会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 21. 发明授权
    • Configuration of a computing device in a secure manner
    • 以安全的方式配置计算设备
    • US07809949B2
    • 2010-10-05
    • US11191133
    • 2005-07-26
    • Christopher R. WysockiAlan Ward
    • Christopher R. WysockiAlan Ward
    • H04L9/32
    • H04L63/10G06Q20/3678H04L63/123
    • In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital signature generated based on the configuration indication. Generation of the digital signature accounts for a unique identifier nominally associated with the computing device. The received configuration indication is verified to be authentic including processing the unique identifier, the received configuration indication and the received digital signature. The computing device is operated or interoperated with in accordance with the received configuration indication. In one example, a service interoperates with the computing device. For example, the computing device may be a portable media player, and the service may provide media to the computing device based on a capacity indication of the configuration indication.
    • 根据广泛的方面,提供了一种用于安全地配置计算设备的方法。 配置指示被接收到计算设备中,包括接收基于配置指示生成的数字签名。 数字签名的生成考虑了名义上与计算设备相关联的唯一标识符。 所接收的配置指示被验证为真实的,包括处理唯一标识符,接收到的配置指示和接收到的数字签名。 计算设备根据接收到的配置指示进行操作或互操作。 在一个示例中,服务与计算设备互操作。 例如,计算设备可以是便携式媒体播放器,并且服务可以基于配置指示的容量指示向计算设备提供媒体。
    • 22. 发明申请
    • Program optimization with intermediate code
    • 程序优化与中间代码
    • US20050125783A1
    • 2005-06-09
    • US10731766
    • 2003-12-09
    • Reid TatgeAlan DavisAlan Ward
    • Reid TatgeAlan DavisAlan Ward
    • G06F9/445G06F9/45
    • G06F8/54G06F8/443
    • In some embodiments, a code generating system comprises a compiler that receives source code written in a high-level programming language and generates object code and intermediate code. In addition, the code generating system comprises a linker that receives the object code and the intermediate code and sends the intermediate code to a code optimizer that is coupled to the compiler. In some embodiments, the intermediate code generated by the compiler is stored in a magnetic storage device before being sent to the linker. In other embodiments, the intermediate code is stored in non-volatile memory before being set to the linker.
    • 在一些实施例中,代码生成系统包括接收以高级编程语言编写的源代码并生成目标代码和中间代码的编译器。 此外,代码生成系统包括接收目标代码和中间代码的链接器,并将中间代码发送到耦合到编译器的代码优化器。 在一些实施例中,由编译器生成的中间代码在发送到链接器之前被存储在磁存储设备中。 在其他实施例中,中间代码在设置到链接器之前被存储在非易失性存储器中。
    • 24. 发明授权
    • Secure configuration of computing device
    • 计算设备的安全配置
    • US08631241B2
    • 2014-01-14
    • US13531357
    • 2012-06-22
    • Christopher R. WysockiAlan Ward
    • Christopher R. WysockiAlan Ward
    • G06F21/00
    • H04L63/10G06Q20/3678H04L63/123
    • In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital signature generated based on the configuration indication. Generation of the digital signature accounts for a unique identifier nominally associated with the computing device. The received configuration indication may be verified to be authentic including processing the unique identifier, the received configuration indication and the received digital signature. The computing device may be operated or interoperated with in accordance with the received configuration indication. In one example, a service interoperates with the computing device. For example, the computing device may be a portable media player, and the service may provide media to the computing device based on a capacity indication of the configuration indication.
    • 根据广泛的方面,提供了一种用于安全地配置计算设备的方法。 配置指示被接收到计算设备中,包括接收基于配置指示生成的数字签名。 数字签名的生成考虑了名义上与计算设备相关联的唯一标识符。 所接收的配置指示可以被验证为真实的,包括处理唯一标识符,接收到的配置指示和所接收的数字签名。 计算设备可以根据接收到的配置指示来操作或互操作。 在一个示例中,服务与计算设备互操作。 例如,计算设备可以是便携式媒体播放器,并且服务可以基于配置指示的容量指示向计算设备提供媒体。
    • 26. 发明申请
    • Secure Configuration of a Computing Device
    • 计算设备的安全配置
    • US20110007895A1
    • 2011-01-13
    • US12878201
    • 2010-09-09
    • Christopher R. WysockiAlan Ward
    • Christopher R. WysockiAlan Ward
    • H04L9/30H04L9/32H04M3/00
    • H04L63/10G06Q20/3678H04L63/123
    • In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital signature generated based on the configuration indication. Generation of the digital signature accounts for a unique identifier nominally associated with the computing device. The received configuration indication may be verified to be authentic including processing the unique identifier, the received configuration indication and the received digital signature. The computing device may be operated or interoperated with in accordance with the received configuration indication. In one example, a service interoperates with the computing device. The configuration indication and digital signature may be provided from the computing device to the service, and the service may interoperate with the computing device in accordance with the configuration indication and the digital signature. For example, the computing device may be a portable media player, and the service may provide media to the computing device based on a capacity indication of the configuration indication.
    • 根据广泛的方面,提供了一种用于安全地配置计算设备的方法。 配置指示被接收到计算设备中,包括接收基于配置指示生成的数字签名。 数字签名的生成考虑了名义上与计算设备相关联的唯一标识符。 所接收的配置指示可以被验证为真实的,包括处理唯一标识符,接收到的配置指示和所接收的数字签名。 计算设备可以根据接收到的配置指示来操作或互操作。 在一个示例中,服务与计算设备互操作。 可以从计算设备向服务提供配置指示和数字签名,并且服务可以根据配置指示和数字签名与计算设备进行互操作。 例如,计算设备可以是便携式媒体播放器,并且服务可以基于配置指示的容量指示向计算设备提供媒体。
    • 27. 发明申请
    • Configuration of a computing device in a secure manner
    • 以安全的方式配置计算设备
    • US20070028109A1
    • 2007-02-01
    • US11191133
    • 2005-07-26
    • Christopher WysockiAlan Ward
    • Christopher WysockiAlan Ward
    • H04L9/00
    • H04L63/10G06Q20/3678H04L63/123
    • In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital signature generated based on the configuration indication. Generation of the digital signature accounts for a unique identifier nominally associated with the computing device. The received configuration indication is verified to be authentic including processing the unique identifier, the received configuration indication and the received digital signature. The computing device is operated or interoperated with in accordance with the received configuration indication. In one example, a service interoperates with the computing device. The configuration indication and digital signature are provided from the computing device to the service, and the service interoperates with the computing device in accordance with the configuration indication and the digital signature. For example, the computing device may be a portable media player, and the service may provide media to the computing device based on a capacity indication of the configuration indication.
    • 根据广泛的方面,提供了一种用于安全地配置计算设备的方法。 配置指示被接收到计算设备中,包括接收基于配置指示生成的数字签名。 数字签名的生成考虑了名义上与计算设备相关联的唯一标识符。 所接收的配置指示被验证为真实的,包括处理唯一标识符,接收到的配置指示和接收到的数字签名。 计算设备根据接收到的配置指示进行操作或互操作。 在一个示例中,服务与计算设备互操作。 从计算设备向服务提供配置指示和数字签名,并且服务根据配置指示和数字签名与计算设备进行交互操作。 例如,计算设备可以是便携式媒体播放器,并且服务可以基于配置指示的容量指示向计算设备提供媒体。
    • 28. 发明申请
    • SECURE CONFIGURATION OF COMPUTING DEVICE
    • 计算设备的安全配置
    • US20120297199A1
    • 2012-11-22
    • US13531357
    • 2012-06-22
    • Christopher R. WysockiAlan Ward
    • Christopher R. WysockiAlan Ward
    • H04L9/32
    • H04L63/10G06Q20/3678H04L63/123
    • In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital signature generated based on the configuration indication. Generation of the digital signature accounts for a unique identifier nominally associated with the computing device. The received configuration indication may be verified to be authentic including processing the unique identifier, the received configuration indication and the received digital signature. The computing device may be operated or interoperated with in accordance with the received configuration indication. In one example, a service interoperates with the computing device. For example, the computing device may be a portable media player, and the service may provide media to the computing device based on a capacity indication of the configuration indication.
    • 根据广泛的方面,提供了一种用于安全地配置计算设备的方法。 配置指示被接收到计算设备中,包括接收基于配置指示生成的数字签名。 数字签名的生成考虑了名义上与计算设备相关联的唯一标识符。 所接收的配置指示可以被验证为真实的,包括处理唯一标识符,接收到的配置指示和所接收的数字签名。 计算设备可以根据接收到的配置指示来操作或互操作。 在一个示例中,服务与计算设备互操作。 例如,计算设备可以是便携式媒体播放器,并且服务可以基于配置指示的容量指示向计算设备提供媒体。