【樓主】我只是一馬甲2012-11-07 11:15
» 今天蘋果公司和VirnetX之間的專利大戰(zhàn)正式落下帷幕,根據(jù)美國國際貿(mào)易委員會的指控蘋果的產(chǎn)品尤其是iPhone,iPad和Mac等產(chǎn)品都侵犯了 VirnetX公司的無線專利,蘋果需要向VirnetX支付$3.68億,而之前VirnetX之前也和微軟打過官司,最終以微軟支持$2億而結(jié)束。此次雙方的訴訟于2011年11月份正式提交申請,VirnetX稱蘋果公司旗下的iPhone 4S產(chǎn)品侵犯了該公司的U.S. Patent No. 8,05,181號專利,該專利名稱為“Method for Establishing Secure Communication Link Between Computers of Virtual Private Network”。
作者俺妹桐乃2012-11-07 11:16
這公司干嘛的
作者punning2012-11-07 11:17
打打官司都能拿這么多,,,,
作者雲(yún)飛揚2012-11-07 11:18
新產(chǎn)品研發(fā)費用又增加了$3.68億。
作者變巨2012-11-07 11:18
呃,那么這是個什么專利呢,把微軟和流氓果都放倒了……
作者rafale2012-11-07 11:18
我靠 這律師費是多少啊 怪不得美帝人民都愛學(xué)法律
作者xfy922012-11-07 11:20
建立虛擬專線網(wǎng)絡(luò)的連接?虛擬專線網(wǎng)路自信Google,不知道是否敏感
作者qq3699008732012-11-07 11:23
我想知道什么專利。
作者I回來了2012-11-07 11:23
牛逼死了
作者和諧之魂2012-11-07 11:26
誰要是能在外觀專利上從蘋果嘴里拽出肉來那就是真牛了。
作者Liva2012-11-07 11:27
活該不過蘋果付不付錢是個問題
作者dudestia2012-11-07 11:30
這個?A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a secure communication mode of communication is enabled at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication. Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication. The secure communication link is a virtual private network communication link over the computer network in which one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.Claims1. A method for establishing a secure communication link between a first computer and a second computer over a computer network, the method comprising steps of:enabling a secure communication mode of communication at the first computer without a user entering any cryptographic information for establishing the secure communication mode of communication; and establishing the secure communication link between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication, the secure communication link being a virtual private network communication link over the computer network.2. The method according to claim 1, further comprising steps of:determining whether a secure communication software module is stored on the first computer in response to the step of enabling the secure communication mode of communication;accessing a predetermined computer network address for loading the secure communication software module when the software module is not stored on the first computer; andstoring the software module in the first computer.3. The method according to claim 1, wherein the virtual private network is based on inserting into each data packet one or more data values that vary according to a pseudo-random sequence.4. The method according to claim 1, wherein the virtual private network is based on inserting into at least one data packet at least one data value representing a predetermined level of service associated with the virtual private network.5. The method according to claim 1, wherein the virtual private network is based on a computer network address hopping regime that is used to pseudorandomly change computer network addresses in packets transmitted between the first computer and the second computer.6. The method according to claim 1, wherein the virtual private network is based on comparing a value in each data packet transmitted between the first computer and the second computer to a moving window of valid values.7. The method according to claim 1, wherein the virtual private network is based on a comparison of a discriminator field in a header of each data packet to a table of valid discriminator fields maintained for the first computer.8. The method according to claim 1, wherein the computer network includes the Internet.9. The method according to claim 1, wherein the step of enabling the secure communication mode of communication includes a step of entering a command into the first computer that specifies the secure communication mode.10. The method according to claim 9, wherein the command is entered to define a setup parameter associated with the secure communication mode of communication, andwherein the secure communication link is automatically established when a communication link is established over the computer network.11. The method according to claim 1, wherein the step of enabling a secure communication link mode of operation includes a step of selecting an icon displayed on a display device of the first computer.12. The method according to claim 1, further comprising a step of displaying an indication on a display of the first computer that the secure communication link is established.13. The method according to claim 12, wherein the indication is an icon.14. The method according to claim 1, wherein the secure communication link is one of a plurality of secure communication links in a hierarchy of secure communication links.15. The method according to claim 1, wherein the secure communication link is through a secure portal connected to the computer network, and wherein the second computer comprises a secure domain name service.16. A computer-readable storage medium, comprising:a storage area; andcomputer-readable instructions for a method for establishing a secure communication link between a first computer and a second computer over a computer network, the method comprising steps of:enabling a secure communication mode of communication at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication; andestablishing a secure communication link between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication, the secure communication link being a virtual private network communication link over the computer network.17. The computer-readable storage medium according to claim 16, further comprising steps of:determining whether a secure communication software module is stored on the first computer in response to the step of enabling the secure communication mode of communication;accessing a predetermined computer network address for loading the secure communication software module when the software module is not stored on the first computer; andstoring the software module in the first computer.18. The computer-readable medium according to claim 16, wherein the virtual private network is based on inserting into at least one data packet at least one data value representing a predetermined level of service associated with the virtual private network.19. The computer-readable storage medium according to claim 16, wherein the virtual private network is based on inserting into each data packet one or more data values that vary according to a pseudo-random sequence.20. The computer-readable storage medium according to claim 16, wherein the virtual private network is based on a computer network address hopping regime that is used to pseudorandomly change computer network addresses in packets transmitted between the first computer and the second computer.21. The computer-readable storage medium according to claim 16, wherein the virtual private network is based on comparing a value in each data packet transmitted between the first computer and the second computer to a moving window of valid values.22. The computer-readable storage medium according to claim 16, wherein the virtual private network is based on a comparison of a discriminator field in a header of each data packet to a table of valid discriminator fields maintained for the first computer.23. The computer-readable storage medium according to claim 16, wherein the computer network includes the Internet.24. The computer-readable storage medium according to claim 16, wherein the step of enabling the secure communication mode of communication includes a step of entering a command into the first computer that specifies the secure communication mode.25. The computer-readable storage medium according to claim 24, wherein the command is entered to define a setup parameter associated with the secure communication mode of communication, and wherein the secure communication link is automatically established when a communication link is established over the computer network.26. The computer-readable storage medium according to claim 16, wherein the step of enabling a secure communication link mode of operation includes a step of selecting an icon displayed on a display device of the first computer.27. The computer-readable storage medium according to claim 16, further comprising a step of displaying an indication on a display of the first computer that the secure communication link is established.28. The computer-readable storage medium according to claim 27, wherein the indication is an icon.29. The computer-readable storage medium according to claim 16, wherein the secure communication link is one of a plurality of secure communication links in a hierarchy of secure communication links.30. The computer-readable storage medium according to claim 16, wherein the secure communication link is through a secure portal connected to the computer network, and wherein the second computer comprises a secure domain name service.
作者簡直是一派胡言2012-11-07 11:30
活該不過蘋果付不付錢是個問題 誰要是能在外觀專利上從蘋果嘴里拽出肉來那就是真牛了。
作者嗷嗷嗷嗷嗷嗷嗷嗷嗷嗷2012-11-07 11:37
蘋果敗訴 需向VirnetX支付誰要是能在外觀專利上從蘋果嘴里拽出肉來那就是真牛了。外觀專利?蘋果告贏過別人么?