会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 52. 发明申请
    • Hierarchical Trust Based Posture Reporting and Policy Enforcement
    • 基于层次信任的姿势报告和策略执行
    • US20100162356A1
    • 2010-06-24
    • US12714979
    • 2010-03-01
    • Hormuzd KhosraviDavid DurhamKaranvir Grewal
    • Hormuzd KhosraviDavid DurhamKaranvir Grewal
    • G06F17/30
    • H04L63/0227
    • A method that includes initiating a network access request from an access requester on a platform that couples to a network, the network access request made to a policy decision point for the network. The method also includes establishing a secure communication channel over a communication link between the policy decision point and a policy enforcement point on the platform. Another secure communication channel is established over another communication link. The other communication link is between at least the policy enforcement point and a manageability engine resident on the platform. The manageability engine forwards posture information associated with the access requester via the other secure communication channel. The posture information is then forwarded to the policy decision point via the secure communication channel between the policy enforcement point and the policy decision point. The policy decision point indicates what access the access requester can obtain to the network based on a comparison of the posture information to one or more network administrative policies.
    • 一种方法,其包括从耦合到网络的平台上的访问请求者发起网络访问请求,所述网络访问请求发送到网络的策略决策点。 该方法还包括在策略决策点和平台上的策略执行点之间的通信链路上建立安全通信信道。 通过另一个通信链路建立另一个安全通信信道。 另一个通信链路至少在平台上驻留的策略执行点和可管理引擎之间。 可管理性引擎经由另一个安全通信信道转发与访问请求者相关联的姿势信息。 然后,姿势信息经由策略执行点和策略决策点之间的安全通信信道被转发到策略决策点。 策略决策点基于姿势信息与一个或多个网络管理策略的比较来指示访问请求者可以获得哪些访问到网络。
    • 53. 发明申请
    • Hierarchical trust based posture reporting and policy enforcement
    • 基于层次信任的姿势报告和策略执行
    • US20070234402A1
    • 2007-10-04
    • US11395504
    • 2006-03-31
    • Hormuzd KhosraviDavid DurhamKaranvir Grewal
    • Hormuzd KhosraviDavid DurhamKaranvir Grewal
    • H04L9/32
    • H04L63/0227
    • A method that includes initiating a network access request from an access requester on a platform that couples to a network, the network access request made to a policy decision point for the network. The method also includes establishing a secure communication channel over a communication link between the policy decision point and a policy enforcement point on the platform. Another secure communication channel is established over another communication link. The other communication link is between at least the policy enforcement point and a manageability engine resident on the platform. The manageability engine forwards posture information associated with the access requester via the other secure communication channel. The posture information is then forwarded to the policy decision point via the secure communication channel between the policy enforcement point and the policy decision point. The policy decision point indicates what access the access requester can obtain to the network based on a comparison of the posture information to one or more network administrative policies.
    • 一种方法,其包括从耦合到网络的平台上的访问请求者发起网络访问请求,所述网络访问请求发送到网络的策略决策点。 该方法还包括在策略决策点和平台上的策略执行点之间的通信链路上建立安全通信信道。 通过另一个通信链路建立另一个安全通信信道。 另一个通信链路至少在平台上驻留的策略执行点和可管理引擎之间。 可管理性引擎经由另一个安全通信信道转发与访问请求者相关联的姿势信息。 然后,姿势信息经由策略执行点和策略决策点之间的安全通信信道被转发到策略决策点。 策略决策点基于姿势信息与一个或多个网络管理策略的比较来指示访问请求者可以获得哪些访问到网络。
    • 54. 发明申请
    • METHODS AND SYSTEMS TO DIRECLTY RENDER AN IMAGE AND CORRELATE CORRESPONDING USER INPUT IN A SECUIRE MEMORY DOMAIN
    • 方法和系统直接渲染图像和相关的用户输入在一个SECUIRE记忆体域
    • US20100169666A1
    • 2010-07-01
    • US12347576
    • 2008-12-31
    • Prashant DewanDavid Durham
    • Prashant DewanDavid Durham
    • G06F12/14G06F3/048H04L9/32G06F12/10
    • G06F21/36
    • Methods and systems to assign an application and a video frame buffer to a protected memory domain to render an image of a keyboard from the protected memory domain to a random position of the video frame buffer and correlate user input from a pointing device to the rendered keyboard image. The keyboard image may be randomly repositioned following a user input. The keyboard image may be rendered over a secure user image. An acknowledgment image may be rendered from the protected memory domain to a random position of the video frame buffer, and may be randomly repositioned in response to a user input that does not correlate to the acknowledgment image. User inputs that do not correlate to a randomly positioned image may be counted, and one or more processes may be aborted when the number of non-correlated user inputs exceeds a threshold.
    • 将应用程序和视频帧缓冲区分配给受保护的存储器域以将键盘的图像从受保护的存储器域呈现到视频帧缓冲器的随机位置并将来自指示设备的用户输入与所渲染的键盘相关联的方法和系统 图片。 键盘图像可以在用户输入之后被随机重新定位。 键盘图像可以通过安全的用户图像呈现。 确认图像可以从受保护的存储器域呈现到视频帧缓冲器的随机位置,并且可以响应于与确认图像不相关的用户输入而被随机地重新定位。 可以计数与随机定位的图像不相关的用户输入,并且当非相关用户输入的数量超过阈值时,可以中止一个或多个进程。
    • 55. 发明申请
    • Copy Equivalent Protection Using Secure Page Flipping For Software Components Within An Execution Environment
    • 在执行环境中使用安全页面翻转软件组件复制等效保护
    • US20130298120A1
    • 2013-11-07
    • US13860912
    • 2013-04-11
    • David DurhamPrashant Dewan
    • David DurhamPrashant Dewan
    • G06F9/455
    • G06F9/455G06F12/145G06F12/1491
    • Embodiments of copy equivalent protection using secure page flipping for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor (VMM), Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. In an embodiment, an embedded VM is allowed to directly manipulate page table mappings so that, even without running the VMM or obtaining VMXRoot privilege, the embedded VM can directly flip pages of memory into its direct/exclusive control and back. Other embodiments may be described and claimed.
    • 这里一般地描述使用执行环境中的软件组件的安全页面翻转的复制等效保护的实施例。 一个实施例包括虚拟机监视器(VMM),操作系统监视器或其他底层平台功能的能力,以限制仅通过特定认证,授权和验证的软件组件进行访问的存储区域,即使在其他方面受到损害的操作系统环境 。 在一个实施例中,嵌入式VM被允许直接操纵页表映射,使得即使没有运行VMM或获得VMXRoot特权,嵌入式VM也可以将存储器的页面直接翻转为其直接/排他控制和返回。 可以描述和要求保护其他实施例。
    • 56. 发明授权
    • Methods and systems to directly render an image and correlate corresponding user input in a secure memory domain
    • 直接呈现图像并将相应的用户输入关联到安全存储器域中的方法和系统
    • US08364601B2
    • 2013-01-29
    • US12347576
    • 2008-12-31
    • Prashant DewanDavid Durham
    • Prashant DewanDavid Durham
    • G06F7/04G06F17/30H04N7/16
    • G06F21/36
    • Methods and systems to assign an application and a video frame buffer to a protected memory domain to render an image of a keyboard from the protected memory domain to a random position of the video frame buffer and correlate user input from a pointing device to the rendered keyboard image. The keyboard image may be randomly repositioned following a user input. The keyboard image may be rendered over a secure user image. An acknowledgment image may be rendered from the protected memory domain to a random position of the video frame buffer, and may be randomly repositioned in response to a user input that does not correlate to the acknowledgment image. User inputs that do not correlate to a randomly positioned image may be counted, and one or more processes may be aborted when the number of non-correlated user inputs exceeds a threshold.
    • 将应用程序和视频帧缓冲区分配给受保护的存储器域以将键盘的图像从受保护的存储器域呈现到视频帧缓冲器的随机位置并将来自指示设备的用户输入与所渲染的键盘相关联的方法和系统 图片。 键盘图像可以在用户输入之后被随机重新定位。 键盘图像可以通过安全的用户图像呈现。 确认图像可以从受保护的存储器域呈现到视频帧缓冲器的随机位置,并且可以响应于与确认图像不相关的用户输入而被随机地重新定位。 可以计数与随机定位的图像不相关的用户输入,并且当非相关用户输入的数量超过阈值时,可以中止一个或多个进程。
    • 57. 发明授权
    • Copy equivalent protection using secure page flipping for software components within an execution environment
    • 使用执行环境中软件组件的安全页面翻转复制等效保护
    • US08423747B2
    • 2013-04-16
    • US12164489
    • 2008-06-30
    • David DurhamPrashant Dewan
    • David DurhamPrashant Dewan
    • G06F12/00
    • G06F9/455G06F12/145G06F12/1491
    • Embodiments of copy equivalent protection using secure page flipping for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor (VMM), Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. In an embodiment, an embedded VM is allowed to directly manipulate page table mappings so that, even without running the VMM or obtaining VMXRoot privilege, the embedded VM can directly flip pages of memory into its direct/exclusive control and back. Other embodiments may be described and claimed.
    • 这里一般地描述使用执行环境中的软件组件的安全页面翻转的复制等效保护的实施例。 一个实施例包括虚拟机监视器(VMM),操作系统监视器或其他底层平台功能的能力,以限制仅通过特定认证,授权和验证的软件组件进行访问的存储区域,即使在其他方面受到损害的操作系统环境的一部分 。 在一个实施例中,嵌入式VM被允许直接操纵页表映射,使得即使没有运行VMM或获得VMXRoot特权,嵌入式VM也可以将存储器的页面直接翻转为其直接/排他控制和返回。 可以描述和要求保护其他实施例。
    • 58. 发明申请
    • COPY EQUIVALENT PROTECTION USING SECURE PAGE FLIPPING FOR SOFTWARE COMPONENTS WITHIN AN EXECUTION ENVIRONMENT
    • 使用执行环境中软件组件的安全页面转移的复制等效保护
    • US20090327575A1
    • 2009-12-31
    • US12164489
    • 2008-06-30
    • David DurhamPrashant Dewan
    • David DurhamPrashant Dewan
    • G06F12/08
    • G06F9/455G06F12/145G06F12/1491
    • Embodiments of copy equivalent protection using secure page flipping for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor (VMM), Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. In an embodiment, an embedded VM is allowed to directly manipulate page table mappings so that, even without running the VMM or obtaining VMXRoot privilege, the embedded VM can directly flip pages of memory into its direct/exclusive control and back. Other embodiments may be described and claimed.
    • 这里一般地描述使用执行环境中的软件组件的安全页面翻转的复制等效保护的实施例。 一个实施例包括虚拟机监视器(VMM),操作系统监视器或其他底层平台功能的能力,以限制仅通过特定认证,授权和验证的软件组件进行访问的存储区域,即使在其他方面受到损害的操作系统环境的一部分 。 在一个实施例中,嵌入式VM被允许直接操纵页表映射,使得即使没有运行VMM或获得VMXRoot特权,嵌入式VM也可以将存储器的页面直接翻转为其直接/排他控制和返回。 可以描述和要求保护其他实施例。