会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 54. 发明授权
    • Data recovery and overwrite independent of operating system
    • 独立于操作系统的数据恢复和覆盖
    • US08307175B2
    • 2012-11-06
    • US12492964
    • 2009-06-26
    • Hormuzd M. KhosraviMojtaba Mojy MirashrafiDuncan GlendinningGyan Prakash
    • Hormuzd M. KhosraviMojtaba Mojy MirashrafiDuncan GlendinningGyan Prakash
    • G06F12/00G06F13/00G06F13/28
    • G06F21/6218
    • Methods and systems to access data in a computer system independent of an operating environment of the computer system, including to recover data to a remote system, to overwrite data, and to copy data to a hidden partition. A management system may directly access a storage device of the computer system and communicate with the remote system over a data channel that is secure from an operating environment of the computer system. The management system may access the storage device on a block basis, using a device driver associated with a storage device controller, and may include a virtualization engine to access the storage device. The remote system may include logic to request meta-data, to identify disk blocks corresponding to files of interest from the meta-data, and to construct the files of interest from the disk blocks.
    • 访问独立于计算机系统的操作环境的计算机系统中的数据的方法和系统,包括将数据恢复到远程系统,以覆盖数据,以及将数据复制到隐藏分区。 管理系统可以直接访问计算机系统的存储设备,并通过数据通道与远程系统通信,该数据通道与计算机系统的操作环境是安全的。 管理系统可以使用与存储设备控制器相关联的设备驱动程序在块上访问存储设备,并且可以包括访问存储设备的虚拟化引擎。 远程系统可以包括请求元数据的逻辑,从元数据中识别与感兴趣的文件相对应的磁盘块,以及从磁盘块构造感兴趣的文件。
    • 55. 发明授权
    • Determination by circuitry of presence of authorized and/or malicious data
    • 通过存在授权和/或恶意数据的电路确定
    • US08214902B2
    • 2012-07-03
    • US12487878
    • 2009-06-19
    • Hormuzd M. KhosraviVincent E. Von BokernMen Long
    • Hormuzd M. KhosraviVincent E. Von BokernMen Long
    • G06F12/14G06F11/30H04L29/06H04L9/32H03K19/003
    • G06F21/565
    • An embodiment may include circuitry that may be comprised in a host. The host may include memory and a host processor to execute an operating system. The circuitry may be to determine, independently of the operating system and the host processor, the authenticity of signature list information, based at least in part upon authentication information received by the circuitry from a remote server. The circuitry also may be to determine, independently of the operating system and the host processor, based at least in part upon comparison of at least one portion of the signature list information with at least one portion of contents of the memory, whether authorized and/or malicious data are present in the at least one portion of the contents of the memory. Of course, many variations, modifications, and alternatives are possible without departing from this embodiment.
    • 实施例可以包括可以包括在主机中的电路。 主机可以包括存储器和主机处理器来执行操作系统。 该电路可以至少部分地基于电路从远程服务器接收的认证信息来独立于操作系统和主处理器来确定签名列表信息的真实性。 电路还可以至少部分地基于对签名列表信息的至少一部分与存储器的内容的至少一部分进行比较来独立于操作系统和主处理器来确定是否授权和/ 或恶意数据存在于存储器的内容的至少一部分中。 当然,在不偏离本实施例的情况下,可以进行许多变化,修改和替换。
    • 57. 发明申请
    • VIRTUAL AND HIDDEN SERVICE PARTITION AND DYNAMIC ENHANCED THIRD PARTY DATA STORE
    • 虚拟和隐藏服务分区和动态增强第三方数据存储
    • US20110161551A1
    • 2011-06-30
    • US12647538
    • 2009-12-27
    • Hormuzd M. KhosraviYasser RasheedVenkat R. Gokulrangan
    • Hormuzd M. KhosraviYasser RasheedVenkat R. Gokulrangan
    • G06F12/02
    • G06F21/80G06F9/5077
    • A system reserves and manages a hidden service partition through components of the hardware platform of a computing device. The hidden partition is not accessible by way of a host operating system on the computing device. A hardware platform controller provisions a portion of nonvolatile storage through configuration settings of the hardware platform controller. When the host system requests settings related to storage in the system, the request is routed through the interfaces of the hardware platform, and the hardware platform controller reports in accordance with the configuration settings, hiding the service partition. The hidden partition is dynamically modifiable through secure remote access to the hardware platform controller, not through the host system such as operating system or BIOS.
    • 系统通过计算设备的硬件平台的组件来保留和管理隐藏的服务分区。 隐藏的分区不能通过计算设备上的主机操作系统访问。 硬件平台控制器通过硬件平台控制器的配置设置来提供非易失性存储器的一部分。 当主机系统请求与系统存储相关的设置时,请求通过硬件平台的接口进行路由,硬件平台控制器根据配置设置进行报告,隐藏服务分区。 隐藏的分区可以通过安全远程访问硬件平台控制器而不是通过主机系统(如操作系统或BIOS)进行动态修改。