System and method for authorized digital content distribution
    1.
    发明授权
    System and method for authorized digital content distribution 有权
    授权数字内容分发的系统和方法

    公开(公告)号:US09077691B2

    公开(公告)日:2015-07-07

    申请号:US11341172

    申请日:2006-01-26

    摘要: A digital content distribution system uses a Digital Rights Management Controller that performs a set of arbitrary tests against the transfer request from one user to another such as user A to user B. Assuming these tests are successful, the DRM sends an encryption key to transferring user A. This encryption key E is taken from a table of encryption key/hash pairs which have been provided to the DRM Controller by an external authority such as the content rights holder. User A encrypts the content using they key provided by the DRM controller and then optionally calculates a hash over the encrypted form of the content E(X) and returns this value to the DRM Controller. On checking the returned hash against the hash from the table the DRM controller knows that user A does indeed have the digital content X in good condition. The DRM Controller then instructs both users A and B that the transfer may proceed. The encrypted form of the content E(X) is transferred from A to B. Once the content transfer has completed B ensures that the received content has been physically written to non-volatile storage (to account for crashes etc. during the next step). B then calculates a hash over the received content and returns this value to the DRM Controller. If this value matches the value previously given then the transfer has been successful and the DRM Controller updates whatever central records are appropriate, while also returning a decrypt key to B to allow it to decrypt the content.

    摘要翻译: 数字内容分发系统使用数字权限管理控制器,该数字权限管理控制器针对来自一个用户到另一用户(例如用户A)到另一个用户B的传送请求执行一组任意测试。假设这些测试成功,DRM向传送用户发送加密密钥 A.该加密密钥E取自已经由诸如内容版权所有者的外部机构提供给DRM控制器的加密密钥/散列对的表。 用户A使用由DRM控制器提供的密钥加密内容,然后可选地计算内容E(X)的加密形式的散列,并将该值返回给DRM控制器。 在从表中检测相对于散列的返回哈希时,DRM控制器知道用户A确实具有良好状态的数字内容X. 然后DRM控制器向用户A和B指示传送可以进行。 内容E(X)的加密形式从A传送到B.一旦内容传送完成B确保接收到的内容已被物理地写入非易失性存储器(以在下一步骤中解决崩溃等) 。 B然后计算接收的内容上的散列,并将该值返回给DRM控制器。 如果此值与先前给出的值相匹配,则传输已成功,并且DRM控制器更新任何中央记录是适当的,同时还将解密密钥返回到B以允许其解密内容。

    Demand-driven prioritized data structure
    2.
    发明授权
    Demand-driven prioritized data structure 有权
    需求驱动的优先数据结构

    公开(公告)号:US08908530B2

    公开(公告)日:2014-12-09

    申请号:US12855359

    申请日:2010-08-12

    摘要: A system and method for optimizing the efficiency of data sharing among a set of radio nodes in a radio environment is provided. The technique includes identifying a data unit and assigning it a class, identifying a connectivity type, computing a significance factor based on connectivity type and assigned class, mapping the significance factor to a priority factor, and scheduling output of the data unit based on the priority factor. A scheduler algorithm can be used for scheduling output. The class can be assigned based on which nodes of the set of radio nodes possess copies of the data unit at a given time. An arbitration process can be used to determine the priority factor. A significance factor weighting algorithm, based on how many nodes will be receiving the data and on how much a node needs the data, can be used to determine the significance factor.

    摘要翻译: 提供了一种在无线电环境中优化一组无线电节点之间的数据共享效率的系统和方法。 该技术包括识别数据单元并为其分配类别,识别连接类型,基于连接类型和分配类计算有效因子,将有效因子映射到优先级因子,以及基于优先级调度数据单元的输出 因子。 调度算法可用于调度输出。 可以根据给定时间的无线电节点集合中哪些节点拥有数据单元的副本来分配该类。 可以使用仲裁过程来确定优先级因素。 基于有多少个节点将接收数据以及节点需要多少数据的重要因素加权算法可用于确定有效因子。

    Method and apparatus to conduct a commercial transaction over wireless networks
    3.
    发明授权
    Method and apparatus to conduct a commercial transaction over wireless networks 有权
    通过无线网络进行商业交易的方法和装置

    公开(公告)号:US08645282B2

    公开(公告)日:2014-02-04

    申请号:US11434633

    申请日:2006-05-16

    IPC分类号: G06Q10/00 G06Q20/00

    摘要: A Secure Virtual Point of Service (SVPOS) that coordinates the authentication, authorization, and identity, settlement, arbitration and non-repudiation for an electronic commercial transaction. For each commercial transaction, both the buyer and merchant authenticate itself to the SVPOS and create two unique transaction encryption keys, one for the buyer and one for the merchant. The merchant uses both encryption keys to encrypt a package that include at least product identification. The merchant and buyer calculate a hash of the package and transmit the calculated hash to the SVPOS for comparison to prevent repudiation. If the calculated hash is identical the buyer receives the merchants encryption key and decrypts the package. Payment is released by the SVPOS if the buyer is satisfied with the package via a Parlay system. If the buyer is not satisfied, said SVPOS performs arbitration between the buyer and merchant to determine if the package is correct.

    摘要翻译: 一个安全的虚拟服务点(SVPOS),用于协调电子商业交易的认证,授权和身份,结算,仲裁和不可否认性。 对于每个商业交易,买方和商家都向SVPOS进行身份验证,并创建两个独特的交易加密密钥,一个用于买方,一个用于商家。 商家使用两个加密密钥对至少包括产品标识的包进行加密。 商家和买方计算包的散列,并将计算出的散列传送到SVPOS进行比较以防止否认。 如果计算的散列是相同的,买方将收到商家加密密钥并解密该包。 如果买方通过Parlay系统对包裹感到满意,SVPOS将发放付款。 如果买方不满意,SVPOS将在买方和商家之间进行仲裁,以确定包裹是否正确。

    Method and system for using communication devices for retrieving personal medical data
    4.
    发明授权
    Method and system for using communication devices for retrieving personal medical data 有权
    使用通信设备检索个人医疗数据的方法和系统

    公开(公告)号:US08615214B2

    公开(公告)日:2013-12-24

    申请号:US12187156

    申请日:2008-08-06

    IPC分类号: H04M11/04 H04W4/00

    CPC分类号: G16H10/65 G06F19/00

    摘要: The present invention discloses a method, system and a program storage device for remotely accessing medically relevant data stored on a server and provides remote access over a cellular or PCS communications network employing either a SMS or MMS communication protocol allowing dissemination of an individual's medically relevant data in an emergency, wherein the server authenticates each accessing PCS device by determining whether said accessing PCS device ID is stored in an emergency medical profile database and sending the user inputted emergency related personal data if the accessing PCS device ID is found in the emergency medical database device.

    摘要翻译: 本发明公开了一种用于远程访问存储在服务器上的医疗相关数据的方法,系统和程序存储设备,并通过使用SMS或MMS通信协议的蜂窝或PCS通信网络提供远程访问,允许传播个人的医学相关数据 在紧急情况下,如果在紧急医疗数据库中存在访问PCS设备ID,则服务器通过确定所述访问PCS设备ID是否存储在紧急医疗简档数据库中并发送用户输入的紧急相关个人数据来认证每个访问PCS设备 设备。

    Virus localization using cryptographic hashing

    公开(公告)号:US08572743B2

    公开(公告)日:2013-10-29

    申请号:US13408728

    申请日:2012-02-29

    IPC分类号: H04L29/14

    CPC分类号: H04L9/3239 G06F21/565

    摘要: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.

    Method and system for policy enabled programming

    公开(公告)号:US08448159B2

    公开(公告)日:2013-05-21

    申请号:US11982675

    申请日:2007-11-02

    IPC分类号: G06F9/44 H04M3/42

    CPC分类号: G06F11/3644 G06F8/656

    摘要: A system and method for allowing external execution-time adaptation of application behavior of an application in a telecommunication system without modification to the application code comprises an application having at least one break point and residing on an application server, at least one identifiable decision engine, and a listing of break points that has for each break point at least one identifier of the decision engine, such that at one of the break points, the application accesses the listing of break points, invokes the listed instances of the decision engine corresponding to the break point, and adapts application behavior based on the decision engine. In addition, each entry in the listing of break points can have a sequence number so that if two entries for the same break point have equal sequence numbers, the decision engines identified in these entries can be invoked in parallel.

    Methods and apparatus for implementing model-based software solution development and integrated change management
    7.
    发明授权
    Methods and apparatus for implementing model-based software solution development and integrated change management 有权
    实施基于模型的软件解决方案开发和综合变更管理的方法和设备

    公开(公告)号:US08392873B2

    公开(公告)日:2013-03-05

    申请号:US11329541

    申请日:2006-01-11

    IPC分类号: G06F9/44

    CPC分类号: G06F8/36 G06F8/20 G06F8/30

    摘要: The present invention concerns methods and apparatus for implementing a model-based paradigm for use in developing systems of software solutions. In a method of the present invention, a developer defines templates for use in creating software architecture elements which comprise a software solution or a system of software solutions. The template definitions comprise specifications of template attributes. The developer specifies relationships and dependencies among the templates using a computer programmed to receive the template definitions.

    摘要翻译: 本发明涉及用于实现用于开发软件解决方案系统的基于模型的范式的方法和装置。 在本发明的方法中,开发人员定义用于创建包括软件解决方案或软件解决方案系统的软件架构元素的模板。 模板定义包括模板属性的规范。 开发人员使用编程为接收模板定义的计算机指定模板之间的关系和依赖关系。

    Automated policy generation for mobile communication networks
    8.
    发明授权
    Automated policy generation for mobile communication networks 有权
    移动通信网络的自动策略生成

    公开(公告)号:US08724508B2

    公开(公告)日:2014-05-13

    申请号:US13219222

    申请日:2011-08-26

    IPC分类号: H04W16/00

    摘要: A solution to the problem of automated policy generation for mobile ad hoc networks includes an optimization-based, utility-driven approach aimed at generating optimal policies with respect to the given network objectives. The combination of optimization heuristics and network simulation is used to solve the problem. Specifically, the problem of automated generation of network management policies based on available network plans and related information is solved by converting the policy generation into the following optimization problem: given network information and objectives as input, generate optimal policies as output. The optimization process is guided by a utility function based on performance evaluation criteria reflecting the network objectives.

    摘要翻译: 针对移动自组织网络的自动化策略生成问题的解决方案包括基于优化的实用程序驱动方法,旨在针对给定的网络目标生成最佳策略。 利用优化启发式和网络仿真的结合来解决问题。 具体来说,通过将策略生成转换为以下优化问题来解决基于可用网络规划和相关信息自动生成网络管理策略的问题:给定网络信息和目标作为输入,生成最优策略作为输出。 优化过程由基于反映网络目标的绩效评估标准的效用函数指导。

    Successive interference cancellation
    9.
    发明授权
    Successive interference cancellation 有权
    连续干扰消除

    公开(公告)号:US08670418B2

    公开(公告)日:2014-03-11

    申请号:US13365757

    申请日:2012-02-03

    IPC分类号: H04B7/216

    摘要: Methods and systems in a wireless receiver for enabling the reception of input signals at varied power levels in the presence of co-channel interference utilizing combinations of space-time adaptive processing, interference cancellation multi-user detection, and combined techniques. In multi-user detection, code, timing, and possibly channel information of multiple users are jointly used to better detect each individual user. The novel combination of adaptive signal reconstruction techniques with interference cancellation techniques provides accurate temporal cancellation of interference with minimal interference residuals.

    摘要翻译: 无线接收机中的方法和系统,其利用空时自适应处理,干扰消除多用户检测和组合技术的组合,在存在同信道干扰的情况下,能够以不同的功率电平接收输入信号。 在多用户检测中,共同使用多个用户的代码,定时和可能的信道信息来更好地检测每个用户。 具有干扰消除技术的自适应信号重建技术的新颖组合提供了具有最小干扰残差的干扰的精确时间消除。

    Virus Localization Using Cryptographic Hashing

    公开(公告)号:US20120167223A1

    公开(公告)日:2012-06-28

    申请号:US13408690

    申请日:2012-02-29

    IPC分类号: G06F21/00

    CPC分类号: H04L9/3239 G06F21/565

    摘要: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.