Abstract:
The present invention is directed to a method of deterring the illicit copying of electronically published documents. It includes utilizing a computer system to electronically publish a plurality of copies of a document having electronically created material thereon for distribution to a plurality of subscribers and operating programming within the computer system so as to perform the identification code functions. The steps are to encode the plurality of copies each with a separate, unique identification code, the identification code being based on a unique arrangement of the electronically created material on each such copy; and, creating a codebook to correlate each such identification code to a particular subscriber. In some embodiments, decoding methods are included with the encoding capabilities. The unique arrangement of the electronically created material may be based on line-shift coding, word-shift coding, or feature enhancement coding (or combinations of these) and may be effected through bitmap alteration of document format file alteration.
Abstract:
A methodology for allocation of transmission capacity in communications networks is provided wherein a collection of constant rate channels is implemented between end points in the network. In that methodology, periodic sources are assigned channels of bandwidth corresponding to the transmission rate for each such source, and bursty sources are assigned to channels providing bandwidth corresponding to a minimum service guarantee for each such bursty source. Channel capacity assigned to periodic services which is not needed by such sources is then made available to bursty sources for accommodating capacity requirements of such bursty sources over and above the minimum service guarantee.
Abstract:
A potential transmission-access failing in the IEEE 802.6 protocol is remedied by the use of terminals that sense the activity level on the interconnecting communications lines. In response to conditions that may give rise to such a failing, each terminal throttles its own transmission rate to improve the transmission capacity allocation of the protocol. In one embodiment, the terminal that transmits over more than half of the slots in the round trip delay simply throttles itself to one half the slots when it detects that another is transmitting or is wishing to transmit. In another embodiment, even a terminal that is transmitting over fewer than half the slots in the round trip delay determines the number of unoccupied slots and throttles itself to transmit over not more than half of the number of available slots. In still another embodiment, a terminal wishing to transmit many packets casts a number of reservation bits onto the transmission channel to insure for itself some transmission capacity. The number of reservation bits sent is equal to a fraction of the available slots. In yet another embodiment, each terminal throttles itself to take no more than a specified fraction of the remaining transmission capacity.
Abstract:
Techniques for performing credit-card transactions without disclosing the subject matter of the transaction to the institution providing the credit card. The techniques include the use of a communications exchange so that information and funds may be transferred without the destination for the transfer knowing the source of the information or funds and the use of public key encryption so that each party to the transaction and the communications exchange can read only the information the party or the exchange needs for its role in the transaction. Also disclosed are techniques for authenticating a card holder by receiving personal information from the card holder, using the information to ask the card holder one or more questions, and using the answers to authenticate the card holder.
Abstract:
Techniques for performing credit-card transactions without disclosing the subject matter of the transaction to the institution providing the credit card. The techniques include the use of a communications exchange so that information and funds may be transferred without the destination for the transfer knowing the source of the information or funds and the use of public key encryption so that each party to the transaction and the communications exchange can read only the information the party or the exchange needs for its role in the transaction. Also disclosed are techniques for authenticating a card holder by receiving personal information from the card holder, using the information to ask the card holder one or more questions, and using the answers to authenticate the card holder.
Abstract:
The present invention is directed to a method of deterring the illicit copying of electronically published documents. It includes utilizing a computer system to electronically publish a plurality of copies of a document having electronically created material thereon for distribution to a plurality of subscribers and operating programming within the computer system so as to perform the identification code functions. The steps are to encode the plurality of copies each with a separate, unique identification code, the identification code being based on a unique arrangement of the electronically created material on each such copy; and, creating a codebook to correlate each such identification code to a particular subscriber. In some embodiments, decoding methods are included with the encoding capabilities. The unique arrangement of the electronically created material may be based on line-shift coding, word-shift coding, or feature enhancement coding (or combinations of these) and may be effected through bitmap alteration of document format file alteration.
Abstract:
Bandwidth balancing is accomplisbed in DQDB networks that handle multi-priority traffic by causing each node to throttle its own rate of transmission in accordance with the priority of the data that the node transmits. In accordance with one approach, each node limits (24,37) its throughput to the product of a bandwidth balancing factor (which is a fraction that varies according to the priority level of data) and the unused bus capacity. When parcels of different priorities are received within each node, the parcels are processed in priority order. In accordance with another approach, all active parcels within a node are handled concurrently and receive some bandwidth. The throughput of each parcel in a node is limited to the product of the bandwidth balancing factor and the unused bus capacity. In accordance with still another approach, each traffic parcel limits its throughput to the product of the bandwidth balancing factor and the bus capacity unused by parcels of equal or higher priority. This scheme allocates bandwidth first to the higher-priority parcels, then allocates the leftovers to the lower-priority parcels. Lower-priority parcels have no effect on The steady-state throughputs of higher-priority parcels.
Abstract:
Bandwidth balancing is accomplisbed in DQDB networks that handle multi-priority traffic by causing each node to throttle its own rate of transmission in accordance with the priority of the data that the node transmits. In accordance with one approach, each node limits (24,37) its throughput to the product of a bandwidth balancing factor (which is a fraction that varies according to the priority level of data) and the unused bus capacity. When parcels of different priorities are received within each node, the parcels are processed in priority order. In accordance with another approach, all active parcels within a node are handled concurrently and receive some bandwidth. The throughput of each parcel in a node is limited to the product of the bandwidth balancing factor and the unused bus capacity. In accordance with still another approach, each traffic parcel limits its throughput to the product of the bandwidth balancing factor and the bus capacity unused by parcels of equal or higher priority. This scheme allocates bandwidth first to the higher-priority parcels, then allocates the leftovers to the lower-priority parcels. Lower-priority parcels have no effect on The steady-state throughputs of higher-priority parcels.