会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Quality of service improvements for network transactions
    • 网络交易服务质量改进
    • US07213071B2
    • 2007-05-01
    • US09825078
    • 2001-04-03
    • Roberto DeLimaJohn R. HindMarcia L. Peters
    • Roberto DeLimaJohn R. HindMarcia L. Peters
    • G06F15/16
    • H04L41/147H04L67/02H04L67/322
    • Methods, systems, computer program products, and methods of doing business by improving quality of service (“QoS”) in network exchanges comprising a plurality of related request and response messages. A TQoS (“transactional QoS”) cookie is defined, which is used to store information needed when controlling response time (and perhaps other QoS factors as well) for messages exchanged with a particular client. In preferred embodiments, this QoS information comprises a relative priority for these related messages and an available bandwidth for transmitting messages to the client. The disclosed techniques enable applying consistent QoS requirements for delivery of all the related Web objects comprising a transaction. No changes are required on client devices or in client software, and there is no dependency on a client to support cookies.
    • 方法,系统,计算机程序产品和通过提高包括多个相关请求和响应消息的网络交换服务质量(“QoS”)来进行业务的方法。 定义了TQoS(“事务性QoS”)cookie,用于在与特定客户端交换的消息控制响应时间(以及可能的其他QoS因素)时存储所需的信息。 在优选实施例中,该QoS信息包括这些相关消息的相对优先级和用于向客户端发送消息的可用带宽。 所公开的技术使得能够对包括事务的所有相关Web对象的传送应用一致的QoS要求。 在客户端设备或客户端软件中不需要进行任何更改,并且客户端不依赖于支持Cookie。
    • 2. 发明授权
    • Method and system for providing targeted advertising in public places and carriers
    • 在公共场所和运营商提供有针对性的广告的方法和系统
    • US08825526B2
    • 2014-09-02
    • US11927130
    • 2007-10-29
    • Marcia L. PetersJames M. Mathewson, IIJohn R. Hind
    • Marcia L. PetersJames M. Mathewson, IIJohn R. Hind
    • G06Q30/02
    • G06Q30/02G06Q30/0255G06Q30/0267G06Q30/0277
    • A method and system for providing targeted advertising in public places and carriers such as trains, buses, train stations, shopping malls, airports, etc. The demographics, purchasing history and/or personal preferences of individuals in the public place are collected from personal digital assistants (PDAs) or other wireless communication devices carried by the individuals in the public place or public carrier. The collected data pertaining to a group of individuals who are present near the display device, is processed and used to select appropriate advertisements that would most likely interest that group of individuals. The selected advertisements are displayed on the display device located in the public place or public carrier so as to provide targeted advertising to the group of individuals.
    • 在公共场所以及列车,公交车,火车站,商场,机场等公共场所和运营商提供有针对性的广告的方法和系统。公众场所个人的人口统计,采购历史和/或个人喜好从个人数字 助理(PDA)或其他无线通信设备由个人在公共场所或公共运营商承载。 收集的与出现在显示设备附近的一组个人有关的数据被处理并用于选择最可能对该组个人感兴趣的适当的广告。 所选择的广告被显示在位于公共场所或公共运营商的显示装置上,以向个人群体提供有针对性的广告。
    • 3. 发明授权
    • Selective data encryption using style sheet processing for decryption by a client proxy
    • 使用样式表处理进行选择性数据加密,由客户端代理解密
    • US06978367B1
    • 2005-12-20
    • US09422492
    • 1999-10-21
    • John R. HindMarcia L. PetersBrad B. Topol
    • John R. HindMarcia L. PetersBrad B. Topol
    • G06F1/28G06F21/00H04L29/06
    • H04L63/20G06F21/577G06Q20/3821G06Q20/3829H04L63/0428H04L63/06H04L63/102H04L63/105H04L63/168
    • A method, system, and computer program product for selectively encrypting one or more elements of a document using style sheet processing. Disclosed is a policy-driven augmented style sheet processor (e.g. an Extensible Stylesheet Language, or “XSL”, processor) that creates a selectively-encrypted document (e.g. an Extensible Markup Language, or “XML”, document) carrying key-distribution material, such that by using an augmented document processor (e.g. an augmented XML processing engine), an agent can recover only the information elements for which it is authorized. The Document Type Definition (DTD) or schema associated with a document is modified, such that the DTD or schema specifies a reference to stored security policy to be applied to document elements. Each document element may specify a different security policy, such that the different elements of a single document can be encrypted differently (and, some elements may remain unencrypted). The key distribution material enables a document to be encrypted for decryption by an audience that is unknown at the time of document creation, and enables access to the distinct elements of a single encrypted document to be controlled for multiple users and/or groups of users. In this manner, group collaboration is improved by giving more people easier access to information for which they are authorized, while protecting sensitive data from unauthorized agents. A key recovery technique is also defined, whereby the entire document can be decrypted by an authorized agent regardless of how the different elements were originally encrypted and the access protections which were applied to those elements.
    • 一种用于使用样式表处理选择性地加密文档的一个或多个元素的方法,系统和计算机程序产品。 公开了一种策略驱动的增强样式表处理器(例如可扩展样式表语言或“XSL”处理器),其创建携带密钥分发材料的选择性加密的文档(例如可扩展标记语言或“XML”文档) ,使得通过使用增强的文档处理器(例如增强的XML处理引擎),代理人可以仅恢复其被授权的信息元素。 与文档相关联的文档类型定义(DTD)或模式被修改,使得DTD或模式指定对要应用于文档元素的存储的安全策略的引用。 每个文档元素可以指定不同的安全策略,使得可以不同地加密单个文档的不同元素(并且一些元素可以保持未加密)。 密钥分发材料使得文档被加密以供在文档创建时未知的受众解密,并且使得能够访问要为多个用户和/或用户组控制的单个加密文档的不同元素。 以这种方式,通过让更多的人更容易地访问他们获得授权的信息,同时保护敏感数据免受未经授权的代理人的改进,可以改善团队合作。 还定义了关键恢复技术,由此整个文档可以由授权代理进行解密,而不管不同元素最初被加密以及应用于这些元素的访问保护。
    • 4. 发明授权
    • Method and an apparatus for detecting a need for security and invoking a secured presentation of data
    • 用于检测对安全性的需求并调用数据的安全呈现的方法和装置
    • US06918039B1
    • 2005-07-12
    • US09573859
    • 2000-05-18
    • John R. HindMarcia L. Peters
    • John R. HindMarcia L. Peters
    • G06F21/00H04K1/00H04L9/00H04L29/06G06F11/30G06F12/14H04L9/32
    • H04L63/0428G06F21/6218G06F2221/2111G06F2221/2113H04K1/00H04L9/00H04L2209/76H04L2209/80
    • A method and an apparatus in a data processing system detects the presence of sensitive data and renders this data in a secured manner. The data processing system may be any device with information presentation capability which can receive data from a network. Detecting a need for secured rendering may include recognition that the data was encrypted, tags in the data indicating a level of secured rendering, or various forms of pre-arrangement between the sender and the recipient. Ways to determine if the recipient is in a secured environment include detection of conversations in the environment, video images showing people in the environment, analysis of infrared signals, determining the location of the data processing system using GPS or similar means, or interaction with an authenticated user. The means for rendering may be specified in the data, may be determined by the recipient, may be determined by pre-agreement between the sender and recipient, or may be based on the capability of the data processing system. Secured rendering means include, but are not limited to, display of data in a visual format that requires a special lens for detection, speaking the data into a speaker device in an ear canal of the recipient, or use of a special coded format known only to the recipient.
    • 数据处理系统中的方法和装置检测敏感数据的存在并以安全的方式呈现该数据。 数据处理系统可以是可以从网络接收数据的具有信息呈现能力的任何设备。 检测对安全渲染的需要可以包括:数据被加密的识别,指示安全渲染级别的数据中的标签,或发送者和接收者之间的各种形式的预先安排。 确定接收者是否处于安全环境中的方法包括:检测环境中的对话,在环境中显示人的视频图像,红外信号的分析,使用GPS或类似装置确定数据处理系统的位置,或与 认证用户。 用于呈现的装置可以在数据中指定,可以由接收者确定,可以通过发送者和接收者之间的预先协商来确定,或者可以基于数据处理系统的能力。 安全渲染装置包括但不限于以视觉格式显示需要特殊镜头进行检测的数据,将数据说明在接收者的耳道中的扬声器装置中,或使用仅仅被公认的特殊编码格式 给收件人
    • 9. 发明授权
    • Secure integrated device with secure, dynamically-selectable capabilities
    • 安全的集成设备,具有安全,动态可选的功能
    • US06968453B2
    • 2005-11-22
    • US09761906
    • 2001-01-17
    • Ronald P. DoyleJohn R. HindMarcia L. Peters
    • Ronald P. DoyleJohn R. HindMarcia L. Peters
    • G06F21/00G07F7/10H04L9/00
    • G07F7/1008G06F21/32G06F21/445G06F21/57G06F21/64G06Q20/341G06Q20/40145H04L63/08H04L2463/082
    • A method, system, computer program product, and method of doing business by providing a secure integrated device (such as a pervasive computing device) for which operating capabilities can be dynamically yet securely selected (including, but not limited to, pluggable connection of input/output devices and/or application processors that provide selected functions). Each input/output (I/O) device and application processor to be used is plugged in to a bus of a security core, and authenticates itself to the security core using public key infrastructure techniques, thereby creating a secure multi-function device. All of the multi-function device's input and output interactions with its environment necessarily traverse an I/O bus under the sole control of the security core. The only communication path between an application processor and the external environment (such as an I/O device) is through an application processor bus, which is likewise under control of the security core. Thus a user may dynamically yet securely select the capabilities of a multi-function device, and because each I/O device and application processor in use by that multi-function device is authenticated, the security of transactions or network services performed when using such devices is improved.
    • 一种方法,系统,计算机程序产品和通过提供安全集成设备(例如普及计算设备)来进行业务的方法,对于该安全的集成设备,可以动态地安全地选择操作能力(包括但不限于输入的可插拔连接 /输出设备和/或提供所选功能的应用处理器)。 要使用的每个输入/输出(I / O)设备和应用处理器被插入安全核心的总线,并且使用公共密钥基础设施技术将其自身认证到安全核心,由此创建安全的多功能设备。 所有多功能设备与其环境的输入和输出交互必须在安全核心的唯一控制下遍历I / O总线。 应用处理器和外部环境(例如I / O设备)之间的唯一通信路径是通过应用处理器总线,其同样在安全核心的控制下。 因此,用户可以动态地安全地选择多功能设备的能力,并且由于该多功能设备使用的每个I / O设备和应用处理器被认证,所以在使用这些设备时执行的事务或网络服务的安全性 改进了
    • 10. 发明授权
    • Selective data encryption using style sheet processing for decryption by a key recovery agent
    • 选择性数据加密使用样式表处理,由密钥恢复代理进行解密
    • US06941459B1
    • 2005-09-06
    • US09422431
    • 1999-10-21
    • John R. HindMarcia L. PetersBrad B. Topol
    • John R. HindMarcia L. PetersBrad B. Topol
    • G06F17/22G06F17/27
    • G06F17/227G06Q20/3821G06Q20/3829H04L9/088H04L9/0894H04L2209/76
    • A method, system, and computer program product for selectively encrypting one or more elements of a document using style sheet processing. Disclosed is a policy-driven augmented style sheet processor (e.g. an Extensible Stylesheet Language, or “XSL”, processor) that creates a selectively-encrypted document (e.g. an Extensible Markup Language, or “XML”, document) carrying key-distribution material, such that by using an augmented document processor (e.g. an augmented XML processing engine), an agent can recover only the information elements for which it is authorized. The Document Type Definition (DTD) or schema associated with a document is modified, such that the DTD or schema specifies a reference to stored security policy to be applied to document elements. Each document element may specify a different security policy, such that the different elements of a single document can be encrypted differently (and, some elements may remain unencrypted). The key distribution material enables a document to be encrypted for decryption by an audience that is unknown at the time of document creation, and enables access to the distinct elements of a single encrypted document to be controlled for multiple users and/or groups of users. In this manner, group collaboration is improved by giving more people easier access to information for which they are authorized, while protecting sensitive data from unauthorized agents. A key recovery technique is also defined, whereby the entire document can be decrypted by an authorized agent regardless of how the different elements were originally encrypted and the access protections which were applied to those elements.
    • 一种用于使用样式表处理选择性地加密文档的一个或多个元素的方法,系统和计算机程序产品。 公开了一种策略驱动的增强样式表处理器(例如可扩展样式表语言或“XSL”处理器),其创建携带密钥分发材料的选择性加密的文档(例如可扩展标记语言或“XML”文档) ,使得通过使用增强的文档处理器(例如增强的XML处理引擎),代理人可以仅恢复其被授权的信息元素。 与文档相关联的文档类型定义(DTD)或模式被修改,使得DTD或模式指定对要应用于文档元素的存储的安全策略的引用。 每个文档元素可以指定不同的安全策略,使得可以不同地加密单个文档的不同元素(并且一些元素可以保持未加密)。 密钥分发材料使得文档被加密以供在文档创建时未知的受众解密,并且使得能够访问要为多个用户和/或用户组控制的单个加密文档的不同元素。 以这种方式,通过让更多的人更容易地访问他们获得授权的信息,同时保护敏感数据免受未经授权的代理人的改进,可以改善团队合作。 还定义了关键恢复技术,由此整个文档可以由授权代理进行解密,而不管不同元素最初被加密以及应用于这些元素的访问保护。