会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 23. 发明申请
    • METHOD AND APPARATUS FOR SECURITY VALIDATION
    • 用于安全验证的方法和装置
    • US20120304249A1
    • 2012-11-29
    • US13512642
    • 2010-11-05
    • Lin LuoFan Jing MengShun Xiang YangYu Zhang
    • Lin LuoFan Jing MengShun Xiang YangYu Zhang
    • G06F21/00
    • G06F21/00G06F21/554H04L63/0263H04L63/1408
    • A computer-implemented method, apparatus, and article of manufacture for security validation of a user input in a computer network application. The method includes: providing a subset of security rules of a server-side protection means to a pre-validation component deployed at a client side, so as to enable security validation of a user input on the client side by the pre-validation component; validating the user input based on at least one of the security rules; determining, in response to detecting a user input violation and that a violated security rule has not been provided to the pre-validation component, the user as a first class of users; determining, in response to detecting the user input violation and that the violated security rule has been provided to the pre-validation component, the user as a second class of users; and performing different security protection actions to the first and second class of users.
    • 用于计算机网络应用中的用户输入的安全验证的计算机实现的方法,装置和制品。 该方法包括:将服务器侧保护装置的安全规则的子集提供给部署在客户机侧的预验证组件,以便通过预验证组件实现客户端侧的用户输入的安全验证; 基于所述安全规则中的至少一个验证所述用户输入; 确定响应于检测到用户输入违例并且未将所述违反的安全规则提供给所述预验证组件,所述用户作为第一类用户; 响应于检测到所述用户输入违例并且所述违反的安全规则已经被提供给所述预验证部件,所述用户作为第二类用户; 并对第一类和第二类用户执行不同的安全保护动作。
    • 28. 发明申请
    • Tracing and identifying piracy in wireless digital rights management system
    • 跟踪和识别无线数字版权管理系统中的盗版
    • US20060048237A1
    • 2006-03-02
    • US11211804
    • 2005-08-25
    • Lin LuoJian ZhangRong YanLing Shao
    • Lin LuoJian ZhangRong YanLing Shao
    • H04N7/16
    • H04L63/0428H04L2463/103H04N21/2541H04N21/41407H04N21/44236H04N21/6131H04N21/8358
    • Provides methods for tracing and identifying a piracy in a wireless rights management system, wherein the content provider allow the protected digital content to be super-distributed, when unauthorized holding a pirated copy of the protected digital content is detected, based on the gateway controlling ability of the wireless operator within the wireless digital rights management system, a specific fingerprint is embedded in or removed from the protected digital content so as to trace the suspected persons and further identify the pirate. The fingerprint is related to information of a suspected person holding the protected digital content without authorization. A process of screening singles out highly suspected persons. Therefore the operator can determine whether the suspected person is a real pirate by comparing the similarity of the pirated version of content and the version held by the suspected person, and the exact tracing and identifying is achieved.
    • 提供了在无线权限管理系统中跟踪和识别盗版的方法,其中,当未经授权的情况下,基于所述网关控制能力检测到未经授权的方式检测到受保护的数字内容的盗版副本时,所述内容提供商允许所述受保护的数字内容被超分散 无线数字版权管理系统内的无线运营商,将特定的指纹嵌入到受保护的数字内容中或从受保护的数字内容中移除,以便跟踪可疑的人并进一步识别盗版者。 该指纹与未经授权持有受保护的数字内容的怀疑人员的信息相关。 筛选高度怀疑人士的过程。 因此,运营商可以通过比较盗版内容与嫌疑人所持有的版本的相似性来确定被怀疑的人是否是真正的盗版者,并且实现了准确的跟踪和识别。