Integrated native language translation
    61.
    发明申请
    Integrated native language translation 有权
    综合母语翻译

    公开(公告)号:US20060271352A1

    公开(公告)日:2006-11-30

    申请号:US11137894

    申请日:2005-05-26

    IPC分类号: G06F17/28

    CPC分类号: G06F17/289

    摘要: A method and apparatus provide for performing language translation by obtaining a selection of a language preference for presentation of text and/or speech on an electronic device. When data is received that includes content in a language other than the preferred language, a decision whether translation is required may be reached by analyzing the context of the language or metadata associated with the language, such as. HTML tags, or language data included in a particular protocol, e.g. HTTP headers. A selection may be made of billing level, determined at least in part by the languages involved, desired accuracy, latency and volume of translation. If necessary, the data may be routed to a translation host or service before final presentation.

    摘要翻译: 一种方法和装置,用于通过获得在电子设备上呈现文本和/或语音的语言偏好的选择来执行语言翻译。 当接收到包含不同于首选语言的语言的内容的数据时,可以通过分析与该语言相关联的语言或元数据的上下文来达成是否需要翻译的决定。 HTML标签或特定协议中包括的语言数据,例如 HTTP标头 可以选择可以至少部分地由所涉及的语言确定的计费水平,期望的准确性,延迟和翻译量。 如果需要,可以在最终呈现之前将数据路由到翻译主机或服务。

    System and method for trustworthy metering and deactivation
    62.
    发明申请
    System and method for trustworthy metering and deactivation 有权
    用于可靠计量和停用的系统和方法

    公开(公告)号:US20060206718A1

    公开(公告)日:2006-09-14

    申请号:US11074500

    申请日:2005-03-08

    IPC分类号: H04L9/00

    摘要: A computer is adapted for use in different operating modes by configuring an output controller, such as a graphics processing unit, to screen output signals prior to presenting them to the output device. A secure environment in the output controller verifies a digital signature or a hash of the output signal to determine whether the output signal is compatible with the current mode of operation. Thus only authorized output signals are presented when the computer is operating in a limited function mode, such as when metered usage time is expired. The apparatus and method also disclose similar output signal screening for determining whether the computer should be returned from a standby, or no-metering, mode to an active, or metered mode.

    摘要翻译: 计算机适于在不同的操作模式中使用,通过配置诸如图形处理单元之类的输出控制器,以在将输出信号呈现给输出设备之前进行屏幕输出。 输出控制器中的安全环境验证输出信号的数字签名或散列,以确定输出信号是否与当前操作模式兼容。 因此,当计算机以有限的功能模式操作时,例如当计量使用时间到期时,仅呈现授权的输出信号。 该装置和方法还公开了类似的输出信号筛选,用于确定计算机是否应该从备用或无计量模式返回到活动或计量模式。

    Binding a device to a computer
    63.
    发明申请
    Binding a device to a computer 有权
    将设备绑定到计算机

    公开(公告)号:US20060161445A1

    公开(公告)日:2006-07-20

    申请号:US11039165

    申请日:2005-01-19

    申请人: Alexander Frank

    发明人: Alexander Frank

    IPC分类号: G06Q99/00

    摘要: A device, such as a component or a peripheral, and corresponding computer are adapted to be bound such that the device will only operate with that computer after the binding process. Cryptographic messages are sent between the device and computer to confirm the relationship. When the device cannot confirm it is operating with the previously bound computer, the device reduces its own operating capability to render itself substantially useless until either unbound from that computer or a successful confirmation takes place. Methods for operation, binding and unbinding are also disclosed.

    摘要翻译: 诸如组件或外围设备的设备以及对应的计算机适于被绑定,使得设备将仅在绑定过程之后与该计算机一起操作。 在设备和计算机之间发送加密消息以确认关系。 当设备无法确认它是否使用以前绑定的计算机进行操作时,设备会降低自身的操作能力,使其本身基本上无用,直到从该计算机取消绑定或成功确认发生。 还公开了操作,结合和解绑定的方法。

    Last line of defense ensuring and enforcing sufficiently valid/current code
    64.
    发明申请
    Last line of defense ensuring and enforcing sufficiently valid/current code 审中-公开
    最后一道防线确保并执行足够有效/现行的代码

    公开(公告)号:US20060156008A1

    公开(公告)日:2006-07-13

    申请号:US11034377

    申请日:2005-01-12

    申请人: Alexander Frank

    发明人: Alexander Frank

    IPC分类号: H04L9/00

    摘要: A computer is adapted for self-validation using a dedicated validation circuit or process. The validation circuit may include a timing circuit for activating the validation process, a verification circuit for verifying the computer is in compliance with a pre-determined set of conditions and an enforcement circuit for imposing a sanction on the computer when the computer is found in a non-compliant state. The validation circuit may include cryptographic circuitry or processes for hashing and digital signature verification. The validation circuit is preferable small and portable to help ensure that the validation circuit itself is not vulnerable to a widespread attack. A self-validation method for use by a computer is also disclosed.

    摘要翻译: 计算机适用于使用专用验证电路或过程的自我验证。 验证电路可以包括用于激活验证过程的定时电路,用于验证计算机符合预定条件集合的验证电路和用于在计算机被发现时在计算机上施加制裁的强制电路 不合规状态。 验证电路可以包括加密电路或用于散列和数字签名验证的过程。 验证电路较小且便于携带,以确保验证电路本身不易受到广泛的攻击。 还公开了一种由计算机使用的自验证方法。

    System and method for managing storage space of a cache

    公开(公告)号:US06654856B2

    公开(公告)日:2003-11-25

    申请号:US09855957

    申请日:2001-05-15

    申请人: Alexander Frank

    发明人: Alexander Frank

    IPC分类号: G06F1200

    摘要: A system and method for managing a cache space employs a space allocation and recycling scheme that has very low complexity for each data caching transaction regardless of the size of the data set, is virtually fragmentation free, and does not depend on garbage collection. The cache space is treated as a linear space with its two ends connected in the manner of a cyclic queue. The reclaiming and allocation of cache space for writing new objects proceeds as an “allocation wave” that sweeps in a pre-selected direction over the “circular” cache space. As the allocation wave moves along the circular space, the space used by existing objects are reclaimed for writing new objects except for those existing objects that for some reason are not to be written over. Those existing objects to be passed over by the allocation wave are viewed as “interruptions” to the generally first-in-first-out (FIFO) allocation scheme for writing new objects into the circular cache space.

    Device for shaping a flat blank into a container

    公开(公告)号:US09604748B2

    公开(公告)日:2017-03-28

    申请号:US13984891

    申请日:2012-01-31

    申请人: Alexander Frank

    发明人: Alexander Frank

    IPC分类号: B65D1/22 B31B1/00

    摘要: In a device for shaping a flat blank (46) made of cardboard into a container (48), comprising a shaping tool (50) and a ram (10) which can be moved in a primary shaping direction (z) into the shaping tool (50) so as to erect the flat blank by means of the shaping tool (50), at least two lateral walls (18) which can be pivoted about a respective pivot axis (s) located transversely relative to the primary shaping direction (z) are hinged to the ram (10), whereby a main surface defined by the free end edges (19) of the lateral walls (18) can be adjusted. In order to carry out a pivoting motion, the lateral walls (18) are seated in a non-positively sliding manner against wedge elements (28) by means of pretensioned spring elements (22, 24), the wedge elements being displaceable in the primary shaping direction (z).

    SYSTEM AND METHOD FOR CONFIDENTIAL REMOTE COMPUTING
    67.
    发明申请
    SYSTEM AND METHOD FOR CONFIDENTIAL REMOTE COMPUTING 审中-公开
    用于机密远程计算的系统和方法

    公开(公告)号:US20150264024A1

    公开(公告)日:2015-09-17

    申请号:US14214936

    申请日:2014-03-15

    申请人: Alexander Frank

    发明人: Alexander Frank

    IPC分类号: H04L29/06

    摘要: A system, method, device and protocols are disclosed. Each and combined they protect computation and data hosted on remote computing resources from first party attacks.First party attacks refer to attacks that are launched by agents (employees, contractors, etc.) of the hosting facility. Such attacks can be launched by the first patty agents, or some other adversary exploiting the privileges of the first party agent.This invention allows customers to submit workloads to a remote computing facility, e.g. a datacenter or cloud computing, with the assurance that the administrators of the remote computers cannot access the workload computation and data.The invention scales effectively from a single compute-server device to a whole datacenter with numerous compute-servers. It interoperates and may utilize VMM and VM deployment architectures. The invention allows varying degrees of datacenter operations access to the workload ranging from virtually none in the most strict case, to limited access to enable monitoring and maintenance of the workload.This invention can be applied to existing cloud computing and other datacenters with off the self computing components. Further it can be applied to existing computing resource commonly in use in such facilities. Further, the invention is applicable to a wide variety of settings including single computers, computer labs, datacenters and public and private cloud computing services.

    摘要翻译: 公开了一种系统,方法,设备和协议。 每个组合它们保护远程计算资源上托管的计算和数据免受第一方攻击。 第一方攻击是指托管设施的代理(员工,承包商等)发起的攻击。 这种攻击可以由第一代理代理人或利用第一方代理人的特权的其他对手发起。 本发明允许客户将工作负载提交给远程计算设备,例如, 数据中心或云计算,确保远程计算机的管理员无法访问工作负载计算和数据。 本发明有效地从单个计算服务器设备扩展到具有许多计算服务器的整个数据中心。 它可以互操作并且可以利用VMM和VM部署架构。 本发明允许不同程度的数据中心操作访问工作负载,在最严格的情况下几乎不存在,到有限的访问以允许监视和维护工作负载。 本发明可以应用于现有的云计算和其他数据中心,而不考虑自身计算组件。 此外,它可以应用于通常在这样的设施中使用的现有计算资源。 此外,本发明可应用于各种设置,包括单个计算机,计算机实验室,数据中心以及公共和私有云计算服务。

    Position measuring instrument, scale, and method for producing a scale
    68.
    发明授权
    Position measuring instrument, scale, and method for producing a scale 有权
    位置测量仪器,刻度尺和刻度尺的制作方法

    公开(公告)号:US08844152B2

    公开(公告)日:2014-09-30

    申请号:US13448590

    申请日:2012-04-17

    摘要: A method a scale having an inductively scannable graduation, the scale including a sequence of graduation elements disposed in a measuring direction and a layer stack including a succession of metal layers. The succession of metal layers includes a ferromagnetic metal carrier layer and a graduation layer that forms the sequence of graduation elements. The carrier layer is disposed between the graduation layer and a metal substrate, and the metal substrate is dimensioned to definitively determine mechanical properties of the layer stack.

    摘要翻译: 一种具有感应可扫描刻度的刻度的方法,所述刻度包括在测量方向上设置的刻度元件序列和包括一系列金属层的层叠层。 金属层的连续包括铁磁金属载体层和形成刻度元件序列的刻度层。 载体层设置在刻度层和金属基底之间,并且金属基底的尺寸被确定为确定层叠层的机械性能。

    Leveraging active firewalls for network intrusion detection and retardation of attack
    69.
    发明授权
    Leveraging active firewalls for network intrusion detection and retardation of attack 有权
    利用主动防火墙进行网络入侵检测和阻止攻击

    公开(公告)号:US08170020B2

    公开(公告)日:2012-05-01

    申请号:US11298411

    申请日:2005-12-08

    IPC分类号: H04L12/28 G06F7/04

    CPC分类号: H04L63/0227 H04L63/1408

    摘要: A computer network firewall or network filter functions normally to pass data on open ports to a respective service or data source associated with an open port. In addition, traffic arriving on closed ports may be directed to a handler for analysis and response. The handler may analyze and catalog the source and type of traffic arriving on the closed ports. The handler may then send a response with either a fixed response or data tailored to the type and nature of the traffic. The handler may respond slowly to cause the source of the traffic to wait for the response, thereby slowing the speed at which a potential attacker can identify valid targets and proceed past non-valid targets.

    摘要翻译: 计算机网络防火墙或网络过滤器可以正常工作,将开放端口上的数据传递到与开放端口相关联的相应服务或数据源。 此外,到达封闭港口的流量可能被引导到处理程序进行分析和响应。 处理程序可以分析和编目到达封闭端口的流量的来源和类型。 然后,处理程序可以发送具有针对流量的类型和性质的固定响应或数据的响应。 处理程序可能会缓慢响应,导致流量来源等待响应,从而降低潜在攻击者可以识别有效目标并进入非有效目标的速度。