会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 81. 发明申请
    • CHARGED PARTICLE BEAM SYSTEM AND METHOD OF OPERATING THEREOF
    • 充电颗粒束系统及其操作方法
    • US20140367586A1
    • 2014-12-18
    • US13920284
    • 2013-06-18
    • Jürgen FROSIENBenjamin John COOK
    • Jürgen FROSIENBenjamin John COOK
    • H01J37/04
    • H01J37/045H01J37/1478H01J37/153H01J37/263H01J2237/1534H01J2237/281H01J2237/2815
    • A charged particle beam device is described. In one aspect, the charged particle beam device includes a charged particle beam source, and a switchable multi-aperture for generating two or more beam bundles from a charged particle beam which includes: two or more aperture openings, wherein each of the two or more aperture openings is provided for generating a corresponding beam bundle of the two or more beam bundles; a beam blanker arrangement configured for individually blanking the two or more beam bundles; and a stopping aperture for blocking beam bundles. The device further includes a control unit configured to control the individual blanking of the two or more beam bundles for switching of the switchable multi-aperture and an objective lens configured for focusing the two or more beam bundles on a specimen or wafer.
    • 描述带电粒子束装置。 一方面,带电粒子束装置包括带电粒子束源和用于从带电粒子束产生两个或更多个束束的可切换多孔,其包括:两个或更多个孔口,其中两个或更多个 提供孔径开口以产生两个或更多束束的相应束束; 束消除器配置,其被配置为单独地消隐所述两个或更多个束束; 以及用于阻挡束束的止动孔。 该装置还包括控制单元,该控制单元被配置为控制用于切换可切换多孔的两个或更多束束的单独消隐,以及被配置用于将两束或更多束束聚焦在样本或晶片上的物镜。
    • 89. 发明申请
    • ANTI-PIRACY MEASURES FOR A VIDEO GAME USING HIDDEN SECRETS
    • 使用隐形秘密的视频游戏的反盗版措施
    • US20090328227A1
    • 2009-12-31
    • US12147459
    • 2008-06-26
    • John CookMartin Otten
    • John CookMartin Otten
    • G06F21/00
    • G06F21/121A63F13/335A63F13/73A63F13/75A63F13/77G06F21/16
    • Embodiments are directed towards employing hidden secrets on a client device to detect and deter piracy of a computer application. The computer application is partitioned into components, where a subset of the components is initially provided to the client device. In one embodiment, the computer application is unable to execute properly within the removed or other set of components. The removed components not provided to the client device may then be modified based on hidden secrets information and a verification component and provided over a network to the client device. If the verification component is unable to locate an armed secret, or detects that an armed secret is modified, the computer application may be inhibited from installation and/or execution. In one embodiment, a secret might be unarmed, such that its presence, absence, and/or modification might be ignored.
    • 实施例旨在在客户端设备上采用隐藏的秘密来检测和阻止计算机应用的盗版。 计算机应用程序被分成组件,其中组件的子集最初被提供给客户端设备。 在一个实施例中,计算机应用程序无法在所移除或其他组件组中正确执行。 然后可以基于隐藏的秘密信息和验证组件修改未提供给客户端设备的移除的组件,并通过网络向客户端设备提供。 如果验证组件不能找到武装秘密,或检测到武装秘密被修改,则可能禁止计算机应用程序的安装和/或执行。 在一个实施例中,秘密可以是非武装的,使得其存在,不存在和/或修改可能被忽略。