会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Adaptive data compression system
    • 自适应数据压缩系统
    • US5229768A
    • 1993-07-20
    • US827737
    • 1992-01-29
    • Kasman E. Thomas
    • Kasman E. Thomas
    • G06T9/00H03M7/30
    • H03M7/3088G06T9/005
    • A system for data compression and decompression is disclosed. A series of fixed length overlapping segments, called hash strings, are formed from an input data sequence. A retrieved character is the next character in the input data sequence after a particular hash string. A hash function relates a particular hash string to a unique address in a look-up table (LUT). An associated character for the particular hash string is stored in the LUT at the address. When a particular hash string is considered, the content of the LUT address associated with the hash string is checked to determine whether the associated character matches the retrieved character following the hash string. If there is a match, a Boolean TRUE is output; if there is no match, a Boolean FALSE along with the retrieved character is output. Furthermore, if there is no match, then the LUT is updated by replacing the associated character in the LUT with the retrieved character. The process continues for each hash string until the entire input data sequence is processed. The method of decompression includes the steps of initializing a decompression LUT to mirror the initial compression LUT and receiving a representational form output from the compressor. The representational form is generally analyzed one character at a time. If the character is a Boolean TRUE, then the content of the LUT addressed by the most recently decoded hash string is output. Otherwise, if the character is a Boolean FALSE, the next character (exception character) in the representational form is output and the content of the LUT addressed by the most recently decoded hash string is output.
    • 公开了一种用于数据压缩和解压缩的系统。 由输入数据序列形成一系列固定长度的重叠段,称为散列字符串。 检索到的字符是特定散列字符串后的输入数据序列中的下一个字符。 散列函数将特定的散列字符串与查找表(LUT)中的唯一地址相关联。 用于特定散列串的相关字符存储在地址中的LUT中。 当考虑特定散列字符串时,检查与散列字符串相关联的LUT地址的内容,以确定相关联的字符是否与散列字符串之后的检索字符匹配。 如果有匹配,则输出布尔值TRUE; 如果没有匹配,则输出布尔值FALSE以及检索到的字符。 此外,如果没有匹配,则通过用检索到的字符替换LUT中的关联字符来更新LUT。 每个散列字符串的处理将继续进行,直到整个输入数据序列被处理。 解压缩的方法包括初始化解压缩LUT以反映初始压缩LUT并从压缩器接收表示形式输出的步骤。 一般分析一个字符的表示形式。 如果字符是布尔值TRUE,则输出由最近解码的散列字符串寻址的LUT的内容。 否则,如果字符是布尔值FALSE,则输出表示形式的下一个字符(异常字符),并输出由最近解码的散列字符串寻址的LUT的内容。
    • 2. 发明授权
    • Managing supplied data
    • 管理提供的数据
    • US08606834B2
    • 2013-12-10
    • US11505134
    • 2006-08-16
    • Kasman E. Thomas
    • Kasman E. Thomas
    • G06F1/02
    • H04L9/002
    • In a computing system environment, a data recipient manages entropy data supplied from an external data source despite not knowing or being certain about their trustworthiness or if such varies over time. Features relate to scoring the data and determining whether it meets or exceeds a predetermined policy score. One or more initial or updated reputation values of the data source are contemplated and used for scoring. Logging of the scoring, reputation values or other matters is provided for historical purposes and to identify possible future corrective actions. Other embodiments contemplate enhancing the score of the entropy data. In some instances, use of less than all the data by the recipient occurs to increase attack-resistance. Whether such occurs or how much occurs remains substantially unbeknownst to all parties other than the data recipient. Still other embodiments contemplate computer-readable media.
    • 在计算系统环境中,数据接收者管理从外部数据源提供的熵数据,尽管不知道或确定其可信赖性,或者如果随时间而变化。 特征涉及对数据进行评分并确定其是否达到或超过预定策略分数。 预期数据源的一个或多个初始或更新的信誉值并用于评分。 记录评分,声望值或其他事项是为了历史目的而提供的,并确定可能的未来纠正措施。 其他实施例考虑增加熵数据的分数。 在某些情况下,由接收者使用的数据少于所有数据,以增加抗攻击性。 无论发生这种情况还是发生了多少事情,除了数据接收者之外,所有其他方面基本上都不知道。 还有其他实施例考虑计算机可读介质。
    • 3. 发明授权
    • Visual indication of user role in an address bar
    • 在地址栏中显示用户角色
    • US07594193B2
    • 2009-09-22
    • US11703043
    • 2007-02-06
    • Kasman E. Thomas
    • Kasman E. Thomas
    • G06F3/00
    • G06F17/30867
    • Apparatus, methods and computer program products relate to icons in an address bar of a browser indicative of roles of users as they visit web sites. In this manner, users (with many roles, such as in the context of an employer's business) are visually cued to remind them of their role at the web sites, often because web sites have different functionality according to different roles. Various features include icon forms suggesting roles as employees, managers, administrators, anonymous users, etc. Upon mousing-over icons, tool tips are obtainable regarding a status of the role of the user. Menus of multiple icons are also available for the many roles of the user. Upon selection of one the icons of the menu, the selected icon appears in the address bar upon the user visiting the website in their new role. Altering the display of the icon exists to show different role status.
    • 装置,方法和计算机程序产品涉及浏览器的地址栏中的图标,指示用户访问网站时的角色。 以这种方式,用户(具有许多角色,例如在雇主业务的背景下)被视觉上提醒他们他们在网站上的角色,这通常是因为网站根据不同的角色具有不同的功能。 各种功能包括建议角色扮演员工,管理员,匿名用户等的图标表单。在鼠标悬停图标上,可以获取关于用户角色状态的工具提示。 多个图标的菜单也可用于用户的许多角色。 在选择菜单的图标之一后,当用户以新角色访问网站时,所选择的图标将出现在地址栏中。 更改图标的显示存在以显示不同的角色状态。
    • 4. 发明授权
    • Stealth entropy collection
    • 隐形熵收集
    • US09026638B2
    • 2015-05-05
    • US11702453
    • 2007-02-05
    • Kasman E. ThomasStephen R Carter
    • Kasman E. ThomasStephen R Carter
    • G06F15/16H04L29/06H04L12/26G06F7/58
    • H04L63/1458G06F7/58G06F7/588H04L9/0861H04L9/0872H04L43/04
    • In a computing system environment, methods and apparatus include tapping a plurality of connected computing devices and distilling small amounts of entropy from each, concentrating the entropy so collected, and performing all in a stealth or surreptitious fashion relative to the providers of the entropy. In this manner: the potential supply of entropy on a networked computing device is greatly expanded; the potential for entropy-related denial-of-service attacks in Linux systems is reduced; no significant extra processing burden on participating computing devices is required; and enlisting entropy-providing computing devices (including or not naïve applications) in entropy exchanges occurs unobtrusively. Representative particular environments include web servers, including servlet filters, and clients engaged in http sessions; Java virtual machines; network interface cards in promiscuous mode analyzing packets; and other. Computer program products for devices to realize the foregoing are also intended.
    • 在计算系统环境中,方法和装置包括点击多个连接的计算设备并从每一个中抽取少量的熵,集中所收集的熵,并相对于熵的提供者以隐身或隐蔽的方式执行所有的熵。 以这种方式:网络计算设备上熵的潜在供应大大扩大; 在Linux系统中熵相关的拒绝服务攻击的潜力降低了; 不需要参与计算设备的重大额外处理负担; 并且在熵交换中招募熵提供计算设备(包括或不是天真的应用)不引人注目地发生。 代表性的特定环境包括Web服务器,包括servlet过滤器和从事http会话的客户端; Java虚拟机; 网络接口卡混杂模式分析数据包; 和别的。 用于实现上述设备的计算机程序产品也是旨在。
    • 5. 发明申请
    • Foreign language translator in a document editor
    • 外文翻译在文件编辑器中
    • US20080172219A1
    • 2008-07-17
    • US11654247
    • 2007-01-17
    • Kasman E. Thomas
    • Kasman E. Thomas
    • G06F17/28
    • G06F17/289
    • Apparatus and methods allow users of document editors to real-time translate language of text from a first to a second language. During use, users indicate a selection for translation in a typing area of the document editor. The document editor seeks translation from a remote language translation service, especially by way of internet http requests. Processing of returned translations also occurs to present users with a useable form of the translation. Other aspects include seeking translations from multiple language translation services and selecting a best translation for display, according to a predetermined criteria. Users can also select preferred languages for translation. Retrofitting existing document editors contemplates inserting executable code, in the form of plug-ins or macros, and executing them to obtain translations. Executable code is available as a computer program product in the form of a download or on a computer-readable medium.
    • 设备和方法允许文档编辑者的用户实时地将文本的语言从第一语言翻译成第二语言。 在使用期间,用户指示在文档编辑器的打字区域中进行翻译的选择。 文档编辑器寻求远程语言翻译服务的翻译,特别是通过互联网http请求。 还可以处理返回的翻译,以向用户呈现可用的翻译形式。 其他方面包括根据预定标准从多语言翻译服务寻求翻译并选择最佳翻译来显示。 用户还可以选择首选语言进行翻译。 改装现有文档编辑器考虑以插件或宏的形式插入可执行代码,并执行它们以获得翻译。 可执行代码作为下载形式的计算机程序产品或计算机可读介质可用。
    • 6. 发明申请
    • Cooperative encoding of data by pluralities of parties
    • 多方合作编制数据
    • US20080019505A1
    • 2008-01-24
    • US11449494
    • 2006-06-08
    • Kasman E. Thomas
    • Kasman E. Thomas
    • H04L9/28
    • H04L63/0428G06F21/6209H04L2463/103
    • Methods and apparatus include cooperatively encoding digital data between collaborating parties. By prior agreement, the parties take turns encoding portions of a given payload (e.g., document), until all portions have been encoded, thereby transforming the payload from a native encoding to a new, composite encoding. Choreography rules facilitate the process. Each party is free to use its own processing scheme. The use of a lookback or chaining step enables each party to impart a quality of informational entanglement to the output during its construction. By virtue of these features and attendant synergies, the resultant jointly encoded digital data enjoys certain novel cryptographic properties in addition to serving as a record of interaction between parties. To decode the data, the process is reversed. Third parties are optionally employed to mediate aspects of the process. Noise and padding, such as watermarks or copyrights, may be added variously to the encoded digital data. Encoding schemes include encryption or compression algorithms.
    • 方法和装置包括在协作方之间协作编码数字数据。 通过事先协议,各方轮流给定有效载荷(例如,文档)的编码部分,直到所有部分已被编码,从而将有效载荷从本机编码转换为新的复合编码。 编排规则便于进程。 各方可以自由使用自己的处理方案。 使用回溯或链接步骤使得各方在施工过程中能够将输出信息质量交给输出。 由于这些特征和伴随的协同作用,所得到的共同编码的数字数据除了作为各方之间的交互记录之外,还享有某些新颖的加密属性。 要解码数据,过程相反。 第三方任选地用于调解过程的各个方面。 噪声和填充(例如水印或版权)可以被不同地添加到编码的数字数据。 编码方案包括加密或压缩算法。
    • 7. 发明申请
    • Role-based access control for redacted content
    • 针对编辑内容的基于角色的访问控制
    • US20090025063A1
    • 2009-01-22
    • US11879714
    • 2007-07-18
    • Kasman E. Thomas
    • Kasman E. Thomas
    • G06F7/04
    • G06F21/6218
    • Apparatus and methods are described for accessing redacted material based on user roles. An author designates portions of content as to-be-redacted. The author establishes various users roles able to access it and defines attributes or time constraints affecting the viewing/using. Upon electronically saving the content, the to-be-redacted portion is encrypted. An intermediary, such as a keytable service, mediates access between later users and the content. Upon identification of a role of a user attempting to interact with the content, and matching the role to one of the author-established roles, the encrypted redacted portion is decrypted. In this manner, users gain access to content based only on their role. The surrounding events are also loggable, traceable, and verifiable. A monitored connection between the user and the content, as well as various user interface options, are other noteworthy features. Computer program products and computing network interaction are also defined.
    • 描述了基于用户角色访问编辑材料的装置和方法。 作者将部分内容指定为要编辑的内容。 作者建立了能够访问它的各种用户角色,并定义了影响查看/使用的属性或时间约束。 通过电子方式保存内容,对被编辑部分进行加密。 诸如密钥表服务之类的中间媒介介于稍后用户与内容之间的访问。 在识别尝试与内容交互并且将角色与作者建立的角色之一匹配的用户的角色之后,加密的编码部分被解密。 以这种方式,用户只能根据自己的角色访问内容。 周围的事件也是可追溯的,可追溯的和可验证的。 用户和内容之间的受监控连接以及各种用户界面选项是其他值得注意的功能。 还定义了计算机程序产品和计算网络交互。
    • 8. 发明申请
    • Identity-aware scheduler service
    • 身份感知调度服务
    • US20080301685A1
    • 2008-12-04
    • US11809300
    • 2007-05-31
    • Kasman E. ThomasLyndon A. Washington
    • Kasman E. ThomasLyndon A. Washington
    • G06F9/46G06Q20/00H04L9/32
    • G06Q10/06G06Q20/40
    • In a computing environment, clients and scheduling services are arranged to coordinate time-based services. Representatively, the client and scheduler engage in an http session whereby the client creates an account (if the first usage) indicating various identities and rights of the client for use with a scheduling job. Thereafter, one or more scheduling jobs are registered including an indication of what payloads are needed, where needed and when needed. Upon appropriate timing, the payloads are delivered to the proper locations, but the scheduling of events is no longer entwined with underlying applications in need of scheduled events. Monitoring of jobs is also possible as is establishment of appropriate communication channels between the parties. Noticing, encryption, and authentication are still other aspects as are launching third party services before payload delivery. Still other embodiments contemplate publishing an API or other particulars so the service can be used in mash-up applications.
    • 在计算环境中,安排客户端和调度服务来协调基于时间的服务。 代表性地,客户端和调度器参与http会话,由此客户端创建指示用于调度作业的客户端的各种身份和权限的帐户(如果是第一使用)。 此后,一个或多个调度作业被注册,包括在需要时和需要时需要什么有效载荷的指示。 在适当的定时,有效载荷被传递到适当的位置,但是事件的调度不再与需要预定事件的底层应用程序相关联。 监督工作也是可能的,因为在双方之间建立适当的沟通渠道。 注意,加密和认证还是在有效载荷传送之前启动第三方服务的其他方面。 还有一些实施例考虑发布API或其他细节,使得服务可以在混搭应用中使用。
    • 9. 发明申请
    • Stealth entropy collection
    • 隐形熵收集
    • US20080189356A1
    • 2008-08-07
    • US11702453
    • 2007-02-05
    • Kasman E. ThomasStephen R. Carter
    • Kasman E. ThomasStephen R. Carter
    • G06F15/173G06F9/455
    • H04L63/1458G06F7/58G06F7/588H04L9/0861H04L9/0872H04L43/04
    • In a computing system environment, methods and apparatus include tapping a plurality of connected computing devices and distilling small amounts of entropy from each, concentrating the entropy so collected, and performing all in a stealth or surreptitious fashion relative to the providers of the entropy. In this manner: the potential supply of entropy on a networked computing device is greatly expanded; the potential for entropy-related denial-of-service attacks in Linux systems is reduced; no significant extra processing burden on participating computing devices is required; and enlisting entropy-providing computing devices (including or not naive applications) in entropy exchanges occurs unobtrusively. Representative particular environments include web servers, including servlet filters, and clients engaged in http sessions; Java virtual machines; network interface cards in promiscuous mode analyzing packets; and other. Computer program products for devices to realize the foregoing are also intended.
    • 在计算系统环境中,方法和装置包括点击多个连接的计算设备并从每一个中抽取少量的熵,集中所收集的熵,并相对于熵的提供者以隐身或隐蔽的方式执行所有的熵。 以这种方式:网络计算设备上熵的潜在供应大大扩大; 在Linux系统中熵相关的拒绝服务攻击的潜力降低了; 不需要参与计算设备的重大额外处理负担; 并且在熵交换中招募熵提供计算设备(包括或不是天真的应用)不引人注目地发生。 代表性的特定环境包括Web服务器,包括servlet过滤器和从事http会话的客户端; Java虚拟机; 网络接口卡混杂模式分析数据包; 和别的。 用于实现上述设备的计算机程序产品也是旨在。
    • 10. 发明申请
    • Provisioning software with policy-appropriate capabilities
    • 配置软件具有策略适当的功能
    • US20080141335A1
    • 2008-06-12
    • US11635845
    • 2006-12-08
    • Kasman E. Thomas
    • Kasman E. Thomas
    • G06F21/22
    • G06F21/629G06F21/125
    • Apparatus and methods are described for enabling distribution of user-tailored pieces of a larger software program in a way that facilitates compliance with organizational policies around security, access control, and the like. The pieces, representing new or missing functionality in an existing instance of pre-installed software, are supplied as supplemental software fragments (known as “aspects”) that provide the new or missing logic to a target application with the target application having to know of the fragment's existence. The number and quality of aspects provisioned to the user are tailored to the user's identity and/or organizational role in accordance with explicit policy governing such provisioning. In this manner, the user of the software gains functionality appropriate to his security level, title, or other qualifications, and the events surrounding the provisioning become loggable, traceable, and verifiable.
    • 描述了用于使得能够以便于遵守关于安全性,访问控制等的组织策略的方式分发较大软件程序的用户定制的片段的装置和方法。 代表预先安装的软件的现有实例中的新功能或缺少功能的部分作为补充软件片段(称为“方面”)提供,其向目标应用提供新的或缺少的逻辑,目标应用必须知道 片段的存在。 根据管理这种配置的明确政策,为用户量身定制的方面的数量和质量是根据用户的身份和/或组织角色量身定制的。 以这种方式,软件的用户获得与其安全级别,标题或其他资格相适应的功能,并且围绕配置的事件变得可记录,可追溯和可验证。