会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 21. 发明申请
    • AD STALKING DEFENSE
    • US20110288934A1
    • 2011-11-24
    • US12786231
    • 2010-05-24
    • John R. DouceurJacob R. LorchJames MickensThomas MoscibrodaDavid Levin
    • John R. DouceurJacob R. LorchJames MickensThomas MoscibrodaDavid Levin
    • G06Q30/00G06F17/30G06F3/048
    • G06Q30/0241G06Q30/0251G06Q30/0255G06Q30/0269
    • Techniques are described to mitigate ad stalking and other user concerns resulting from user-targeted advertising. A user may be informed of advertising information by a process in which an advertising server receives a request for an ad. The request may have been generated in response to a user request for a landing web page. An ad may be selected based on user information available to the advertising server, where the user information is associated with the user and describes behavior and/or attributes and/or preferences associated with the user. Text about how the ad was selected may be incorporated into the ad. Such text may describe the user information used to select the ad. The selection-disclosing text may be incorporated in the ad in a form that is displayable to the user by a browser. The ad may then be transmitted for display in the landing web page.
    • 描述技术来减轻由用户定向广告产生的广告跟踪和其他用户关注的问题。 可以通过广告服务器接收到广告请求的处理来向用户通知广告信息。 请求可能是响应于用户对登陆网页的请求而产生的。 可以基于广告服务器可用的用户信息来选择广告,其中用户信息与用户相关联并且描述与用户相关联的行为和/或属性和/或偏好。 关于广告如何选择的文字可能会纳入广告。 这样的文本可以描述用于选择广告的用户信息。 选择公开的文本可以以浏览器向用户显示的形式并入广告中。 该广告然后可以被传输以在着陆网页中显示。
    • 22. 发明申请
    • Trusted Hardware Component for Distributed Systems
    • 分布式系统的可信硬件组件
    • US20100318786A1
    • 2010-12-16
    • US12483338
    • 2009-06-12
    • John R. DouceurDavid M. LevinJacob R. LorchThomas Moscibroda
    • John R. DouceurDavid M. LevinJacob R. LorchThomas Moscibroda
    • H04L29/06
    • H04L63/123H04L9/3247H04L29/06H04L2209/127
    • Techniques for utilizing trusted hardware components for mitigating the effects of equivocation amongst participant computing devices of a distributed system are described herein. For instance, a distributed system employing a byzantine-fault-resilient protocol—that is, a protocol intended to mitigate (e.g., tolerate, detect, isolate, etc.) the effects of byzantine faults—may employ the techniques. To do so, the techniques may utilize a trusted hardware component comprising a non-decreasing counter and a key. This hardware component may be “trusted” in that the respective participant computing device cannot modify or observe the contents of the component in any manner other than according to the prescribed procedures, as described herein. Furthermore, the trusted hardware component may couple to the participant computing device in any suitable manner, such as via a universal serial bus (USB) connection or the like.
    • 在此描述了利用可信硬件组件来减轻分布式系统的参与者计算设备之间的混淆效应的技术。 例如,采用拜占庭故障弹性协议的分布式系统 - 即旨在减轻(例如,容忍,检测,隔离等)拜占庭故障的影响的协议 - 可以采用这些技术。 为了这样做,这些技术可以利用包括非递减计数器和密钥的可信硬件组件。 该硬件组件可能是“可信赖的”,因为如本文所述,相应的参与者计算设备不能以除了根据规定的过程之外的任何方式修改或观察组件的内容。 此外,可信硬件组件可以以任何合适的方式,例如经由通用串行总线(USB)连接等耦合到参与者计算设备。
    • 24. 发明授权
    • Application compatibility shims for minimal client computers
    • 最小客户端计算机的应用程序兼容性垫片
    • US08903705B2
    • 2014-12-02
    • US12972081
    • 2010-12-17
    • John R. DouceurJonathan R. HowellArun M. Seehra
    • John R. DouceurJonathan R. HowellArun M. Seehra
    • G06F9/455
    • G06F9/4555G06F9/455
    • This document describes techniques for allowing a computing device that provides a minimal execution environment to execute legacy applications that rely on rich functionality that the computing device does not natively provide. For instance, a device may initially receive a request to execute an application and may determine whether the application is directly executable. In response to determining that the application is not directly executable, the computing device may determine whether the application specifies another application to provide the functionality. If the application specifies another application to provide this functionality, then the computing device retrieves the specified application and executes the specified application on the client computing device. If the application does not specify such an application, then the computing device may execute a default application for providing the functionality. The specified or default application then executes the application that is not directly executable on the minimal-execution-environment computing device.
    • 本文档描述了允许提供最小执行环境的计算设备执行依赖计算设备本身不提供的丰富功能的旧应用程序的技术。 例如,设备可以初始地接收执行应用的请求,并且可以确定应用是否可直接执行。 响应于确定应用程序不是可直接执行的,计算设备可以确定应用程序是否指定另一个应用程序来提供功能。 如果应用程序指定另一个应用程序来提供此功能,则计算设备将检索指定的应用程序并在客户端计算设备上执行指定的应用程序。 如果应用程序没有指定这样的应用程序,则计算设备可以执行用于提供功能的默认应用程序。 指定或默认应用程序然后执行在最小执行环境计算设备上不能直接执行的应用程序。
    • 28. 发明授权
    • Secure application interoperation via user interface gestures
    • 通过用户界面手势确保应用程序的互操作
    • US08335991B2
    • 2012-12-18
    • US12814154
    • 2010-06-11
    • John R. DouceurJonathan R. Howell
    • John R. DouceurJonathan R. Howell
    • G06F3/048G06F3/00
    • G06F3/0486
    • Techniques for facilitating secure application interoperation via user interface (UI) gestures in computing devices that strictly isolate applications operating thereon are described herein. For instance, applications may define one or more specific UI gestures that, when executed by the user, express that the user desires for the computing device to allow for an instance of directed, ephemeral, by-value communication between two isolated applications. In some implementations, the gesture is an atomic gesture, such as a drag-and-drop operation. That is, the gesture is one that the user completes continuously and without interruption.
    • 本文描述了用于在严格隔离其上运行的应用的计算设备中的用户界面(UI)手势促进安全应用互操作的技术。 例如,应用可以定义一个或多个特定的UI手势,当用户执行时,用户表示用户期望计算设备允许在两个隔离的应用之间进行定向,短暂的副值通信的实例。 在一些实现中,手势是原子手势,例如拖放操作。 也就是说,手势是用户不间断地完成的手势。