会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Personal domain controller
    • 个人域控制器
    • US07822863B2
    • 2010-10-26
    • US11383144
    • 2006-05-12
    • Dirk BalfanzDiana K. SmettersGlenn E. DurfeeTrevor F. Smith
    • Dirk BalfanzDiana K. SmettersGlenn E. DurfeeTrevor F. Smith
    • G06F15/16
    • H04L63/101H04L12/2803H04L12/2818H04L63/0823
    • A method of accessing a data resource identifies the data resource, the data resource accessible through a first device and associated with a resource locator, the first device configured to provide access to the data resource responsive to possession of a whitelisted credential. The method includes receiving a second-device credential from a second device by a personal domain controller, the personal domain controller and the first device within a first trusted relationship and provides, by the personal domain controller, the second-device credential to the first device for whitelisting subject to the first trusted relationship. The method uses, by the second device, the second-device credential to access the data resource responsive to the resource locator.
    • 访问数据资源的方法标识数据资源,数据资源可通过第一设备访问并与资源定位符相关联,第一设备被配置为响应于拥有白名单凭证提供对数据资源的访问。 该方法包括由个人域控制器,个人域控制器和第一信任关系中的第一设备从第二设备接收第二设备凭证,并且由个人域控制器将第二设备凭证提供给第一设备 将白名单列入第一个信任关系。 该方法由第二设备使用第二设备凭证来响应于资源定位器来访问数据资源。
    • 2. 发明授权
    • Wormhole devices for usable secure access to remote resource
    • 蠕虫孔设备可用于远程资源的安全访问
    • US08387124B2
    • 2013-02-26
    • US11744451
    • 2007-05-04
    • Diana K. SmettersTrevor F. SmithKyung-Hee Lee
    • Diana K. SmettersTrevor F. SmithKyung-Hee Lee
    • H04L29/06
    • H04L63/0853
    • A token has a memory, an interface allow connection to a host, and a processor. The processor, in response to user input for configuring a remote access connection, executes a first set of processing instructions to establish a trusted connection with the server host, exchanges credentials over the trusted connection to establish a secure connection with the server host over an untrusted connection, and defines configuration information for accessing user selected data or services. The processor, in response to user input received in a legacy environment, executes a second set of processing instructions that includes establishing, over an untrusted connection, a secure connection with the server host using the security credentials, configuring the secure connection for access to the data or services, making the data or services available in the legacy environment, and defends against attempted access to data or services available at the token other than the data or services made available in the legacy environment.
    • 令牌具有内存,接口允许连接到主机和处理器。 响应于用于配置远程访问连接的用户输入,处理器执行第一组处理指令以建立与服务器主机的可信连接,通过可信连接交换凭证,以通过不可信的方式与服务器主机建立安全连接 连接,并定义用于访问用户选择的数据或服务的配置信息。 响应于在传统环境中接收的用户输入,处理器执行第二组处理指令,其包括通过不可信连接在使用安全凭证的情况下建立与服务器主机的安全连接,配置安全连接以访问 数据或服务,使数据或服务在遗留环境中可用,并防止尝试访问在令牌上可用的数据或服务,而不是在传统环境中提供的数据或服务。
    • 3. 发明申请
    • WORMHOLE DEVICES FOR USABLE SECURE ACCESS TO REMOTE RESOURCE
    • 用于可靠安全访问远程资源的WORMHOLE设备
    • US20080229402A1
    • 2008-09-18
    • US11744451
    • 2007-05-04
    • Diana K. SmettersTrevor F. SmithKyung-Hee Lee
    • Diana K. SmettersTrevor F. SmithKyung-Hee Lee
    • H04L9/32
    • H04L63/0853
    • A token has a memory, an interface allow connection to a host, and a processor. The processor, in response to user input for configuring a remote access connection, executes a first set of processing instructions to establish a trusted connection with the server host, exchanges credentials over the trusted connection to establish a secure connection with the server host over an untrusted connection, and defines configuration information for accessing user selected data or services. The processor, in response to user input received in a legacy environment, executes a second set of processing instructions that includes establishing, over an untrusted connection, a secure connection with the server host using the security credentials, configuring the secure connection for access to the data or services, making the data or services available in the legacy environment, and defends against attempted access to data or services available at the token other than the data or services made available in the legacy environment.
    • 令牌具有内存,接口允许连接到主机和处理器。 响应于用于配置远程访问连接的用户输入,处理器执行第一组处理指令以建立与服务器主机的可信连接,通过可信连接交换凭证,以通过不可信的方式与服务器主机建立安全连接 连接,并定义用于访问用户选择的数据或服务的配置信息。 响应于在传统环境中接收的用户输入,处理器执行第二组处理指令,其包括通过不可信连接在使用安全凭证的情况下建立与服务器主机的安全连接,配置安全连接以访问 数据或服务,使数据或服务在遗留环境中可用,并防止尝试访问在令牌上可用的数据或服务,而不是在传统环境中提供的数据或服务。
    • 6. 发明申请
    • System And Method For Facilitating Cognitive Processing Of Simultaneous Remote Voice Conversations
    • 用于促进同时远程语音对话的认知处理的系统和方法
    • US20090259464A1
    • 2009-10-15
    • US12101764
    • 2008-04-11
    • Nicolas B. DucheneautTrevor F. Smith
    • Nicolas B. DucheneautTrevor F. Smith
    • G10L15/00
    • G10L15/1822H04N7/15
    • A system and method for facilitating cognitive processing of simultaneous remote voice conversations is provided. A plurality of remote voice conversations participated in by distributed participants are provided over a shared communication channel. A main conversation between at least two of the distributed participants and one or more subconversations between at least two other of the distributed participants are identified from within the remote voice conversations. Segments of interest to one of the distributed participants are defined including a conversation excerpt having a lower attention activation threshold for the one distributed participant. Each of the subconversations is parsed into conversation excerpts. The conversation excerpts are compared to the segments of interest. One or more gaps between conversation flow in the main conversation are predicted. Segments of interest are selectively injected into the gaps of the main conversation as provided to the one distributed participant over the shared communications channel.
    • 提供了一种用于促进同时远程语音对话的认知处理的系统和方法。 通过共享通信信道提供分散的参与者参与的多个远程语音对话。 从远程语音对话中识别至少两个分布式参与者之间的主要对话和至少两个其他分布参与者之间的一个或多个子会话。 定义一个分布式参与者的感兴趣区段,包括一个分布式参与者具有较低注意力激活阈值的会话节选。 每个子句都被分解为会话摘录。 将会话片段与感兴趣的部分进行比较。 预测主要会话中的会话流之间的一个或多个差距。 通过共享通信信道向一个分布式参与者提供关注的分段被选择性地注入到主会话的间隙中。
    • 8. 发明授权
    • System and method for facilitating cognitive processing of simultaneous remote voice conversations
    • 促进同步远程语音对话的认知处理的系统和方法
    • US08265252B2
    • 2012-09-11
    • US12101764
    • 2008-04-11
    • Nicolas B. DucheneautTrevor F. Smith
    • Nicolas B. DucheneautTrevor F. Smith
    • H04M3/42
    • G10L15/1822H04N7/15
    • A system and method for facilitating cognitive processing of simultaneous remote voice conversations is provided. A plurality of remote voice conversations participated in by distributed participants are provided over a shared communication channel. A main conversation between at least two of the distributed participants and one or more subconversations between at least two other of the distributed participants are identified from within the remote voice conversations. Segments of interest to one of the distributed participants are defined including a conversation excerpt having a lower attention activation threshold for the one distributed participant. Each of the subconversations is parsed into conversation excerpts. The conversation excerpts are compared to the segments of interest. One or more gaps between conversation flow in the main conversation are predicted. Segments of interest are selectively injected into the gaps of the main conversation as provided to the one distributed participant over the shared communications channel.
    • 提供了一种用于促进同时远程语音对话的认知处理的系统和方法。 通过共享通信信道提供分散的参与者参与的多个远程语音对话。 从远程语音对话中识别至少两个分布式参与者之间的主要对话和至少两个其他分布参与者之间的一个或多个子会话。 定义一个分布式参与者的感兴趣区段,包括一个分布式参与者具有较低注意力激活阈值的会话节选。 每个子句都被分解为会话摘录。 将会话片段与感兴趣的部分进行比较。 预测主要会话中的会话流之间的一个或多个差距。 通过共享通信信道向一个分布式参与者提供关注的分段被选择性地注入到主会话的间隙中。