会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Authenticating suspect data using key tables
    • 使用关键表验证可疑数据
    • US08024579B2
    • 2011-09-20
    • US11647932
    • 2006-12-29
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • G06F11/30
    • G06F21/57G06F21/51H04L9/0897H04L9/3236
    • A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
    • 用于认证可疑代码的系统和方法包括以下步骤:接收可信平台模块的第一实例的可疑代码; 将可疑代码加载到与处理器可操作地相关联的可信任的平台模块设备中,其中可疑代码被加载到可信平台模块设备内的屏蔽位置之外; 从表中检索验证公钥并将其存储在可信平台模块设备中的寄存器中,由可疑代码索引的验证公钥; 并从表中检索散列算法,由可疑代码索引的哈希算法。 运行散列算法以导出第一散列值; 然后,使用验证公钥,解密第二哈希值以导出第二解密哈希值。 比较两个哈希值; 并且在确定匹配时,可疑代码被加载到处理器的屏蔽位置以供处理器执行。
    • 3. 发明申请
    • Authenticating suspect data using key tables
    • 使用关键表验证可疑数据
    • US20080162932A1
    • 2008-07-03
    • US11647932
    • 2006-12-29
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • H04L9/14
    • G06F21/57G06F21/51H04L9/0897H04L9/3236
    • A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
    • 用于认证可疑代码的系统和方法包括以下步骤:接收可信平台模块的第一实例的可疑代码; 将可疑代码加载到与处理器可操作地相关联的可信任的平台模块设备中,其中可疑代码被加载到可信平台模块设备内的屏蔽位置之外; 从表中检索验证公钥并将其存储在可信平台模块设备中的寄存器中,由可疑代码索引的验证公钥; 并从表中检索散列算法,由可疑代码索引的哈希算法。 运行散列算法以导出第一散列值; 然后,使用验证公钥,解密第二哈希值以导出第二解密哈希值。 比较两个哈希值; 并且在确定匹配时,可疑代码被加载到处理器的屏蔽位置以供处理器执行。
    • 5. 发明授权
    • Cooled vane or blade for a gas turbine engine
    • 用于燃气涡轮发动机的冷却叶片或叶片
    • US4616976A
    • 1986-10-14
    • US397412
    • 1982-06-28
    • Barry W. LingsJohn H. Nicholson
    • Barry W. LingsJohn H. Nicholson
    • F01D5/18B63H1/14
    • F01D5/186F01D5/189F05D2240/81F05D2260/201Y02T50/673Y02T50/676
    • A cooled vane or blade for a gas turbine engine has a cooling arrangement for its trailing region which can be accommodated in the relatively thin section available. In this arrangement the trailing region of the hollow interior of the blade is divided off from the remainder by a partition which may be apertured to allow cooling air to enter the compartment thus formed. The concave, pressure flank of the compartment is cooled by arrays of film cooling holes while the convex, suction flank has a perforated plate spaced therefrom to provide impingement cooling. The suction flank is therefore unapertured and there is no disturbance of the high speed airflow in this region. The spent impingement air leaves the aerofoil via a slot and may pass over pedestals en route to cool the entire trailing edge.
    • 用于燃气涡轮发动机的冷却叶片或叶片具有用于其尾部区域的冷却装置,其可以容纳在可用的相对薄的部分中。 在这种布置中,叶片的中空内部的尾部区域与其余部分分开,隔板可以是开孔的,以允许冷却空气进入如此形成的隔室。 隔室的凹面压力侧面由薄膜冷却孔的阵列冷却,而凸形的吸力侧面具有与之隔开的多孔板,以提供冲击冷却。 因此,吸力侧面是未被挤压的,并且在该区域中没有高速气流的干扰。 消耗的冲击空气经由狭槽离开机翼,并且可以在路线上经过基座以冷却整个后缘。