会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • Actionable email documents
    • 可操作的电子邮件文件
    • US20060129592A1
    • 2006-06-15
    • US11012866
    • 2004-12-15
    • Suraj PoozhiyilCyrus BalsaraJason BouldMark LucovskyRichard McDowell
    • Suraj PoozhiyilCyrus BalsaraJason BouldMark LucovskyRichard McDowell
    • G06F17/30
    • G06F17/246G06Q10/107H04L51/00Y10S707/99943
    • A received reply email document enables some action to be effectuated using data included in the email document responsive to field identifiers associated with the data and corresponding to fields of metadata. The associated field identifiers that correspond to known fields of the metadata provide some expectation as to the semantic meaning and/or syntactic constraints of the data to which the field identifiers are associated. In a described implementation, an actionable email documents module creates an email document having blocks that are mapped to fields of metadata. The email document is transmitted to one or more recipients. Each recipient adds data to the blocks so that the data becomes mapped to the fields of the metadata. The recipients return a reply email document having the field-mapped data. Upon receipt, the module can effectuate some action using the field-mapped data responsive to the mappings.
    • 接收到的回复电子邮件文档使得能够使用包括在电子邮件文档中的数据来响应于与数据相关联的字段标识符并且对应于元数据字段来实现一些动作。 对应于元数据的已知字段的相关联的字段标识符提供关于字段标识符与之相关联的数据的语义和/或语法约束的期望。 在所描述的实现中,可操作的电子邮件文档模块创建具有映射到元数据字段的块的电子邮件文档。 电子邮件文件被传送给一个或多个收件人。 每个收件人将数据添加到块,以便数据映射到元数据的字段。 收件人返回具有字段映射数据的回复电子邮件文档。 收到后,模块可以使用响应于映射的字段映射数据来实现某些动作。
    • 4. 发明授权
    • Software protection injection at load time
    • 加载时软件保护注入
    • US08001596B2
    • 2011-08-16
    • US11743755
    • 2007-05-03
    • Matthias WollnikNir Ben ZviHakki Tunc BostanciJohn Richard McDowellAaron Goldsmid
    • Matthias WollnikNir Ben ZviHakki Tunc BostanciJohn Richard McDowellAaron Goldsmid
    • G06F11/00
    • G06F21/51G06F21/54
    • A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium.
    • 将保护机制应用于二进制对象的方法包括使用操作系统资源将二进制对象与清单和数字签名一起从存储介质加载。 使用数字签名执行二进制对象的认证,读取清单以确定二进制对象的保护类别。 操作系统选择对应于保护类别的保护机制,并将保护机制代码与二进制对象一起注入计算机RAM中的二进制映像。 当访问二进制图像时,保护机制执行,并允许对二进制对象的完全访问和功能,或者阻止二进制对象的正确访问和操作。 可以独立于存储介质上的信息更新保护机制。
    • 9. 发明申请
    • SOFTWARE PROTECTION INJECTION AT LOAD TIME
    • 负载时软件保护注射
    • US20080276314A1
    • 2008-11-06
    • US11743755
    • 2007-05-03
    • MATTHIAS WOLLNIKNir Ben-ZviHakki Tunc BostanciJohn Richard McDowellAaron Goldsmid
    • MATTHIAS WOLLNIKNir Ben-ZviHakki Tunc BostanciJohn Richard McDowellAaron Goldsmid
    • G06F19/00
    • G06F21/51G06F21/54
    • A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium.
    • 将保护机制应用于二进制对象的方法包括使用操作系统资源将二进制对象与清单和数字签名一起从存储介质加载。 使用数字签名执行二进制对象的认证,读取清单以确定二进制对象的保护类别。 操作系统选择对应于保护类别的保护机制,并将保护机制代码与二进制对象一起注入计算机RAM中的二进制映像。 当访问二进制图像时,保护机制执行,并允许对二进制对象的完全访问和功能,或者阻止二进制对象的正确访问和操作。 可以独立于存储介质上的信息更新保护机制。