会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • System and method for n-way authentication in a network
    • 网络中n路认证的系统和方法
    • US07370199B2
    • 2008-05-06
    • US10766060
    • 2004-01-28
    • Michael A. AdayBryan M. WillmanMarcus PeinadoAlan S. Geller
    • Michael A. AdayBryan M. WillmanMarcus PeinadoAlan S. Geller
    • G06F21/00
    • H04L9/0825H04L9/14H04L2209/56
    • A method of controlling information exposure in a multiparty transaction includes an originating transaction participant cryptographically encoding all information for each of the transaction participants such that a unique data content and encryption are used for each of the messages destined to the other transaction participants. The cryptographically encoded messages are transmitted to the transaction participants such that each may decrypt their message and respond to a primary transaction participant with status concerning their portion of the transaction. After reception of affirmative status messages from the transaction participants, the primary transaction participant may transmit messages to the responding transaction participants to execute the multiparty transaction. The originating transaction participant may also be provided an indication that the multiparty transaction is executed.
    • 控制多方交易中的信息曝光的方法包括对每个交易参与者的所有信息进行密码编码的始发交易参与者,从而为发往其他交易参与者的每个消息使用唯一的数据内容和加密。 密码编码的消息被传送到交易参与者,使得每个消息可以解密他们的消息并且响应具有关于其交易部分的状态的主交易参与者。 在从交易参与者接收到肯定状态消息之后,主交易参与者可以向响应的交易参与者发送消息以执行多方交易。 也可以向源交易参与者提供执行多方交易的指示。
    • 5. 发明授权
    • Determining target types for generic pointers in source code
    • 确定源代码中通用指针的目标类型
    • US09329845B2
    • 2016-05-03
    • US12477954
    • 2009-06-04
    • Weidong CuiMarcus Peinado
    • Weidong CuiMarcus Peinado
    • G06F9/45
    • G06F8/434
    • A system described herein includes a receiver component that receives source code from a computer-readable medium of a computing device and a static analysis component that executes a points-to analysis algorithm over the source code to cause generation of a points-to graph, wherein the points-to graph is a directed graph that comprises a plurality of nodes and a plurality of edges, wherein nodes of the points-to graph represent pointers in the source code and edges represent inclusion relationships in the source code. The system also includes an inference component that infers target types for generic pointers in the source code based at least in part upon known type definitions and global variables in the source code.
    • 本文描述的系统包括从计算设备的计算机可读介质接收源代码的接收器组件和在源代码上执行点对分析算法以产生点对图的静态分析组件,其中 点对图是包括多个节点和多个边缘的有向图,其中点对图的节点表示源代码中的指针,边缘表示源代码中的包含关系。 该系统还包括至少部分地基于源代码中的已知类型定义和全局变量来推断源代码中的通用指针的目标类型的推理组件。
    • 10. 发明授权
    • Protection of content stored on portable memory from unauthorized usage
    • 保护存储在便携式存储器上的内容免于未经授权的使用
    • US07689791B2
    • 2010-03-30
    • US11064348
    • 2005-02-22
    • Marcus Peinado
    • Marcus Peinado
    • G06F12/14
    • G06F21/10
    • A device for securely recording protected content to a portable memory, and for reading the protected content therefrom. The device includes a feature that makes it adapted to read or write specially-configured portable memories that are incompatible with standard read/write devices. For example, the device may be designed to work with memories having an unusual shape or size, or may manipulate the data in a non-standard way before storing it on the memory. The read/write devices are trusted components that will only handle the protected content in accordance with rules governing the content. The feature included in the device is preferably a proprietary and/or hardware feature, so that counterfeit devices incorporating the feature cannot be built without overcoming economic and/or legal hurdles. Because of the hurdles to building devices compatible with the specially-configured portable memory, protected content can be transferred to such a memory with reasonable assurance that the content will not be widely copied.
    • 一种用于将受保护内容安全地记录到便携式存储器并用于从其读取受保护内容的装置。 该设备包括一个功能,使其适合于读取或写入与标准读/写设备不兼容的特殊配置的便携式存储器。 例如,设备可以被设计为与具有不寻常形状或尺寸的存储器一起工作,或者可以在将其存储在存储器之前以非标准方式操纵数据。 读/写设备是只能根据管理内容的规则处理受保护内容的受信任组件。 设备中包括的特征优选地是专有和/或硬件特征,使得并入该特征的假冒设备不能克服经济和/或法律障碍。 由于构建与特殊配置的便携式存储器兼容的设备的障碍,受保护的内容可以被合理地保证内容不会被广泛地复制到这样的存储器中。