Document copying deterrent method
    2.
    发明公开
    Document copying deterrent method 失效
    Dokumentkopierabwehrverfahren。

    公开(公告)号:EP0660275A3

    公开(公告)日:1996-12-27

    申请号:EP94308916.9

    申请日:1994-12-01

    Applicant: AT&T Corp.

    Abstract: The present invention is directed to a method of deterring the illicit copying of electronically published documents. It includes utilizing a computer system to electronically publish a plurality of copies of a document having electronically created material thereon for distribution to a plurality of subscribers and operating programming within the computer system so as to perform the identification code functions. The steps are to encode the plurality of copies each with a separate, unique identification code, the identification code being based on a unique arrangement of the electronically created material on each such copy; and, creating a codebook to correlate each such identification code to a particular subscriber. In some embodiments, decoding methods are included with the encoding capabilities. The unique arrangement of the electronically created material may be based on line-shift coding, word-shift coding, or feature enhancement coding (or combinations of these) and may be effected through bitmap alteration of document format file alteration.

    Abstract translation: 本发明涉及一种阻止非法复制电子出版文件的方法。 它包括利用计算机系统电子地发布其上具有电子创建材料的文档的多个副本,以分发给多个用户并在计算机系统内操作编程以执行识别码功能。 步骤是以单独的独特的识别码对多个副本进行编码,识别码基于每个这样的副本上的电子创建的材料的独特布置; 并且创建码本以将每个这样的识别码与特定用户相关联。 在一些实施例中,编码能力包括解码方法。 电子创建材料的独特布置可以基于行移码编码,字移码编码或特征增强编码(或这些的组合),并且可以通过文档格式文件改变的位图改变来实现。

    System and method for capacity management in multi-service networks
    3.
    发明公开
    System and method for capacity management in multi-service networks 失效
    系统和方法的带宽管理与多重服务网络

    公开(公告)号:EP0782299A3

    公开(公告)日:1999-09-15

    申请号:EP96120795.8

    申请日:1996-12-23

    Applicant: AT&T Corp.

    Abstract: A methodology for allocation of transmission capacity in communications networks is provided wherein a collection of constant rate channels is implemented between end points in the network. In that methodology, periodic sources are assigned channels of bandwidth corresponding to the transmission rate for each such source, and bursty sources are assigned to channels providing bandwidth corresponding to a minimum service guarantee for each such bursty source. Channel capacity assigned to periodic services which is not needed by such sources is then made available to bursty sources for accommodating capacity requirements of such bursty sources over and above the minimum service guarantee.

    An improved communications system
    4.
    发明公开
    An improved communications system 失效
    改进的通信系统

    公开(公告)号:EP0410636A3

    公开(公告)日:1992-12-02

    申请号:EP90307849.1

    申请日:1990-07-18

    Applicant: AT&T Corp.

    CPC classification number: H04L12/2852

    Abstract: A potential transmission-access failing in the IEEE 802.6 protocol is remedied by the use of terminals that sense the activity level on the interconnecting communications lines. In response to conditions that may give rise to such a failing, each terminal throttles its own transmission rate to improve the transmission capacity allocation of the protocol. In one embodiment, the terminal that transmits over more than half of the slots in the round trip delay simply throttles itself to one half the slots when it detects that another is transmitting or is wishing to transmit. In another embodiment, even a terminal that is transmitting over fewer than half the slots in the round trip delay determines the number of unoccupied slots and throttles itself to transmit over not more than half of the number of available slots. In still another embodiment, a terminal wishing to transmit many packets casts a number of reservation bits onto the transmission channel to insure for itself some transmission capacity. The number of reservation bits sent is equal to a fraction of the available slots. In yet another embodiment, each terminal throttles itself to take no more than a specified fraction of the remaining transmission capacity.

    Anonymous credit card transactions
    6.
    发明公开
    Anonymous credit card transactions 失效
    匿名Kreditkartentransaktionen。

    公开(公告)号:EP0662673A3

    公开(公告)日:1996-06-26

    申请号:EP94309342.7

    申请日:1994-12-14

    Applicant: AT&T Corp.

    CPC classification number: G06Q20/02 G06Q20/04 G06Q20/085 G06Q20/383 G07F7/1016

    Abstract: Techniques for performing credit-card transactions without disclosing the subject matter of the transaction to the institution providing the credit card. The techniques include the use of a communications exchange so that information and funds may be transferred without the destination for the transfer knowing the source of the information or funds and the use of public key encryption so that each party to the transaction and the communications exchange can read only the information the party or the exchange needs for its role in the transaction. Also disclosed are techniques for authenticating a card holder by receiving personal information from the card holder, using the information to ask the card holder one or more questions, and using the answers to authenticate the card holder.

    Anonymous credit card transactions
    7.
    发明公开
    Anonymous credit card transactions 失效
    匿名信用卡交易。

    公开(公告)号:EP0662673A2

    公开(公告)日:1995-07-12

    申请号:EP94309342.7

    申请日:1994-12-14

    Applicant: AT&T Corp.

    CPC classification number: G06Q20/02 G06Q20/04 G06Q20/085 G06Q20/383 G07F7/1016

    Abstract: Techniques for performing credit-card transactions without disclosing the subject matter of the transaction to the institution providing the credit card. The techniques include the use of a communications exchange so that information and funds may be transferred without the destination for the transfer knowing the source of the information or funds and the use of public key encryption so that each party to the transaction and the communications exchange can read only the information the party or the exchange needs for its role in the transaction. Also disclosed are techniques for authenticating a card holder by receiving personal information from the card holder, using the information to ask the card holder one or more questions, and using the answers to authenticate the card holder.

    Document copying deterrent method
    8.
    发明公开
    Document copying deterrent method 失效
    文件复制防御程序。

    公开(公告)号:EP0660275A2

    公开(公告)日:1995-06-28

    申请号:EP94308916.9

    申请日:1994-12-01

    Applicant: AT&T Corp.

    Abstract: The present invention is directed to a method of deterring the illicit copying of electronically published documents. It includes utilizing a computer system to electronically publish a plurality of copies of a document having electronically created material thereon for distribution to a plurality of subscribers and operating programming within the computer system so as to perform the identification code functions. The steps are to encode the plurality of copies each with a separate, unique identification code, the identification code being based on a unique arrangement of the electronically created material on each such copy; and, creating a codebook to correlate each such identification code to a particular subscriber. In some embodiments, decoding methods are included with the encoding capabilities. The unique arrangement of the electronically created material may be based on line-shift coding, word-shift coding, or feature enhancement coding (or combinations of these) and may be effected through bitmap alteration of document format file alteration.

    Fair access of multi-priority traffic to distributed-queue dual-bus networks
    9.
    发明公开
    Fair access of multi-priority traffic to distributed-queue dual-bus networks 失效
    公共交通多功能交通分配二线路双总线网络

    公开(公告)号:EP0478190A3

    公开(公告)日:1994-07-13

    申请号:EP91308393.7

    申请日:1991-09-13

    Applicant: AT&T Corp.

    CPC classification number: H04L12/2852

    Abstract: Bandwidth balancing is accomplisbed in DQDB networks that handle multi-priority traffic by causing each node to throttle its own rate of transmission in accordance with the priority of the data that the node transmits. In accordance with one approach, each node limits (24,37) its throughput to the product of a bandwidth balancing factor (which is a fraction that varies according to the priority level of data) and the unused bus capacity. When parcels of different priorities are received within each node, the parcels are processed in priority order. In accordance with another approach, all active parcels within a node are handled concurrently and receive some bandwidth. The throughput of each parcel in a node is limited to the product of the bandwidth balancing factor and the unused bus capacity. In accordance with still another approach, each traffic parcel limits its throughput to the product of the bandwidth balancing factor and the bus capacity unused by parcels of equal or higher priority. This scheme allocates bandwidth first to the higher-priority parcels, then allocates the leftovers to the lower-priority parcels. Lower-priority parcels have no effect on The steady-state throughputs of higher-priority parcels.

    Fair access of multi-priority traffic to distributed-queue dual-bus networks
    10.
    发明公开
    Fair access of multi-priority traffic to distributed-queue dual-bus networks 失效
    在由两条总线和分布式Wortenschlauge的网络中的各种优先级队列的公平性。

    公开(公告)号:EP0478190A2

    公开(公告)日:1992-04-01

    申请号:EP91308393.7

    申请日:1991-09-13

    Applicant: AT&T Corp.

    CPC classification number: H04L12/2852

    Abstract: Bandwidth balancing is accomplisbed in DQDB networks that handle multi-priority traffic by causing each node to throttle its own rate of transmission in accordance with the priority of the data that the node transmits. In accordance with one approach, each node limits (24,37) its throughput to the product of a bandwidth balancing factor (which is a fraction that varies according to the priority level of data) and the unused bus capacity. When parcels of different priorities are received within each node, the parcels are processed in priority order. In accordance with another approach, all active parcels within a node are handled concurrently and receive some bandwidth. The throughput of each parcel in a node is limited to the product of the bandwidth balancing factor and the unused bus capacity. In accordance with still another approach, each traffic parcel limits its throughput to the product of the bandwidth balancing factor and the bus capacity unused by parcels of equal or higher priority. This scheme allocates bandwidth first to the higher-priority parcels, then allocates the leftovers to the lower-priority parcels. Lower-priority parcels have no effect on The steady-state throughputs of higher-priority parcels.

    Abstract translation: 带宽平衡在DQDB网络accomplisbed没有通过使每个节点扼杀自己的传输速率在雅舞蹈与数据的优先级做了节点发送处理多优先级业务。 与一种方法雅舞蹈,每个节点限制(24,37)其可以通过到一个带宽平衡因子的乘积(所有这些是一小部分没有变化中雅丁到数据的优先级)和未使用的容量总线。 当不同的优先级的包裹都每个节点内接收,该包裹按照优先级顺序进行处理。 在另一途径雅舞,一个节点内的所有活动的包裹都同时处理,并获得一定的带宽。 在一个节点中的每个包裹的吞吐量限制为带宽平衡因子的乘积和未使用的容量总线。 安静的另一途径雅舞,每一个交通包裹限制了它的吞吐量,带宽均衡因子的乘积和总线容量相等或更高优先级的包裹未使用。 该方案首先对优先级较高的包裹分配带宽,然后分配剩饭低优先级的包裹。 低优先级的包裹有更高优先级的包裹的稳态吞吐量没有影响。

Patent Agency Ranking