会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明授权
    • Reputation in on-line consumer markets
    • 在线消费市场的声誉
    • US08438068B2
    • 2013-05-07
    • US11952679
    • 2007-12-07
    • Darko KirovskiAshwin SwaminathanRenan Gonçalves CattelanVarkey Cherian
    • Darko KirovskiAshwin SwaminathanRenan Gonçalves CattelanVarkey Cherian
    • G06Q30/00
    • G06Q30/06G06Q20/10G06Q30/02G06Q50/188
    • Seller's reputation quantification technique embodiments are presented that quantify in monetary terms a risk of dissatisfaction to a potential buyer of a product or service from a seller in an on-line consumer market. Generally, this involves computing the monetary sales limit for the seller. This monetary sales limit represents an amount, which if a sum of the current prices of all the products and services currently offered by the seller is equal to or less than the amount, there would not be a significant risk to the buyer of being dissatisfied with the product or service. Given this, a risk of a potential buyer's dissatisfaction with a product or service purchased from the seller in view of a price the buyer wants to pay is assessed. The assessed risk is then provided to the potential buyer in the form of one or more risk indicators.
    • 提供卖方信誉量化技术实施方案,以货币方式量化在在线消费者市场上卖方对产品或服务的潜在买家的不满意的风险。 一般来说,这涉及计算卖方的货币销售限额。 该货币销售限额是指一笔金额,如果卖方目前提供的所有产品和服务的当前价格的总和等于或小于该金额,买方就不会有不满意的风险 产品或服务。 鉴于此,鉴于买方要支付的价格,潜在买家对从卖方购买的产品或服务的不满风险被评估。 然后以一种或多种风险指标的形式向潜在买方提供评估风险。
    • 14. 发明授权
    • Collusion-resistant watermarking and fingerprinting
    • 防欺骗水印和指纹识别
    • US07681039B2
    • 2010-03-16
    • US10975514
    • 2004-10-28
    • Yacov YacobiHenrique MalvarDarko Kirovski
    • Yacov YacobiHenrique MalvarDarko Kirovski
    • H04L9/32
    • G06T1/005G06T2201/0063G06T2201/0065H04N1/32144H04N2201/3205H04N2201/3233H04N2201/3236
    • An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish. However, in this scenario each member of the malicious coalition leaves a fingerprint in every digital good from which the estimated watermark is subtracted. Thus, like a burglar without gloves, the digital pirate leaves her fingerprints only when she commits a crime. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    • 这里描述了一种使用水印来促进数字商品的权利实施的技术的实现。 更具体地说,它是通过检测串通作为恶意攻击并识别参与的共谋者来保护数字商品的指纹技术。 如果数字盗版打破了一个客户端,并且使得该客户端能够避免水印检测,则所有内容(无标记/免费标记/保护)只能在该特定客户端上被标记为无标记。 然而,为了使其他客户端能够以无标记的方式播放内容,数字盗版者需要从许多客户端中抽出提取的检测密钥,以创建可以避免所有客户端上的水印检测的内容。 所描述的实现通过指纹机制显着地提高了共谋阻力,其可以识别恶意联盟的成员,即使它们的数量比常规串谋保护方案可以实现的数量级大几个数量级。 然而,在这种情况下,恶意联盟的每个成员在每个数字商品中留下指纹,从中减去估计的水印。 因此,像没有手套的防盗器一样,数字盗版者只有在犯罪时才会留下指纹。 本摘要本身并不旨在限制本专利的范围。 在所附权利要求中指出了本发明的范围。
    • 18. 发明申请
    • UTILIZING CRYPTOGRAPHIC KEYS AND ONLINE SERVICES TO SECURE DEVICES
    • 利用CRYPTOGRAPHIC KEYS和在线服务来安全的设备
    • US20090147949A1
    • 2009-06-11
    • US11951021
    • 2007-12-05
    • Darko Kirovski
    • Darko Kirovski
    • H04L9/14G06F12/14
    • H04L9/083H04L9/3226
    • The claimed subject matter in accordance with an aspect provides systems and/or methods that generates, allocates, or utilizes strong symmetric cryptographic keys to secure storage devices. The system can include components that determine whether a storage device with an associated credential cache has been affiliated with the system. The system extracts authentication information included within the credential cache and establishes communications with a web service that utilizes the authentication information to generate and return a set strong symmetric cryptographic keys to the system. The system employs one of the set of strong symmetric cryptographic keys to encrypt or decrypt the storage device to make content persisted on the storage device available and thereafter removes the distributed set of strong symmetric cryptographic keys from the system.
    • 根据一个方面的要求保护的主题提供了生成,分配或利用强对称加密密钥来保护存储设备的系统和/或方法。 该系统可以包括确定具有相关联的凭证高速缓存的存储设备是否已经隶属于该系统的组件。 该系统提取包含在凭证高速缓存内的认证信息,并建立与使用认证信息的Web服务的通信,以生成并返回一组强对称密码密钥给系统。 该系统使用一组强对称加密密钥中的一个来对存储设备进行加密或解密,使存储设备上的内容持续存在,然后从系统中删除强对称密钥的分布式集合。