会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Managing host application privileges
    • 管理主机应用程序权限
    • US08590037B2
    • 2013-11-19
    • US12342965
    • 2008-12-23
    • Ahmet AltayHaluk Kent TanikRobert Chin-Tse ChangXian Jun LiuOktay RasizadePo Yuan
    • Ahmet AltayHaluk Kent TanikRobert Chin-Tse ChangXian Jun LiuOktay RasizadePo Yuan
    • H04L29/06
    • G06F21/335H04L9/321H04L9/3271H04L63/0823H04L2209/80H04W12/06
    • A method and system of controlling access to a hardware or software feature provided by a host is disclosed. An application seeking authorization to access a feature transmits a credential and an index to a host agent within the host. The index is associated with the requested feature. The host agent reads credential validation data from a storage location corresponding to the index in a non-volatile storage device in communication with the host. The validity of the credential is determined based on the credential validation data, and an authorization is transmitted if the credential is valid. A third party can control the outcome of the validity determination by sending an instruction to the host to replace the credential validation data with invalid data that causes the validity test to fail. The third party can also control the non-volatile storage device data used by the application to calculate the credential.
    • 公开了一种控制由主机提供的硬件或软件特征的访问的方法和系统。 寻求授权以访问功能的应用程序向主机中的主机代理发送凭证和索引。 索引与请求的功能相关联。 主机代理从与主机通信的非易失性存储设备中的索引对应的存储位置读取凭证验证数据。 基于证书验证数据确定凭证的有效性,并且如果凭证有效则传送授权。 第三方可以通过向主机发送指令来替换凭证验证数据,使无效数据导致有效性测试失败来控制有效性确定的结果。 第三方还可以控制应用程序使用的非易失性存储设备数据来计算凭证。
    • 8. 发明申请
    • Method And System For Transferring Data And Instructions Through A Host File System
    • 通过主机文件系统传输数据和指令的方法和系统
    • US20090172393A1
    • 2009-07-02
    • US11967622
    • 2007-12-31
    • Haluk Kent TanikRobert Chin-Tse ChangPo YuanBahman QawamiFarshid Sabet-Sharghi
    • Haluk Kent TanikRobert Chin-Tse ChangPo YuanBahman QawamiFarshid Sabet-Sharghi
    • H04L9/28
    • G06F21/6218G06F21/79
    • A method for encrypting data may generate an encryption instruction and combine it with a payload of data to form a packet. The packet is associated with a command and passed to a host file system process. The packet, now associated with a second command, is received from the host file system process. The encryption instruction and the payload of data are extracted from the packet. At least a portion of the payload of data is encrypted based on the encryption instruction. A method for decrypting data may receive a packet and generate a decryption instruction. At least a portion of the packet is decrypted using at least the decryption instruction. The second packet comprising the decrypted packet is passed to a host file system process. A third packet comprising the decrypted packet is received from the host file system process. The decrypted packet is extracted from the third packet.
    • 用于加密数据的方法可以生成加密指令并将其与数据的有效载荷组合以形成分组。 数据包与命令相关联,并传递给主机文件系统进程。 从主机文件系统进程接收现在与第二命令相关联的分组。 从数据包中提取数据的加密指令和有效载荷。 基于加密指令对数据的有效载荷的至少一部分进行加密。 解密数据的方法可以接收分组并产生解密指令。 使用至少解密指令对分组的至少一部分进行解密。 包括解密的分组的第二分组被传递到主机文件系统进程。 从主机文件系统处理接收包括解密的分组的第三分组。 从第三个数据包中提取解密的数据包。