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCQ9VV43
http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID37610
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCO94811
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCD3ZQL7
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID415716016
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID85247
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419544139
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID37610
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCQ27957

Total number of triples: 36.