会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 22. 发明授权
    • Replaceable sequenced one-time pads for detection of cloned service client
    • 可替换的顺序一次性检测克隆服务客户端
    • US07529371B2
    • 2009-05-05
    • US10829571
    • 2004-04-22
    • Yen-Fu ChenJohn Hans Handy-BosmaJun SawadaMei Yang SelvageKeith Raymond Walker
    • Yen-Fu ChenJohn Hans Handy-BosmaJun SawadaMei Yang SelvageKeith Raymond Walker
    • H04K1/00H04L9/00H04M1/66
    • H04L63/0838H04L63/0853H04W12/06H04W12/12
    • Authentication of cellular telephone device by providing a first one-time pad cryptological table to a security server which has multiple sequenced One Time Pad value entries including a previous use indicator initialized as “unused”, and providing a second one-time pad cryptological table to an authentic device initially synchronized with the first table. A cloned copy of the second table is stored in an inauthentic cellular telephone device, these third table being initially synchronized with the second table. The authentic device selects an unused entry in the second table and transmits it to the server when requesting service. If the received entry matches a next sequential unused entry in the first table, the server grants service, and both server and authentic device mark that entry as used. If the received entry does not match a sequentially next unused entry in the first table, service is denied to the requesting device.
    • 通过向安全服务器提供第一个一次性密码密码表来进行蜂窝电话设备的认证,该安全服务器具有包括初始化为“未使用”的先前使用指示符的多个有序的一次性值值条目,并且提供第二一次性密码学表 最初与第一个表同步的可信设备。 将第二表的克隆副本存储在不真实的蜂窝电话设备中,这些第三表最初与第二表同步。 真实设备选择第二表中未使用的条目,并在请求服务时将其发送到服务器。 如果接收到的条目与第一个表中的下一个顺序未使用的条目匹配,则服务器授予服务,并且服务器和可信设备将标记所使用的条目。 如果接收到的条目与第一个表中的顺序下一个未使用的条目不匹配,则服务将被拒绝给请求设备。
    • 23. 发明申请
    • DUPLICATE EMAIL ADDRESS DETECTION FOR A CONTACT
    • 联系人的双重电子邮件地址检测
    • US20090106369A1
    • 2009-04-23
    • US11874758
    • 2007-10-18
    • Yen-Fu ChenFabian F. MorganKeith R. WalkerSarah V. White Eagle
    • Yen-Fu ChenFabian F. MorganKeith R. WalkerSarah V. White Eagle
    • G06F15/16
    • G06Q10/107H04L51/28
    • Methods, systems, and media are disclosed for managing multiple email addresses, each of which are associated with a known contact, e.g., a specific person. One embodiment includes selecting email addresses for an email to be sent through a computer system in communication with a mail server, wherein the email addresses comprise an email distribution list. Further, the method includes querying, before sending the email, for duplicate contacts associated with the email addresses in the email distribution list for the email. Further still, the method includes updating, after the querying, the email distribution list to the email addresses left in a remaining email distribution list produced through removal, if any, of the duplicate contacts identified by the querying. Finally, the method includes sending the email to contacts associated with each of the email addresses in the remaining email distribution list, wherein the contacts are in communication with the mail server.
    • 公开了用于管理多个电子邮件地址的方法,系统和媒体,每个电子邮件地址与已知联系人(例如特定人)相关联。 一个实施例包括选择要通过与邮件服务器通信的计算机系统发送的电子邮件的电子邮件地址,其中电子邮件地址包括电子邮件分发列表。 此外,该方法包括在发送电子邮件之前查询与电子邮件的电子邮件分发列表中的电子邮件地址相关联的重复联系人。 此外,该方法还包括在查询之后将电子邮件分发列表更新为剩余电子邮件分发列表中留下的电子邮件地址,通过由查询标识的重复联系人的删除(如果有的话)生成。 最后,该方法包括将电子邮件发送给剩余电子邮件分发列表中与每个电子邮件地址相关联的联系人,其中联系人与邮件服务器通信。
    • 27. 发明授权
    • Invoking user designated actions based upon selected computer content
    • 根据所选择的计算机内容调用用户指定的操作
    • US07503012B2
    • 2009-03-10
    • US10756108
    • 2004-01-13
    • Yen-Fu ChenJohn W. Dunsmoir
    • Yen-Fu ChenJohn W. Dunsmoir
    • G06F3/048
    • G06F9/543G06F17/211G06F17/24
    • A program or system function on a computer system is automatically invoked by receiving a user-selected first insertion point or replacement area within a first user interface to a destination computer file. Subsequent to receiving the first insertion point within a destination file, a second user interface to content of a source computer file is provided upon user command. Then, responsive to a user highlighting text within the second user interface, the highlighted text is automatically copied from the application program to a clipboard buffer. Auto-trigger rules are searched for a rule which correlates to said highlighted text copied to the clipboard and, upon finding a correlating rule, one or more programs or system functions are invoked according to the found rule without need to modify or change said application program.
    • 通过在目的地计算机文件的第一用户界面内接收用户选择的第一插入点或替换区域来自动调用计算机系统上的程序或系统功能。 在目的地文件中接收到第一插入点之后,根据用户命令提供到源计算机文件的内容的第二用户界面。 然后,响应于用户突出显示第二用户界面内的文本,突出显示的文本被自动从应用程序复制到剪贴板缓冲区。 搜索自动触发规则,该规则与复制到剪贴板的所述突出显示的文本相关联,并且在找到相关规则时,根据所发现的规则调用一个或多个程序或系统功能,而不需要修改或改变所述应用程序 。
    • 28. 发明申请
    • DYNAMIC DATA RESTRUCTURING METHOD AND SYSTEM
    • 动态数据重构方法与系统
    • US20090064101A1
    • 2009-03-05
    • US11845869
    • 2007-08-28
    • Gregory Jensen BossYen-Fu ChenRick Allen Hamilton, IIHari Shankar
    • Gregory Jensen BossYen-Fu ChenRick Allen Hamilton, IIHari Shankar
    • G06F9/44
    • G06Q10/10Y10S707/99953
    • A data restructuring method and system. The method includes receiving by a computing system from a first user content data arranged in a first specified order and a command for tagging portions of the content data according to various parameters. The computing system assigns identification tags to the portions of the content data. The computing system presents the identification tags to the first user. The computing system receives from the first user, a selection of at least one of the identification tags. The computing system restructures the content data into a second specified order in response to the selection. The computing system receives a request for viewing the content data from a second user. The computing system presents to the second user, the content data in the second specified order.
    • 数据重组方法和系统。 该方法包括:通过计算系统从第一用户接收以第一指定顺序排列的内容数据和根据各种参数标记内容数据的部分的命令。 计算系统将识别标签分配给内容数据的部分。 计算系统向第一用户呈现识别标签。 计算系统从第一用户接收至少一个识别标签的选择。 响应于该选择,计算系统将内容数据重新构成第二指定顺序。 计算系统从第二用户接收查看内容数据的请求。 计算系统向第二用户呈现第二指定顺序中的内容数据。