会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明授权
    • Method and apparatus for facilitating validation of data retrieved from disk
    • 便于验证从磁盘检索的数据的方法和装置
    • US06904547B2
    • 2005-06-07
    • US10039417
    • 2002-01-04
    • Robert S. GittinsRichard S. Brown
    • Robert S. GittinsRichard S. Brown
    • G06F11/00G11B20/18H04L1/22
    • G11B20/18
    • One embodiment of the present invention provides a system that facilitates validation of data retrieved from a secondary storage device. The system operates by receiving a write request to write new data to a block of the secondary storage device, and calculating a new checksum value from the new data. The system also retrieves a current checksum value and an old checksum value associated with the block of the secondary storage device. Next, the system performs a checksum write operation to a validation device to update the current checksum value and the old checksum value, and then performs a data write operation to the secondary storage device to write the new data to the block of the secondary storage device.
    • 本发明的一个实施例提供一种有助于验证从辅助存储设备检索的数据的系统。 该系统通过接收写入请求来将新数据写入辅助存储设备的块,并从新数据计算新的校验和值。 系统还检索与辅助存储设备的块相关联的当前校验和值和旧校验和值。 接下来,系统对验证装置执行校验和写入操作,以更新当前校验和值和旧校验和值,然后对辅助存储设备执行数据写入操作,以将新数据写入辅助存储设备的块 。
    • 14. 发明授权
    • Method and system for providing a user access to multiple secured
subsystems
    • 提供用户访问多个安全子系统的方法和系统
    • US5604490A
    • 1997-02-18
    • US304325
    • 1994-09-09
    • George R. Blakley, IIIL. Brooks HickersonIvan M. MilmanRobert S. GittinsDouglas B. ScheerJohn H. Wilson
    • George R. Blakley, IIIL. Brooks HickersonIvan M. MilmanRobert S. GittinsDouglas B. ScheerJohn H. Wilson
    • G06F21/00G06F12/14
    • G06F21/41G06F21/6236
    • An improvement relating to the security of an operating system for either a stand alone computer system or for a networked computer system. The operating system provides improved security for programs available on the computer system having different security protocols. The operating system unifies these security protocols for each user based on unique user credentials. The system operates, upon request to start a program procedure by the user, to authenticate the identity of the user based on information unique to that user. Following which, the system generates a user handle associated with the user. The system then notifies each of the security protocols of the user handle associated with the user. The system then generates new user credentials for each of the security protocols. These user credentials are associated with the user handle and then the user handle is mapped to the unique user's credentials for each program procedure. Once this is accomplished, the system invokes an alternate process and tags the process with the user handle. Once a request from the alternate process for access to an object accessed through the server is requested, the system then grants access to the object based on the new user credentials associated with the user handle. The new user credentials are typically based on an association of the user identifier, the user handle, and the unique user credentials from before.
    • 关于独立计算机系统或联网计算机系统的操作系统的安全性的改进。 操作系统为具有不同安全协议的计算机系统上可用的程序提供改进的安全性。 操作系统基于唯一的用户凭据统一了每个用户的这些安全协议。 根据用户启动程序程序的要求,系统根据该用户唯一的信息对用户的身份进行认证。 之后,系统生成与用户相关联的用户句柄。 系统然后通知与用户相关联的用户句柄的每个安全协议。 然后,系统为每个安全协议生成新的用户凭据。 这些用户凭据与用户句柄相关联,然后将用户句柄映射到每个程序过程的唯一用户凭据。 一旦完成,系统将调用一个替代过程,并使用用户句柄标记该过程。 一旦请求来自替代进程的访问通过服务器访问的对象被请求,则系统基于与用户句柄相关联的新的用户凭证来授予对对象的访问。 新的用户凭证通常基于用户标识符,用户句柄和来自之前的唯一用户凭证的关联。