会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Saving and retrieving data based on symmetric key encryption
    • 基于对称密钥加密保存和检索数据
    • US07587589B2
    • 2009-09-08
    • US11557641
    • 2006-11-08
    • Paul EnglandMarcus Peinado
    • Paul EnglandMarcus Peinado
    • H04L29/06
    • G06F21/6218
    • In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using a symmetric cipher, in a manner that allows only one or more target programs to be able to obtain the data from the ciphertext. In accordance with other aspects, a bit string is received from a calling program. An identifier of the calling program is checked to determine whether the calling program is allowed to access data encrypted in ciphertext of the bit string. The integrity of the data is also verified, and the data is decrypted using a symmetric key. The data is returned to the calling program only if the calling program is allowed to access the data and if the integrity of the data is successfully verified.
    • 根据某些方面,从呼叫程序接收数据。 使用对称密码,以允许只有一个或多个目标程序能够从密文获得数据的方式生成包含数据的密文。 根据其他方面,从呼叫程序接收到位串。 检查调用程序的标识符以确定是否允许调用程序访问以位串的密文加密的数据。 还验证数据的完整性,并使用对称密钥对数据进行解密。 只有当主叫程序被允许访问数据并且数据的完整性被成功验证时,才将数据返回给调用程序。
    • 6. 发明授权
    • Transferring application secrets in a trusted operating system environment
    • 在受信任的操作系统环境中传送应用程序秘密
    • US07243230B2
    • 2007-07-10
    • US09993340
    • 2001-11-16
    • Paul EnglandMarcus PeinadoDaniel R. SimonJosh D. Benaloh
    • Paul EnglandMarcus PeinadoDaniel R. SimonJosh D. Benaloh
    • H04L9/00
    • G06F21/57G06F21/606
    • Transferring application secrets in a trusted operating system environment involves receiving a request to transfer application data from a source computing device to a destination computing device. A check is made as to whether the application data can be transferred to the destination computing device, and if so, whether the application data can be transferred under control of the user or a third party. If these checks succeed, a check is also made as to whether the destination computing device is a trustworthy device running known trustworthy software. Input is also received from the appropriate one of the user or third party to control transferring of the application data to the destination computing device. Furthermore, application data is stored on the source computing device in a manner that facilitates determining whether the application data can be transferred, and that facilitates transferring the application data if it can be transferred.
    • 在受信任的操作系统环境中传送应用程序秘密涉及接收将应用数据从源计算设备传送到目的地计算设备的请求。 检查应用数据是否可以传送到目的地计算设备,如果是,可以在用户或第三方的控制下传送应用数据。 如果这些检查成功,还要检查目的地计算设备是否是运行已知可靠软件的值得信赖的设备。 还从适当的用户或第三方接收输入以控制将应用数据传送到目的地计算设备。 此外,应用数据以便于确定是否可以传送应用数据的方式存储在源计算设备上,并且如果可以传送应用数据便于传送应用数据。
    • 8. 发明授权
    • Methods and systems for cryptographically protecting secure content
    • 用于密码保护安全内容的方法和系统
    • US07203310B2
    • 2007-04-10
    • US10124922
    • 2002-04-18
    • Paul EnglandMarcus PeinadoNicholas P. Wilt
    • Paul EnglandMarcus PeinadoNicholas P. Wilt
    • H04N7/167
    • G06F21/83G06F21/64G06F21/79
    • Methods and systems are provided for cryptographically protecting secure content in connection with a graphics subsystem of a computing device. Techniques are implemented to encrypt the contents of video memory so that unauthorized software cannot gain meaningful access to it, thereby maintaining confidentiality. Moreover, a mechanism for tamper detection is provided so that there is awareness when data has been altered in some fashion, thereby maintaining integrity. In various embodiments, the contents of overlay surfaces and/or command buffers are encrypted, and/or the GPU is able to operate on encrypted content while preventing its availability to untrusted parties, devices or software.
    • 提供了与计算设备的图形子系统相关联地加密地保护安全内容的方法和系统。 实现技术来加密视频存储器的内容,使得未经授权的软件不能获得对其的有意义的访问,从而保持机密性。 此外,提供用于篡改检测的机制,使得当数据以某种方式被改变时,意识到,从而保持完整性。 在各种实施例中,覆盖表面和/或命令缓冲器的内容被加密,和/或GPU能够对加密内容进行操作,同时防止其对不信任方,设备或软件的可用性。