会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Trusted access to third party applications systems and methods
    • 受信任的访问第三方应用程序系统和方法
    • US08863252B1
    • 2014-10-14
    • US13557213
    • 2012-07-25
    • Robin D. KatzerLyle W. PaczkowskiWilliam M. ParselCarl J. PerssonMatthew C. Schlesener
    • Robin D. KatzerLyle W. PaczkowskiWilliam M. ParselCarl J. PerssonMatthew C. Schlesener
    • G06F7/00
    • G06F21/53H04W12/10H04W12/12
    • A method of downloading trusted content. The method comprises sending by a mobile device a request for a trusted content to a server, wherein the mobile device comprises a first mobile device trusted security zone and builds the request while executing in the first mobile device trusted security zone and wherein the server comprises a server trusted security zone and wherein the server handles the request for the trusted content at least partly in the server trusted security zone. The method comprises receiving the trusted content by the first mobile device trusted security zone, storing the trusted content in a second mobile device trusted security zone of the mobile device, inspecting the trusted content in the second mobile device trusted security zone, and when the trusted content passes inspection, at least one of executing or presenting a portion of the trusted content by the first mobile device trusted security zone.
    • 一种下载可信内容的方法。 所述方法包括由移动设备向服务器发送对可信内容的请求,其中所述移动设备包括第一移动设备信任安全区域,并在所述第一移动设备信任安全区域中执行时构建所述请求,并且其中所述服务器包括 服务器可信安全区域,并且其中服务器至少部分地在服务器可信安全区域中处理对可信内容的请求。 该方法包括由第一移动设备信任安全区域接收可信内容,将可信内容存储在移动设备的第二移动设备信任安全区域中,检查第二移动设备可信安全区域中的可信内容,以及何时可信 内容通过检查,由第一移动设备可信安全区执行或呈现可信内容的一部分中的至少一个。
    • 2. 发明申请
    • TRUSTED SECURITY ZONE ACCESS TO PERIPHERAL DEVICES
    • TRUSTED安全区域访问外围设备
    • US20140033316A1
    • 2014-01-30
    • US13556200
    • 2012-07-24
    • Lyle W. PaczkowskiWilliam M. ParselCarl J. PerssonMatthew C. Schlesener
    • Lyle W. PaczkowskiWilliam M. ParselCarl J. PerssonMatthew C. Schlesener
    • G06F21/00
    • G06F21/62G06F21/74G06F21/85
    • A method of trusted data communication. The method comprises executing a data communication application in a trusted security zone of a processor, wherein the processor is a component of a computer, commanding a controller of a peripheral device to execute a control application in a trusted security zone of the controller, wherein the controller is a component of the computer, commanding at least one of another peripheral device or a user interface device to not access a data bus of the computer, verifying that the controller is executing the control application in the trusted security zone of the controller, sending data from the processor to the controller over the data bus of the computer, and the controller one of transmitting the data sent by the processor on an external communication link, reading a memory storage disk, or writing to a memory storage disk.
    • 可信数据通信的方法。 该方法包括在处理器的可信安全区域中执行数据通信应用,其中处理器是计算机的组件,命令外围设备的控制器执行控制器的可信安全区域中的控制应用,其中, 控制器是计算机的组件,命令至少另一个外围设备或用户接口设备之一,以不访问计算机的数据总线,验证控制器正在执行控制器的可信安全区域中的控制应用程序,发送 通过计算机的数据总线从处理器到控制器的数据,以及控制器,用于在外部通信链路上发送由处理器发送的数据,读取存储器存储盘或写入到存储器存储盘。
    • 5. 发明授权
    • Trusted security zone access to peripheral devices
    • 可靠的安全区域访问外围设备
    • US08667607B2
    • 2014-03-04
    • US13556200
    • 2012-07-24
    • Lyle W. PaczkowskiWilliam M. ParselCarl J. PerssonMatthew C. Schlesener
    • Lyle W. PaczkowskiWilliam M. ParselCarl J. PerssonMatthew C. Schlesener
    • G06F13/00G06F17/30
    • G06F21/62G06F21/74G06F21/85
    • A method of trusted data communication. The method comprises executing a data communication application in a trusted security zone of a processor, wherein the processor is a component of a computer, commanding a controller of a peripheral device to execute a control application in a trusted security zone of the controller, wherein the controller is a component of the computer, commanding at least one of another peripheral device or a user interface device to not access a data bus of the computer, verifying that the controller is executing the control application in the trusted security zone of the controller, sending data from the processor to the controller over the data bus of the computer, and the controller one of transmitting the data sent by the processor on an external communication link, reading a memory storage disk, or writing to a memory storage disk.
    • 可信数据通信的方法。 该方法包括在处理器的可信安全区域中执行数据通信应用,其中处理器是计算机的组件,命令外围设备的控制器执行控制器的可信安全区域中的控制应用,其中, 控制器是计算机的组件,命令至少另一个外围设备或用户接口设备之一,以不访问计算机的数据总线,验证控制器正在执行控制器的可信安全区域中的控制应用程序,发送 通过计算机的数据总线从处理器到控制器的数据,以及控制器,用于在外部通信链路上发送由处理器发送的数据,读取存储器存储盘或写入到存储器存储盘。
    • 9. 发明授权
    • Conflict avoidance in data store replication
    • 冲突避免在数据存储复制
    • US07899998B1
    • 2011-03-01
    • US11875573
    • 2007-10-19
    • Robin D. KatzerCarl J. Persson
    • Robin D. KatzerCarl J. Persson
    • G06F12/00
    • G06F11/2097G06F17/30578
    • A conflict avoidance system is provided. The conflict avoidance system comprises a first data store provided at a first geographic location and a second data store at a second geographic location, where the first and second data stores are replications of one another. The conflict avoidance system also comprises a conflict avoidance module operable to receive a data store request from applications, wherein the conflict avoidance module communicates update data store requests to the first data store and communicates create data store requests and delete data store requests to the second data store.
    • 提供冲突回避制度。 冲突避免系统包括在第一地理位置处提供的第一数据存储和第二地理位置处的第二数据存储,其中第一和第二数据存储器彼此复制。 冲突避免系统还包括冲突避免模块,其可操作以从应用程序接收数据存储请求,其中冲突避免模块将更新数据存储请求传送到第一数据存储器,并将创建数据存储请求传送到第二数据 商店。
    • 10. 发明授权
    • Conflict avoidance in data store replication
    • 冲突避免在数据存储复制
    • US07313657B1
    • 2007-12-25
    • US11088660
    • 2005-03-24
    • Robin D. KatzerCarl J. Persson
    • Robin D. KatzerCarl J. Persson
    • G06F12/00
    • G06F11/2097G06F17/30578
    • A conflict avoidance system is provided. The conflict avoidance system comprises a first data store provided at a first geographic location and a second data store at a second geographic location, where the first and second data stores are replications of one another. The conflict avoidance system also comprises a conflict avoidance module operable to receive a data store request from applications, wherein the conflict avoidance module communicates update data store requests to the first data store and communicates create data store requests and delete data store requests to the second data store.
    • 提供冲突回避制度。 冲突避免系统包括在第一地理位置处提供的第一数据存储和第二地理位置处的第二数据存储,其中第一和第二数据存储器彼此复制。 冲突避免系统还包括冲突避免模块,其可操作以从应用程序接收数据存储请求,其中冲突避免模块将更新数据存储请求传送到第一数据存储器,并将创建数据存储请求传送到第二数据 商店。