会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明申请
    • Method and system for a platform-based trust verifying service for multi-party verification
    • 用于多方验证的基于平台的信任验证服务的方法和系统
    • US20090328164A1
    • 2009-12-31
    • US12215907
    • 2008-06-30
    • Divya Naidu SunderHormuzd KhosraviDavid DurhamDan DahlePrashant Dewan
    • Divya Naidu SunderHormuzd KhosraviDavid DurhamDan DahlePrashant Dewan
    • G06F7/58
    • H04L63/126G06F21/31G06F21/57G06F21/577G06F2221/2129H04L63/0823H04L63/123
    • A method and system for a platform-based trust verifying service for multi-party verification. In one embodiment, the method includes a client platform accessing an service provider over a network. Upon accessing the service provider, the client platform receives a request from the service provider for platform measurement and verification. The client platform collects platform information and performs measurement and verification, including performing an integrity manifest comparison. If the integrity manifest comparison indicates a good client platform posture, then the client platform signs the client platform posture and sends an approval notification to the service provider indicating that the client platform has not been compromised. The client platform may then receive the service of the service provider. If the integrity manifest comparison indicates that the client platform posture is not good, then the client platform will send a failure notification to the service provider indicating that the client platform has been compromised.
    • 一种用于多方验证的基于平台的信任验证服务的方法和系统。 在一个实施例中,该方法包括通过网络访问服务提供商的客户端平台。 在访问服务提供商时,客户机平台从服务提供商接收用于平台测量和验证的请求。 客户端平台收集平台信息并执行测量和验证,包括执行完整性清单比较。 如果完整性清单比较表示良好的客户端平台姿态,则客户端平台签署客户端平台姿态,并向服务提供商发送一个批准通知,指示客户端平台尚未被泄露。 然后,客户端平台可以接收服务提供商的服务。 如果完整性清单比较表明客户端平台姿势不好,那么客户端平台将向服务提供商发送一个失败通知,指示客户端平台已被破坏。
    • 44. 发明申请
    • Hierarchical Trust Based Posture Reporting and Policy Enforcement
    • 基于层次信任的姿势报告和策略执行
    • US20100162356A1
    • 2010-06-24
    • US12714979
    • 2010-03-01
    • Hormuzd KhosraviDavid DurhamKaranvir Grewal
    • Hormuzd KhosraviDavid DurhamKaranvir Grewal
    • G06F17/30
    • H04L63/0227
    • A method that includes initiating a network access request from an access requester on a platform that couples to a network, the network access request made to a policy decision point for the network. The method also includes establishing a secure communication channel over a communication link between the policy decision point and a policy enforcement point on the platform. Another secure communication channel is established over another communication link. The other communication link is between at least the policy enforcement point and a manageability engine resident on the platform. The manageability engine forwards posture information associated with the access requester via the other secure communication channel. The posture information is then forwarded to the policy decision point via the secure communication channel between the policy enforcement point and the policy decision point. The policy decision point indicates what access the access requester can obtain to the network based on a comparison of the posture information to one or more network administrative policies.
    • 一种方法,其包括从耦合到网络的平台上的访问请求者发起网络访问请求,所述网络访问请求发送到网络的策略决策点。 该方法还包括在策略决策点和平台上的策略执行点之间的通信链路上建立安全通信信道。 通过另一个通信链路建立另一个安全通信信道。 另一个通信链路至少在平台上驻留的策略执行点和可管理引擎之间。 可管理性引擎经由另一个安全通信信道转发与访问请求者相关联的姿势信息。 然后,姿势信息经由策略执行点和策略决策点之间的安全通信信道被转发到策略决策点。 策略决策点基于姿势信息与一个或多个网络管理策略的比较来指示访问请求者可以获得哪些访问到网络。
    • 45. 发明申请
    • SECURE PLATFORM VOUCHER SERVICE FOR SOFTWARE COMPONENTS WITHIN AN EXECUTION ENVIRONMENT
    • 执行环境中软件组件的安全平台提供服务
    • US20080022129A1
    • 2008-01-24
    • US11864573
    • 2007-09-28
    • David DurhamHormuzd KhosraviUri BlumenthalMen Long
    • David DurhamHormuzd KhosraviUri BlumenthalMen Long
    • H04L9/00G06F12/14H04L9/32
    • G06F21/54H04L9/004H04L9/3236H04L63/123H04L63/126H04L63/20H04L2209/60
    • Embodiments of apparatus, articles, methods, and systems for secure platform voucher service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise comprised operating system environment. A provisioning remote entity or gateway only needs to know a platform's public key or certificate hierarchy in order to receive verification proof for any component in the platform. The verification proof or voucher helps to assure to the remote entity that no man-in-the-middle, rootkit, spyware or other malware running in the platform or on the network will have access to the provisioned material. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed.
    • 这里一般地描述用于执行环境中的软件组件的安全平台凭单服务的装置,物品,方法和系统的实施例。 一个实施例包括虚拟机监视器,操作系统监视器或其他底层平台功能的能力,以限制仅通过特定认证的,授权的和已验证的软件组件进行访问的存储器区域,即使在另外包含的操作系统环境的一部分。 配置远程实体或网关只需要知道平台的公钥或证书层次结构,以便接收平台中任何组件的验证证明。 验证证明或凭证有助于向远程实体确保在平台或网络上运行的中间人,rootkit,间谍软件或其他恶意软件将无法访问所提供的资料。 代表被保护的内存区域中提供的经过身份验证/授权/验证的软件组件的锁定和解锁秘密的底层平台只能由经过身份验证/授权/验证的软件组件访问。 可以描述和要求保护其他实施例。
    • 48. 发明申请
    • Hierarchical trust based posture reporting and policy enforcement
    • 基于层次信任的姿势报告和策略执行
    • US20070234402A1
    • 2007-10-04
    • US11395504
    • 2006-03-31
    • Hormuzd KhosraviDavid DurhamKaranvir Grewal
    • Hormuzd KhosraviDavid DurhamKaranvir Grewal
    • H04L9/32
    • H04L63/0227
    • A method that includes initiating a network access request from an access requester on a platform that couples to a network, the network access request made to a policy decision point for the network. The method also includes establishing a secure communication channel over a communication link between the policy decision point and a policy enforcement point on the platform. Another secure communication channel is established over another communication link. The other communication link is between at least the policy enforcement point and a manageability engine resident on the platform. The manageability engine forwards posture information associated with the access requester via the other secure communication channel. The posture information is then forwarded to the policy decision point via the secure communication channel between the policy enforcement point and the policy decision point. The policy decision point indicates what access the access requester can obtain to the network based on a comparison of the posture information to one or more network administrative policies.
    • 一种方法,其包括从耦合到网络的平台上的访问请求者发起网络访问请求,所述网络访问请求发送到网络的策略决策点。 该方法还包括在策略决策点和平台上的策略执行点之间的通信链路上建立安全通信信道。 通过另一个通信链路建立另一个安全通信信道。 另一个通信链路至少在平台上驻留的策略执行点和可管理引擎之间。 可管理性引擎经由另一个安全通信信道转发与访问请求者相关联的姿势信息。 然后,姿势信息经由策略执行点和策略决策点之间的安全通信信道被转发到策略决策点。 策略决策点基于姿势信息与一个或多个网络管理策略的比较来指示访问请求者可以获得哪些访问到网络。
    • 49. 发明授权
    • Cumulative integrity check value (ICV) processor based memory content protection
    • 累积完整性检查值(ICV)处理器内存保护
    • US08826035B2
    • 2014-09-02
    • US12646028
    • 2009-12-23
    • David DurhamMen LongUday Savagaonkar
    • David DurhamMen LongUday Savagaonkar
    • G06F21/00
    • G06F21/79G06F21/72
    • In general, in one aspect, the disclosure describes a process that includes a cryptographic engine and first and second registers. The cryptographic engine is to encrypt data to be written to memory, to decrypt data read from memory, to generate read integrity check values (ICVs) and write ICVs for memory accesses. The cryptographic engine is also to create a cumulative read ICV and a cumulative write ICV by XORing the generated read ICV and the generated write ICV with a current read MAC and a current write ICV respectively and to validate data integrity by comparing the cumulative read ICV and the cumulative write ICV. The first and second registers are to store the cumulative read and write ICVs respectively at the processor. Other embodiments are described and claimed.
    • 通常,在一个方面,本公开描述了包括密码引擎和第一和第二寄存器的过程。 加密引擎是对要写入存储器的数据进行加密,解密从存储器读取的数据,生成读取完整性检查值(ICV),并为存储器访问写入ICV。 密码引擎还通过分别用当前读取的MAC和当前的写入ICV异或生成的读取ICV和产生的写ICV来创建累积读取ICV和累积写入ICV,并通过比较累积读取ICV和 累积写ICV。 第一和第二寄存器分别在处理器处存储累积读和写ICV。 描述和要求保护其他实施例。