RussianPatents.com
|
Import control of content. RU patent 2324301. |
|
FIELD: information management systems. SUBSTANCE: method for controlling import of content into a domain comprising number of devices consists in checking for the presence of a domain watermark in the content, and if the domain watermark is found in the content, refusing import of the content into the domain, and if the domain watermark is not found in the content, allowing import of the content into the domain and causing the domain watermark to be embedded into the content. Optionally, re-importing into the "original" domain might be allowed. The method further comprises refusing import of the content into the domain if the domain watermark is found in the content unless the identifier matches an identifier for the domain. Other payloads in the domain watermark can be used to e.g. implement location- or time-based restrictions on import. EFFECT: providing a method for discerning the input of legitimate unencrypted content from illegally copied unencrypted content. 14 cl, 3 dwg
|
Portable electronic device to verify input test sequence of characters on the basis of pre-defined character sequence / 2324292 Portable electronic device includes memory to store a secret code in the form of pre-defined character sequence; rotating device with touch surface providing for user tactile impact and installed in such a manner as to provide for rotation around its axis; feedback tools separated from the rotating device to provide for feedback to user when turning the rotating device; conversion tool to convert each turn in sequence of turns of the rotating device to a character of corresponding ordered test character sequence, and verification tool to verify the test character sequence by comparing it with pre-defined character sequence. |
Method for forming documents, which may be checked and which are protected from falsification, and money transfer center / 2323531 In accordance to the method, cryptographic module is provided with two types of data, which may be received even from a communication partner who is not cryptographically reliable, and which either remain in cryptographic module, or are connected to the document. The information, which remains in cryptographic module, is used to protect the information in the document by generation of a check value, and information which is transferred to document, is used to confirm the fact that the document is protected by a cryptographic module, during the check of document authenticity in a control device. |
Method for registration and activation of pki functions / 2323530 In accordance to the method, reference code and corresponding activation code are recorded in a table at protection server integrated in PKI or connected to PKI. The user inputs reference code or number in record form together with his personal data, after that the form is sent to PKI and to protection server. After registration is confirmed from the side of PKI, the confirmation information is transmitted to user and supplemented with a request to input activation code at user terminal. Simultaneously, the activation code associated with reference code in the table and identification data of smart-card of user are transmitted to activation module in PKI, then activation code together with identification data of smart-card is transmitted from terminal to activation module and on receipt thereof the activation module determines whether the data coincides with activation code and identification data, provided in advance by protection server, and in case they do, the module performs command of activation of PKI-component of smart-card. |
Methods for creation of system and architecture of protected media-channels / 2323473 The system for protecting visualized digital data contains a set of computing devices, where at least one of them is the main device, and at least another one is a remote computing device, where each one of aforementioned devices contains one or more processing components, configured for usage in data processing chain, consisting of components for processing protected information, subject to visualization for user, individual processing components which support one or more of such interfaces, such as authentication interface and intermediary authentication interface, where the intermediary authentication interface ensures reading of authentication identifiers and recording of authentication identifiers, and authentication identifier uses for each one of one or more lists for checking each component in each one of aforementioned one or more lists, to determine authorized components, where an authorized component may receive non-encrypted data. Methods describe operation of the system. |
Methods and device for providing authentication data of applications / 2322763 Methods provide authentication data of application for application, being executed on a device, where authentication data of application are used by application to perform authentication in a database server. In the methods, request is received for generation of authentication data of application, where a request includes automatic identifier of application, and also contains generation of authentication data of appropriate with usage of aforementioned identifier of application and standard authentication data, related to device. Devices realize actions of the method. |
Electronic billing system / 2320014 Method for conducting an online transaction includes providing a transaction manager. Single use transaction request identification is generated, transaction manager compares transaction request identification to banking information of registered user. Registered user is provided with transaction request identification, registered user requests purchase of product or service from a merchant, where purchase requests includes providing transaction request identification to the merchant. The merchant dispatches a request to transaction manager for payment by money transfer from user to merchant, where payment request includes identification of transaction request and cost; check by transaction manager of trustworthiness of transaction request identification; and, if transaction request information is trustworthy, request for electronic transfer of money is dispatched to financial institution to transfer a sum of money from user account to another account; it is checked, whether sufficient sum of money is available on banking account of user, and, if sufficient amount is available, the financial institution conducts the transfer according to banking information; and transaction manager receives confirmation about transaction from financial institution and dispatches a confirmation to the merchant. |
Protective infrastructure and method for peer name resolution protocol (pnrp) / 2320008 Methods are provided, which suppress capability of malicious node to disrupt normal operation of peer-to-peer network. Claimed methods allow nodes to use both protected and unprotected data about identity, ensuring self-check thereof. Then necessary or comfortable, association of ID is checked by "enclosing" a trustworthiness checking procedure into appropriate messages. Probability of connection to malicious node is initially reduced due to random selection of node with which connection is established. Also, information from malicious nodes is identified and may be discarded by recording information about previous connections, which will require a response in the future. |
Method and device meant for realizing protection control during electronic message exchange / 2316122 In accordance to the invention method contains stages at transmitting side, at which unambiguous message identifier is associated with message (IDMsg) and control identifier (IDCONTR) of identification code of message owner, which is received by applying encoding (12), connected to owner of transmitted message, to unambiguous message identifier (IDMsg). At receiving side method contains stages, at which fact of presence or absence of already received message with the same associated unambiguous message identifier (IDMsg) is checked and transmitted by means of signal, and match is determined between unambiguous message identifier (IDMsg), associated with received message, and result (IDDCONTR) of decoding of user name of control (IDCONTR). |
Device and method for providing notification about operation status of digital rights management / 2316121 In accordance to the invention, in home computer network, formed with presence of controlling devices and control station, device for notifying control station about operation state of digital rights management relatively to control device includes: DRM module, which executes digital rights management; module for generating status variables, which receives information about operation condition of DRM from DRM module, which indicates condition of current active DRM process, and on basis of received DRM status information generates DRM status variables; and module for universal detection and auto-adjustment of devices (uPnP), which, using uPnP protocol, transmits generated status variables to control station. |
Biometric authentication system / 2316120 In accordance to the invention, neither biometric template nor cryptographic user key are explicitly represented in information storage device, without provision of biometric sample and information storage device with a pack stored on it, any cryptographic operations with data are impossible. |
Method, system and devices for maintaining services of mobile communications ip protocol, version 6 / 2322766 In accordance to the invention, information related to MIPv6 is transmitted in through procedure via AAA infrastructure by means of preferably extended authentication protocol, where as the base for extended authentication protocol, EAP protocol is used with creation of EAP extensions by including additional informational data, related to MIPv6, with the EAP protocol stack, for example, EAP attributes on the level of EAP stack method of EAP protocol and information, transmitted in the group container attribute at EAP level or EAP method level. The main advantage of claimed MIPv6 authentication / authorization mechanism is its transparency for guest domain (20), which allows the AAA client (22) and AAAv server (24) to act simply as transit agents during execution of aforementioned procedure. |
Mpeg-table structure / 2321965 In accordance to the invention, transport data stream is claimed for transmission through a communication channel, receipt and processing by receiver-decoder, which contains a table which contains header (400) and informational part, featuring the informational part of the table having descriptors (406), corresponding to first cycle (408) of descriptors, and variable length cycle (410) with data elements (412), each one of which includes a data element identifier and cycle (414) of descriptors, containing descriptors (416) which are unique for given data element (412), where informational part of the table includes second header (404) and second informational part, and aforementioned second header (404) includes at least one of the following: information which concerns compression of given table; information which concerns encryption of given table; information which concerns priority; information which concerns the format of syntactical analysis; a filter expansion field. |
Method for signaling embedded data / 2321957 Method is claimed for providing a signal which represents main data, where main data include embedded data, while main data is provided with descriptor of main data for signaling content, included in main data, where the method contains stages: descriptor is generated for embedded data for signaling content included in embedded data, the descriptor of embedded data is provided outside the main data and the descriptor of main data. |
Method and device which ensure immediate beginning of 3g measurements in specialized mode in a cell with packet broadcasting control channel / 2320098 In accordance to the invention, mobile station includes radio frequency receiver-transmitter for communication with wireless communication network and a controller, responsible for receipt of information from wireless communication network for notification about 3G cells in case of operation in specialized GSM mode in a cell which has PBCCH. The controller is made with possible: notification about 3G cells until receiving a list of neighboring 3G cells from MEASUREMENT INFORMATION message, which includes a list of neighboring 3G cells, received in the PACKET SYSTEM INFORMATION message of 3quater type through PBCCH, and information element 3G_BA_IND, received in the PACKET SYSTEM INFORMATION message of 3quater type and notification about 3G cells, using MEASUREMENT NOTIFICATION message, which reflects the value of received information element 3G_BA_IND. |
Audio/video device, device and method for controlling an audio/video device / 2319309 device is claimed for controlling an AV device, which contains web-browser, which receives a structured document, which contains a scenario, from AV device, and provides the same to the user and first software module, including a function called by scenario, and transferring information concerning device control command to AV device through protocol, determined in advance by means of function, where AV device contains web-service module, which transmits the structured document, and second software module, which receives device control commands from first software module through protocol and controls the AV device in response to command information. |
System and method for switching a call from packet commutation network to channel commutation network / 2317647 In accordance to the invention, communication system includes first terminal, capable of realizing communications through packet commutation network and channel commutation network, and second terminal, capable of realizing communications through channel commutation network and a gate, which ensures: indication of connections between packet commutation network and at least one channel commutation network, maintenance of communication between first terminal and second terminal in such a way, that first terminal has packet commutation connection to the gate, and second terminal has channel commutation connection to the gate, where first terminal is capable of setting up a channel communication connection to a gate, when level of signal in packet commutation connection between first terminal and the gate remains below predetermined threshold for longer than predetermined time period, where gate ensures communication between channel commutation connection, set up between first terminal and the gate, and channel commutation connection, set up between the gate and second terminal in cases, when first terminal sets up a channel commutation connection to the gate. |
Method for transmitting packet data in communications system / 2316906 In accordance to the invention, transmission of a packet with full header or compressed header is determined in accordance with lower level report and preferably independently from any request from receiving device. The determining is preferably conducted at the level of packet data convergence protocol, and radio channel control level protocol level acts as lower level. In one example of realization, attachment of full header to a packet is launched on message of radio channel control level protocol level about error of transmission of previous packet. In another example of realization, one of triggers for attachment of full header to a packet is excluded on message of radio channel control level protocol level about successful transmission of previous packet with full header. Transmission of packets with full headers is preferably controlled on basis of lower level information through check connection channel. Aforementioned information defines whether the transmitted packet with full header was successfully received by receiving device. |
Method for storing pages in memory of mobile device (variants) and mobile device for realization of the method / 2316131 In accordance to the invention, mobile phone, having additional module, realized on SIM-card of mobile phone in form of internal browser with internal site. When a user wishes to access a page, such as an Internet-page, using his mobile phone, internal browser browses first file on internal site, to find page identifier and to determine whether it is possible to access that page immediately. If so, then internal browser extracts data from second file, positioned in a different memory area of internal site, and outputs it to display. At the same time, if page identifier was not found in internal site memory, internal browser reports negative result, and browser of SIM-module, realized in SIM-card, at that moment already transfers a page request to extract the page from Internet network. Mobile phone user does not determine, whether a page should be stored in internal site: instead, this action is performed by mobile communication operator or developer of pages, who uses codes, recorded in content of WML-pages. Operator may also transmit pages with forced broadcasting to mobile phone and save, renew or remove them from internal site without any interference from the user. |
Method and system for transmission of ip-packets by combining several radio communication channels for high speed data transmission / 2316130 Mobile wireless terminal (MWT) receives IP-packets, meant for ground-based network in given sequence order, fragments each IP-packet onto smaller packet fragments, adds identification information into each packet fragment and transmits packet fragments in parallel to each other through simultaneously active satellite channels. Receiving station receives packet fragments transmitted from MWT, transmits received packet fragments to ground-based controller through a network connection on basis of identification information added to packet fragments. Ground-based controller combines packet fragments in reconstructed IP-packets on basis of identification information added to fragments, and also orders reconstructed IP-packets in given sequence order on basis of identification information and transmits reconstructed IP-packets in correct sequence order to designated ground-based network. |
Multimedia environment "presence" server based on internet-protocol / 2315436 Subsystem of telecommunication network, using Internet-protocol, for environment of applications and services, contains "presence" server and block which realizes function for controlling service call status, adapted for receiving registration messages, transferred from user equipment, and for further conduction of an individual registration transaction on "presence" server for user equipment. |
Method for transfer and receipt of data in mobile communication system / 2251804 Base station determines speed of direct data transfer of data in accordance to control data about data transfer speed received from base station, reads temporary maximal total size encoder packers from buffer, determines, if it is possible to transfer these temporary packets at this speed of data transfer forms a combination of logic packets from these temporary packets, if it possible to transfer these packets at current data transfer speed, and total size of temporary packets is greater or equal to certain threshold value, and transmits logic packets with physical level packet. |
© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English. |