会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Bundling extension installation with web browser installation
    • 捆绑扩展安装与Web浏览器安装
    • US09021468B1
    • 2015-04-28
    • US13110894
    • 2011-05-18
    • Carlos E. PizanoErik KayAaron Boodman
    • Carlos E. PizanoErik KayAaron Boodman
    • G06F9/445
    • G06Q30/0609G06F3/04842G06F8/61G06F8/62G06F9/54G06F11/0766G06F17/30861G06F17/3089G06F21/53G06F21/57H04L51/12H04L63/0823H04L63/1483H04L67/02H04L67/10H04L67/2842H04L67/289H04L67/34H04L67/42
    • According to one general aspect, a computer-implemented method may include receiving, at a server, a request from a computing device for an executable installation file. The executable installation file may be configured, when executed on the computing device, to install a web browser application on the computing device. The request may be associated with a specific network resource location that is hosted by the server. The method may include, in response to receiving the request, obtaining the executable installation file, dynamically incorporating a data file into the executable installation file. The data file may include a browser extension definition for a browser extension corresponding with the specific network resource location. The executable installation file, with the incorporated data file, may be further configured, when executed on the computing device, to install the defined browser extension on the computing device. The method may also include providing the executable installation file, with the incorporated data file, to the computing device.
    • 根据一个一般方面,计算机实现的方法可以包括在服务器处接收来自计算设备的可执行安装文件的请求。 可执行安装文件可以在计算设备上执行时被配置为在计算设备上安装web浏览器应用。 请求可以与由服务器托管的特定网络资源位置相关联。 该方法可以包括响应于接收到请求而获得可执行安装文件,将数据文件动态地并入到可执行安装文件中。 数据文件可以包括与特定网络资源位置对应的用于浏览器扩展的浏览器扩展定义。 具有合并的数据文件的可执行安装文件可以被进一步配置,当在计算设备上执行时,在计算设备上安装所定义的浏览器扩展。 该方法还可以包括将可执行安装文件与合并的数据文件一起提供给计算设备。
    • 2. 发明授权
    • Altered token sandboxing
    • 改变了令牌沙盒
    • US08429741B2
    • 2013-04-23
    • US12201967
    • 2008-08-29
    • Carlos E. PizanoNicolas SylvainJose Ricardo Vargas PuentesFinnur Breki ThorarinssonMark Alan Larson
    • Carlos E. PizanoNicolas SylvainJose Ricardo Vargas PuentesFinnur Breki ThorarinssonMark Alan Larson
    • G06F7/04G06F12/00G06F12/14G06F17/30G06D13/00G11C7/00
    • G06F21/53
    • Embodiments of the present invention relate generally to application security. In an embodiment, a method for altered token sandboxing includes creating a process based on a naked token and suspending the process. The method further includes obtaining an impersonation token and resuming the process with the impersonation token. The method further includes acquiring resources needed for the process with the impersonation token. The method also includes replacing the impersonation token with the naked token. In a further embodiment, the method further includes executing the suspended process with the naked token and the acquired resources. In another embodiment, a system for user-mode, altered token sandboxing includes a security module, an acquisition module and a replacement module. In a further embodiment, the system may include an execution module. In another embodiment, the system may include a request module.
    • 本发明的实施例一般涉及应用安全性。 在一个实施例中,用于改变的标记沙盒的方法包括基于裸体令牌创建过程并暂停该过程。 该方法还包括获得模拟令牌并使用模拟令牌恢复该过程。 该方法还包括利用模拟令牌获取该进程所需的资源。 该方法还包括用裸体令牌替换假冒令牌。 在另一实施例中,该方法还包括使用裸令牌和获取的资源来执行暂停进程。 在另一个实施例中,用于用户模式,改变的令牌沙盒的系统包括安全模块,采集模块和替换模块。 在另一实施例中,系统可以包括执行模块。 在另一个实施例中,系统可以包括请求模块。
    • 3. 发明申请
    • Altered Token Sandboxing
    • 改变令牌沙盒
    • US20100057774A1
    • 2010-03-04
    • US12201967
    • 2008-08-29
    • Carlos E. PIZANONicolas SylvainJose Ricardo PuentesFinnur Breki ThorarinssonMark Alan Larson
    • Carlos E. PIZANONicolas SylvainJose Ricardo PuentesFinnur Breki ThorarinssonMark Alan Larson
    • G06F17/30G06F21/00
    • G06F21/53
    • Embodiments of the present invention relate generally to application security. In an embodiment, a method for altered token sandboxing includes creating a process based on a naked token and suspending the process. The method further includes obtaining an impersonation token and resuming the process with the impersonation token. The method further includes acquiring resources needed for the process with the impersonation token. The method also includes replacing the impersonation token with the naked token. In a further embodiment, the method further includes executing the suspended process with the naked token and the acquired resources. In another embodiment, a system for user-mode, altered token sandboxing includes a security module, an acquisition module and a replacement module. In a further embodiment, the system may include an execution module. In another embodiment, the system may include a request module.
    • 本发明的实施例一般涉及应用安全性。 在一个实施例中,用于改变的标记沙盒的方法包括基于裸体令牌创建过程并暂停该过程。 该方法还包括获得模拟令牌并使用模拟令牌恢复该过程。 该方法还包括利用模拟令牌获取该进程所需的资源。 该方法还包括用裸体令牌替换假冒令牌。 在另一实施例中,该方法还包括使用裸令牌和获取的资源来执行暂停进程。 在另一个实施例中,用于用户模式,改变的令牌沙盒的系统包括安全模块,采集模块和替换模块。 在另一实施例中,系统可以包括执行模块。 在另一个实施例中,系统可以包括请求模块。
    • 4. 发明授权
    • Method for securing video images
    • 确保视频图像的方法
    • US06731756B1
    • 2004-05-04
    • US09337718
    • 1999-06-21
    • Carlos E. PizanoGregory L. Heileman
    • Carlos E. PizanoGregory L. Heileman
    • H04N7167
    • H04N21/44004H04N7/163
    • A method for protecting the video memory on a computer system from being illicitly copied. The invention decrypts a previously encrypted image and displays it on the video screen. During the time the image is displayed, the invention protects it from being copied by other running applications. This is accomplished in multithreaded operating systems by first issuing a multithreaded locking primitive to the video memory resource, and then inserting a pending video hardware request that will take precedence over any subsequent video memory access requests. The pending request serves the purpose of destroying the contents of video memory. The pending request is passive in that it does not execute unless a malicious program has removed the video memory lock.
    • 一种用于保护计算机系统上的视频存储器不被非法复制的方法。 本发明解密先前加密的图像并将其显示在视频屏幕上。 在显示图像的时间期间,本发明保护其不被其他正在运行的应用程序复制。 这通过首先向视频存储器资源发出多线程锁定原语,然后插入将优先于任何后续视频存储器访问请求的未决视频硬件请求来实现在多线程操作系统中。 挂起的请求用于破坏视频内存的内容。 挂起的请求是被动的,因为它不执行,除非恶意程序已经删除视频内存锁。