会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 13. 发明申请
    • Animal control apparatus and methods
    • 动物控制装置及方法
    • US20080173257A1
    • 2008-07-24
    • US11655306
    • 2007-01-18
    • Michael SteinerPattie Steiner
    • Michael SteinerPattie Steiner
    • A01K27/00
    • A01K27/004A01K15/029A01K27/006A01K27/007A01K27/008A01K27/009
    • Apparatus and methods for animal control and restraint. In one embodiment, the apparatus comprises a retractable tether (e.g., leash) having a single-handed grip handle which include a built-in chemical repellent. The handle further includes a mechanism for quickly dispensing chemical repellent directionally by initiating a safety and actuating a trigger mechanism. The repellant can be used to rapidly spray one or more animals (such as during a dogfight) so as to minimize physical trauma to the dogs, and emotional trauma to the owner(s). Also, the handle is optionally equipped with a built in light for effective use of the handle (and repellant) in the dark, as well as a retractable mechanism to manage the dispensing and storage of a leash that can be attached to an animal collar.
    • 用于动物控制和约束的装置和方法。 在一个实施例中,该装置包括具有单手抓握手柄的可伸缩绳索(例如,皮带),其包括内置的化学驱除剂。 手柄还包括通过启动安全性并致动触发机构来快速分配化学驱除剂的机构。 驱避剂可用于快速喷洒一只或多只动物(例如在狗ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight ight 此外,手柄可选地装备有用于在黑暗中有效使用手柄(和驱避剂)的内置光,以及用于管理可附接到动物衣领的皮带的分配和存储的可伸缩机构。
    • 15. 发明授权
    • Systems and methods for protecting web based applications from cross site request forgery attacks
    • 用于保护基于Web的应用程序免受跨站点请求伪造攻击的系统和方法
    • US08020193B2
    • 2011-09-13
    • US12254494
    • 2008-10-20
    • Sumeer K. BholaTodd E. KaplingerMichael Steiner
    • Sumeer K. BholaTodd E. KaplingerMichael Steiner
    • G06F17/00G06F7/04G06F15/16G06F17/30H04L29/06H04N7/16
    • H04L63/1441G06F21/335G06F21/6218H04L67/02
    • Computer implemented methods (200) for protecting web based applications (110, 114) from Cross Site Request Forgery (CSRF) attacks. The methods involve (204) classifying each resource offered by a web server application as a CSRF-protected resource or a not-CSRF-protected resource. The methods also involve (214, . . . , 222) performing a user authentication, (224) initializing an authentication-token, and (226) initializing a CSRF protection secret that is used to validate CSRF protection parameters contained in resource identifiers for the resources. The methods further involve (228) performing a server-side rewriting process (300) to add the CSRF protection parameter to the resource identifiers for the resources and/or (230) performing a client-side rewriting process to add the CSRF protection parameter to a resource identifier for a second resource (e.g., a resource created at a client computer (102)).
    • 用于保护基于Web的应用程序(110,114)免受跨站点请求伪造(CSRF)攻击的计算机实现的方法(200)。 这些方法涉及(204)将由Web服务器应用提供的每个资源分类为受CSRF保护的资源或不受CSRF保护的资源。 这些方法还涉及执行用户认证的(214,...,222),(224)初始化认证令牌,以及(226)初始化用于验证包含在资源标识符中的CSRF保护参数的CSRF保护机密 资源。 所述方法还包括(228)执行服务器侧重写处理(300)以将CSRF保护参数添加到资源的资源标识符和/或(230)执行客户端重写处理以将CSRF保护参数添加到 用于第二资源的资源标识符(例如,在客户端计算机(102)处创建的资源)。
    • 16. 发明申请
    • SYSTEMS AND METHODS FOR PROTECTING WEB BASED APPLICATIONS FROM CROSS SITE REQUEST FORGERY ATTACKS
    • 保护基于网站的应用程序的系统和方法从交叉点请求伪造攻击
    • US20100100927A1
    • 2010-04-22
    • US12254494
    • 2008-10-20
    • Sumeer K. BholaTodd E. KaplingerMichael Steiner
    • Sumeer K. BholaTodd E. KaplingerMichael Steiner
    • G06F21/20H04L9/32
    • H04L63/1441G06F21/335G06F21/6218H04L67/02
    • Computer implemented methods (200) for protecting web based applications (110, 114) from Cross Site Request Forgery (CSRF) attacks. The methods involve (204) classifying each resource offered by a web server application as a CSRF-protected resource or a not-CSRF-protected resource. The methods also involve (214, . . . , 222) performing a user authentication, (224) initializing an authentication-token, and (226) initializing a CSRF protection secret that is used to validate CSRF protection parameters contained in resource identifiers for the resources. The methods further involve (228) performing a server-side rewriting process (300) to add the CSRF protection parameter to the resource identifiers for the resources and/or (230) performing a client-side rewriting process to add the CSRF protection parameter to a resource identifier for a second resource (e.g., a resource created at a client computer (102)).
    • 用于保护基于Web的应用程序(110,114)免受跨站点请求伪造(CSRF)攻击的计算机实现的方法(200)。 这些方法涉及(204)将由Web服务器应用提供的每个资源分类为受CSRF保护的资源或不受CSRF保护的资源。 这些方法还涉及执行用户认证的(214,...,222),(224)初始化认证令牌,以及(226)初始化用于验证包含在资源标识符中的CSRF保护参数的CSRF保护机密 资源。 所述方法还包括(228)执行服务器侧重写处理(300)以将CSRF保护参数添加到资源的资源标识符和/或(230)执行客户端重写处理以将CSRF保护参数添加到 用于第二资源的资源标识符(例如,在客户端计算机(102)处创建的资源)。