会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Computation to gain access to service
    • 计算获得服务的权限
    • US09367706B2
    • 2016-06-14
    • US12753841
    • 2010-04-02
    • Shawn D. LovelandGeoffrey J. HultenJohn L. Scarrow
    • Shawn D. LovelandGeoffrey J. HultenJohn L. Scarrow
    • G06F21/62H04L29/06G06Q30/02G06Q10/10H04L12/58
    • G06F21/629G06Q10/10G06Q30/02G06Q30/0208G06Q30/0235H04L51/12H04L51/32H04L63/108
    • Access to some aspect of a service may be limited until a user has invested in performing some amount of computation. Legitimate users typically have excess cycles on their machines, which can be used to perform computation at little or no cost to the user. By contrast, computation is expensive for for-profit internet abusers (e.g., spammers). These abusers typically use all of their computing resources to run “bots” that carry out their schemes, so computation increases the abuser's cost by forcing him or her to acquire new computing resources or to rent computer time. Thus, the providers of free services (e.g., web mail services, blogging sites, etc.), can allow newly registered users to use some limited form of the service upon registration. However, in order to make more extensive use of the service, the user can be asked to prove his legitimacy by investing in some amount of computation.
    • 访问服务的某些方面可能受到限制,直到用户投入进行一些计算量。 合法的用户通常在其机器上具有多余的周期,这可以用于对用户进行少量或不费用的计算。 相比之下,营利互联网滥用者(例如垃圾邮件发送者)的计算费用很高。 这些滥用者通常使用他们所有的计算资源来运行执行他们的方案的“机器人”,所以计算通过强迫他或她获得新的计算资源或租用计算机时间来增加滥用者的成本。 因此,免费服务(例如,网络邮件服务,博客站点等)的提供者可以允许新注册的用户在注册时使用一些有限形式的服务。 然而,为了更广泛地使用该服务,用户可以通过投入一些计算来证明他的合法性。
    • 4. 发明申请
    • COMPUTATION TO GAIN ACCESS TO SERVICE
    • 计算增加访问服务
    • US20110247061A1
    • 2011-10-06
    • US12753841
    • 2010-04-02
    • Shawn D. LovelandGeoffrey J. HultenJohn L. Scarrow
    • Shawn D. LovelandGeoffrey J. HultenJohn L. Scarrow
    • G06F21/22G06F15/16
    • G06F21/629G06Q10/10G06Q30/02G06Q30/0208G06Q30/0235H04L51/12H04L51/32H04L63/108
    • Access to some aspect of a service may be limited until a user has invested in performing some amount of computation. Legitimate users typically have excess cycles on their machines, which can be used to perform computation at little or no cost to the user. By contrast, computation is expensive for for-profit internet abusers (e.g., spammers). These abusers typically use all of their computing resources to run “bots” that carry out their schemes, so computation increases the abuser's cost by forcing him or her to acquire new computing resources or to rent computer time. Thus, the providers of free services (e.g., web mail services, blogging sites, etc.), can allow newly registered users to use some limited form of the service upon registration. However, in order to make more extensive use of the service, the user can be asked to prove his legitimacy by investing in some amount of computation.
    • 访问服务的某些方面可能受到限制,直到用户投入进行一些计算量。 合法的用户通常在其机器上具有多余的周期,这可以用于对用户进行少量或不费用的计算。 相比之下,营利互联网滥用者(例如垃圾邮件发送者)的计算费用很高。 这些滥用者通常使用他们所有的计算资源来运行执行他们的方案的“机器人”,所以计算通过强迫他或她获得新的计算资源或租用计算机时间来增加滥用者的成本。 因此,免费服务(例如,网络邮件服务,博客站点等)的提供者可以允许新注册的用户在注册时使用一些有限形式的服务。 然而,为了更广泛地使用该服务,用户可以通过投入一些计算来证明他的合法性。