会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Method for determining constraint-based relationships between devices for interacting and sharing information
    • 用于确定用于交互和共享信息的设备之间基于约束的关系的方法
    • US08838600B2
    • 2014-09-16
    • US13078839
    • 2011-04-01
    • Andrea MariottiBerna ErolMichael J. GormishGregory J. Wolff
    • Andrea MariottiBerna ErolMichael J. GormishGregory J. Wolff
    • G06F17/30H04W4/20H04W60/00
    • H04W4/206H04W4/21H04W60/00
    • The system includes a registry server and devices. The registry server is coupled to the devices for publishing or registering spots, managing places and authenticating membership and places. The registry server includes a data store for constraint metadata, an authentication module, a spot manager module, a place manager module and a query response module. The devices are adapted to collect field values, create spots, access places, and interact and share information with other spots. In one embodiment, the devices include a constraint collection module, a spot creation module, a query module, a challenge creation module, a presentation module, a challenge response module, a spot action module and a spot communication module. The present invention includes methods for creating a spot, for generating and approving a challenge, for direct communication or sharing of documents, for performing an action based upon information space membership and for searching for available places.
    • 该系统包括注册表服务器和设备。 注册服务器耦合到用于发布或注册点,管理场所和认证会员资格的设备。 注册服务器包括用于约束元数据的数据存储,认证模块,现场管理器模块,场所管理器模块和查询响应模块。 这些设备适用于收集现场值,创建点,访问场所,并与其他景点进行交互和共享信息。 在一个实施例中,设备包括约束收集模块,点创建模块,查询模块,挑战创建模块,呈现模块,挑战响应模块,点动模块和点通信模块。 本发明包括用于创建点的方法,用于生成和批准用于直接通信或共享文档的挑战,用于基于信息空间成员进行动作并搜索可用的地点。
    • 6. 发明申请
    • Form Aggregation Based on Marks in Graphic Form Fields
    • 基于图形格式字段的表格汇总
    • US20140258331A1
    • 2014-09-11
    • US13789605
    • 2013-03-07
    • Edward L. SchwartzJohn W. BarrusMichael J. Gormish
    • Edward L. SchwartzJohn W. BarrusMichael J. Gormish
    • G06F17/30
    • G06F17/30392G06F17/30277
    • The disclosure includes a system and method for aggregating form data based on marks in graphic form fields. The system includes a controller, a request customization module, a search module and a presentation module. The controller receives data indicating an initiation of a search request from a user, data describing a form selected by the user, data describing a graphic form field specified by the user in the form and data describing a region of interest specified by the user in the graphic form field. The request customization module customizes the search request using the region of interest. The search module performs a form search on a collection of form data using the search request to determine one or more matching forms that each include at least one mark satisfying the region of interest. The presentation module provides the one or more matching forms to the user.
    • 本公开包括用于基于图形形式字段中的标记聚合表单数据的系统和方法。 该系统包括控制器,请求定制模块,搜索模块和呈现模块。 控制器从用户接收指示搜索请求的发起的数据,描述由用户选择的表单的数据,描述用户以表单指定的图形形式字段的数据和描述用户在 图形格式字段。 请求定制模块使用感兴趣的区域自定义搜索请求。 搜索模块使用搜索请求对表单数据的集合执行表单搜索,以确定一个或多个匹配表单,每个匹配表单包括满足感兴趣区域的至少一个标记。 呈现模块向用户提供一个或多个匹配表单。
    • 10. 再颁专利
    • Method and apparatus for securing executable programs against copying
    • 用于保护可执行程序免于复制的方法和装置
    • USRE40405E1
    • 2008-06-24
    • US09414994
    • 1999-10-07
    • Edward L. SchwartzMichael J. Gormish
    • Edward L. SchwartzMichael J. Gormish
    • H04L9/00
    • G06F21/123G06F2221/2107
    • A secure system for executing program code in an insecure environment while making it impossible, or at least impractical, to determine how to copy the program code and associated data is provided. A program memory contains encrypted program data and security circuitry contained within an integrated circuit is provided for decrypting the program data as it is needed by a processor. A portion of the processing steps which would be done by the processor in an insecure system is performed in this secure system within the secure circuitry using portions of the decrypted program data which are not provided to the processor. Program data is parsed it out based on a proper request to the security chip from the processor. A key value stored in volatile memory is used in the decrypting process and the volatile memory is positioned on the integrated circuit such that its contents are lost before a chip peel provides access to the volatile memory.
    • 提供了一种用于在不安全环境中执行程序代码的安全系统,同时使得不可能或至少不切实际地确定如何复制程序代码和相关联的数据。 程序存储器包含加密的程序数据,并且集成电路中包含的安全电路被提供用于对处理器需要的程序数据进行解密。 在安全电路中的该安全系统中,使用未提供给处理器的解密程序数据的部分,在不安全系统中由处理器完成的处理步骤的一部分被执行。 程序数据根据从处理器向安全芯片的适当请求进行解析。 在解密处理中使用存储在易失性存储器中的键值,并且易失性存储器位于集成电路上,使得在芯片剥离提供对易失性存储器的访问之前其内容丢失。