会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Controlling use of computing-related resources by multiple independent parties
    • 由多个独立方控制计算相关资源的使用
    • US08051491B1
    • 2011-11-01
    • US11966692
    • 2007-12-28
    • Mark Joseph CavageJohn CormieNathan R. FitchDon JohnsonPeter Sirota
    • Mark Joseph CavageJohn CormieNathan R. FitchDon JohnsonPeter Sirota
    • G06F7/04G06F17/30H04N7/16
    • H04L63/10G06F21/604G06F21/6218G06F2221/2141H04L63/0227H04L63/102H04L63/20
    • Techniques are described for managing access to computing-related resources that, for example, may enable multiple distinct parties to independently control access to the resources (e.g., such that a request to access a resource succeeds only if all of multiple associated parties approve that access). For example, an executing software application may, on behalf of an end user, make use of computing-related resources of one or more types that are provided by one or more remote third-party network services (e.g., data storage services provided by an online storage service)—in such a situation, both the developer user who created the software application and the end user may be allowed to independently specify access rights for one or more particular such computing-related resources (e.g., stored data files), such that neither the end user nor the software application developer user may later access those resources without the approval of the other party.
    • 描述了用于管理对计算相关资源的访问的技术,例如,可以使多个不同方独立地控制对资源的访问(例如,使得只有当所有多个关联方批准该访问时,访问资源的请求才能成功 )。 例如,执行的软件应用程序可以代表最终用户利用由一个或多个远程第三方网络服务提供的一种或多种类型的计算相关资源(例如,由 在这种情况下,可以允许创建软件应用程序的开发者用户和终端用户独立地指定一个或多个特定的这样的计算相关资源(例如,存储的数据文件)的访问权限,例如, 最终用户和软件应用程序开发者用户以后都不可以在未经对方批准的情况下访问这些资源。
    • 2. 发明授权
    • Controlling use of computing-related resources by multiple independent parties
    • 由多个独立方控制计算相关资源的使用
    • US08429757B1
    • 2013-04-23
    • US13277070
    • 2011-10-19
    • Mark Joseph CavageJohn CormieNathan R. FitchDon JohnsonPeter Sirota
    • Mark Joseph CavageJohn CormieNathan R. FitchDon JohnsonPeter Sirota
    • H04L29/06
    • H04L63/10G06F21/604G06F21/6218G06F2221/2141H04L63/0227H04L63/102H04L63/20
    • Techniques are described for managing access to computing-related resources that, for example, may enable multiple distinct parties to independently control access to the resources (e.g., such that a request to access a resource succeeds only if all of multiple associated parties approve that access). For example, an executing software application may, on behalf of an end user, make use of computing-related resources of one or more types that are provided by one or more remote third-party network services (e.g., data storage services provided by an online storage service) —in such a situation, both the developer user who created the software application and the end user may be allowed to independently specify access rights for one or more particular such computing-related resources (e.g., stored data files), such that neither the end user nor the software application developer user may later access those resources without the approval of the other party.
    • 描述了用于管理对计算相关资源的访问的技术,例如,可以使多个不同方独立地控制对资源的访问(例如,使得只有当所有多个关联方批准该访问时,访问资源的请求才能成功 )。 例如,执行的软件应用程序可以代表最终用户利用由一个或多个远程第三方网络服务提供的一种或多种类型的计算相关资源(例如,由 在这种情况下,可以允许创建软件应用程序的开发者用户和终端用户独立地指定一个或多个特定的这样的计算相关资源(例如,存储的数据文件)的访问权限,例如, 最终用户和软件应用程序开发者用户以后都不可以在未经对方批准的情况下访问这些资源。
    • 4. 发明授权
    • Once only distribution of secrets
    • 一次只分配秘密
    • US09571481B1
    • 2017-02-14
    • US13308424
    • 2011-11-30
    • Graeme D. BaerGregory B. RothNathan R. Fitch
    • Graeme D. BaerGregory B. RothNathan R. Fitch
    • G06F21/31H04L29/06G06F21/33
    • H04L63/0807G06F21/33G06F21/42H04L63/062H04L63/0823H04L63/0838
    • A secret distribution system may disclose a secret once to a client computing resource while maintaining the privacy of the message and allowing for recovery from dropped network messages. A claim code may be given to a client which may be sent to the secret distribution system, causing the secret distribution system to send a pending secret to the client. Until a client successfully confirms receipt of the pending secret or the claim code expires, the client may request new pending secrets to replace the prior unconfirmed secrets from the secret distribution system. Once a last-sent pending secret is confirmed by the client to the secret distribution system, the last-sent pending secret may be activated for use and the claim code invalidated.
    • 秘密分发系统可以在保持消息的隐私并允许从丢弃的网络消息恢复的同时向客户端计算资源公开一次秘密。 可以向可以发送到秘密分发系统的客户端提供索赔代码,导致秘密分发系统向客户端发送等待的秘密。 在客户端成功确认接收到待处理的秘密或索赔代码到期之前,客户端可以请求新的等待的秘密来从秘密分发系统中替换以前未确认的秘密。 一旦客户端向秘密分发系统确认了最后发送的等待机密,则最后发送的待处理机密可能会被激活以供索赔代码无效。