会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Trusted operating environment for malware detection
    • 可靠的恶意软件检测操作环境
    • US08230511B2
    • 2012-07-24
    • US12964889
    • 2010-12-10
    • Reshma KhilnaniKristofer N. Iverson
    • Reshma KhilnaniKristofer N. Iverson
    • H04L9/00G06F7/04
    • G06F21/567G06F21/575
    • Described herein are techniques and apparatuses for scanning a computing device for malware and/or viruses. In various embodiments, a trusted operating environment, which may include a trusted operating system and/or a trusted antivirus tool, may be utilized with respect to a computing device. More particularly, the trusted operating system may be used to boot the computing device. Moreover, the trusted antivirus tool may search the computing device for malware definition updates (e.g., virus signature updates) and use the trusted operating system to scan the computing device for malware. In other embodiments, the trusted antivirus tool may scan the computing device and remove any viruses detected by the trusted antivirus tool. The trusted operating system may then reboot the computing device into a clean environment once any detected viruses are removed.
    • 这里描述了用于扫描计算设备以用于恶意软件和/或病毒的技术和装置。 在各种实施例中,相对于计算设备可以使用可包括可信操作系统和/或可信防病毒工具的可信操作环境。 更具体地,可信操作系统可以用于引导计算设备。 此外,信任的防病毒工具可以搜索计算设备中的恶意软件定义更新(例如,病毒签名更新),并使用可信操作系统扫描计算设备以获取恶意软件。 在其他实施例中,信任的防病毒工具可以扫描计算设备并且去除由可信防病毒工具检测到的任何病毒。 一旦任何检测到的病毒被移除,受信操作系统就可以将计算设备重新启动到干净的环境中。
    • 3. 发明授权
    • Trusted operating environment for malware detection
    • 可靠的恶意软件检测操作环境
    • US07853999B2
    • 2010-12-14
    • US11747416
    • 2007-05-11
    • Reshma KhilnaniKristofer N. Iverson
    • Reshma KhilnaniKristofer N. Iverson
    • G06F9/00G06F7/04H04L9/32
    • G06F21/567G06F21/575
    • Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a trusted operating system and a trusted antivirus tool, is embodied on a removable data storage medium. A computing device is then booted from the removable data storage medium using the trusted operating system. The trusted antivirus tool searches the computing device for malware definition updates (e.g., virus signature updates) and uses the trusted operating system to scan the computing device for malware. In another implementation, a computing device is booting from a trusted operating system on a removable device and a trusted antivirus tool on the removable device scans the computing device for malware. The removable device can update its own internal components (e.g., virus signatures and antivirus tool) by searching the computing device or a remote resource for updates and authenticating any updates that are located.
    • 描述了用于扫描计算设备以用于恶意软件的技术和设备。 在一个实现中,包括可信操作系统和可信赖的防病毒工具的可信操作环境体现在可移动数据存储介质上。 然后使用可信操作系统从可移动数据存储介质引导计算设备。 可信任的防病毒工具在计算设备上搜索恶意软件定义更新(例如,病毒签名更新),并使用可信操作系统扫描计算设备以获取恶意软件。 在另一实现中,计算设备从可移动设备上的可信操作系统引导,并且可移动设备上的可信防病毒工具扫描计算设备以获取恶意软件。 可移动设备可以通过搜索计算设备或远程资源来更新其自己的内部组件(例如,病毒签名和防病毒工具),并验证所位于的任何更新。
    • 4. 发明授权
    • Trial-before-purchase subscription game infrastructure for peer-peer networks
    • 用于对等网络的购买前购买订阅游戏基础设施
    • US07636783B2
    • 2009-12-22
    • US11005511
    • 2004-12-06
    • Eric D. HeutchyKristofer N. IversonStephen P. Miller
    • Eric D. HeutchyKristofer N. IversonStephen P. Miller
    • G06F15/16G06F7/04G06F17/30G06K9/00
    • G06F21/10H04L67/38
    • A game or other software program is made accessible for execution by clients on a peer-peer network only after a plurality of verifications are made to ensure that control of the software is maintained. With a request sent to a server to access the software, a client includes a nonce and an ID of the user. The server digitally signs a portion of a ticket that is returned to the client, which includes the nonce, a time stamp, and the ID. The ticket is required to access the software. The clients are required to exchange the tickets, verify the digital signature on the portion of each ticket, and use the information therein to confirm that the tickets are current, issued by the correct server, issued to the proper users, and received from the users who are intended to execute the software.
    • 游戏或其他软件程序只有在进行多次验证之后才能访问对等网络上的客户端进行执行,以确保维护软件的控制。 通过发送到服务器来访问软件的请求,客户端包括用户的随机数和ID。 服务器对返回给客户端的一部分票据进行数字签名,其中包括随机数,时间戳和ID。 该机票需要访问该软件。 客户需要交换机票,验证每张票据部分的数字签名,并使用其中的信息确认票证是由正确的服务器颁发的,发给正确的用户,并从用户那里收到的 谁打算执行该软件。
    • 6. 发明授权
    • Trusted operating environment for malware detection
    • 可靠的恶意软件检测操作环境
    • US09251350B2
    • 2016-02-02
    • US13102324
    • 2011-05-06
    • Reshma P KhilnaniKristofer N. Iverson
    • Reshma P KhilnaniKristofer N. Iverson
    • H04L29/06G06F21/57G06F21/00G06F21/56
    • G06F21/575G06F21/00G06F21/567
    • Described herein are techniques and apparatuses for scanning a computing device for malware and/or viruses. In various embodiments, a trusted operating environment, which may include a trusted operating system and/or a trusted antivirus tool, may be utilized with respect to a computing device. More particularly, the trusted operating system may be used to boot the computing device. Moreover, the trusted antivirus tool may search the computing device for malware definition updates (e.g., virus signature updates) and use the trusted operating system to scan the computing device for malware. In other embodiments, the trusted antivirus tool may scan the computing device and remove any viruses detected by the trusted antivirus tool. The trusted operating system may then reboot the computing device into a clean environment once any detected viruses are removed.
    • 这里描述了用于扫描计算设备以用于恶意软件和/或病毒的技术和装置。 在各种实施例中,相对于计算设备可以使用可包括可信操作系统和/或可信防病毒工具的可信操作环境。 更具体地,可信操作系统可以用于引导计算设备。 此外,信任的防病毒工具可以搜索计算设备中的恶意软件定义更新(例如,病毒签名更新),并使用可信操作系统扫描计算设备以获取恶意软件。 在其他实施例中,信任的防病毒工具可以扫描计算设备并且去除由可信防病毒工具检测到的任何病毒。 一旦任何检测到的病毒被移除,受信操作系统就可以将计算设备重新启动到干净的环境中。
    • 8. 发明授权
    • Accessible content reputation lookup
    • 可访问的内容信誉查询
    • US07966553B2
    • 2011-06-21
    • US11759401
    • 2007-06-07
    • Kristofer N. Iverson
    • Kristofer N. Iverson
    • G06F17/30
    • H04L63/1441
    • Implementations of accessible content reputation lookup are described. In one implementation, before a user activates a link in a document, such as a hyperlink on a webpage, the user can designate the link. For example, the user can float a cursor over the link or interact with an icon placed proximate to the link. By designating the link, the user can request reputation information associated with the link, including information as to whether or not content associated with the link, an application used to access the content, and/or source(s) on which the content resides, are known to be dangerous or risky. If the reputation information indicates that the link is safe to activate, the user can activate the link and access the content. Alternately, if the reputation information indicates that the link is unsafe to access, the user can choose to forego activation of the link.
    • 描述可访问内容信誉查询的实现。 在一个实现中,在用户激活文档中的链接(例如网页上的超链接)之前,用户可以指定链接。 例如,用户可以将光标浮在链接上或与靠近链接放置的图标交互。 通过指定链接,用户可以请求与链接相关联的信誉信息,包括关于与链接相关联的内容的信息,用于访问内容的应用和/或内容所在的源, 已知是危险的或有风险的。 如果信誉信息表明该链接是安全的激活,则用户可以激活链接并访问该内容。 或者,如果信誉信息指示链路不安全地访问,则用户可以选择放弃链接的激活。
    • 9. 发明申请
    • Trusted Operating Environment For Malware Detection
    • 恶意软件检测的可信操作环境
    • US20110078796A1
    • 2011-03-31
    • US12964889
    • 2010-12-10
    • Reshma KhilnaniKristofer N. Iverson
    • Reshma KhilnaniKristofer N. Iverson
    • G06F21/00
    • G06F21/567G06F21/575
    • Described herein are techniques and apparatuses for scanning a computing device for malware and/or viruses. In various embodiments, a trusted operating environment, which may include a trusted operating system and/or a trusted antivirus tool, may be utilized with respect to a computing device. More particularly, the trusted operating system may be used to boot the computing device. Moreover, the trusted antivirus tool may search the computing device for malware definition updates (e.g., virus signature updates) and use the trusted operating system to scan the computing device for malware. In other embodiments, the trusted antivirus tool may scan the computing device and remove any viruses detected by the trusted antivirus tool. The trusted operating system may then reboot the computing device into a clean environment once any detected viruses are removed.
    • 这里描述了用于扫描计算设备以用于恶意软件和/或病毒的技术和装置。 在各种实施例中,相对于计算设备可以使用可包括可信操作系统和/或可信防病毒工具的可信操作环境。 更具体地,可信操作系统可以用于引导计算设备。 此外,信任的防病毒工具可以搜索计算设备中的恶意软件定义更新(例如,病毒签名更新),并使用可信操作系统扫描计算设备以获取恶意软件。 在其他实施例中,信任的防病毒工具可以扫描计算设备并且去除由可信防病毒工具检测到的任何病毒。 一旦任何检测到的病毒被移除,受信操作系统就可以将计算设备重新启动到干净的环境中。
    • 10. 发明授权
    • Merchant owned, ISP-hosted online stores with secure data store
    • 商家拥有,ISP托管的在线商店,安全数据存储
    • US06760711B1
    • 2004-07-06
    • US09229494
    • 1999-01-11
    • Don M. GillettEric S. AskilsrudKristofer N. Iverson
    • Don M. GillettEric S. AskilsrudKristofer N. Iverson
    • G06F1700
    • G06F21/6209G06F21/6245G06Q20/12G06Q20/382G06Q20/3823G06Q30/06H04L9/0825H04L9/083H04L9/0897H04L2209/56
    • An online commerce architecture enables merchants to setup online stores that are hosted by third party Internet service providers (ISPs). The architecture provides secure storage of the merchant's commerce information at the ISP-hosted store, based upon a private/public key pair owned by the merchant. When a purchase request is received from a customer, the ISP encrypts all or part of the request using a newly generated session key, and then encrypts that session key with the merchant's public key. The purchase request is stored at the ISP in its encrypted form. The merchant routinely accesses the ISP and retrieves the purchase requests in their encrypted form. The merchant decrypts the session key using the merchant's private key and then decrypts the purchase request using the recovered session key. Since only the merchant knows its private key, no one else (including the ISP) can decrypt the session key to decrypt the purchase requests for the merchant.
    • 在线商务架构使商家可以设置由第三方互联网服务提供商(ISP)托管的在线商店。 该架构基于由商家拥有的私人/公共密钥对,在ISP托管的商店提供商家的商业信息的安全存储。 当从客户接收到购买请求时,ISP使用新生成的会话密钥对全部或部分请求进行加密,然后用商家的公开密钥加密该会话密钥。 购买请求以其加密形式存储在ISP处。 商家通常访问ISP并以其加密形式检索购买请求。 商家使用商家的私钥解密会话密钥,然后使用恢复的会话密钥来解密购买请求。 由于只有商家知道其私钥,所以没有其他人(包括ISP)可以解密会话密钥来解密商家的购买请求。