MA34183B1 - Method of safe conclusion of the existence of digital content on data networks and the issuance of a preview record with the possibility of later verifying the reliability of this conclusion and this record, and the device and software associated with this purpose - Google Patents
Method of safe conclusion of the existence of digital content on data networks and the issuance of a preview record with the possibility of later verifying the reliability of this conclusion and this record, and the device and software associated with this purposeInfo
- Publication number
- MA34183B1 MA34183B1 MA34185A MA34185A MA34183B1 MA 34183 B1 MA34183 B1 MA 34183B1 MA 34185 A MA34185 A MA 34185A MA 34185 A MA34185 A MA 34185A MA 34183 B1 MA34183 B1 MA 34183B1
- Authority
- MA
- Morocco
- Prior art keywords
- conclusion
- issuance
- possibility
- record
- data networks
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/80—Management or planning
- Y02P90/84—Greenhouse gas [GHG] management systems
- Y02P90/845—Inventory and reporting systems for greenhouse gases [GHG]
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Operations Research (AREA)
- Economics (AREA)
- Marketing (AREA)
- Data Mining & Analysis (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
Abstract
يتعلق هذا الاختراع بعملية تأمين وموثوقية قصوى، فضلا عن أمكانية التحقق من شروط انجاز استنتاج على شبكة من البيانات، إضافة إلى شروط إصدار محضر إصدار الاستنتاج المذكور.على الإنترنيت مثلا، قد يحدث أن استنتاجين يستخدمان العنوا الهدف ذاتهurl أو ip كبيانات ،والمنجزة في نفس الوقت كحاسوبين مختلفين يؤديان إلى نتائج مختلفة: محتويات ويب الحاسوبين، مثل صفحات الويب، قد تكون مختلفة بينما لحظات هذا التصفح أو الإبحار هي نفسها تماما. وقد يكون أصل هذا الاختلاف في النتائج متعمدا أو سيئ النية.لكن قد يكون أصله عدم الانتباه أو اختلالات تخص المعدات أو البرمجيات أو ذات مصدر بمثل firewallت خلال الإبحار في الانترنيت أو الاستنتاج أو إصدار محضر المعاينة. يهدف الاختراع الحالي إلى تقديم حل كامل للاستنتاجات حول شبكات البيانات،من خلال تقديم إمكانية التحقق مما إذا كانت الإجراءات المتخذة بالنسبة للاستنتاجات المسجلة حول شبكات البيانات لها نقائص أو لا يمكنها أن تؤثر على نتائج التصفح أو الإبحار في الأنتيرنيت. وبسبب عدم إمكانية الثقة في مضادات الفيروسات بنسبة 100٪ وفي غيرها من أدوات حماية مثل firewall ،يسمح هذا الاختراع بإمكانية إعادة تشكيل مطابق تماما لسير عملية الاستنتاج لاحقا، القيام ، إخضاعه للخبرة من قبل خبراء لمعرفة أن الاستنتاج كان موضوع اختلال أم لا. وتوصف أيضا هنا الطريقة المرتبطة بهذا الاختراع.This invention relates to a process of maximum security and reliability, as well as the possibility of verifying the conditions for the conclusion of a conclusion on a network of data, as well as the conditions for the issuance of the minutes of the issuance of the said conclusion. As two different computers lead to different results: the contents of two computers' Web, such as web pages, may be different while the moments of this browsing or surfing are exactly the same. The origin of this difference in results may be deliberate or ill-intentioned, but it may be rooted in lack of attention or imbalances in hardware, software, or from a source such as firewall during Internet navigation, conclusion, or the issuance of sampling records. The present invention aims to provide a complete solution to the conclusions about data networks, by providing the possibility of verifying whether the actions taken for the conclusions recorded on data networks have deficiencies or cannot affect the results of browsing or surfing the Internet. Because of the 100% unreliability of antivirals and in other protection tools such as firewall, this invention allows the possibility of reshaping completely identical to the conclusion of the conclusion process later, carried out, subjected to expertise by experts to find out that the conclusion was disrupted or not. The method associated with this invention is also described herein.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MA34185A MA34183B1 (en) | 2011-09-16 | 2011-09-16 | Method of safe conclusion of the existence of digital content on data networks and the issuance of a preview record with the possibility of later verifying the reliability of this conclusion and this record, and the device and software associated with this purpose |
PCT/IB2012/001790 WO2013038261A2 (en) | 2011-09-16 | 2012-09-14 | Method of reliable and secure evidencing of the existence of a digitized content on data networks and of issuing an evidencing statement thereof, with the ability to be able to subsequently verify the reliability of said evidencing and of said statement. apparatus associated therewith. |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MA34185A MA34183B1 (en) | 2011-09-16 | 2011-09-16 | Method of safe conclusion of the existence of digital content on data networks and the issuance of a preview record with the possibility of later verifying the reliability of this conclusion and this record, and the device and software associated with this purpose |
Publications (1)
Publication Number | Publication Date |
---|---|
MA34183B1 true MA34183B1 (en) | 2013-05-02 |
Family
ID=47278897
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MA34185A MA34183B1 (en) | 2011-09-16 | 2011-09-16 | Method of safe conclusion of the existence of digital content on data networks and the issuance of a preview record with the possibility of later verifying the reliability of this conclusion and this record, and the device and software associated with this purpose |
Country Status (2)
Country | Link |
---|---|
MA (1) | MA34183B1 (en) |
WO (1) | WO2013038261A2 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016014031A1 (en) | 2014-07-22 | 2016-01-28 | Hewlett-Packard Development Company, L.P. | Authorizing a bios policy change for storage |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1965560A1 (en) | 2007-03-01 | 2008-09-03 | Advanced Digital Broadcast S.A. | Method and system for managing secure access to network content |
-
2011
- 2011-09-16 MA MA34185A patent/MA34183B1/en unknown
-
2012
- 2012-09-14 WO PCT/IB2012/001790 patent/WO2013038261A2/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2013038261A2 (en) | 2013-03-21 |
WO2013038261A3 (en) | 2013-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Damshenas et al. | Forensics investigation challenges in cloud computing environments | |
WO2012023050A3 (en) | Secure cloud computing system and method | |
WO2011157242A3 (en) | Method and device for file protection | |
WO2011129977A3 (en) | Streaming insertion of tokens into content to protect against csrf | |
WO2012166873A3 (en) | Computer program, method, and system for preventing execution of viruses and malware | |
MY203310A (en) | Digital rights management method of media content, drm client and server side | |
MY168469A (en) | Systems and methods for enhancement of single sign-on protection | |
WO2011137683A3 (en) | Method and device for web application hosting | |
MA34183B1 (en) | Method of safe conclusion of the existence of digital content on data networks and the issuance of a preview record with the possibility of later verifying the reliability of this conclusion and this record, and the device and software associated with this purpose | |
FR2973188B1 (en) | METHOD AND DEVICE FOR EXTRACTING DATA | |
CN103020287B (en) | Finite term purpose is excluded based on part cryptographic Hash | |
Moon et al. | A study on the integrated security system based real-time network packet deep inspection | |
Torrano-Gimenez et al. | An anomaly-based web application firewall | |
CN105162652A (en) | Processing method for webpage browsing | |
WO2012069043A3 (en) | Method and apparatus for preventing unauthorized detection of access data | |
Peiravi et al. | Internet security-cyber crime paradox | |
Choi et al. | An Efficient Detecting Scheme of Web-based Attacks through Monitoring HTTP Outbound Traffics | |
Jung et al. | A Web Content Analytics Architecture for Malicious JavaScript Detection | |
BRPI1103480A2 (en) | METHOD AND EQUIPMENT FOR CUSTOMER COMPUTER SAFETY INSULATION | |
Hong | XSS Attack and Countermeasure: Survey | |
CN102904876A (en) | Safety protection system of websites | |
Everywhere | Electronic frontier foundation | |
Jang et al. | Mitigating DoS Attacks based on Recovery-based ITS in Cloud | |
Haji Mahdizadeh Zargar et al. | An entropy-based VoIP flooding attacks detection and prevention system | |
MotafakkerAzad et al. | Intelligent modeling of asymmetric effects of monetary shocks on output in Iran (Neural Network Application) |