会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • METHODS AND SYSTEMS TO EXPLICITLY AND IMPLICITLY MEASURE MEDIA IMPACT
    • 明确和明确地衡量媒体影响的方法和系统
    • US20130290094A1
    • 2013-10-31
    • US13724609
    • 2012-12-21
    • Seema Varma SrivastavaAlbert Ronald PerezAntonia ToupetRobert T. KnightRamachandran GurumoorthyAvgusta Shestyuk
    • Seema Varma SrivastavaAlbert Ronald PerezAntonia ToupetRobert T. KnightRamachandran GurumoorthyAvgusta Shestyuk
    • G06Q30/02
    • G06Q30/0245
    • Example methods, apparatus, systems, and articles of manufacture to explicitly and implicitly measure media impact are disclosed. An example method includes analyzing first survey response data obtained from a control group panelist responding to a first survey instrument after exposure to first media. An example first survey instrument includes an implicit measure. The example first survey response data includes first implicit response data. The example method further includes analyzing second survey response data obtained from a test group panelist responding to the first survey instrument after exposure to second media. The example second survey response data includes second implicit response data. The example second media includes elements of the first media and target advertising or entertainment material not included in the first media. The example method also includes assessing an effectiveness of the target advertising or entertainment material based on the first and second implicit response data.
    • 公开了明确和隐含地测量媒体影响的示例性方法,装置,系统和制品。 示例性方法包括分析在暴露于第一媒体之后响应于第一测量仪器的控制组小组成员获得的第一调查响应数据。 第一个调查工具的示例包括一个隐含的措施。 该示例的第一调查响应数据包括第一隐式响应数据。 示例性方法还包括分析在暴露于第二媒体之后响应于第一测量仪器的测试组小组成员获得的第二测量响应数据。 示例的第二勘测响应数据包括第二隐式响应数据。 示例的第二媒体包括未包括在第一媒体中的第一媒体和目标广告或娱乐素材的元素。 该示例方法还包括基于第一和第二隐含响应数据来评估目标广告或娱乐资料的有效性。
    • 8. 发明授权
    • Used trusted co-servers to enhance security of web interaction
    • 使用可信的协同服务器来增强Web交互的安全性
    • US07194759B1
    • 2007-03-20
    • US09663664
    • 2000-09-15
    • David M. ChessJoan DyerNaomaru ItoiJeff KravitzElaine Rivette PalmerRonald PerezSean William Smith
    • David M. ChessJoan DyerNaomaru ItoiJeff KravitzElaine Rivette PalmerRonald PerezSean William Smith
    • H04L9/00
    • H04L9/321H04L9/3247H04L9/3263H04L63/062H04L63/0823H04L63/166H04L2209/56H04L2209/608H04L2463/102
    • A trusted co-server, and a method of using a trusted co-server, for a service provider. The co-server executes a program such that: for multiple parties P0–Pn (where Po is said co-server), each party Pi may (optionally) provide input Ii, and then said co-server carries out N functions: Fi (io . . . In) describes what the co-server returns to party Pi. The preferred embodiment of the invention raises the trust level of the computation and data storage at the server. For instance, this invention may be witness to authenticity of certain data coming back to the client. This data can include assertions from the trusted co-server about the server content and configuration. The invention, also, can provide privacy of data going back to the server, by keeping it encrypted between the client and the co-server, and then re-encrypting it before inserting it into the server. With this invention, the user can trust the integrity of the computation occurring at the co-server—even if the server operator might be motivated to subvert it. The co-server also provides a trusted haven for computation relevant to third parties who may also have an interest in the client-server interaction.
    • 可信任的协同服务器,以及使用可信任协同服务器的方法,用于服务提供商。 协同服务器执行程序,使得:对于多方P-SUB (其中P 是所述协同服务器), 每个方P可以(可选地)提供输入I i,然后所述协同服务器执行N个功能:F i i(i, SUB> o ...描述共同服务器返回到派对P 。 本发明的优选实施例提高了服务器处的计算和数据存储的信任级别。 例如,本发明可以看到回到客户端的某些数据的真实性。 该数据可以包括关于服务器内容和配置的信任协同服务器的断言。 本发明还可以通过在客户机和协同服务器之间保持加密,然后在将其插入服务器之前重新加密,来提供返回到服务器的数据的隐私。 利用本发明,用户可以信任在共同服务器处发生的计算的完整性 - 即使服务器操作者可能被激励颠覆它。 协同服务器还为与客户端 - 服务器交互感兴趣的第三方提供了可信赖的计算机天线。
    • 9. 发明申请
    • Method for extending the CRTM in a trusted platform
    • 在可信平台上扩展CRTM的方法
    • US20060010326A1
    • 2006-01-12
    • US10887441
    • 2004-07-08
    • Steven BadeRonald PerezLeendert Van DoornHelmut Weber
    • Steven BadeRonald PerezLeendert Van DoornHelmut Weber
    • H04L9/00
    • G06F21/572
    • A method, system and computer program product for enhancing the functionality of the existing core root of trust measurement (CRTM). The CRTM is extended to allow platform manufacturer controlled and certified code to be incorporated into the function of the CRTM, wherein the manufacturer may define the policy for accepting a new function into the CRTM. When a firmware or software module image is compiled, the build process generates a hash value of the compiled firmware or software image, wherein the hash value reflects a fingerprint (or short hand) representation of the compiled image. A determination is made as to whether the hash value of the firmware or software image is to be a CRTM extension. If so, a digital signature of the module is created using the CRTM extension private key. This signature value is added to the firmware or software module.
    • 一种用于增强现有核心信任度量(CRTM)功能的方法,系统和计算机程序产品。 CRTM被扩展为允许平台制造商控制和认证的代码被并入CRTM的功能,其中制造商可以将接受新功能的策略定义到CRTM中。 当编译固件或软件模块图像时,构建过程产生编译的固件或软件映像的哈希值,其中散列值反映编译图像的指纹(或短手)表示。 确定固件或软件映像的哈希值是否为CRTM扩展。 如果是这样,使用CRTM扩展专用密钥创建模块的数字签名。 该签名值被添加到固件或软件模块。