会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明申请
    • Updateable Secure Kernel Extensions
    • 可更新的安全内核扩展
    • US20080301440A1
    • 2008-12-04
    • US11754658
    • 2007-05-29
    • Wilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • Wilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • H04L9/00
    • G06F21/575G06F21/51G06F2221/2143
    • A method, computer program product, and data processing system for providing an updateable encrypted operating kernel are disclosed. In a preferred embodiment, secure initialization hardware decrypts a minimal secure kernel containing sensitive portions of data and/or code into a portion of the processor-accessible memory space, from which the kernel is executed. Most system software functions are not directly supported by the secure kernel but are provided by dynamically loaded kernel extensions that are encrypted with a public key so that they can only be decrypted with a private key possessed by the secure kernel. The public/private key pair is processor-specific. Before passing control to a kernel extension the secure kernel deletes a subset of its sensitive portions, retaining only those sensitive portions needed to perform the task(s) delegated to the kernel extension. Which sensitive portions are retained is determined by a cryptographic key with which the kernel extension is signed.
    • 公开了一种用于提供可更新的加密操作内核的方法,计算机程序产品和数据处理系统。 在优选实施例中,安全初始化硬件将包含敏感部分的数据和/或代码的最小安全内核解密成可执行内核的处理器可访问存储器空间的一部分。 大多数系统软件功能并不直接得到安全内核的支持,而是由使用公钥加密的动态加载内核扩展提供,以便只能使用安全内核拥有的私有密钥进行解密。 公钥/私钥对是处理器特定的。 在将控件传递给内核扩展之前,安全内核将删除其敏感部分的一个子集,只保留执行委托给内核扩展的任务所需的敏感部分。 保留哪些敏感部分由内核扩展名与之签名的加密密钥确定。
    • 12. 发明授权
    • Updateable secure kernel extensions
    • 可更新的安全内核扩展
    • US08332635B2
    • 2012-12-11
    • US11754658
    • 2007-05-29
    • Wilfred E. Plouffe, Jr.Kanna ShimizuVladimir Zbarsky
    • Wilfred E. Plouffe, Jr.Kanna ShimizuVladimir Zbarsky
    • H04L29/06H04L9/32H04L9/00H04L9/28G06F12/14G06F7/04G08B29/00H04K1/00
    • G06F21/575G06F21/51G06F2221/2143
    • A method, computer program product, and data processing system provide an updateable encrypted operating kernel. Secure initialization hardware decrypts a minimal secure kernel containing sensitive portions of data and/or code into a portion of the processor-accessible memory space, from which the kernel is executed. Most system software functions are not directly supported by the secure kernel but are provided by dynamically loaded kernel extensions that are encrypted with a public key so that they can only be decrypted with a private key possessed by the secure kernel. The public/private key pair is processor-specific. Before passing control to a kernel extension, the secure kernel deletes a subset of its sensitive portions, retaining only those sensitive portions needed to perform the task(s) delegated to the kernel extension. Which sensitive portions are retained is determined by a cryptographic key with which the kernel extension is signed.
    • 一种方法,计算机程序产品和数据处理系统提供可更新的加密操作内核。 安全初始化硬件将包含敏感部分数据和/或代码的最小安全内核解密为执行内核的处理器可访问内存空间的一部分。 大多数系统软件功能并不直接得到安全内核的支持,而是由使用公钥加密的动态加载内核扩展提供,以便只能使用安全内核拥有的私有密钥进行解密。 公钥/私钥对是处理器特定的。 在将控件传递给内核扩展之前,安全内核将删除其敏感部分的一部分,仅保留执行委托给内核扩展的任务所需的敏感部分。 保留哪些敏感部分由内核扩展名与之签名的加密密钥确定。
    • 15. 发明申请
    • Grammar-based task analysis of web logs
    • Web日志的语法任务分析
    • US20060085788A1
    • 2006-04-20
    • US10952414
    • 2004-09-29
    • Arnon AmirPrasad DeshpandeSavitha SrinivasanVladimir Zbarsky
    • Arnon AmirPrasad DeshpandeSavitha SrinivasanVladimir Zbarsky
    • G06F9/46
    • G06F8/30
    • A method of detecting tasks performed by users wherein a single task is a sequence of web URLs invocation. Task patterns are detected in web logs to identify tasks performed by users and analyze task trends over time, across corporate divisions and geographies. A grammar-based framework is used to model and detect tasks from web log patterns. The framework has two components: a declarative unit—to generate a task grammar, and a processing unit—to detect tasks from access logs by generating a state machine for applying the task grammar to the tokens associated with the access records. By analyzing user tasks, rather than just URLs, useful business information can be extracted.
    • 检测由用户执行的任务的方法,其中单个任务是web URL调用的序列。 在Web日志中检测到任务模式,以识别用户执行的任务,并在不同的部门和地理位置分析随时间的任务趋势。 基于语法的框架用于从Web日志模式建模和检测任务。 该框架有两个组件:一个声明单元,用于生成一个任务语法,以及一个处理单元,用于通过生成用于将任务语法应用到与访问记录相关联的令牌的状态机来检测来自访问日志的任务。 通过分析用户任务,而不仅仅是URL,可以提取有用的业务信息。
    • 16. 发明授权
    • System and method for protecting data in a secure system
    • 用于在安全系统中保护数据的系统和方法
    • US07860246B2
    • 2010-12-28
    • US11555605
    • 2006-11-01
    • Julian A CerrutiSigfredo I NinDulce B PonceleonVladimir Zbarsky
    • Julian A CerrutiSigfredo I NinDulce B PonceleonVladimir Zbarsky
    • H04L9/00H04N7/167
    • H04L9/0891G06F21/602H04L9/085H04L2209/60
    • A system for protecting data in a security system generates and encodes a backup key for encoding long-lived secrets. The system generates a distribution plan for distributing cryptographic splits of the encoded backup key to selected persons based on geographic and organizational diversity. The distribution plan specifies a number M of the cryptographic splits to be generated and a number N of the cryptographic splits required to recover the backup key. The system processes utilize an init file comprising system parameters and state files each comprising parameters reflecting a state of the secure system after a transaction. Any of the state files may be used for any of the system processes. The state files and the init file are encoded by the backup key, thus protecting the long-lived secrets.
    • 用于保护安全系统中的数据的系统生成并编码用于编码长寿命秘密的备份密钥。 系统生成分配计划,用于根据地理和组织多样性将所编码备份密钥的加密分裂分发给选定的人员。 分配计划指定要生成的密码分割数M,以及恢复备份密钥所需的密码分割数N。 系统过程利用包括系统参数和状态文件的初始化文件,每个文件包括在事务之后反映安全系统的状态的参数。 任何状态文件可用于任何系统进程。 状态文件和init文件由备份密钥编码,从而保护长命的秘密。