MA34183B1 - Method of safe conclusion of the existence of digital content on data networks and the issuance of a preview record with the possibility of later verifying the reliability of this conclusion and this record, and the device and software associated with this purpose - Google Patents

Method of safe conclusion of the existence of digital content on data networks and the issuance of a preview record with the possibility of later verifying the reliability of this conclusion and this record, and the device and software associated with this purpose

Info

Publication number
MA34183B1
MA34183B1 MA34185A MA34185A MA34183B1 MA 34183 B1 MA34183 B1 MA 34183B1 MA 34185 A MA34185 A MA 34185A MA 34185 A MA34185 A MA 34185A MA 34183 B1 MA34183 B1 MA 34183B1
Authority
MA
Morocco
Prior art keywords
conclusion
issuance
possibility
record
data networks
Prior art date
Application number
MA34185A
Other languages
Arabic (ar)
French (fr)
Inventor
Mustapha Adib
Original Assignee
Essaadia Kourrachi
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Essaadia Kourrachi filed Critical Essaadia Kourrachi
Priority to MA34185A priority Critical patent/MA34183B1/en
Priority to PCT/IB2012/001790 priority patent/WO2013038261A2/en
Publication of MA34183B1 publication Critical patent/MA34183B1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/80Management or planning
    • Y02P90/84Greenhouse gas [GHG] management systems
    • Y02P90/845Inventory and reporting systems for greenhouse gases [GHG]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

يتعلق هذا الاختراع بعملية تأمين وموثوقية قصوى، فضلا عن أمكانية التحقق من شروط انجاز استنتاج على شبكة من البيانات، إضافة إلى شروط إصدار محضر إصدار الاستنتاج المذكور.على الإنترنيت مثلا، قد يحدث أن استنتاجين يستخدمان العنوا الهدف ذاتهurl أو ip كبيانات ،والمنجزة في نفس الوقت كحاسوبين مختلفين يؤديان إلى نتائج مختلفة: محتويات ويب الحاسوبين، مثل صفحات الويب، قد تكون مختلفة بينما لحظات هذا التصفح أو الإبحار هي نفسها تماما. وقد يكون أصل هذا الاختلاف في النتائج متعمدا أو سيئ النية.لكن قد يكون أصله عدم الانتباه أو اختلالات تخص المعدات أو البرمجيات أو ذات مصدر بمثل firewallت خلال الإبحار في الانترنيت أو الاستنتاج أو إصدار محضر المعاينة. يهدف الاختراع الحالي إلى تقديم حل كامل للاستنتاجات حول شبكات البيانات،من خلال تقديم إمكانية التحقق مما إذا كانت الإجراءات المتخذة بالنسبة للاستنتاجات المسجلة حول شبكات البيانات لها نقائص أو لا يمكنها أن تؤثر على نتائج التصفح أو الإبحار في الأنتيرنيت. وبسبب عدم إمكانية الثقة في مضادات الفيروسات بنسبة 100٪ وفي غيرها من أدوات حماية مثل firewall ،يسمح هذا الاختراع بإمكانية إعادة تشكيل مطابق تماما لسير عملية الاستنتاج لاحقا، القيام ، إخضاعه للخبرة من قبل خبراء لمعرفة أن الاستنتاج كان موضوع اختلال أم لا. وتوصف أيضا هنا الطريقة المرتبطة بهذا الاختراع.This invention relates to a process of maximum security and reliability, as well as the possibility of verifying the conditions for the conclusion of a conclusion on a network of data, as well as the conditions for the issuance of the minutes of the issuance of the said conclusion. As two different computers lead to different results: the contents of two computers' Web, such as web pages, may be different while the moments of this browsing or surfing are exactly the same. The origin of this difference in results may be deliberate or ill-intentioned, but it may be rooted in lack of attention or imbalances in hardware, software, or from a source such as firewall during Internet navigation, conclusion, or the issuance of sampling records. The present invention aims to provide a complete solution to the conclusions about data networks, by providing the possibility of verifying whether the actions taken for the conclusions recorded on data networks have deficiencies or cannot affect the results of browsing or surfing the Internet. Because of the 100% unreliability of antivirals and in other protection tools such as firewall, this invention allows the possibility of reshaping completely identical to the conclusion of the conclusion process later, carried out, subjected to expertise by experts to find out that the conclusion was disrupted or not. The method associated with this invention is also described herein.

MA34185A 2011-09-16 2011-09-16 Method of safe conclusion of the existence of digital content on data networks and the issuance of a preview record with the possibility of later verifying the reliability of this conclusion and this record, and the device and software associated with this purpose MA34183B1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MA34185A MA34183B1 (en) 2011-09-16 2011-09-16 Method of safe conclusion of the existence of digital content on data networks and the issuance of a preview record with the possibility of later verifying the reliability of this conclusion and this record, and the device and software associated with this purpose
PCT/IB2012/001790 WO2013038261A2 (en) 2011-09-16 2012-09-14 Method of reliable and secure evidencing of the existence of a digitized content on data networks and of issuing an evidencing statement thereof, with the ability to be able to subsequently verify the reliability of said evidencing and of said statement. apparatus associated therewith.

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MA34185A MA34183B1 (en) 2011-09-16 2011-09-16 Method of safe conclusion of the existence of digital content on data networks and the issuance of a preview record with the possibility of later verifying the reliability of this conclusion and this record, and the device and software associated with this purpose

Publications (1)

Publication Number Publication Date
MA34183B1 true MA34183B1 (en) 2013-05-02

Family

ID=47278897

Family Applications (1)

Application Number Title Priority Date Filing Date
MA34185A MA34183B1 (en) 2011-09-16 2011-09-16 Method of safe conclusion of the existence of digital content on data networks and the issuance of a preview record with the possibility of later verifying the reliability of this conclusion and this record, and the device and software associated with this purpose

Country Status (2)

Country Link
MA (1) MA34183B1 (en)
WO (1) WO2013038261A2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016014031A1 (en) 2014-07-22 2016-01-28 Hewlett-Packard Development Company, L.P. Authorizing a bios policy change for storage

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1965560A1 (en) 2007-03-01 2008-09-03 Advanced Digital Broadcast S.A. Method and system for managing secure access to network content

Also Published As

Publication number Publication date
WO2013038261A2 (en) 2013-03-21
WO2013038261A3 (en) 2013-06-13

Similar Documents

Publication Publication Date Title
Damshenas et al. Forensics investigation challenges in cloud computing environments
WO2012023050A3 (en) Secure cloud computing system and method
WO2011157242A3 (en) Method and device for file protection
WO2011129977A3 (en) Streaming insertion of tokens into content to protect against csrf
WO2012166873A3 (en) Computer program, method, and system for preventing execution of viruses and malware
MY203310A (en) Digital rights management method of media content, drm client and server side
MY168469A (en) Systems and methods for enhancement of single sign-on protection
WO2011137683A3 (en) Method and device for web application hosting
MA34183B1 (en) Method of safe conclusion of the existence of digital content on data networks and the issuance of a preview record with the possibility of later verifying the reliability of this conclusion and this record, and the device and software associated with this purpose
FR2973188B1 (en) METHOD AND DEVICE FOR EXTRACTING DATA
CN103020287B (en) Finite term purpose is excluded based on part cryptographic Hash
Moon et al. A study on the integrated security system based real-time network packet deep inspection
Torrano-Gimenez et al. An anomaly-based web application firewall
CN105162652A (en) Processing method for webpage browsing
WO2012069043A3 (en) Method and apparatus for preventing unauthorized detection of access data
Peiravi et al. Internet security-cyber crime paradox
Choi et al. An Efficient Detecting Scheme of Web-based Attacks through Monitoring HTTP Outbound Traffics
Jung et al. A Web Content Analytics Architecture for Malicious JavaScript Detection
BRPI1103480A2 (en) METHOD AND EQUIPMENT FOR CUSTOMER COMPUTER SAFETY INSULATION
Hong XSS Attack and Countermeasure: Survey
CN102904876A (en) Safety protection system of websites
Everywhere Electronic frontier foundation
Jang et al. Mitigating DoS Attacks based on Recovery-based ITS in Cloud
Haji Mahdizadeh Zargar et al. An entropy-based VoIP flooding attacks detection and prevention system
MotafakkerAzad et al. Intelligent modeling of asymmetric effects of monetary shocks on output in Iran (Neural Network Application)