会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明授权
    • Authenticating suspect data using key tables
    • 使用关键表验证可疑数据
    • US08024579B2
    • 2011-09-20
    • US11647932
    • 2006-12-29
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • G06F11/30
    • G06F21/57G06F21/51H04L9/0897H04L9/3236
    • A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
    • 用于认证可疑代码的系统和方法包括以下步骤:接收可信平台模块的第一实例的可疑代码; 将可疑代码加载到与处理器可操作地相关联的可信任的平台模块设备中,其中可疑代码被加载到可信平台模块设备内的屏蔽位置之外; 从表中检索验证公钥并将其存储在可信平台模块设备中的寄存器中,由可疑代码索引的验证公钥; 并从表中检索散列算法,由可疑代码索引的哈希算法。 运行散列算法以导出第一散列值; 然后,使用验证公钥,解密第二哈希值以导出第二解密哈希值。 比较两个哈希值; 并且在确定匹配时,可疑代码被加载到处理器的屏蔽位置以供处理器执行。
    • 13. 发明授权
    • System and method for virtualized hypervisor to detect insertion of removable media
    • 用于虚拟化管理程序的系统和方法,用于检测可移动介质的插入
    • US07779454B2
    • 2010-08-17
    • US11564832
    • 2006-11-29
    • David Carroll ChallenerDaryl CromerHoward Jeffrey LockerRandall Scott Springfield
    • David Carroll ChallenerDaryl CromerHoward Jeffrey LockerRandall Scott Springfield
    • G06F21/20
    • H04L63/10G06F21/552G06F2221/2153
    • A system and method for using a client-side hypervisor in conjunction with a secure network-side monitoring mechanism to detect removable media insertions since a client's last network session with the secure network is presented. The hypervisor uses a “client-side insertion value” to track the number of times that a user inserts removable media into a socket located on the client. When the client is connected to the secure network, the client's hypervisor notifies the secure network of each insertion and the secure network increments a “secure network-side tracker value.” For each login request, the client includes the client-side insertion value, which the secure network compares against its secure network-side tracker value. When the two values are different, the secure network sends an action request to the client, such as a request to perform a full system scan. Once the client performs the action, the client's hypervisor resets its client-side insertion value and attempts to logon to the secure network again.
    • 提出了客户端管理程序与安全网络侧监视机制结合使用以检测可移动介质插入的系统和方法,因为客户端与安全网络的最后一次网络会话。 管理程序使用“客户端插入值”来跟踪用户将可移动媒体插入位于客户端上的套接字的次数。 当客户端连接到安全网络时,客户端的管理程序会将安全网络通知每个插入,安全网络会增加“安全网络侧跟踪器值”。对于每个登录请求,客户端包括客户端插入值, 安全网络与其安全的网络侧跟踪器值进行比较。 当两个值不同时,安全网络向客户端发送动作请求,例如执行完整系统扫描的请求。 一旦客户端执行操作,客户端的管理程序将重置其客户端插入值,并尝试再次登录到安全网络。
    • 16. 发明申请
    • METHOD, APPARATUS, AND SYSTEM FOR ADAPTING POWER CONSUMPTION
    • 用于适应消耗电力的方法,装置和系统
    • US20100106994A1
    • 2010-04-29
    • US12259074
    • 2008-10-27
    • David Carroll ChallenerHarriss Christopher Neil GaneyHoward Locker
    • David Carroll ChallenerHarriss Christopher Neil GaneyHoward Locker
    • G06F1/26G06F9/46
    • G06F1/3203
    • A method, apparatus, and system are disclosed for adapting power consumption. A recording module records a usage record for each component within a computer at scheduled audit times. The usage record comprises a usage level, an application list, a time stamp, a network access point, a computation category, a time category, and a location category. A scenario module creates a plurality of usage scenarios. Each usage scenario comprises a unique combination of a specified computation category, a specified time category, and a specified location category. A profile module creates a power setting profile for each usage scenario. Each power setting profile specifies a target power status for each component of the computer. A scenario detection module detects a first usage scenario. An adjustment module sets a power status of each component to the first usage scenario target power status for the component.
    • 公开了用于调整功耗的方法,装置和系统。 记录模块在计划的审核时间内记录计算机内每个组件的使用记录。 使用记录包括使用级别,应用列表,时间戳,网络接入点,计算类别,时间类别和位置类别。 场景模块创建多个使用场景。 每个使用情景包括指定计算类别,指定时间类别和指定位置类别的唯一组合。 配置文件模块为每个使用场景创建功率设置配置文件。 每个功率设置配置文件指定计算机的每个组件的目标电源状态。 场景检测模块检测第一使用场景。 调整模块将每个组件的电源状态设置为组件的第一使用情景目标电源状态。
    • 17. 发明授权
    • Method for securely creating an endorsement certificate in an insecure environment
    • 在不安全的环境中安全地创建背书证书的方法
    • US07644278B2
    • 2010-01-05
    • US10750594
    • 2003-12-31
    • Ryan Charles CathermanDavid Carroll ChallenerJames Patrick Hoff
    • Ryan Charles CathermanDavid Carroll ChallenerJames Patrick Hoff
    • H04L9/32
    • G06F21/602G06F21/57G06F2221/2117H04L9/0877H04L9/3236H04L9/3263
    • A Method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured trusted platform modules. The endorsement keys are generated for the trusted platform module (TPM). The TPM vendor selects an N-byte secret and stores the N-type secret in the trusted platform module along with the endorsement keys. The secret number cannot be read outside of the trusted platform module. The secret number is also provided to the credential server of the original equipment manufacturer. During the endorsement key (EK) credential process, the trusted platform module generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key withy a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the trusted platform module only when a match is confirmed.
    • 一种用于确保制造可信平台模块的认可密钥的安全兼容创建和签名的方法和系统。 为可信平台模块(TPM)生成认可密钥。 TPM供应商选择N字节的秘密,并将N型秘密与认可密钥一起存储在可信平台模块中。 秘密号码不能在受信任的平台模块之外读取。 秘密编号也提供给原始设备制造商的凭证服务器。 在认可密钥(EK)凭证过程中,可信平台模块生成包括公开密钥和秘密的哈希和公开密钥的认可密钥。 凭证服务器使用所接收的公钥(来自认可密钥)和供应商提供的秘密的第二散列表来匹配认可密钥内的散列。 仅当匹配确认时,EK证书才会生成并插入可信平台模块。