摘要:
A multiple party system for distributing content. In one embodiment, four parties are involved in the system: a consumer, a service provider, an authenticator, and a content provider. The distribution of content from the content provider to the consumer is carried out using a predefined protocol, mutating IDs, and licenses. The authenticator controls the distribution of mutating IDs and verifies the identity of one or more participating parties.
摘要:
Techniques for virtual archiving are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for performing virtual archiving comprising applying archiving rules to a backup catalog, generating a virtual archive catalog based at least in part on a result of applying archiving rules to the backup catalog, determining a backup image associated with the virtual archive catalog becoming expired and converting the backup image into an archive image.
摘要:
A multiple party system for distributing content. In one embodiment, four parties are involved in the system: a consumer, a service provider, an authenticator, and a content provider. The distribution of content from the content provider to the consumer is carried out using a predefined protocol, mutating IDs, watermarks, and licenses. The authenticator controls the distribution of mutating IDs, verifies the identity of one or more participating parties, and provides tracking information for mapping service providers and consumers to particular, possibly watermarked, content items.
摘要:
One preferred embodiment of the present invention includes a cutting system with an hydraulically powered cutting member such as a cutting wheel or blade. The cutting member is arrangeable in a first configuration for substantially vertical cutting, and the cutting member is arrangeable in a second configuration for substantially horizontal cutting. One option includes a rotating joint allowing the cutting member to be arranged between the first configuration and the second configuration. In certain preferred embodiments, the cutting system is on a frame mountable in combination with a support vehicle, such as a skid steer loader.
摘要:
The present invention is a virtual reality game controller that is shaped like a weapon such as a rifle, pistol or shotgun. The controller has at least one multiaxis controller that is actuated by movement part of the weapon, for example its forearm also has a plurality of switch controls that are positioned on the weapon to control movement and actions and attributes of a VR game character within the VR game space without interrupting the playing of the game.
摘要:
Techniques for virtual archiving are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for performing virtual archiving comprising applying archiving rules to a backup catalog, generating a virtual archive catalog based at least in part on a result of applying archiving rules to the backup catalog, determining a backup image associated with the virtual archive catalog becoming expired and converting the backup image into an archive image.
摘要:
Methods and systems of encrypting data. One method includes establishing data that includes discoverable or “white” data and undiscoverable or “black” data. Black data is generally unrecognizable. For example, it may be random data. White data generally has recognizable content or is transmitted in a recognizable format. A first key and a second key are created or established, such that the second key is substantially underivable from the first key. The discoverable or white data is encrypted with the first key and the undiscoverable or black data is encrypted with the second key. In subsequent communications or transactions, at least one of the first key and the second key is mutated.
摘要:
A point-of-sale (POS) terminal for use in performing a transaction between a first entity and a second entity at a POS, the POS terminal associated with the second entity. The POS terminal stores a second mutating identified, receives encrypted transaction information from an account information carrier device over a communication link, sending the encrypted first and second transaction information to an authenticator, and receiving the second mutating identifier from the authenticator and a processor configured to encrypt transaction information with the second mutating identifier to create second encrypted transaction information.
摘要:
Methods and systems for performing electronic commerce using mutating identifiers. One method can include encrypting buyer transaction data with a first mutating identifier, transmitting the buyer transaction data to an authenticator device, decrypting the buyer transaction data, generating a payment request, encrypting the payment request with a third mutating identifier, and transmitting the payment request to a payment authenticator device.
摘要:
Methods and system for managing manipulation of digital content stored in a content server. One method includes receiving a first mutating identifier at a content manipulation device. The first mutating identifier includes a first secret key. The method also includes generating a content request for digital content stored in the content server at the content manipulation device, the content request encrypted with the first secret key and including an identifier of the digital content; transmitting the content request to an authenticator over at least one communication link; transmitting access rights from the authenticator to the content manipulation device over at least one communication link; transmitting the digital content from the content server to the content manipulation device; manipulating the digital content at the content manipulation device based on the access rights; and marking the first mutating identifier as used at the authenticator.