会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • BORE-RESISTANT DIGITAL GOODS CONFIGURATION AND DISTRIBUTION METHODS AND ARRANGEMENTS
    • 耐磨数字配件和分配方法和安排
    • WO01069354A2
    • 2001-09-20
    • PCT/US2001/001609
    • 2001-01-17
    • G06F1/00G06F21/00
    • G06F21/10G06F2221/0784
    • Break-Once, Run-everywhere (BORE) resistant software configurations and digital goods and content distribution methods and arrangements are provided for use in computer systems and networks. An initial digital good is selectively divided into at least two portions. The first portion is provided to a destination computer, for example, via a CD ROM, floppy disk, or pre-loaded on a hard disk drive. The second portion is operatively modified within a source computer based on unique data associated with the destination computer. The modified second portion is then provided to the destination computer, for example, over a network, along with a key that can be used to operatively modify the first portion to be compatible with the modified second portion. The destination computer then modifies the first portion accordingly, and combines the modified first portion with the modified second portion to produce a modified digital good that is operatively different in configuration, but substantially functionally equivalent to the initial digital good. During subsequent initialization or operation, the modified digital good verifies that the destination computer is properly associated with the key and/or the unique data previously associated with the destination computer.
    • 一次性,无处不在(BORE)运行的软件配置和数字商品和内容分发方法和安排被提供用于计算机系统和网络。 初始数字商品被选择性地分成至少两部分。 第一部分例如经由CD ROM,软盘或预先加载到硬盘驱动器上而被提供给目标计算机。 基于与目的地计算机相关联的唯一数据,在源计算机内可操作地修改第二部分。 修改的第二部分然后例如通过网络被提供给目的地计算机,以及可用于可操作地修改第一部分以与修改的第二部分兼容的密钥。 目的地计算机然后相应地修改第一部分,并且将修改的第一部分与修改的第二部分组合以产生在配置上可操作地不同但在功能上等同于初始数字商品的修改的数字商品。 在随后的初始化或操作期间,修改的数字商品验证目的地计算机是否正确地与密钥和/或先前与目的地计算机相关联的唯一数据相关联。
    • 7. 发明申请
    • METHOD TO CONTROL AND LIMIT READABILITY OF ELECTRONIC DOCUMENTS
    • 控制和限制电子文件可读性的方法
    • WO2011137927A1
    • 2011-11-10
    • PCT/EP2010/056014
    • 2010-05-04
    • C.K.D. CRYPTOGRAPHY KEY DATABANK SaglNICCOLAI, Giancarlo
    • NICCOLAI, Giancarlo
    • G06F21/00H04L9/00H04L29/00
    • H04L63/0428G06F21/10G06F2221/0784G06F2221/2135H04L9/083H04L63/062
    • A series of data treatment processes, software applications and hardware devices jointly used to achieve the ability to make an electronic document available to the public or to a limited audience to either cease being readable, or start being readable, at a given moment in time or after a given event has occurred. A typical usage scenario consists in "automatic destruction" of documents used internally by an organization and that must be made unreadable after a certain project is complete. Conversely, public offers for auctions may be posted to all the participants and the issuer in an unreadable form, and made then readable after the deadline of the auction is expired. Again, documents may be made unreadable after a certain number of reads, or forwarded to a specific address under some conditions, or accessed only through well-known unmodified clients.
    • 一系列数据处理过程,软件应用程序和硬件设备,共同用于实现向公众或有限的受众提供电子文档,以便在给定时间内停止可读或开始可读, 在给定的事件发生后。 典型的使用场景包括组织内部使用的文档的“自动销毁”,并且在某个项目完成后必须使其不可读。 相反,拍卖的公开报价可以以不可读的形式发布给所有参与者和发行人,并且在拍卖的截止日期到期之后可以阅读。 再次,在一定数量的读取之后,文档可能不可读,或者在某些条件下转发到特定地址,或仅通过熟知的未修改的客户端访问文档。