会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明专利
    • Method for protecting content on client platform
    • 保护客户端平台内容的方法
    • JP2010157224A
    • 2010-07-15
    • JP2009289005
    • 2009-12-21
    • Intel Corpインテル コーポレイション
    • DEWAN PRASHANT
    • G06F12/14G06F21/24G06Q30/00H04L9/08
    • G06F21/10G06F21/57
    • PROBLEM TO BE SOLVED: To provide a method, a computer system, and a computer-readable medium, having an instruction to provide a client security management layer and a content player that ensure that a content is protected from malware on the reception side computer system. SOLUTION: The client security management layer controls access to a protected portion of a memory of the computer system on behalf of a constituent portion such as the content player executed on a processor of the computer system. The client security management layer receives an encrypted content key from the constituent portion, confirms integrity of the constituent portion, decrypts the encrypted content key to supply a decrypted content key, and places the decrypted content key in the protected portion of the memory according to the confirmation of the integrity of the constituent portion. Other embodiments are described and claimed. COPYRIGHT: (C)2010,JPO&INPIT
    • 要解决的问题:提供一种具有提供客户端安全管理层的指令的方法,计算机系统和计算机可读介质,以及确保内容受到保护以免受到接收的恶意软件的内容播放器 侧计算机系统。 解决方案:客户端安全管理层代表诸如在计算机系统的处理器上执行的内容播放器的组成部分来控制对计算机系统的存储器的保护部分的访问。 客户端安全管理层从组成部分接收加密的内容密钥,确认组成部分的完整性,解密加密的内容密钥以提供解密的内容密钥,并且将解密的内容密钥放置在存储器的受保护部分中 确认构成部分的完整性。 描述和要求保护其他实施例。 版权所有(C)2010,JPO&INPIT
    • 4. 发明专利
    • Symmetric key distribution framework for internet
    • 互联网对称密钥分发框架
    • JP2012182812A
    • 2012-09-20
    • JP2012096711
    • 2012-04-20
    • Intel Corpインテル コーポレイション
    • KOLAR SUNDER DIVYA NAIDUDEWAN PRASHANTLONG MEN
    • H04L9/08G06F21/20
    • H04L63/0435H04L9/083H04L63/0428H04L63/062H04L63/20
    • PROBLEM TO BE SOLVED: To provide a method, a device, and a system, which can continuously and dynamically distribute symmetric keys from a dedicated key distribution server to each client on the Internet.SOLUTION: A method comprises: a step for receiving measured health information from a client 100 on a key distribution server 124; a step for validating the measured health information on the server; a step for sending a session key to the client on the server when the measured health information is validated; and a step for initiating encrypted and authenticated connection with an application server 106 in a domain 102 using the session key, on the client, when the client receives the session key.
    • 要解决的问题:提供一种方法,设备和系统,其可以将专用密钥分发服务器中的对称密钥连续且动态地分发到因特网上的每个客户端。 解决方案:一种方法,包括:从密钥分发服务器124上的客户端100接收测量的健康信息的步骤; 验证服务器上测得的健康信息的步骤; 当测量的健康信息被验证时,将会话密钥发送到服务器上的客户端的步骤; 以及当客户端接收到会话密钥时,在客户端上使用会话密钥发起与域102中的应用服务器106的加密和认证连接的步骤。 版权所有(C)2012,JPO&INPIT
    • 5. 发明专利
    • Method and system to directly render image and correlate corresponding user input in secure memory domain
    • 方法和系统直观的渲染图像和相关的用户输入在安全的存储器域
    • JP2010170543A
    • 2010-08-05
    • JP2009293555
    • 2009-12-24
    • Intel Corpインテル・コーポレーション
    • DEWAN PRASHANTDAVID DURHAM
    • G06F21/24G06F21/20G06F21/22
    • G06F21/36
    • PROBLEM TO BE SOLVED: To prevent data input through a keyboard, a pointing device and the like from being exposed to malware. SOLUTION: There are disclosed a methods and a system to assign an application and a video frame buffer to a protected memory domain for rendering an image to a random position of the video frame buffer and correlating user input from a pointing device to a rendered keyboard image. The keyboard image may be randomly repositioned following a user input. The keyboard image may be rendered over a secure user image. An acknowledgment image may be rendered from the protected memory domain to a random position of the video frame buffer, and may be randomly repositioned in response to a user input that does not correlate to the acknowledgment image. COPYRIGHT: (C)2010,JPO&INPIT
    • 要解决的问题:防止通过键盘,指点设备等的数据输入暴露于恶意软件。 解决方案:公开了一种方法和系统,用于将应用和视频帧缓冲器分配给受保护的存储器域,以将图像呈现到视频帧缓冲器的随机位置,并将来自指点设备的用户输入与 呈现键盘图像。 键盘图像可以在用户输入之后被随机重新定位。 键盘图像可以通过安全的用户图像呈现。 确认图像可以从受保护的存储器域呈现到视频帧缓冲器的随机位置,并且可以响应于与确认图像不相关的用户输入而被随机地重新定位。 版权所有(C)2010,JPO&INPIT
    • 6. 发明专利
    • Method of protecting content on client platforms
    • 保护客户平台内容的方法
    • JP2012181862A
    • 2012-09-20
    • JP2012108469
    • 2012-05-10
    • Intel Corpインテル コーポレイション
    • DEWAN PRASHANT
    • G06F21/22G06F21/24H04L9/08
    • G06F21/10G06F21/57
    • PROBLEM TO BE SOLVED: To provide a method, computer system, and computer-readable medium with instructions to provide a client security management layer and a content player that ensure that the content is protected from malware on a receiving computer system.SOLUTION: The client security management layer controls access to a protected portion of a memory of a computer system on behalf of a component, such as the content player, running on the processor of the computer system. The client security management layer receives an encrypted content key from the component, confirms the integrity of the component, decrypts the encrypted content key to provide a decrypted content key, and places the decrypted content key in the protected portion of the memory in response to confirming the integrity of the component. Other embodiments are described and claimed.
    • 要解决的问题:提供一种方法,计算机系统和计算机可读介质,其具有提供客户端安全管理层和内容播放器的指令,以确保内容被保护免受接收计算机系统上的恶意软件。 解决方案:客户端安全管理层代表在计算机系统的处理器上运行的组件(例如内容播放器)控制对计算机系统的存储器的保护部分的访问。 客户端安全管理层从组件接收加密的内容密钥,确认组件的完整性,解密加密的内容密钥以提供解密的内容密钥,并且将解密的内容密钥放置在存储器的受保护部分中以响应确认 组件的完整性。 描述和要求保护其他实施例。 版权所有(C)2012,JPO&INPIT
    • 8. 发明专利
    • End-to-end network security with traffic visibility
    • 具有交通可见性的端到端网络安全
    • JP2009153111A
    • 2009-07-09
    • JP2008284424
    • 2008-11-05
    • Intel Corpインテル コーポレイション
    • LONG MENWALKER JESSEDURHAM DAVIDMILLIER MARCGREWAL KARANVIRDEWAN PRASHANTSAVAGAONKAR UDAYWILLIAMS STEVEN D
    • H04L9/14
    • H04L63/0428H04L9/0631H04L9/3242H04L63/08H04L63/1466H04L63/168H04L2209/12H04L2209/38
    • PROBLEM TO BE SOLVED: To achieve end-to-end security with traffic visibility. SOLUTION: A combined encryption-authentication unit includes a cipher unit and an authentication unit coupled in parallel to the cipher unit, and generates an authentication tag by using an authentication key, in parallel with the generation of the cipher text using an encryption key, where the authentication key and the encryption key have different key values. In various embodiments, the cipher unit operates in AES counter mode, and the authentication unit operates in parallel, in an AES-GMAC mode. Using a two key, single-pass combined mode algorithm preserves network performance by using a limited number of HW gates, while allowing an intermediate device to access to the encryption key for deciphering the data, without having to provide to that device the ability to compromise data integrity, which is preserved between the end to end devices. COPYRIGHT: (C)2009,JPO&INPIT
    • 要解决的问题:实现交通可见性的端到端安全。 解决方案:组合加密认证单元包括密码单元和与密码单元并行耦合的认证单元,并且通过使用认证密钥与使用加密的密文的生成并行地生成认证标签 密钥,其中认证密钥和加密密钥具有不同的密钥值。 在各种实施例中,密码单元以AES计数器模式工作,并且认证单元以AES-GMAC模式并行操作。 使用双键单通组合模式算法通过使用有限数量的HW门来保留网络性能,同时允许中间设备访问加密密钥来解密数据,而不必向该设备提供妥协的能力 数据完整性,保留在端到端设备之间。 版权所有(C)2009,JPO&INPIT