CONTROLLING ACCESS TO PROTECTED DIGITAL CONTENT
    1.
    发明申请
    CONTROLLING ACCESS TO PROTECTED DIGITAL CONTENT 审中-公开
    控制访问受保护的数字内容

    公开(公告)号:WO02069070A3

    公开(公告)日:2003-08-14

    申请号:PCT/GB0200727

    申请日:2002-02-20

    Applicant: IBM IBM UK

    Abstract: The present invention provides a technique for preventing an illegal use of contents by users when an expiration date is established for the use of the contents. Contents or contents execution programs have information indicative of an expiration date or time. The expiration date information is embedded into, for example, external files, contents or contents execution programs. The expiration date information could be a start of use time, an end of use time, and a last time of use, which are used as authentication data to conduct authentication when making use of the contents (e.g., when executing the contents execution program). The technique for authentication is that two requirements should be satisfied when using the contents, including (1) that the current date acquired from the system timer is between the start of use time and the end of use time (expiration date); and (2) the current time is after the last time of use (last date of access).

    Abstract translation: 本发明提供了一种当为使用内容而建立失效日期时防止用户非法使用内容的技术。 内容或内容执行程序具有指示有效期限或时间的信息。 到期日期信息嵌入到例如外部文件,内容或内容执行程序中。 过期日期信息可以是使用时间的使用时间的开始,使用时间的结束和最后的使用时间,这些使用时间用作认证数据以在使用内容时进行认证(例如,当执行内容执行程序时) 。 验证技术是在使用内容时应满足两个要求,其中包括:(1)从系统定时器获取的当前日期在使用开始时间与使用时间结束(有效期)之间; 和(2)当前时间是在最后一次使用之后(最后访问日期)。

    2.
    发明专利
    未知

    公开(公告)号:AT280408T

    公开(公告)日:2004-11-15

    申请号:AT02700442

    申请日:2002-02-20

    Applicant: IBM

    Abstract: The present invention provides for deterring and/or preventing an illegal use of contents by users when an expiration date is established for the use of the contents. Contents or contents execution programs have information indicative of an expiration date. In an example, expiration date information is embedded into external files, contents or contents execution programs. The expiration date information could be a start, end or last date of use, which is used as authentication data to conduct authentication when making use of the contents. An example embodiment has two requirements satisfied when using the contents in order to execute the execution program, including (1) the current date acquired from the system timer is between the start date of use and the end date of use (expiration date); and (2) the current date is posterior to the last date of use (last date of access).

    3.
    发明专利
    未知

    公开(公告)号:DE60201662D1

    公开(公告)日:2004-11-25

    申请号:DE60201662

    申请日:2002-02-20

    Applicant: IBM

    Abstract: The present invention provides for deterring and/or preventing an illegal use of contents by users when an expiration date is established for the use of the contents. Contents or contents execution programs have information indicative of an expiration date. In an example, expiration date information is embedded into external files, contents or contents execution programs. The expiration date information could be a start, end or last date of use, which is used as authentication data to conduct authentication when making use of the contents. An example embodiment has two requirements satisfied when using the contents in order to execute the execution program, including (1) the current date acquired from the system timer is between the start date of use and the end date of use (expiration date); and (2) the current date is posterior to the last date of use (last date of access).

    4.
    发明专利
    未知

    公开(公告)号:DE60201662T2

    公开(公告)日:2005-10-13

    申请号:DE60201662

    申请日:2002-02-20

    Applicant: IBM

    Abstract: The present invention provides for deterring and/or preventing an illegal use of contents by users when an expiration date is established for the use of the contents. Contents or contents execution programs have information indicative of an expiration date. In an example, expiration date information is embedded into external files, contents or contents execution programs. The expiration date information could be a start, end or last date of use, which is used as authentication data to conduct authentication when making use of the contents. An example embodiment has two requirements satisfied when using the contents in order to execute the execution program, including (1) the current date acquired from the system timer is between the start date of use and the end date of use (expiration date); and (2) the current date is posterior to the last date of use (last date of access).

    Controlling access to protected digital content

    公开(公告)号:AU2002233515A1

    公开(公告)日:2002-09-12

    申请号:AU2002233515

    申请日:2002-02-20

    Applicant: IBM

    Abstract: The present invention provides for deterring and/or preventing an illegal use of contents by users when an expiration date is established for the use of the contents. Contents or contents execution programs have information indicative of an expiration date. In an example, expiration date information is embedded into external files, contents or contents execution programs. The expiration date information could be a start, end or last date of use, which is used as authentication data to conduct authentication when making use of the contents. An example embodiment has two requirements satisfied when using the contents in order to execute the execution program, including (1) the current date acquired from the system timer is between the start date of use and the end date of use (expiration date); and (2) the current date is posterior to the last date of use (last date of access).

    PICTURE PROCESSING METHOD AND PICTURE PROCESSOR

    公开(公告)号:JPH0668270A

    公开(公告)日:1994-03-11

    申请号:JP19200992

    申请日:1992-07-20

    Applicant: IBM

    Abstract: PURPOSE: To attain an automatic fill processing by counting the outlines of the plus and minus directions of a Y axis along an X axial direction, and assigning a closed block area in which a difference between the total number of the Y axial plus directions and that of the Y axial minus directions is turned 0 to an area not to be filled, and assigning an area in which that is not turned 0 to an area to be filled. CONSTITUTION: A CPU 10 checks the size relation of the Y axial coordinate values of two adjacent end point positions on a work memory 14, and decides the traveling direction of a segment connecting the two end point positions. When the segment moving from a first point to a second point is traveling to a Y axial minus direction, the relation that the Y axial coordinate value of the first point is more than the Y axial coordinate value of the second point is obtained, and when the segment is orthogonally crossing the Y axis, the two Y axial coordinate values are made equal. In this method, the traveling direction of the segment connecting each end point is analyzed, and data are divided into two kinds of data. That is, after graphic bit data and Y directional bit data are prepared, a fill picture is prepared on the exclusive area of the work memory 14.

    Information processor and information processing method, program, data structure and computer readable recording medium
    9.
    发明专利
    Information processor and information processing method, program, data structure and computer readable recording medium 有权
    信息处理器和信息处理方法,程序,数据结构和计算机可读记录介质

    公开(公告)号:JP2004227434A

    公开(公告)日:2004-08-12

    申请号:JP2003016843

    申请日:2003-01-27

    CPC classification number: G06F17/30949 H04L29/12839 H04L61/6022

    Abstract: PROBLEM TO BE SOLVED: To much more efficiently achieve data registration in a data table and data retrieval from the data table.
    SOLUTION: Data registration in a data table (3) in which the first item data are registered with the corresponding second item data and data retrieval from the data table is executed by using a first pointer table (1) in which a pointer to a portion of registered data in the data table is registered at a storage position shown by a hash value obtained by applying a first hash function (6) to the first item data of the registered data and a second pointer table (2) in which the pointer is registered at a storage position shown by a hash value obtained by applying a second hash function (22) to the first item data of the registered data.
    COPYRIGHT: (C)2004,JPO&NCIPI

    Abstract translation: 要解决的问题:更有效地实现数据表中的数据注册和数据表中的数据检索。 解决方案:通过使用第一指针表(1)来执行数据表(3)中数据表(3)中的数据表,其中第一项数据与对应的第二项数据进行登记,并从数据表中进行数据检索,其中指针 将数据表中的登记数据的一部分登记在通过将第一散列函数(6)应用于登记数据的第一项目数据而获得的哈希值所示的存储位置,以及第二指针表(2) 指针被登记在通过将第二散列函数(22)应用于登记数据的第一项目数据而获得的哈希值所示的存储位置。 版权所有(C)2004,JPO&NCIPI

Patent Agency Ranking