会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明授权
    • System and method for content protection
    • 内容保护的系统和方法
    • US08689011B2
    • 2014-04-01
    • US12195598
    • 2008-08-21
    • Frederic BauchotJean-Luc ColletGerard MarmigereChristophe Mialon
    • Frederic BauchotJean-Luc ColletGerard MarmigereChristophe Mialon
    • E21B15/04
    • G11B20/00086G06F21/10G11B20/0021
    • The invention provides a system and method for content protection. A system in accordance with an embodiment includes a media center connectable to a mobile master memory unit associated with an identifier, the media center including: a protection key; storage means for storing files identified by respective file identifiers; a processing unit comprising file encryption for encrypting each file before storage, using a title key computed from the protection key of the media center and for encrypting the title key using the protection key of the master storage device and the identifier of the master memory unit, the master storage device being further provided to write the encrypted title key in association with the corresponding file identifier to the master memory unit.
    • 本发明提供了一种用于内容保护的系统和方法。 根据实施例的系统包括可连接到与标识符相关联的移动主存储器单元的媒体中心,所述媒体中心包括:保护密钥; 用于存储由相应文件标识符标识的文件的存储装置; 处理单元,包括用于在存储之前对每个文件进行加密的文件加密,使用从媒体中心的保护密钥计算的标题密钥,以及使用主存储设备的保护密钥和主存储器单元的标识符加密标题密钥, 主存储装置还被提供以将加密的标题密钥与相应的文件标识符相关联地写入主存储器单元。
    • 52. 发明授权
    • Method and system for securing access to an unsecure network utilizing a transparent identification member
    • 方法和系统,用于使用透明识别构件确保访问不安全网络
    • US08646040B2
    • 2014-02-04
    • US11967910
    • 2007-12-31
    • Flemming BoegelundFrederic BauchotGerard MarmigereSteven E. Hicks
    • Flemming BoegelundFrederic BauchotGerard MarmigereSteven E. Hicks
    • H04L29/06
    • H04L63/08H04L63/1441H04L63/1483H04L67/02
    • A method, system and computer-usable medium for providing secure access to an application over an unsecure network. A transparent identification member can be physically placed by a user against a login interface, the transparent identification member possessing a filter for filtering and displaying a pattern unique to the login interface. Thereafter, the user can be automatically permitted to authenticate an unsecure network and securely access an application over the unsecure network, in response to placing the transparent identification member against the login interface and providing a user input at a physical location on the login interface corresponding to the pattern unique to the login interface, thereby providing a secure authentication for the user to perform secure transactions over the unsecure network and preventing phishing by others with respect to the user and the unsecure network.
    • 一种用于通过不安全网络提供对应用的安全访问的方法,系统和计算机可用介质。 透明识别成员可以由用户物理放置登录界面,透明识别成员拥有一个过滤器,用于过滤和显示登录界面唯一的模式。 此后,响应于将透明标识构件放置在登录界面上并且在对应于登录界面的登录界面上的物理位置处提供用户输入,用户可以自动被允许认证不安全的网络并且安全地访问不安全网络上的应用程序 登录界面独有的模式,从而为用户提供安全认证,以便通过不安全网络执行安全交易,并防止他人针对用户和不安全网络的网络钓鱼。
    • 55. 发明授权
    • Locating RFID tags
    • 定位RFID标签
    • US08289129B2
    • 2012-10-16
    • US12335601
    • 2008-12-16
    • Frederic BauchotJean-Yves ClementGerard MarmigereJoaquin Picon
    • Frederic BauchotJean-Yves ClementGerard MarmigereJoaquin Picon
    • G05B23/02
    • G06K7/0008G01S11/02G06K2017/0045
    • A method and RFID tag for locating RFID tags. A passive RFID tag A receives a polling command transmitted from a RFID reader and addressed to another passive RFID tag B. The RFID tag A determines that the polling command is not addressed to the RFID tag A and consequent1y, at time t1, switches the RFID tag A to a catching mode for catching echos from other tags. The RFID tag A receives at time t3>t1 an echo of a message sent by the RFID tag B to the RFID reader. The RFID tag A determines a distance (D.t2t) between the RFID tag A and the RFID tag B based on t3 minus t1. The distance D.t2t does not exceed a specified radius limit and the identification of the RFID tag B and the distance D.t2t are stored in a database within the RFID tag A.
    • 一种用于定位RFID标签的方法和RFID标签。 无源RFID标签A接收从RFID读取器发送并寻址到另一无源RFID标签B的轮询命令。RFID标签A确定轮询命令未被寻址到RFID标签A,并且因此在时间t1切换RFID 将A标记为捕捉模式,以捕捉其他标签的回声。 RFID标签A在时间t3> t1处接收由RFID标签B发送到RFID读取器的消息的回波。 RFID标签A基于t3减去t1来确定RFID标签A和RFID标签B之间的距离(D.t2t)。 距离D.t2t不超过指定的半径限制,RFID标签B的标识和距离D.t2t存储在RFID标签A内的数据库中。
    • 56. 发明授权
    • System and method for authenticating an end user
    • 用于认证最终用户的系统和方法
    • US08260718B2
    • 2012-09-04
    • US12316221
    • 2008-12-10
    • Frederic BauchotFlemming BoegelundGerard MarmigereSebastian Thomschke
    • Frederic BauchotFlemming BoegelundGerard MarmigereSebastian Thomschke
    • G06Q99/00
    • G06Q20/409G06F21/36G09C5/00
    • A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device.
    • 用于认证最终用户的方法。 该方法开始于响应于从最终用户接收到认证请求而生成登录字段。 登录字段包括多个彩色节点,其包含匹配颜色和位置的节点的第一子集,以及驻留在由最终用户控制的透明信用卡中的节点的第二子集。 接下来,该方法通过将从最终用户接收的数据与节点的第一子集进行比较来确定最终用户的真实性状态。 最终用户通过将透明信用卡覆盖在登录字段的顶部并且选择至少一个彩色节点来生成数据。 根据使用静态和动态变量的功能选择每个节点。 最后,该方法通过输出设备向终端用户发送确定的真实性状态。
    • 57. 发明申请
    • LOCATION LOCALIZATION
    • 位置本地化
    • US20120218088A1
    • 2012-08-30
    • US13418739
    • 2012-03-13
    • Frederic BauchotJean-Yves ClementGerard MarmigereJoaquin Picon
    • Frederic BauchotJean-Yves ClementGerard MarmigereJoaquin Picon
    • G06K7/01
    • G08C21/00H04Q9/00H04Q2209/47H04Q2209/75
    • A location localization method and system. The method includes transmitting by an RFID tag reader, a request for locating a passive RFID tag in a facility. The RFID tag reader receives from active RFID tags, a first date/time associated with first data. The RFID tag reader transmits to the active RFID tags, a request for retrieving the first data. The first data comprises distances between each active RFID tag and the passive RFID tag. The RFID tag reader receives the first data. The RFID tag reader receives a map of the facility and locations on the map for the active RFID tags. The RFID tag reader determines a location within the facility for the passive RFID tag based on the first data, the map, and the locations on the map. The RFID tag reader transmits the first location to a user.
    • 位置定位方法和系统。 该方法包括通过RFID标签读取器发送在设备中定位无源RFID标签的请求。 RFID标签读取器从有源RFID标签接收与第一数据相关联的第一日期/时间。 RFID标签读取器向有源RFID标签传送检索第一数据的请求。 第一数据包括每个有源RFID标签与无源RFID标签之间的距离。 RFID标签读取器接收第一数据。 RFID标签读取器接收有关RFID标签的设施的地图和地图上的位置。 RFID标签读取器基于第一数据,地图和地图上的位置来确定无线RFID标签在设施内的位置。 RFID标签读取器将第一位置发送给用户。