Tracing and identifying piracy in wireless digital rights management system
    22.
    发明申请
    Tracing and identifying piracy in wireless digital rights management system 失效
    跟踪和识别无线数字版权管理系统中的盗版

    公开(公告)号:US20060048237A1

    公开(公告)日:2006-03-02

    申请号:US11211804

    申请日:2005-08-25

    IPC分类号: H04N7/16

    摘要: Provides methods for tracing and identifying a piracy in a wireless rights management system, wherein the content provider allow the protected digital content to be super-distributed, when unauthorized holding a pirated copy of the protected digital content is detected, based on the gateway controlling ability of the wireless operator within the wireless digital rights management system, a specific fingerprint is embedded in or removed from the protected digital content so as to trace the suspected persons and further identify the pirate. The fingerprint is related to information of a suspected person holding the protected digital content without authorization. A process of screening singles out highly suspected persons. Therefore the operator can determine whether the suspected person is a real pirate by comparing the similarity of the pirated version of content and the version held by the suspected person, and the exact tracing and identifying is achieved.

    摘要翻译: 提供了在无线权限管理系统中跟踪和识别盗版的方法,其中,当未经授权的情况下,基于所述网关控制能力检测到未经授权的方式检测到受保护的数字内容的盗版副本时,所述内容提供商允许所述受保护的数字内容被超分散 无线数字版权管理系统内的无线运营商,将特定的指纹嵌入到受保护的数字内容中或从受保护的数字内容中移除,以便跟踪可疑的人并进一步识别盗版者。 该指纹与未经授权持有受保护的数字内容的怀疑人员的信息相关。 筛选高度怀疑人士的过程。 因此,运营商可以通过比较盗版内容与嫌疑人所持有的版本的相似性来确定被怀疑的人是否是真正的盗版者,并且实现了准确的跟踪和识别。

    Performing authorization control in a cloud storage system
    23.
    发明授权
    Performing authorization control in a cloud storage system 有权
    在云存储系统中执行授权控制

    公开(公告)号:US09158465B2

    公开(公告)日:2015-10-13

    申请号:US13096589

    申请日:2011-04-28

    摘要: A method, apparatus and computer program product for performing authorization control in a cloud storage system. The method comprises: receiving an access request to a file block, wherein the file block is embedded with tag data comprising at least file block authorization information; retrieving the file block; extracting the file block authorization information from the tag data; determining whether the access request matches the file block authorization information; and performing the access request if the access request matches the file block authorization information. Effective authorization control may be performed in a cloud storage system.

    摘要翻译: 一种用于在云存储系统中执行授权控制的方法,装置和计算机程序产品。 该方法包括:接收对文件块的访问请求,其中所述文件块嵌入至少包括文件块授权信息的标签数据; 检索文件块; 从标签数据中提取文件块授权信息; 确定所述访问请求是否匹配所述文件块授权信息; 以及如果访问请求与文件块授权信息匹配,则执行访问请求。 可以在云存储系统中执行有效的授权控制。

    Performing authorization control in a cloud storage system
    24.
    发明授权
    Performing authorization control in a cloud storage system 有权
    在云存储系统中执行授权控制

    公开(公告)号:US09134912B2

    公开(公告)日:2015-09-15

    申请号:US13407718

    申请日:2012-02-28

    摘要: A method, apparatus and computer program product for performing authorization control in a cloud storage system. The method comprises: receiving an access request to a file block, wherein the file block is embedded with tag data comprising at least file block authorization information; retrieving the file block; extracting the file block authorization information from the tag data; determining whether the access request matches the file block authorization information; and performing the access request if the access request matches the file block authorization information. ,Effective authorization control may be performed in a cloud storage system.

    摘要翻译: 一种用于在云存储系统中执行授权控制的方法,装置和计算机程序产品。 该方法包括:接收对文件块的访问请求,其中所述文件块嵌入至少包括文件块授权信息的标签数据; 检索文件块; 从标签数据中提取文件块授权信息; 确定所述访问请求是否匹配所述文件块授权信息; 以及如果访问请求与文件块授权信息匹配,则执行访问请求。 可以在云存储系统中执行有效的授权控制。

    Method and apparatus for security validation of user input
    25.
    发明授权
    Method and apparatus for security validation of user input 有权
    用户输入安全验证的方法和装置

    公开(公告)号:US08826421B2

    公开(公告)日:2014-09-02

    申请号:US13512642

    申请日:2010-11-05

    IPC分类号: G06F21/00 G06F21/55

    摘要: According to embodiments of the present invention, a computing device provides a security rules subset of a server-side protection element to a pre-validation component deployed at a client side. The computing device validates the user input based on the security rules. The computing device determines, in response to detecting a user input violation and that a violated security rule has/or has not been provided to the pre-validation component, the user as a first or second class of users. The computing device performs different security protection actions to the first and second class of users. The computing device asynchronously performs a dynamic update to the security rule subset provided to the pre-validation component. The security rule subset is screened from the security rules of the server-side protection means. A policy for screening the security rule subset is selected.

    摘要翻译: 根据本发明的实施例,计算设备向部署在客户端的预验证组件提供服务器侧保护元件的安全规则子集。 计算设备根据安全规则验证用户输入。 计算设备响应于检测到用户输入违规而确定已经/尚未向预验证组件提供违反的安全规则,该用户作为第一或第二类用户。 计算设备对第一类用户和第二类用户执行不同的安全保护动作。 计算设备异步地对提供给预验证组件的安全规则子集进行动态更新。 从服务器端保护装置的安全规则中筛选出安全规则子集。 选择筛选安全规则子集的策略。

    Apparatus and method for securely submitting and processing a request
    26.
    发明授权
    Apparatus and method for securely submitting and processing a request 有权
    用于安全地提交和处理请求的装置和方法

    公开(公告)号:US08386784B2

    公开(公告)日:2013-02-26

    申请号:US12473559

    申请日:2009-05-28

    IPC分类号: H04L9/32

    CPC分类号: H04L63/068 H04L63/1441

    摘要: An apparatus and a method for securely submitting a request and an apparatus and a method for securely processing a request. The apparatus for securely submitting a request includes a request pre-submitting component and a request confirmation component. The request pre-submitting component sends a request with a unique identifier to a server and sends an alarm message containing the unique identifier and a request description to the request confirmation component. The request confirmation component contains a key inaccessible to other components in a client. It pops up a request confirmation window, on which the request description is displayed, in response to the alarm message and generates a request confirmation message associated with the request by using the key and the unique identifier.

    摘要翻译: 用于安全地提交请求的装置和方法,以及用于安全地处理请求的装置和方法。 用于安全地提交请求的装置包括请求提交组件和请求确认组件。 请求预提交组件向服务器发送具有唯一标识符的请求,并向请求确认组件发送包含唯一标识符和请求描述的警报消息。 请求确认组件包含客户机中其他组件无法访问的密钥。 它响应于该报警消息弹出显示请求描述的请求确认窗口,并通过使用密钥和唯一标识符生成与该请求相关联的请求确认消息。

    PERFORMING AUTHORIZATION CONTROL IN A CLOUD STORAGE SYSTEM
    27.
    发明申请
    PERFORMING AUTHORIZATION CONTROL IN A CLOUD STORAGE SYSTEM 审中-公开
    在云存储系统中执行授权控制

    公开(公告)号:US20120158786A1

    公开(公告)日:2012-06-21

    申请号:US13407718

    申请日:2012-02-28

    IPC分类号: G06F17/30

    摘要: A method, apparatus and computer program product for performing authorization control in a cloud storage system. The method comprises: receiving an access request to a file block, wherein the file block is embedded with tag data comprising at least file block authorization information; retrieving the file block; extracting the file block authorization information from the tag data; determining whether the access request matches the file block authorization information; and performing the access request if the access request matches the file block authorization information. Effective authorization control may be performed in a cloud storage system.

    摘要翻译: 一种用于在云存储系统中执行授权控制的方法,装置和计算机程序产品。 该方法包括:接收对文件块的访问请求,其中所述文件块嵌入至少包括文件块授权信息的标签数据; 检索文件块; 从标签数据中提取文件块授权信息; 确定所述访问请求是否匹配所述文件块授权信息; 以及如果访问请求与文件块授权信息匹配,则执行访问请求。 可以在云存储系统中执行有效的授权控制。

    INTERACTIVE MANAGEMENT OF WEB APPLICATION FIREWALL RULES
    28.
    发明申请
    INTERACTIVE MANAGEMENT OF WEB APPLICATION FIREWALL RULES 有权
    WEB应用程序规则的互动管理

    公开(公告)号:US20110099482A1

    公开(公告)日:2011-04-28

    申请号:US12603947

    申请日:2009-10-22

    IPC分类号: G06F3/048 G06F21/00

    摘要: A computer implemented method, information processing system, and computer program product manage web application firewall rule configuration. A web application is analyzed. A set of data elements within the web application is identified. Each data element in the set of data elements stores information that is sent from a web client to a web server. Each data element in the set of data elements is analyzed. A data type is associated with each data element in the set of data element. The data type describes a type of data stored by the data element. A web application firewall rule recommendation is automatically generated for each data element based at least on the data type associated therewith.

    摘要翻译: 计算机实现的方法,信息处理系统和计算机程序产品管理Web应用程序防火墙规则配置。 分析一个Web应用程序。 识别Web应用程序中的一组数据元素。 数据元素集合中的每个数据元素都存储从Web客户端发送到Web服务器的信息。 分析数据元素集合中的每个数据元素。 数据类型与数据元素集合中的每个数据元素相关联。 数据类型描述数据元素存储的数据类型。 至少基于与其相关联的数据类型,为每个数据元素自动生成Web应用防火墙规则推荐。

    METHOD AND SYSTEM FOR RECONSTRUCTING ERROR RESPONSE MESSAGES UNDER WEB APPLICATION ENVIRONMENT
    30.
    发明申请
    METHOD AND SYSTEM FOR RECONSTRUCTING ERROR RESPONSE MESSAGES UNDER WEB APPLICATION ENVIRONMENT 有权
    在WEB应用环境下重新构建错误响应消息的方法和系统

    公开(公告)号:US20100281311A1

    公开(公告)日:2010-11-04

    申请号:US12769845

    申请日:2010-04-29

    IPC分类号: G06F11/14 G06F15/16

    CPC分类号: H04L63/168 H04L63/1441

    摘要: A computer-implemented method and system for reconstructing a response message to an improper accessing request in a web application environment. The method includes: obtaining the URL of a web application to be accessed by the improper accessing request and the error parameter information of the improper accessing request; obtaining a response template based on the obtained URL of the web application to be accessed; and merging the obtained error parameter information of the improper accessing request with the obtained response template to generate a reconstructed response message for the improper accessing request. The system includes: a message obtaining device; a response message template obtaining device; and a response message merging device.

    摘要翻译: 一种计算机实现的方法和系统,用于在Web应用环境中重建响应消息到不正确的访问请求。 该方法包括:获取由不正当访问请求访问的Web应用的URL和不正当访问请求的错误参数信息; 基于所获取的要访问的web应用的URL获取响应模板; 将获得的不正当访问请求的错误参数信息与所获得的响应模板合并,生成用于不正当访问请求的重构响应消息。 该系统包括:消息获取装置; 响应消息模板获取装置; 和响应消息合并设备。