会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Grammar-based task analysis of web logs
    • Web日志的语法任务分析
    • US20060085788A1
    • 2006-04-20
    • US10952414
    • 2004-09-29
    • Arnon AmirPrasad DeshpandeSavitha SrinivasanVladimir Zbarsky
    • Arnon AmirPrasad DeshpandeSavitha SrinivasanVladimir Zbarsky
    • G06F9/46
    • G06F8/30
    • A method of detecting tasks performed by users wherein a single task is a sequence of web URLs invocation. Task patterns are detected in web logs to identify tasks performed by users and analyze task trends over time, across corporate divisions and geographies. A grammar-based framework is used to model and detect tasks from web log patterns. The framework has two components: a declarative unit—to generate a task grammar, and a processing unit—to detect tasks from access logs by generating a state machine for applying the task grammar to the tokens associated with the access records. By analyzing user tasks, rather than just URLs, useful business information can be extracted.
    • 检测由用户执行的任务的方法,其中单个任务是web URL调用的序列。 在Web日志中检测到任务模式,以识别用户执行的任务,并在不同的部门和地理位置分析随时间的任务趋势。 基于语法的框架用于从Web日志模式建模和检测任务。 该框架有两个组件:一个声明单元,用于生成一个任务语法,以及一个处理单元,用于通过生成用于将任务语法应用到与访问记录相关联的令牌的状态机来检测来自访问日志的任务。 通过分析用户任务,而不仅仅是URL,可以提取有用的业务信息。
    • 5. 发明授权
    • Application-specific secret generation
    • 特定于应用程序的秘密生成
    • US08422674B2
    • 2013-04-16
    • US11754667
    • 2007-05-29
    • Masana MuraseWilfred E. Plouffe, Jr.Kanna ShimizuVladimir Zbarsky
    • Masana MuraseWilfred E. Plouffe, Jr.Kanna ShimizuVladimir Zbarsky
    • H04L9/00H04L29/06H04L9/28G06F9/24G06F12/14G06F7/04G08B29/00H04K1/00
    • G06F21/52
    • A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access. Dedicated hardware decrypts an encrypted kernel into memory for execution. When an application is to be executed, the kernel computes one or more secrets by cryptographically combining information contained in the application with secret information contained in the kernel itself. The kernel then deletes its secret information and passes the computed secrets to the application. To store data persistently in memory, the application uses one of the computed secrets to encrypt the data prior to storage. If the kernel starts another instance of the same application, the kernel (which will have been re-decrypted to restore the kernel's secrets) will compute the same one or more secrets, thus allowing the second application instance to access the data encrypted by the first application instance.
    • 一种用于保护敏感程序代码和数据(包括永久存储的数据)的未经授权的访问的方法,计算机程序产品和数据处理系统。 专用硬件将加密的内核解密为内存以供执行。 当应用程序被执行时,内核通过将应用程序中包含的信息加密地组合在内核中包含的秘密信息来计算一个或多个秘密。 内核然后删除其秘密信息,并将计算的秘密传递给应用程序。 为了将数据永久存储在内存中,应用程序使用计算的秘密之一在存储之前对数据进行加密。 如果内核启动同一应用程序的另一个实例,内核(将被重新解密以恢复内核的秘密)将计算相同的一个或多个秘密,从而允许第二个应用程序实例访问由第一个 应用程序实例。
    • 8. 发明申请
    • Application-Specific Secret Generation
    • 特定应用程序的秘密生成
    • US20080298581A1
    • 2008-12-04
    • US11754667
    • 2007-05-29
    • Masana MuraseWilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • Masana MuraseWilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • H04L9/00
    • G06F21/52
    • A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access are disclosed. Dedicated hardware decrypts an encrypted kernel into memory for execution. When an application is to be executed, the kernel computes one or more secrets by cryptographically combining information contained in the application with secret information contained in the kernel itself. The kernel then deletes its secret information and passes the computed secrets to the application. To store data persistently in memory, the application uses one of the computed secrets to encrypt the data prior to storage. If the kernel starts another instance of the same application, the kernel (which will have been re-decrypted to restore the kernel's secrets) will compute the same one or more secrets, thus allowing the second application instance to access the data encrypted by the first application instance.
    • 公开了一种用于保护敏感程序代码和数据(包括永久存储的数据)从未经授权的访问的方法,计算机程序产品和数据处理系统。 专用硬件将加密的内核解密为内存以供执行。 当应用程序被执行时,内核通过将应用程序中包含的信息加密地组合在内核中包含的秘密信息来计算一个或多个秘密。 内核然后删除其秘密信息,并将计算的秘密传递给应用程序。 为了将数据永久存储在内存中,应用程序使用计算的秘密之一在存储之前对数据进行加密。 如果内核启动同一应用程序的另一个实例,内核(将被重新解密以恢复内核的秘密)将计算相同的一个或多个秘密,从而允许第二个应用程序实例访问由第一个 应用程序实例。
    • 10. 发明申请
    • Updateable Secure Kernel Extensions
    • 可更新的安全内核扩展
    • US20080301440A1
    • 2008-12-04
    • US11754658
    • 2007-05-29
    • Wilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • Wilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • H04L9/00
    • G06F21/575G06F21/51G06F2221/2143
    • A method, computer program product, and data processing system for providing an updateable encrypted operating kernel are disclosed. In a preferred embodiment, secure initialization hardware decrypts a minimal secure kernel containing sensitive portions of data and/or code into a portion of the processor-accessible memory space, from which the kernel is executed. Most system software functions are not directly supported by the secure kernel but are provided by dynamically loaded kernel extensions that are encrypted with a public key so that they can only be decrypted with a private key possessed by the secure kernel. The public/private key pair is processor-specific. Before passing control to a kernel extension the secure kernel deletes a subset of its sensitive portions, retaining only those sensitive portions needed to perform the task(s) delegated to the kernel extension. Which sensitive portions are retained is determined by a cryptographic key with which the kernel extension is signed.
    • 公开了一种用于提供可更新的加密操作内核的方法,计算机程序产品和数据处理系统。 在优选实施例中,安全初始化硬件将包含敏感部分的数据和/或代码的最小安全内核解密成可执行内核的处理器可访问存储器空间的一部分。 大多数系统软件功能并不直接得到安全内核的支持,而是由使用公钥加密的动态加载内核扩展提供,以便只能使用安全内核拥有的私有密钥进行解密。 公钥/私钥对是处理器特定的。 在将控件传递给内核扩展之前,安全内核将删除其敏感部分的一个子集,只保留执行委托给内核扩展的任务所需的敏感部分。 保留哪些敏感部分由内核扩展名与之签名的加密密钥确定。