会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Method for making holograms
    • 制作全息图的方法
    • US20070116943A1
    • 2007-05-24
    • US10482129
    • 2002-06-25
    • Peter SinclairMark Watson
    • Peter SinclairMark Watson
    • B32B27/30B32B27/20B32B3/26B05D3/12B05D1/12B05D3/02
    • D21H19/66B29C59/026B29C59/046B29K2105/165D21H21/54G03H1/0252G03H1/028G03H2250/14G03H2250/43Y10T428/249972Y10T428/31504Y10T428/31855Y10T428/31935
    • A durable holographically imaged paper, plastic film or other product is produced by embossing the image into a thermoplastic coating thereon which comprises plastic pigment particles. The plastic pigment particles are preferably hollow but may be solid. The coating preferably also comprises a thermoplastic polymer or copolymer, for example a copolymer of vinyl acetate and versatic acid, an acrylic polymer, a styrene-acrylic or other acrylic copolymer, a vinyl chloride-vinyl acetate-ethylene terpolymer, a polyvinyl acetate or a polyvinyl alcohol. Preferably, the polymer or copolymer has a glass transition temperature (Tg value) in the range 20° C. to 110° C. The thermoplastic coating may also contain inorganic pigments, for example precipitated calcium carbonate (PCC), ground natural calcium carbonate, or kaolin or other clays, and/or a starch binder. Embossing is preferably carried out directly on the thermoplastic coating by means of a holographically engraved shim.
    • 通过将图像压印在其上的包含塑料颜料颗粒的热塑性涂层中来制造耐久的全息成像的纸,塑料膜或其它产品。 塑料颜料颗粒优选是中空的,但可以是固体。 涂层优选还包含热塑性聚合物或共聚物,例如乙酸乙烯酯和叔碳酸的共聚物,丙烯酸聚合物,苯乙烯 - 丙烯酸或其它丙烯酸共聚物,氯乙烯 - 乙酸乙烯酯 - 乙烯三元共聚物,聚乙酸乙烯酯或 聚乙烯醇。 优选地,聚合物或共聚物的玻璃化转变温度(Tg值)在20℃至110℃的范围内。热塑性涂层还可以含有无机颜料,例如沉淀碳酸钙(PCC),研磨天然碳酸钙, 或高岭土或其它粘土,和/或淀粉粘合剂。 压花优选通过全息雕刻的垫片直接在热塑性涂层上进行。
    • 2. 发明授权
    • Secure communication methods
    • 安全沟通方式
    • US09235732B2
    • 2016-01-12
    • US14055868
    • 2013-10-16
    • Michael EynonPeter SinclairJames Lloyd
    • Michael EynonPeter SinclairJames Lloyd
    • G06F21/00G06F21/83G06F21/60H04L9/32H04L29/06
    • G06F21/83G06F21/554G06F21/602G06F21/84H04L9/3247H04L63/0823H04L63/10H04L63/105
    • Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    • 通过隔离端点设备的一部分来实现用户输入的安全通信,从而保护证书和加密密钥免受恶意软件的破坏。 此外,通信被传递通过被配置为解密和/或认证由端点设备的隔离部分加密的用户输入的可信数据中继。 可信数据中继器可以确定用户输入被受保护的证书和加密密钥加密或认证,从而在端点设备内对其来源进行认证。 然后,可信数据中继器将输入转发到预定的目的地。 在一些实施例中,端点设备的隔离部分被配置为检测由自动完成逻辑和/或拼写检查逻辑创建的输入。
    • 3. 发明授权
    • Trusted data relay
    • 可信数据中继
    • US09235731B2
    • 2016-01-12
    • US14055861
    • 2013-10-16
    • James LloydMichael EynonPeter Sinclair
    • James LloydMichael EynonPeter Sinclair
    • G06F21/00G06F21/83G06F21/60H04L9/32H04L29/06
    • G06F21/83G06F21/554G06F21/602G06F21/84H04L9/3247H04L63/0823H04L63/10H04L63/105
    • Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    • 通过隔离端点设备的一部分来实现用户输入的安全通信,从而保护证书和加密密钥免受恶意软件的破坏。 此外,通信被传递通过被配置为解密和/或认证由端点设备的隔离部分加密的用户输入的可信数据中继。 可信数据中继器可以确定用户输入被受保护的证书和加密密钥加密或认证,从而在端点设备内对其来源进行认证。 然后,可信数据中继器将输入转发到预定的目的地。 在一些实施例中,端点设备的隔离部分被配置为检测由自动完成逻辑和/或拼写检查逻辑创建的输入。
    • 4. 发明申请
    • Secure Communication Architecture
    • 安全通信架构
    • US20140108820A1
    • 2014-04-17
    • US14055706
    • 2013-10-16
    • Michael EynonPeter SinclairJames Lloyd
    • Michael EynonPeter SinclairJames Lloyd
    • G06F21/83
    • G06F21/83G06F21/554G06F21/602G06F21/84H04L9/3247H04L63/0823H04L63/10H04L63/105
    • Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    • 通过隔离端点设备的一部分来实现用户输入的安全通信,从而保护证书和加密密钥免受恶意软件的破坏。 此外,通信被传递通过被配置为解密和/或认证由端点设备的隔离部分加密的用户输入的可信数据中继。 可信数据中继器可以确定用户输入被受保护的证书和加密密钥加密或认证,从而在端点设备内对其来源进行认证。 然后,可信数据中继器将输入转发到预定的目的地。 在一些实施例中,端点设备的隔离部分被配置为检测由自动完成逻辑和/或拼写检查逻辑创建的输入。
    • 6. 发明申请
    • Trusted Data Relay
    • 可信数据中继
    • US20140108821A1
    • 2014-04-17
    • US14055861
    • 2013-10-16
    • James LloydMichael EynonPeter Sinclair
    • James LloydMichael EynonPeter Sinclair
    • G06F21/83
    • G06F21/83G06F21/554G06F21/602G06F21/84H04L9/3247H04L63/0823H04L63/10H04L63/105
    • Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    • 通过隔离端点设备的一部分来实现用户输入的安全通信,从而保护证书和加密密钥免受恶意软件的破坏。 此外,通信被传递通过被配置为解密和/或认证由端点设备的隔离部分加密的用户输入的可信数据中继。 可信数据中继器可以确定用户输入被受保护的证书和加密密钥加密或认证,从而在端点设备内对其来源进行认证。 然后,可信数据中继器将输入转发到预定的目的地。 在一些实施例中,端点设备的隔离部分被配置为检测由自动完成逻辑和/或拼写检查逻辑创建的输入。
    • 7. 发明申请
    • Secure Communication Methods
    • 安全通信方法
    • US20140108790A1
    • 2014-04-17
    • US14055868
    • 2013-10-16
    • Michael EynonPeter SinclairJames Lloyd
    • Michael EynonPeter SinclairJames Lloyd
    • H04L9/32
    • G06F21/83G06F21/554G06F21/602G06F21/84H04L9/3247H04L63/0823H04L63/10H04L63/105
    • Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
    • 通过隔离端点设备的一部分来实现用户输入的安全通信,从而保护证书和加密密钥免受恶意软件的破坏。 此外,通信被传递通过被配置为解密和/或认证由端点设备的隔离部分加密的用户输入的可信数据中继。 可信数据中继器可以确定用户输入被受保护的证书和加密密钥加密或认证,从而在端点设备内对其来源进行认证。 然后,可信数据中继器将输入转发到预定的目的地。 在一些实施例中,端点设备的隔离部分被配置为检测由自动完成逻辑和/或拼写检查逻辑创建的输入。