会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Radio frequency certificates of authenticity and related scanners
    • 射频证书的真实性和相关的扫描仪
    • US08708241B2
    • 2014-04-29
    • US12633289
    • 2009-12-08
    • Gerald R DeJeanDarko Kirovski
    • Gerald R DeJeanDarko Kirovski
    • G06K19/06
    • H01Q9/0421H01Q1/243H01Q1/38H01Q19/005
    • Radio frequency certificates of authenticity (RFCOAs) and associated scanners and methods are presented. In one implementation, an array of miniaturized antenna elements in an RFCOA scanner occupies an area smaller than a credit card yet obtains a unique electromagnetic fingerprint from an RFCOA associated with an item, such as the credit card. The antenna elements are miniaturized by a combination of both folding and meandering the antenna patch components. The electromagnetic fingerprint of an exemplary RFCOA embeddable in a credit card or other item is computationally infeasible to fake, and the RFCOA cannot be physically copied or counterfeited based only on possession of the electromagnetic fingerprint.
    • 介绍了射频证书的真实性(RFCOAs)及相关的扫描仪和方法。 在一个实现中,RFCOA扫描器中的小型化天线元件阵列占据小于信用卡的区域,而从与诸如信用卡的项目相关联的RFCOA获得唯一的电磁指纹。 天线元件通过折叠和曲折天线补片部件的组合而被小型化。 可嵌入信用卡或其他物品中的示例性RFCOA的电磁指纹在计算上是不可行的,并且RFCOA不能仅基于拥有电磁指纹而被物理地复制或伪造。
    • 6. 发明授权
    • Reputation in on-line consumer markets
    • 在线消费市场的声誉
    • US08438068B2
    • 2013-05-07
    • US11952679
    • 2007-12-07
    • Darko KirovskiAshwin SwaminathanRenan Gonçalves CattelanVarkey Cherian
    • Darko KirovskiAshwin SwaminathanRenan Gonçalves CattelanVarkey Cherian
    • G06Q30/00
    • G06Q30/06G06Q20/10G06Q30/02G06Q50/188
    • Seller's reputation quantification technique embodiments are presented that quantify in monetary terms a risk of dissatisfaction to a potential buyer of a product or service from a seller in an on-line consumer market. Generally, this involves computing the monetary sales limit for the seller. This monetary sales limit represents an amount, which if a sum of the current prices of all the products and services currently offered by the seller is equal to or less than the amount, there would not be a significant risk to the buyer of being dissatisfied with the product or service. Given this, a risk of a potential buyer's dissatisfaction with a product or service purchased from the seller in view of a price the buyer wants to pay is assessed. The assessed risk is then provided to the potential buyer in the form of one or more risk indicators.
    • 提供卖方信誉量化技术实施方案,以货币方式量化在在线消费者市场上卖方对产品或服务的潜在买家的不满意的风险。 一般来说,这涉及计算卖方的货币销售限额。 该货币销售限额是指一笔金额,如果卖方目前提供的所有产品和服务的当前价格的总和等于或小于该金额,买方就不会有不满意的风险 产品或服务。 鉴于此,鉴于买方要支付的价格,潜在买家对从卖方购买的产品或服务的不满风险被评估。 然后以一种或多种风险指标的形式向潜在买方提供评估风险。
    • 9. 发明授权
    • Watchdog processors in multicore systems
    • 多核系统中的看门狗处理器
    • US07958396B2
    • 2011-06-07
    • US11437341
    • 2006-05-19
    • Behrooz ChitsazDarko Kirovski
    • Behrooz ChitsazDarko Kirovski
    • G06F11/00G06F11/30
    • G06F11/349G06F11/0724G06F11/0757G06F21/606G06F2221/2101
    • Systems and methods are provided for securing a multicore computer chip with a watchdog processor. In a system with a watchdog process and any number of other processors and components, the watchdog processor monitors bus communications between the second processor and at least one third component. The watchdog processor may be further independently coupled to at least one of the other components so that it can monitor internal operations of such component, thereby acquiring detailed information about the specific operations of at least one component in the system. The watchdog processor can enforce an interaction policy on bus communications between components, as well as enforce an independent security policy on the monitored components.
    • 提供了系统和方法,用于通过看门狗处理器来保护多核计算机芯片。 在具有看门狗进程和任何数量的其他处理器和组件的系统中,看门狗处理器监视第二处理器与至少一个第三组件之间的总线通信。 看门狗处理器可以进一步独立地耦合到至少一个其他组件,使得其可以监视这种组件的内部操作,从而获取关于系统中至少一个组件的具体操作的详细信息。 看门狗处理器可以在组件之间的总线通信上实施交互策略,并对监视的组件实施独立的安全策略。
    • 10. 发明授权
    • Collusion-resistant watermarking and fingerprinting
    • 防欺骗水印和指纹识别
    • US07681039B2
    • 2010-03-16
    • US10975514
    • 2004-10-28
    • Yacov YacobiHenrique MalvarDarko Kirovski
    • Yacov YacobiHenrique MalvarDarko Kirovski
    • H04L9/32
    • G06T1/005G06T2201/0063G06T2201/0065H04N1/32144H04N2201/3205H04N2201/3233H04N2201/3236
    • An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish. However, in this scenario each member of the malicious coalition leaves a fingerprint in every digital good from which the estimated watermark is subtracted. Thus, like a burglar without gloves, the digital pirate leaves her fingerprints only when she commits a crime. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    • 这里描述了一种使用水印来促进数字商品的权利实施的技术的实现。 更具体地说,它是通过检测串通作为恶意攻击并识别参与的共谋者来保护数字商品的指纹技术。 如果数字盗版打破了一个客户端,并且使得该客户端能够避免水印检测,则所有内容(无标记/免费标记/保护)只能在该特定客户端上被标记为无标记。 然而,为了使其他客户端能够以无标记的方式播放内容,数字盗版者需要从许多客户端中抽出提取的检测密钥,以创建可以避免所有客户端上的水印检测的内容。 所描述的实现通过指纹机制显着地提高了共谋阻力,其可以识别恶意联盟的成员,即使它们的数量比常规串谋保护方案可以实现的数量级大几个数量级。 然而,在这种情况下,恶意联盟的每个成员在每个数字商品中留下指纹,从中减去估计的水印。 因此,像没有手套的防盗器一样,数字盗版者只有在犯罪时才会留下指纹。 本摘要本身并不旨在限制本专利的范围。 在所附权利要求中指出了本发明的范围。