会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明授权
    • Automatic modification of executable code
    • 自动修改可执行代码
    • US08555380B2
    • 2013-10-08
    • US12039486
    • 2008-02-28
    • Vedvyas ShanbhogueRavi SahitaUday Savagaonkar
    • Vedvyas ShanbhogueRavi SahitaUday Savagaonkar
    • G06F11/00
    • G06F9/4484G06F2209/542
    • A method for automatically modifying an executable file for a software agent is provided. The method comprises detecting original static entry and exit points in the executable file and generating corresponding transformed points; modifying the executable file by linking the executable file to the integrity services environment and embedding a signed agent manifest; loading the modified executable file into memory and registering a target list with the software agent's hypervisor, wherein the target list provides mappings between protected and active page tables; detecting dynamic entry and exit points in the executable file and generating corresponding transformed points; switching to a protected context, in response to a transformed exit point being invoked, and switching to an active context, in response a transformed entry point being invoked; and de-registering the software agent with the memory protection module, in response to the software agent being unloaded.
    • 提供了一种用于自动修改软件代理的可执行文件的方法。 该方法包括检测可执行文件中的原始静态入口点和出口点,并产生相应的变换点; 通过将可执行文件链接到完整性服务环境并嵌入签名的代理清单来修改可执行文件; 将修改的可执行文件加载到存储器中并且与所述软件代理的管理程序注册目标列表,其中所述目标列表提供受保护页面和活动页面表之间的映射; 检测可执行文件中的动态入口点和出口点,并生成相应的转换点; 响应于被转换的退出点被调用,切换到受保护的上下文,并且响应于被转换的入口点被切换到活动上下文; 以及响应于所述软件代理被卸载,将所述软件代理与所述存储器保护模块取消注册。
    • 48. 发明授权
    • Generating multiple address space identifiers per virtual machine to switch between protected micro-contexts
    • 为每个虚拟机生成多个地址空间标识符,以便在受保护的微上下文之间切换
    • US08738889B2
    • 2014-05-27
    • US13650227
    • 2012-10-12
    • Uday SavagaonkarMadhavan ParthasarathyRavi SahitaDavid Durham
    • Uday SavagaonkarMadhavan ParthasarathyRavi SahitaDavid Durham
    • G06F12/00
    • G06F12/1027G06F12/145
    • Embodiments of an invention for generating multiple address space identifiers per virtual machine to switch between protected micro-contexts are disclosed. In one embodiment, a method includes receiving an instruction requiring an address translation; initiating, in response to receiving the instruction, a page walk from a page table pointed to by the contents of a page table pointer storage location; finding, during the page walk, a transition entry; storing the address translation and one of a plurality of address source identifiers in a translation lookaside buffer, the one of the plurality of address source identifiers based on one of a plurality of a virtual partition identifiers, at least two of the plurality of virtual partition identifiers associated with one of a plurality of virtual machines; and re-initiating the page walk.
    • 公开了用于在每个虚拟机之间生成多个地址空间标识符以在受保护的微上下文之间切换的发明的实施例。 在一个实施例中,一种方法包括接收需要地址转换的指令; 响应于接收到指令,从页表指针存储位置的内容指向的页表中启动页面移动; 在页面散步期间发现转换条目; 将地址转换和多个地址源标识符之一存储在转换后备缓冲器中,所述多个地址源标识符中的一个基于多个虚拟分区标识符中的一个,多个虚拟分区标识符中的至少两个 与多个虚拟机中的一个相关联; 并重新启动页面散步。
    • 50. 发明授权
    • Protecting caller function from undesired access by callee function
    • 保护来电功能免受被叫功能的不期望的访问
    • US08261065B2
    • 2012-09-04
    • US11770067
    • 2007-06-28
    • Uday SavagaonkarDavid DurhamRavi SahitaSubhash Gutti
    • Uday SavagaonkarDavid DurhamRavi SahitaSubhash Gutti
    • G06F21/00
    • G06F21/52G06F9/4486
    • Disclosed is a method for restricting access of a first code of a plurality of codes and data of a first function from a second function. Thee method comprises calling the second function by the first function, addresses of the plurality of data may be stored in a stack page and colored in a first color (102). The method comprises performing access control check in a transition page for verifying whether the first function has permission to call the second function (104). Further the method comprises protecting the first code from the second function by coloring the data and/or addresses in a second color (106). Furthermore, the method comprises executing the second function by pushing addresses of the second function on the stack page, the addresses of the second function colored in a third color (108) and unprotecting the first code by coloring the addresses of the first code in the first color (110).
    • 公开了一种用于从第二功能限制多个代码的第一代码和第一函数的数据的访问的方法。 该方法包括通过第一功能调用第二功能,多个数据的地址可以被存储在堆栈页面中并以第一颜色(102)着色。 该方法包括在转换页面中执行访问控制检查,以验证第一功能是否具有调用第二功能的权限(104)。 此外,该方法包括通过使第二颜色(106)中的数据和/或地址着色来保护第一代码免受第二功能。 此外,该方法包括通过在堆栈页面上推动第二函数的地址来执行第二函数,第二函数的地址以第三颜色(108)着色,并且通过着色第一代码中的第一代码的地址来对第一代码进行保护 第一颜色(110)。