VimIy微民网,让世界倾听微民的声音! 设为首页 | 加入收藏 | 网站地图
当前位置:主页 > 大杂烩 >

苹果败诉 需向VirnetX支付$3.68亿专利费用

整理时间:2012-11-09 16:57 来源:www.vimiy.com 作者:编辑 点击:

【楼主】我只是一马甲2012-11-07 11:15
» 今天苹果公司和VirnetX之间的专利大战正式落下帷幕,根据美国国际贸易委员会的指控苹果的产品尤其是iPhone,iPad和Mac等产品都侵犯了 VirnetX公司的无线专利,苹果需要向VirnetX支付$3.68亿,而之前VirnetX之前也和微软打过官司,最终以微软支持$2亿而结束。此次双方的诉讼于2011年11月份正式提交申请,VirnetX称苹果公司旗下的iPhone 4S产品侵犯了该公司的U.S. Patent No. 8,05,181号专利,该专利名称为“Method for Establishing Secure Communication Link Between Computers of Virtual Private Network”。
作者俺妹桐乃2012-11-07 11:16
这公司干嘛的
作者punning2012-11-07 11:17
打打官司都能拿这么多,,,,
作者雲飛扬2012-11-07 11:18
新产品研发费用又增加了$3.68亿。
作者变巨2012-11-07 11:18
呃,那么这是个什么专利呢,把微软和流氓果都放倒了……
作者rafale2012-11-07 11:18
我靠 这律师费是多少啊 怪不得美帝人民都爱学法律
作者xfy922012-11-07 11:20
建立虚拟专线网络的连接?虚拟专线网路自信Google,不知道是否敏感
作者qq3699008732012-11-07 11:23
我想知道什么专利。
作者I回来了2012-11-07 11:23
牛逼死了
作者和諧之魂2012-11-07 11:26
谁要是能在外观专利上从苹果嘴里拽出肉来那就是真牛了。
作者Liva2012-11-07 11:27
活该不过苹果付不付钱是个问题
作者dudestia2012-11-07 11:30
这个?A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a secure communication mode of communication is enabled at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication. Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication. The secure communication link is a virtual private network communication link over the computer network in which one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.Claims1. A method for establishing a secure communication link between a first computer and a second computer over a computer network, the method comprising steps of:enabling a secure communication mode of communication at the first computer without a user entering any cryptographic information for establishing the secure communication mode of communication; and establishing the secure communication link between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication, the secure communication link being a virtual private network communication link over the computer network.2. The method according to claim 1, further comprising steps of:determining whether a secure communication software module is stored on the first computer in response to the step of enabling the secure communication mode of communication;accessing a predetermined computer network address for loading the secure communication software module when the software module is not stored on the first computer; andstoring the software module in the first computer.3. The method according to claim 1, wherein the virtual private network is based on inserting into each data packet one or more data values that vary according to a pseudo-random sequence.4. The method according to claim 1, wherein the virtual private network is based on inserting into at least one data packet at least one data value representing a predetermined level of service associated with the virtual private network.5. The method according to claim 1, wherein the virtual private network is based on a computer network address hopping regime that is used to pseudorandomly change computer network addresses in packets transmitted between the first computer and the second computer.6. The method according to claim 1, wherein the virtual private network is based on comparing a value in each data packet transmitted between the first computer and the second computer to a moving window of valid values.7. The method according to claim 1, wherein the virtual private network is based on a comparison of a discriminator field in a header of each data packet to a table of valid discriminator fields maintained for the first computer.8. The method according to claim 1, wherein the computer network includes the Internet.9. The method according to claim 1, wherein the step of enabling the secure communication mode of communication includes a step of entering a command into the first computer that specifies the secure communication mode.10. The method according to claim 9, wherein the command is entered to define a setup parameter associated with the secure communication mode of communication, andwherein the secure communication link is automatically established when a communication link is established over the computer network.11. The method according to claim 1, wherein the step of enabling a secure communication link mode of operation includes a step of selecting an icon displayed on a display device of the first computer.12. The method according to claim 1, further comprising a step of displaying an indication on a display of the first computer that the secure communication link is established.13. The method according to claim 12, wherein the indication is an icon.14. The method according to claim 1, wherein the secure communication link is one of a plurality of secure communication links in a hierarchy of secure communication links.15. The method according to claim 1, wherein the secure communication link is through a secure portal connected to the computer network, and wherein the second computer comprises a secure domain name service.16. A computer-readable storage medium, comprising:a storage area; andcomputer-readable instructions for a method for establishing a secure communication link between a first computer and a second computer over a computer network, the method comprising steps of:enabling a secure communication mode of communication at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication; andestablishing a secure communication link between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication, the secure communication link being a virtual private network communication link over the computer network.17. The computer-readable storage medium according to claim 16, further comprising steps of:determining whether a secure communication software module is stored on the first computer in response to the step of enabling the secure communication mode of communication;accessing a predetermined computer network address for loading the secure communication software module when the software module is not stored on the first computer; andstoring the software module in the first computer.18. The computer-readable medium according to claim 16, wherein the virtual private network is based on inserting into at least one data packet at least one data value representing a predetermined level of service associated with the virtual private network.19. The computer-readable storage medium according to claim 16, wherein the virtual private network is based on inserting into each data packet one or more data values that vary according to a pseudo-random sequence.20. The computer-readable storage medium according to claim 16, wherein the virtual private network is based on a computer network address hopping regime that is used to pseudorandomly change computer network addresses in packets transmitted between the first computer and the second computer.21. The computer-readable storage medium according to claim 16, wherein the virtual private network is based on comparing a value in each data packet transmitted between the first computer and the second computer to a moving window of valid values.22. The computer-readable storage medium according to claim 16, wherein the virtual private network is based on a comparison of a discriminator field in a header of each data packet to a table of valid discriminator fields maintained for the first computer.23. The computer-readable storage medium according to claim 16, wherein the computer network includes the Internet.24. The computer-readable storage medium according to claim 16, wherein the step of enabling the secure communication mode of communication includes a step of entering a command into the first computer that specifies the secure communication mode.25. The computer-readable storage medium according to claim 24, wherein the command is entered to define a setup parameter associated with the secure communication mode of communication, and wherein the secure communication link is automatically established when a communication link is established over the computer network.26. The computer-readable storage medium according to claim 16, wherein the step of enabling a secure communication link mode of operation includes a step of selecting an icon displayed on a display device of the first computer.27. The computer-readable storage medium according to claim 16, further comprising a step of displaying an indication on a display of the first computer that the secure communication link is established.28. The computer-readable storage medium according to claim 27, wherein the indication is an icon.29. The computer-readable storage medium according to claim 16, wherein the secure communication link is one of a plurality of secure communication links in a hierarchy of secure communication links.30. The computer-readable storage medium according to claim 16, wherein the secure communication link is through a secure portal connected to the computer network, and wherein the second computer comprises a secure domain name service.
作者简直是一派胡言2012-11-07 11:30
活该不过苹果付不付钱是个问题 谁要是能在外观专利上从苹果嘴里拽出肉来那就是真牛了。
作者嗷嗷嗷嗷嗷嗷嗷嗷嗷嗷2012-11-07 11:37
苹果败诉 需向VirnetX支付谁要是能在外观专利上从苹果嘴里拽出肉来那就是真牛了。外观专利?苹果告赢过别人么?

关于网站 | 网站声明 | 用户反馈 | 合作伙伴 | 联系我们
Copyright © 2012年2月8日