会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 21. 发明授权
    • Secure app ecosystem with key and data exchange according to enterprise information control policy
    • 根据企业信息化管理政策,密钥和数据交换安全应用生态系统
    • US09286477B2
    • 2016-03-15
    • US13598248
    • 2012-08-29
    • William E. SobelThomas Jeffrey EnderwickBruce McCorkendale
    • William E. SobelThomas Jeffrey EnderwickBruce McCorkendale
    • G06F11/30G06F21/60H04L29/06G06F17/30
    • G06F21/606G06F17/30238G06F21/604H04L63/0428H04L63/20
    • Multiple apps of an ecosystem on a computer securely exchange encrypted data according to an information control policy of an enterprise, without allowing unauthorized access from outside of the ecosystem. An ecosystem agent creates an ecosystem directory, which contains policy information and identification information concerning each specific app in the ecosystem, including the ecosystem agent. Each ecosystem app generates an asymmetric key pair, the public key of which it shares only with apps in the ecosystem through the directory. The ecosystem agent's private key is used to encrypt the directory. Data is securely communicated between apps in the ecosystem, by encrypting and decrypting messages and data objects with the appropriate ecosystem app keys. Each specific app in the ecosystem complies with enterprise information control policy. Ecosystem apps can read a policy from the directory, and receive policy updates from the enterprise.
    • 计算机上生态系统的多个应用程序根据企业的信息控制策略安全地交换加密数据,而不允许从生态系统外面进行未经授权的访问。 生态系统代理创建一个生态系统目录,其中包含有关生态系统中每个特定应用程序(包括生态系统代理)的策略信息和标识信息。 每个生态系统应用程序都会生成一个非对称密钥对,其公钥仅通过目录与生态系统中的应用共享。 生态系统代理的私钥用于加密目录。 通过使用适当的生态系统应用程序密钥加密和解密消息和数据对象,可以在生态系统中的应用程序之间安全地传送数据。 生态系统中的每个具体应用都符合企业信息控制政策。 生态系统应用程序可以从目录中读取策略,并从企业接收策略更新。
    • 23. 发明授权
    • Anti-malware scanning in a portable application virtualized environment
    • 在可移植应用程序虚拟化环境中的反恶意软件扫描
    • US08312547B1
    • 2012-11-13
    • US12059764
    • 2008-03-31
    • William E. SobelBruce McCorkendale
    • William E. SobelBruce McCorkendale
    • H04L29/06
    • G06F21/567
    • A computer includes a portable environment including a portable file system located on a removable storage device, the portable environment using virtualization in a host operating system. A path translation module translates a virtualized path of a file in the portable file system to an actual path of the file. The virtualized path is the path in the context of a portable user application running in the portable environment, and the actual path is the path in the context of the host operating system. A malware detection module executing directly under the host operating system determines whether the file contains malware using the actual path of the file and takes remedial actions if malware is detected.
    • 计算机包括便携式环境,其包括位于可移动存储设备上的便携式文件系统,所述便携式环境在主机操作系统中使用虚拟化。 路径转换模块将便携式文件系统中的文件的虚拟路径转换为文件的实际路径。 虚拟化路径是在便携式环境中运行的便携式用户应用程序的上下文中的路径,实际路径是主机操作系统上下文中的路径。 在主机操作系统下直接执行的恶意软件检测模块确定该文件是否包含使用该文件的实际路径的恶意软件,并在检测到恶意软件时采取补救措施。
    • 25. 发明授权
    • Systems and methods for determining whether to perform a computing operation that is optimized for a specific storage-device-technology type
    • 用于确定是否执行针对特定存储设备技术类型而优化的计算操作的系统和方法
    • US08140804B1
    • 2012-03-20
    • US12337132
    • 2008-12-17
    • William E. SobelBruce McCorkendale
    • William E. SobelBruce McCorkendale
    • G06F3/00G06F12/00
    • G06F3/0653G06F3/0605G06F3/0634G06F3/0679
    • A computer-implemented method for determining whether to perform a computing operation that is optimized for a specific storage-device-technology type may comprise: 1) performing at least one proximate read operation by accessing a control location on a storage device and then accessing a test location on the storage device that is logically proximate to the control location, 2) performing at least one remote read operation by accessing a test location on the storage device that is logically remote from the control location, 3) determining, by comparing a length of time to access the proximate test location with a length of time to access the remote test location, a technology type of the storage device, and then 4) determining, based on the technology type of the storage device, whether to perform the computing operation. Corresponding systems and computer-readable media are also disclosed.
    • 用于确定是否执行针对特定存储设备技术类型优化的计算操作的计算机实现的方法可以包括:1)通过访问存储设备上的控制位置并且然后访问 在逻辑上靠近控制位置的存储设备上的测试位置,2)通过访问逻辑上远离控制位置的存储设备上的测试位置来执行至少一个远程读取操作,3)通过比较长度 的时间以访问远程测试位置的时间长度,存储设备的技术类型,然后4)基于存储设备的技术类型来确定是否执行计算操作 。 还公开了相应的系统和计算机可读介质。
    • 27. 发明申请
    • Extending Secure Management of File Attribute Information to Virtual Hard Disks
    • 将文件属性信息的安全管理扩展到虚拟硬盘
    • US20100191784A1
    • 2010-07-29
    • US12362452
    • 2009-01-29
    • William E. SOBELBruce McCorkendale
    • William E. SOBELBruce McCorkendale
    • G06F17/30G06F17/00G06F11/00
    • G06F21/56G06F21/562
    • File attribute information is shared between processes running on a virtual machine and processes accessing a virtual hard disk from a host level. When a host level process accesses files on a virtual hard disk, that process updates the relevant file attribute information, and stores the updated file attribute information on the virtual hard disk. When a virtual machine level process subsequently accesses files on the virtual hard disk, that process reads the updated file attribute information, and omits unnecessary operations. When a virtual machine level process accesses files on the virtual hard disk and updates the corresponding file attribute information, that process communicates the updated file attribute information to the host. When a host level process subsequently accesses files on the virtual hard disk, the host level process reads the updated file attribute information.
    • 文件属性信息在虚拟机上运行的进程之间共享,并处理从主机级访问虚拟硬盘。 当主机级进程访问虚拟硬盘上的文件时,该进程将更新相关的文件属性信息,并将更新的文件属性信息存储在虚拟硬盘上。 当虚拟机级别进程随后访问虚拟硬盘上的文件时,该进程读取更新的文件属性信息,并省略不必要的操作。 当虚拟机级别进程访问虚拟硬盘上的文件并更新相应的文件属性信息时,该进程将更新的文件属性信息传送给主机。 当主机级进程随后访问虚拟硬盘上的文件时,主机级进程读取更新的文件属性信息。
    • 30. 发明授权
    • Hypervisor enabled secure inter-container communications
    • 管理程序启用安全的集装箱间通信
    • US08977842B1
    • 2015-03-10
    • US12701399
    • 2010-02-05
    • Bruce McCorkendaleWilliam E. Sobel
    • Bruce McCorkendaleWilliam E. Sobel
    • H04L29/06H04L9/08
    • H04L63/0428G06F21/53G06F21/57G06F21/602H04L9/0816
    • A secure component communication management system provides secure, trusted communication between components in a hypervisor based virtual computing environment. A hypervisor security extension generates a container level private key/public key pair. The hypervisor security extension container injects the container level public key into one or more VM(s) that are to securely receive trustworthy data. The hypervisor security extension container encrypts data to transmit to VMs with the container level private key, and injects the encrypted data into one or more target VM(s), such that the injected data is trusted by the VM(s). The one or more VM(s) receive the container level public key and data encrypted with the container level private key, injected by the hypervisor security extension container. These VM(s) use the public key to decrypt injected data encrypted with the private key, such that the decrypted data is trusted.
    • 安全组件通信管理系统在基于虚拟机管理程序的虚拟计算环境中的组件之间提供安全的可信任的通信。 管理程序安全扩展生成容器级私钥/公钥对。 虚拟机管理程序安全扩展容器将容器级公钥注入一个或多个要安全地接收可靠数据的VM。 虚拟机管理程序安全扩展容器加密数据以使用容器级私有密钥发送到VM,并将加密的数据注入到一个或多个目标VM中,使得注入的数据被VM信任。 一个或多个VM接收容器级公钥和使用由管理程序安全扩展容器注入的容器级别私钥加密的数据。 这些VM使用公钥来解密用私钥加密的注入数据,使得解密的数据被信任。