会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • METHOD AND APPARATUS FOR REMOVING ENCRYPTED FILES UNASSOCIATED WITH A USER KEY FROM AN ARCHIVE
    • 用于从存档中删除与用户密钥相关联的加密文件的方法和装置
    • US20090119341A1
    • 2009-05-07
    • US11935743
    • 2007-11-06
    • Eric P. FriedRajeev MishraKonagalli N. RajeshSuresh Sabarathinam
    • Eric P. FriedRajeev MishraKonagalli N. RajeshSuresh Sabarathinam
    • G06F17/30
    • G06F21/6218G06F2221/0737G06F2221/2117G06F2221/2143
    • The present invention provides a computer implemented method, data processing system, and computer program product to selectively extracts compressed-encrypted files from an archive. The data processing system receives a command to preprocess the archive from an authenticated user, wherein the authenticated user is associated with at least one fingerprint. The data processing system determines that the at least one fingerprint fails to match all fingerprints in metadata of a first compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint fails to match all fingerprints, deletes the compressed-encrypted file. The data processing system determines that the fingerprint matches a second fingerprint in metadata of a second compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint matches the second fingerprint, avoids deleting the second compressed-encrypted file.
    • 本发明提供了一种计算机实现的方法,数据处理系统和计算机程序产品,用于从归档中选择性地提取压缩加密的文件。 数据处理系统从认证的用户接收预处理归档的命令,其中认证的用户与至少一个指纹相关联。 所述数据处理系统确定所述至少一个指纹未能匹配所述存档中的第一压缩加密文件的元数据中的所有指纹。 数据处理系统响应于指纹未能匹配所有指纹的确定,删除压缩加密的文件。 数据处理系统确定指纹与存档中的第二压缩加密文件的元数据中的第二指纹匹配。 数据处理系统响应于指纹与第二指纹匹配的确定,避免删除第二压缩加密文件。
    • 2. 发明授权
    • Method and apparatus for removing encrypted files unassociated with a user key from an archive
    • 用于从归档中去除与用户密钥无关的加密文件的方法和装置
    • US08140856B2
    • 2012-03-20
    • US11935743
    • 2007-11-06
    • Eric P. FriedRajeev MishraKonagalli N. RajeshSuresh Sabarathinam
    • Eric P. FriedRajeev MishraKonagalli N. RajeshSuresh Sabarathinam
    • G06F21/00
    • G06F21/6218G06F2221/0737G06F2221/2117G06F2221/2143
    • The present invention provides a computer implemented method, data processing system, and computer program product to selectively extracts compressed-encrypted files from an archive. The data processing system receives a command to preprocess the archive from an authenticated user, wherein the authenticated user is associated with at least one fingerprint. The data processing system determines that the at least one fingerprint fails to match all fingerprints in metadata of a first compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint fails to match all fingerprints, deletes the compressed-encrypted file. The data processing system determines that the fingerprint matches a second fingerprint in metadata of a second compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint matches the second fingerprint, avoids deleting the second compressed-encrypted file.
    • 本发明提供了一种计算机实现的方法,数据处理系统和计算机程序产品,用于从归档中选择性地提取压缩加密的文件。 数据处理系统从认证的用户接收预处理归档的命令,其中认证的用户与至少一个指纹相关联。 所述数据处理系统确定所述至少一个指纹未能匹配所述存档中的第一压缩加密文件的元数据中的所有指纹。 数据处理系统响应于指纹未能匹配所有指纹的确定,删除压缩加密的文件。 数据处理系统确定指纹与存档中的第二压缩加密文件的元数据中的第二指纹匹配。 数据处理系统响应于指纹与第二指纹匹配的确定,避免删除第二压缩加密文件。
    • 9. 发明申请
    • Multi-Participant Communication System With Audio Manager Responsive To Mode Change Requests
    • 具有响应模式更改请求的音频管理器的多参与者通信系统
    • US20120008757A1
    • 2012-01-12
    • US12830879
    • 2010-07-06
    • Eric P. FriedPriyanka JadeSuresh SabarathinamSilpa Kosanam
    • Eric P. FriedPriyanka JadeSuresh SabarathinamSilpa Kosanam
    • H04M3/42
    • H04M1/72519H04M3/42238H04M3/56
    • A communication system includes a local communication device that communicates with a remote communication device via a wired or wireless communication link between the devices. The local communication device and the remote communication device are each capable of switching between a multiple user mode and a single user private mode in response to a mode change request. The local and remote communication devices include respective profiles that include profile attributes that define how the respective communication device responds to a mode change request. A user of one communication device may send a mode change request to the other communication device. In response to the mode change request, the other communication device changes mode between multiple participant mode and single participant mode if the profile of that communication device permits the mode change.
    • 通信系统包括经由设备之间的有线或无线通信链路与远程通信设备进行通信的本地通信设备。 响应于模式改变请求,本地通信设备和远程通信设备都能够在多用户模式和单个用户专用模式之间切换。 本地和远程通信设备包括各自的配置文件,其包括定义各个通信设备如何响应于模式改变请求的配置文件属性。 一个通信设备的用户可以向另一个通信设备发送模式改变请求。 响应于模式改变请求,如果该通信设备的配置文件允许模式改变,则另一个通信设备在多个参与者模式和单个参与者模式之间改变模式。
    • 10. 发明授权
    • Host trust report based filtering mechanism in a reverse firewall
    • 反向防火墙中基于主机信任报告的过滤机制
    • US08375435B2
    • 2013-02-12
    • US12339542
    • 2008-12-19
    • Eric P. FriedAnand GoyalSilpa KosanamSuresh Sabarathinam
    • Eric P. FriedAnand GoyalSilpa KosanamSuresh Sabarathinam
    • H04L29/06
    • H04L63/02H04L63/0227
    • Disclosed is a computer implemented method and computer program product to throttle traffic from a source internet protocol address. The reverse firewall inspects payloads of a plurality of packets each packet having a source address identical to the source internet protocol address and a target address corresponding to a receiver host. Responsive to detecting purported good content within at least one of the plurality of packets, the reverse firewall forwards packets having the source address. The reverse firewall determines whether a count of packets having the source address exceeds a safe threshold. The reverse firewall requests a demanded positive trust report from the receiver host, responsive to a determination that the count of packets having the source address exceeds the safe threshold. The reverse firewall determines whether a positive trust report is received from the receiver host that indicates that the source internet protocol address is good. The reverse firewall analyzes a header of packet having the source address without analyzing a payload of the packet, responsive to a determination that the positive trust report is received from the receiver host.
    • 公开了一种计算机实现的方法和计算机程序产品,用于限制源互联网协议地址的流量。 反向防火墙检查多个分组的有效载荷,每个分组具有与源互联网协议地址相同的源地址和对应于接收方主机的目标地址。 响应于在多个分组中的至少一个分组中检测到所述的良好内容,反向防火墙转发具有源地址的分组。 反向防火墙确定源数据包的数量是否超过安全阈值。 响应于确定具有源地址的分组的计数超过安全阈值的确定,反向防火墙从接收方主机请求所请求的肯定信任报告。 反向防火墙确定是否从接收者主机接收到指示源互联网协议地址良好的肯定信任报告。 响应于从接收者主机接收到肯定的信任报告的确定,反向防火墙分析具有源地址的分组的报头,而不分析分组的有效载荷。