会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Dynamic fine-grained dependency analysis for a functional language
    • 功能语言的动态细粒度依赖性分析
    • US5940619A
    • 1999-08-17
    • US738150
    • 1996-10-25
    • Martin AbadiJames J. HorningButler W. LampsonRoy LevinJean-Jacques LevyYuan Yu
    • Martin AbadiJames J. HorningButler W. LampsonRoy LevinJean-Jacques LevyYuan Yu
    • G06F9/44G06F9/45
    • G06F8/311G06F8/433G06F9/45508
    • In a computerized method, a computer program is analyzed while the program is interpreted. The program is expressed in a first memory as input values and functions. Some of the input values are complex values which can have a plurality of component values. Each function operates on combinations of the input values and the functions of the program. The program is interpreted in a processor connected to the first memory. The processor is also connected to a second memory to store result values produced during the interpretation. Selected input values, components of the complex values, and functions are named only if the selected values, components, and functions are necessary to produce a selected result value. For each function of the program, the function which is interpreted, the input values on which the function depends, and the result value produced by the function during interpretation, are recorded in the second memory to dynamically perform a precise dependency analysis of the program.
    • 在计算机化方法中,在解释程序时分析计算机程序。 该程序在第一个存储器中表示为输入值和函数。 一些输入值是可以具有多个分量值的复数值。 每个功能按照程序的输入值和功能的组合进行操作。 该程序在连接到第一存储器的处理器中解释。 处理器还连接到第二存储器以存储在解释期间产生的结果值。 选定的输入值,复数值的组成部分和功能仅在选定的值,组件和功能需要产生选定的结果值时进行命名。 对于程序的每个功能,解释的功能,功能所依赖的输入值和解释期间由功能产生的结果值被记录在第二存储器中以动态地执行程序的精确的依赖性分析。
    • 4. 发明授权
    • Method and apparatus for end-to-end encryption of a data packet in a
computer network
    • 用于计算机网络中的数据分组的端到端加密的方法和装置
    • US5594869A
    • 1997-01-14
    • US432331
    • 1995-05-01
    • William R. HaweButler W. LampsonAmar Gupta
    • William R. HaweButler W. LampsonAmar Gupta
    • H04L29/06G06F7/00
    • H04L63/0485H04L29/06H04L63/12H04L63/162
    • A technique to facilitate decryption processing of information packets transmitted over a communication network after encryption in accordance with a specific network protocol, the details of which may be subject to later change as standards are developed or modified. Programmable registers are used in the decryption process to hold information for identifying an incoming information packet as being subject to the specific protocol and requiring decryption, and identifying a starting location of a data field to be decrypted. Specifically one programmable register contains a first offset locating an identifier field in the packet, in which a cryptographic identifier will be found if the packet is one conforming to the protocol; another programmable register contains a cryptographic identifier value that will be found in the identifier field if decryption is to be performed, and a third programmable register contains a second offset to locate the beginning of a data field to be decrypted.
    • 一种用于根据特定网络协议在加密之后通过通信网络传送的信息分组的解密处理的技术,其细节可能随着标准的开发或修改而随之而变化。 解密过程中使用可编程寄存器来保存用于识别进入信息包的信息为受特定协议的约束,并且需要解密,以及识别要被解密的数据字段的起始位置。 具体地,一个可编程寄存器包含定位分组中的标识符字段的第一偏移,其中如果分组是符合该协议的密钥标识符,将找到密码标识符; 另一个可编程寄存器包含将要在执行解密时在标识符字段中找到的加密标识符值,并且第三可编程寄存器包含第二偏移量以定位待解密的数据字段的开始。
    • 7. 发明授权
    • Hierarchical trusted code for content protection in computers
    • 计算机内容保护的层次可信代码
    • US07496769B2
    • 2009-02-24
    • US11018065
    • 2004-12-20
    • Butler W. LampsonPaul England
    • Butler W. LampsonPaul England
    • H04L9/00H04K1/00
    • G06Q10/10G06F21/57
    • An architecture for protecting premium content in a nonsecure computer environment executes only a small number of code modules in a secure memory. The modules are arranged in a hierarchy of trust, where a module names other modules that it is willing to trust, and those modules in turn name other modules that they are willing to trust. A secure loader loads a security manager that oversees a number of content-providing modules for manipulating the content. A memory manager assigns permissions to various pages of the secure memory. The memory has rings of different security. The security model can be extended to program modules and other devices on the computer's bus, such as DMA controllers and peripherals.
    • 在非安全计算机环境中保护优质内容的架构仅在安全存储器中执行少量代码模块。 这些模块被布置在信任层级中,其中模块命名它愿意信任的其他模块,而这些模块又命名他们愿意信任的其他模块。 安全加载器加载一个安全管理器,该管理器负责监视用于操纵内容的多个内容提供模块。 内存管理员将权限分配给安全内存的各个页面。 内存具有不同安全性的环。 安全模型可以扩展到计算机总线上的程序模块和其他设备,如DMA控制器和外设。