会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明授权
    • Automated detection of defined input values and transformation to tokens
    • 自动检测定义的输入值并转换为令牌
    • US08655787B1
    • 2014-02-18
    • US12826491
    • 2010-06-29
    • Robert W. GriffinDaniel V. BaileyJoshua A. Rosenthol
    • Robert W. GriffinDaniel V. BaileyJoshua A. Rosenthol
    • G06F17/00
    • G06F17/00G06F21/6272G06Q20/24G06Q20/385H04L63/00
    • A computer-implemented technique processes a potentially sensitive item of data (e.g., data which may be either a credit card number or a token having a similar format). The technique involves, after the potentially sensitive item of data is properly received within a physical memory location, generating a token result which indicates whether the potentially sensitive item of data satisfies a valid-token requirement. The technique further involves preserving the potentially sensitive item of data in an unaltered form within the physical memory location when the token result indicates that the potentially sensitive item of data satisfies the valid-token requirement. The technique further involves replacing the potentially sensitive item of data within the physical memory location with a token when the token result indicates that the potentially sensitive item of data does not satisfy the valid-token requirement.
    • 计算机实现的技术处理可能敏感的数据项目(例如,可能是信用卡号码或具有类似格式的令牌的数据)。 该技术涉及在物理存储器位置中适当地接收到潜在的敏感数据项之后,生成指示潜在敏感数据项是否满足有效令牌要求的令牌结果。 该技术还涉及当令牌结果指示潜在敏感数据项满足有效令牌要求时,在物理存储器位置内以未改变的形式保留潜在敏感数据项。 该技术还包括当令牌结果指示潜在的敏感数据项不满足有效令牌要求时,用令牌替换物理存储器位置内的潜在敏感数据项。
    • 15. 发明授权
    • System for linking from objects to remote resources
    • 从对象到远程资源链接的系统
    • US08180844B1
    • 2012-05-15
    • US09531076
    • 2000-03-18
    • Geoffrey B. RhoadsBruce L. DavisWilliam C. Hein, IIIJoshua A. RosentholBrian T. MacIntoshKenneth L. Levy
    • Geoffrey B. RhoadsBruce L. DavisWilliam C. Hein, IIIJoshua A. RosentholBrian T. MacIntoshKenneth L. Levy
    • G06F15/16
    • G06F17/30047G06F21/10G06Q30/0603
    • A machine readable code (e.g., digital watermark or bar code) conveyed with objects is used in establishing links to associated electronic resources, such as web pages. The object can be physical (e.g., a magazine page) or electronic (e.g., music data). The associated electronic resource can be a web site from which goods or services (e.g., music) may be offered for sale. In some embodiments, when a code is sensed from one object, the system can foresee other object codes that may soon be sensed, and can anticipatorily provide address information for their respectively associated electronic resources. In another embodiment, the microphone of a cell phone is used to listen to ambient audio. A watermark in the audio is decoded and its payload is used to link to, or provide, related information. A variety of other concepts are also detailed, such as permitting the free distribution of low fidelity music as marketing agents for higher fidelity versions that are available for sale.
    • 使用用对象传送的机器可读代码(例如,数字水印或条形码)用于建立与相关联的电子资源(例如网页)的链接。 物体可以是物理的(例如,杂志页面)或电子的(例如,音乐数据)。 相关联的电子资源可以是可以从其提供商品或服务(例如,音乐)以供出售的网站。 在一些实施例中,当从一个对象感测到代码时,系统可以预见可能很快被感测到的其他目标代码,并且可以预期为其分别关联的电子资源提供地址信息。 在另一个实施例中,蜂窝电话的麦克风用于监听环境音频。 音频中的水印被解码,并且其有效载荷用于链接到或提供相关信息。 还有其他各种其他概念也很详细,例如允许将低保真音乐作为营销代理商免费发布,用于可用于销售的更高保真版本。
    • 18. 发明授权
    • Self-identification of tokens
    • 令牌的自我识别
    • US08452965B1
    • 2013-05-28
    • US12826466
    • 2010-06-29
    • Robert W. GriffinDaniel V. BaileyJoshua A. Rosenthol
    • Robert W. GriffinDaniel V. BaileyJoshua A. Rosenthol
    • G06F21/00
    • G06F21/6272
    • A technique of protecting a datum within a set of sensitive data is presented. In this technique, the datum includes a first set of bits satisfying a first set of constraints, and a computer receives the set of sensitive data from an authorized client. The technique involves producing a token corresponding to the datum, the token including a second set of bits distinct from the first set of bits, the second set of bits satisfying a second set of constraints, the second set of constraints being a superset of the first set of constraints. The technique further involves storing the datum and the corresponding token. The technique further involves sending the token to the authorized client, the authorized client enabled to perform, using the second set of bits, a verification that the token satisfies the second set of constraints, the verification being performed apart from the database.
    • 提出了一种在一组敏感数据内保护数据的技术。 在该技术中,数据包括满足第一组约束的第一组位,并且计算机从授权客户端接收敏感数据集合。 该技术涉及产生对应于该数据的令牌,令牌包括与第一组位不同的第二组位,第二组位满足第二组约束,第二组约束是第一组的超集 一套约束。 该技术还涉及存储数据和相应的令牌。 该技术还包括将令牌发送到授权客户端,授权客户机能够使用第二组位来执行令牌满足第二组约束的验证,所述验证是从数据库执行的。