Method and apparatus for measuring presentation data exposure
    61.
    发明授权
    Method and apparatus for measuring presentation data exposure 有权
    用于测量演示数据曝光的方法和装置

    公开(公告)号:US07669056B2

    公开(公告)日:2010-02-23

    申请号:US11092041

    申请日:2005-03-29

    IPC分类号: G06F9/00 H04L9/32 H04N7/167

    CPC分类号: G06Q30/02 G06F2221/2101

    摘要: A method and apparatus for measuring data presentation is measured for authenticity and accuracy using a cryptographic capability. The data may include both presentation data and metadata related to measuring and reporting results of outputting the presentation data. After measurement, the presentation data may be presented to an output device. The output device may be a display, a sound device or other computer output. Related statistics may be collected, for example, user identity, computer identity, time, duration, and interference from other sources. In the case of displayed presentation data, unblocked viewing area, and presentation data area size may also be collected. In an exemplary embodiment, the presence of a user and/or user interaction with the presentation data may be recorded and reported. The recorded data may be securely reported to a participating host or server, by a secure channel and/or by signing and/or encrypting.

    摘要翻译: 使用加密能力测量用于测量数据呈现的方法和装置的真实性和准确性。 数据可以包括呈现数据和与测量和报告输出演示数据的结果相关的元数据。 在测量之后,呈现数据可以呈现给输出设备。 输出设备可以是显示器,声音设备或其他计算机输出。 可能会收集相关统计信息,例如用户身份,计算机身份,时间,持续时间和其他来源的干扰。 在显示的呈现数据的情况下,还可以收集未屏蔽的观看区域和呈现数据区域大小。 在示例性实施例中,可以记录和报告用户和/或用户与呈现数据的交互的存在。 记录的数据可以通过安全信道和/或通过签名和/或加密安全地报告给参与的主机或服务器。

    DEVICE CONSTELLATION MANAGEMENT
    62.
    发明申请
    DEVICE CONSTELLATION MANAGEMENT 有权
    设备信号管理

    公开(公告)号:US20080120401A1

    公开(公告)日:2008-05-22

    申请号:US11561853

    申请日:2006-11-20

    IPC分类号: G06F15/173

    摘要: A method and apparatus is provided for managing a plurality of devices in a federated network and a sub-network within the federated network. The devices in the sub-network may have a functional capability of performing a function associated with the federated network. For example, the federated network may include devices for providing data content such as media content and the sub-network may include devices for controlling the presentation of the data content. In addition, a constellation of devices is provided that may share data content such as media data. At least some of the devices in the constellation may form a sub-network.

    摘要翻译: 提供了一种用于管理联合网络中的多个设备和联合网络内的子网络的方法和装置。 子网中的设备可以具有执行与联合网络相关联的功能的功能性能。 例如,联合网络可以包括用于提供诸如媒体内容的数据内容的设备,并且子网络可以包括用于控制数据内容呈现的设备。 此外,提供了可以共享诸如媒体数据之类的数据内容的设备的星座。 星座中的至少一些设备可以形成子网络。

    Zone Policy Administration For Entity Tracking And Privacy Assurance
    63.
    发明申请
    Zone Policy Administration For Entity Tracking And Privacy Assurance 有权
    区域政策管理实体跟踪和隐私保证

    公开(公告)号:US20080072284A1

    公开(公告)日:2008-03-20

    申请号:US11468039

    申请日:2006-08-29

    摘要: The present invention includes entity tracking, privacy assurance, and zone policy administration technologies allowing for the creation of zone policies, including the definition of zones and managed entities, the zone policies including rules that apply to the managed entities within or in relation to the zones, and privacy policies assuring privacy of sensitive data. The technologies also provide for the definition of sensors, rule event objects, and default event objects, and for the establishment of associations between rules and managed entities, sensors, and rule event objects so as to create zone policies. Event objects may generate zone policy events or actions upon compliance with or violation of various rules of zone policy. Managed entities are defined as entities associated with mobile devices capable of location tracking and communication with zone policy servers. Entities may be persons, vehicles, animals, or any other object for which tracking and zone policy administration is of value. Zone policy may include privacy policy that may restrict access to or set access conditions for data or information. Privacy policies may be used to ensure individual managed entities and their data remain anonymous to a desired degree and that sensitive data is appropriately protected.

    摘要翻译: 本发明包括实体跟踪,隐私保护和区域策略管理技术,允许创建区域策略,包括区域和被管理实体的定义,区域策略包括适用于区域内或与区域相关联的管理实体的规则 ,隐私政策保证敏感数据的隐私。 这些技术还提供传感器,规则事件对象和默认事件对象的定义,以及建立规则和被管实体,传感器和规则事件对象之间的关联,以创建区域策略。 事件对象可能会根据或违反区域策略的各种规则生成区域策略事件或动作。 管理实体被定义为与能够进行位置跟踪和与区域策略服务器通信的移动设备相关联的实体。 实体可以是人员,车辆,动物或跟踪和区域政策管理有价值的任何其他对象。 区域策略可能包括可能限制对数据或信息的访问或设置访问条件的隐私策略。 可以使用隐私政策来确保个人管理实体及其数据在所需程度上保持匿名,并且敏感数据得到适当保护。

    Integrated native language translation
    64.
    发明申请
    Integrated native language translation 有权
    综合母语翻译

    公开(公告)号:US20060271352A1

    公开(公告)日:2006-11-30

    申请号:US11137894

    申请日:2005-05-26

    IPC分类号: G06F17/28

    CPC分类号: G06F17/289

    摘要: A method and apparatus provide for performing language translation by obtaining a selection of a language preference for presentation of text and/or speech on an electronic device. When data is received that includes content in a language other than the preferred language, a decision whether translation is required may be reached by analyzing the context of the language or metadata associated with the language, such as. HTML tags, or language data included in a particular protocol, e.g. HTTP headers. A selection may be made of billing level, determined at least in part by the languages involved, desired accuracy, latency and volume of translation. If necessary, the data may be routed to a translation host or service before final presentation.

    摘要翻译: 一种方法和装置,用于通过获得在电子设备上呈现文本和/或语音的语言偏好的选择来执行语言翻译。 当接收到包含不同于首选语言的语言的内容的数据时,可以通过分析与该语言相关联的语言或元数据的上下文来达成是否需要翻译的决定。 HTML标签或特定协议中包括的语言数据,例如 HTTP标头 可以选择可以至少部分地由所涉及的语言确定的计费水平,期望的准确性,延迟和翻译量。 如果需要,可以在最终呈现之前将数据路由到翻译主机或服务。

    Binding a device to a computer
    65.
    发明申请
    Binding a device to a computer 有权
    将设备绑定到计算机

    公开(公告)号:US20060161445A1

    公开(公告)日:2006-07-20

    申请号:US11039165

    申请日:2005-01-19

    申请人: Alexander Frank

    发明人: Alexander Frank

    IPC分类号: G06Q99/00

    摘要: A device, such as a component or a peripheral, and corresponding computer are adapted to be bound such that the device will only operate with that computer after the binding process. Cryptographic messages are sent between the device and computer to confirm the relationship. When the device cannot confirm it is operating with the previously bound computer, the device reduces its own operating capability to render itself substantially useless until either unbound from that computer or a successful confirmation takes place. Methods for operation, binding and unbinding are also disclosed.

    摘要翻译: 诸如组件或外围设备的设备以及对应的计算机适于被绑定,使得设备将仅在绑定过程之后与该计算机一起操作。 在设备和计算机之间发送加密消息以确认关系。 当设备无法确认它是否使用以前绑定的计算机进行操作时,设备会降低自身的操作能力,使其本身基本上无用,直到从该计算机取消绑定或成功确认发生。 还公开了操作,结合和解绑定的方法。

    Last line of defense ensuring and enforcing sufficiently valid/current code
    66.
    发明申请
    Last line of defense ensuring and enforcing sufficiently valid/current code 审中-公开
    最后一道防线确保并执行足够有效/现行的代码

    公开(公告)号:US20060156008A1

    公开(公告)日:2006-07-13

    申请号:US11034377

    申请日:2005-01-12

    申请人: Alexander Frank

    发明人: Alexander Frank

    IPC分类号: H04L9/00

    摘要: A computer is adapted for self-validation using a dedicated validation circuit or process. The validation circuit may include a timing circuit for activating the validation process, a verification circuit for verifying the computer is in compliance with a pre-determined set of conditions and an enforcement circuit for imposing a sanction on the computer when the computer is found in a non-compliant state. The validation circuit may include cryptographic circuitry or processes for hashing and digital signature verification. The validation circuit is preferable small and portable to help ensure that the validation circuit itself is not vulnerable to a widespread attack. A self-validation method for use by a computer is also disclosed.

    摘要翻译: 计算机适用于使用专用验证电路或过程的自我验证。 验证电路可以包括用于激活验证过程的定时电路,用于验证计算机符合预定条件集合的验证电路和用于在计算机被发现时在计算机上施加制裁的强制电路 不合规状态。 验证电路可以包括加密电路或用于散列和数字签名验证的过程。 验证电路较小且便于携带,以确保验证电路本身不易受到广泛的攻击。 还公开了一种由计算机使用的自验证方法。

    System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication
    67.
    发明申请
    System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication 有权
    用于保护计算设备免受在安全通信中通过网络环境传送的计算机漏洞的系统和方法

    公开(公告)号:US20050183138A1

    公开(公告)日:2005-08-18

    申请号:US10879837

    申请日:2004-06-29

    摘要: A network security module for protecting computing devices connected to a communication network from identified security threats communicated in a secured communication is presented. The network security module is interposed, either logically or physically, between the protected computer and the communication network. Upon detecting a secured communication, the network security module obtains a decryption key from the computing device to decrypt the secured communication. The network security module then processes the decrypted communication according to whether the decrypted communication violates protective security measures implemented by the network security module.

    摘要翻译: 提供一种网络安全模块,用于保护连接到通信网络的计算设备免受在安全通信中通信的所识别的安全威胁。 网络安全模块在逻辑上或物理上介于受保护的计算机和通信网络之间。 在检测到安全通信时,网络安全模块从计算设备获得解密密钥以解密安全通信。 然后,网络安全模块根据解密的通信是否违反由网络安全模块实施的保护性安全措施来处理解密的通信。

    System and method for managing storage space of a cache

    公开(公告)号:US06654856B2

    公开(公告)日:2003-11-25

    申请号:US09855957

    申请日:2001-05-15

    申请人: Alexander Frank

    发明人: Alexander Frank

    IPC分类号: G06F1200

    摘要: A system and method for managing a cache space employs a space allocation and recycling scheme that has very low complexity for each data caching transaction regardless of the size of the data set, is virtually fragmentation free, and does not depend on garbage collection. The cache space is treated as a linear space with its two ends connected in the manner of a cyclic queue. The reclaiming and allocation of cache space for writing new objects proceeds as an “allocation wave” that sweeps in a pre-selected direction over the “circular” cache space. As the allocation wave moves along the circular space, the space used by existing objects are reclaimed for writing new objects except for those existing objects that for some reason are not to be written over. Those existing objects to be passed over by the allocation wave are viewed as “interruptions” to the generally first-in-first-out (FIFO) allocation scheme for writing new objects into the circular cache space.

    Device for shaping a flat blank into a container

    公开(公告)号:US09604748B2

    公开(公告)日:2017-03-28

    申请号:US13984891

    申请日:2012-01-31

    申请人: Alexander Frank

    发明人: Alexander Frank

    IPC分类号: B65D1/22 B31B1/00

    摘要: In a device for shaping a flat blank (46) made of cardboard into a container (48), comprising a shaping tool (50) and a ram (10) which can be moved in a primary shaping direction (z) into the shaping tool (50) so as to erect the flat blank by means of the shaping tool (50), at least two lateral walls (18) which can be pivoted about a respective pivot axis (s) located transversely relative to the primary shaping direction (z) are hinged to the ram (10), whereby a main surface defined by the free end edges (19) of the lateral walls (18) can be adjusted. In order to carry out a pivoting motion, the lateral walls (18) are seated in a non-positively sliding manner against wedge elements (28) by means of pretensioned spring elements (22, 24), the wedge elements being displaceable in the primary shaping direction (z).

    SYSTEM AND METHOD FOR CONFIDENTIAL REMOTE COMPUTING
    70.
    发明申请
    SYSTEM AND METHOD FOR CONFIDENTIAL REMOTE COMPUTING 审中-公开
    用于机密远程计算的系统和方法

    公开(公告)号:US20150264024A1

    公开(公告)日:2015-09-17

    申请号:US14214936

    申请日:2014-03-15

    申请人: Alexander Frank

    发明人: Alexander Frank

    IPC分类号: H04L29/06

    摘要: A system, method, device and protocols are disclosed. Each and combined they protect computation and data hosted on remote computing resources from first party attacks.First party attacks refer to attacks that are launched by agents (employees, contractors, etc.) of the hosting facility. Such attacks can be launched by the first patty agents, or some other adversary exploiting the privileges of the first party agent.This invention allows customers to submit workloads to a remote computing facility, e.g. a datacenter or cloud computing, with the assurance that the administrators of the remote computers cannot access the workload computation and data.The invention scales effectively from a single compute-server device to a whole datacenter with numerous compute-servers. It interoperates and may utilize VMM and VM deployment architectures. The invention allows varying degrees of datacenter operations access to the workload ranging from virtually none in the most strict case, to limited access to enable monitoring and maintenance of the workload.This invention can be applied to existing cloud computing and other datacenters with off the self computing components. Further it can be applied to existing computing resource commonly in use in such facilities. Further, the invention is applicable to a wide variety of settings including single computers, computer labs, datacenters and public and private cloud computing services.

    摘要翻译: 公开了一种系统,方法,设备和协议。 每个组合它们保护远程计算资源上托管的计算和数据免受第一方攻击。 第一方攻击是指托管设施的代理(员工,承包商等)发起的攻击。 这种攻击可以由第一代理代理人或利用第一方代理人的特权的其他对手发起。 本发明允许客户将工作负载提交给远程计算设备,例如, 数据中心或云计算,确保远程计算机的管理员无法访问工作负载计算和数据。 本发明有效地从单个计算服务器设备扩展到具有许多计算服务器的整个数据中心。 它可以互操作并且可以利用VMM和VM部署架构。 本发明允许不同程度的数据中心操作访问工作负载,在最严格的情况下几乎不存在,到有限的访问以允许监视和维护工作负载。 本发明可以应用于现有的云计算和其他数据中心,而不考虑自身计算组件。 此外,它可以应用于通常在这样的设施中使用的现有计算资源。 此外,本发明可应用于各种设置,包括单个计算机,计算机实验室,数据中心以及公共和私有云计算服务。