会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 9. 发明授权
    • Secure execution box
    • 安全执行箱
    • US07065654B1
    • 2006-06-20
    • US09852372
    • 2001-05-10
    • Dale E. GulickGeoffrey S. Strongin
    • Dale E. GulickGeoffrey S. Strongin
    • H04L9/00
    • G06F21/85G06F21/72
    • A system and method for secure computing. The system includes a processor, one or more secured assets coupled to the processor, and security hardware. The processor is configured to operate in various operating modes, including a secure operating mode. The security hardware is configured to control access to the secured assets dependant upon the operating mode of the processor. The security hardware is configured to allow access to the secure assets in the secure operating mode, preferably only in the secure operating mode. The method includes switching the computer system between operating modes, while allowing or restricting access to the secured assets based on the operating modes. The second operating mode comprises a secure operating mode. The method restricts access to the secured assets in the first operating mode and permits access to the secured assets in the secure operating mode.
    • 一种用于安全计算的系统和方法。 该系统包括处理器,耦合到处理器的一个或多个安全资产以及安全硬件。 处理器被配置为在各种操作模式下操作,包括安全操作模式。 安全硬件被配置为根据处理器的操作模式控制对安全资产的访问。 安全硬件被配置为允许以安全操作模式访问安全资产,优选仅在安全操作模式下。 该方法包括在操作模式之间切换计算机系统,同时基于操作模式允许或限制对安全资产的访问。 第二操作模式包括安全操作模式。 该方法限制了在第一操作模式下对安全资产的访问,并允许以安全操作模式访问安全资产。
    • 10. 发明授权
    • Enhanced security and manageability using secure storage in a personal computer system
    • 在个人计算机系统中使用安全存储来增强安全性和可管理性
    • US07216362B1
    • 2007-05-08
    • US09853395
    • 2001-05-11
    • Geoffrey S. StronginDale E. Gulick
    • Geoffrey S. StronginDale E. Gulick
    • G06F12/14G06F12/00G06F7/04G06F13/00
    • G06F12/1441G06F7/582G06F12/1458G06F21/53G06F21/72
    • A method and system for enhanced security and manageability using secure storage. The system may include a crypto-processor and a memory coupled to receive memory transactions through the crypto-processor. The memory transactions are passed to the memory by the crypto-processor. The system may include a first processor, a second processor coupled to the first processor, and a storage device operably coupled to the first processor through the second processor. The second processor is configured to control access to the storage device. The method includes transmitting a request for a memory transaction for a storage location in the storage device and receiving the request for the memory transaction at the crypto-processor. The method also includes determining if the memory transaction is authorized for the storage location, and passing the request for the memory transaction to the storage device if the memory transaction is authorized for the storage location.
    • 一种使用安全存储来增强安全性和可管理性的方法和系统。 该系统可以包括加密处理器和耦合以通过密码处理器接收存储器事务的存储器。 存储器事务由加密处理器传递到存储器。 该系统可以包括第一处理器,耦合到第一处理器的第二处理器,以及通过第二处理器可操作地耦合到第一处理器的存储设备。 第二处理器被配置为控制对存储设备的访问。 该方法包括向存储设备发送对存储位置的存储器事务的请求,并在密码处理器处接收对存储器事务的请求。 该方法还包括确定存储器事务是否被授权用于存储位置,并且如果存储器事务被授权用于存储位置,则将存储器事务的请求传递到存储设备。