会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明授权
    • Pincer structure
    • 钳子结构
    • US09216494B2
    • 2015-12-22
    • US13793902
    • 2013-03-11
    • Chiu-Chi Lai
    • Chiu-Chi Lai
    • B25B7/12
    • B25B7/123
    • A pincer structure includes a first body having an immovable palate and an immovable stem, a second body having a movable palate and a movable stem, a clipping space defined by the movable palate and the immovable palate, the movable stem pivoted on the movable palate, an elastomer elastically connected between the movable palate and the immovable stem, a limiting member extruded from the movable stem, the limiting member having an abutting unit, a pivoting member pivoted on the movable stem, the pivoting member having an abutting portion, the abutting portion being movable between the movable stem and the abutting unit, a connecting member having one end and another end, said one end pivotally assembled to the pivoting member and said another end movably assembled to the immovable stem. Therefore, a recovery force of the elastomer makes the operation smooth.
    • 夹子结构包括具有不可移动的上颚和不可移动的杆的第一主体,具有可移动的上颚和可移动的柄的第二主体,由所述可动腭和所述不动腭限定的夹紧空间,所述可移动的杆枢转在所述可动腭上, 弹性地连接在可动腭和不可移动的杆之间的弹性体,从活动杆挤出的限制构件,限制构件具有邻接单元,枢转构件在可移动的杆上枢转,枢转构件具有邻接部分, 可移动的杆和邻接单元之间可移动,连接构件具有一端和另一端,所述一端枢转地组装到枢转构件,而另一端可移动地组装到不动杆上。 因此,弹性体的恢复力使操作平稳。
    • 42. 发明授权
    • Determining a source of malicious computer element in a computer network
    • 确定计算机网络中的恶意计算机元素的来源
    • US07958557B2
    • 2011-06-07
    • US11436751
    • 2006-05-17
    • Anthony Chiu-Chi Kwan
    • Anthony Chiu-Chi Kwan
    • G06F11/00G06F12/14G06F12/16G08B23/00
    • H04L63/1441G06F21/552H04L63/1416
    • In certain embodiments, a method for tagging communications from a user system, such that a source of a malicious computer element in a computer network may be determined, includes determining tag information for a user system in the computer network, the tag information physically identifying the user system. The method further includes detecting an attempt to send a communication from the user system and, in response to detecting the attempt to send a communication from the user system, attaching the tag information to the communication prior to sending the communication from the user system. The attachment of the tag information to the communication allows the source of the communication to be determined in response to determining that the communication is associated with a malicious computer element, the source comprising the user system.
    • 在某些实施例中,可以确定用于标记来自用户系统的通信的方法,使得计算机网络中的恶意计算机元件的源可以被确定,包括确定计算机网络中的用户系统的标签信息,标签信息物理地识别 用户系统。 该方法还包括检测从用户系统发送通信的尝试,并且响应于检测到从用户系统发送通信的尝试,在从用户系统发送通信之前将标签信息附加到通信。 响应于确定通信与恶意计算机元件相关联,包括用户系统的源将标签信息附加到通信允许确定通信源。