会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 27. 发明授权
    • Secure platform voucher service for software components within an execution environment
    • 在执行环境中的软件组件的安全平台凭证服务
    • US08132003B2
    • 2012-03-06
    • US11864573
    • 2007-09-28
    • David DurhamHormuzd M. KhosraviUri BlumenthalMen Long
    • David DurhamHormuzd M. KhosraviUri BlumenthalMen Long
    • H04L29/06
    • G06F21/54H04L9/004H04L9/3236H04L63/123H04L63/126H04L63/20H04L2209/60
    • Embodiments of apparatus, articles, methods, and systems for secure platform voucher service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. A provisioning remote entity or gateway only needs to know a platform's public key or certificate hierarchy in order to receive verification proof for any component in the platform. The verification proof or voucher helps to assure to the remote entity that no man-in-the-middle, rootkit, spyware or other malware running in the platform or on the network will have access to the provisioned material. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed.
    • 这里一般地描述用于执行环境中的软件组件的安全平台凭单服务的装置,物品,方法和系统的实施例。 一个实施例包括虚拟机监视器,操作系统监视器或其他底层平台功能的能力,以限制存储器区域,以便仅通过特定认证的,授权的和已验证的软件组件进行访问,即使在其他受损的操作系统环境的一部分。 配置远程实体或网关只需要知道平台的公钥或证书层次结构,以便接收平台中任何组件的验证证明。 验证证明或凭证有助于向远程实体确保在平台或网络上运行的中间人,rootkit,间谍软件或其他恶意软件将无法访问所提供的资料。 代表被保护的内存区域中提供的经过身份验证/授权/验证的软件组件的锁定和解锁秘密的底层平台只能由经过身份验证/授权/验证的软件组件访问。 可以描述和要求保护其他实施例。
    • 30. 发明授权
    • Methods and systems for cryptographic access control of video
    • 视频加密访问控制的方法和系统
    • US09094733B2
    • 2015-07-28
    • US13977529
    • 2012-03-31
    • Karanvir S. GrewalDavid DurhamXiaozhu KangMen LongPrashant Dewan
    • Karanvir S. GrewalDavid DurhamXiaozhu KangMen LongPrashant Dewan
    • G06F21/62H04N21/647H04N21/266H04N21/4405H04N21/4627H04N21/8355H04L9/18
    • H04N21/64715H04N21/23476H04N21/2541H04N21/266H04N21/4405H04N21/4627H04N21/8355
    • Cryptographic access control of multimedia video is presented. A method includes generating as metadata an access control policy (ACP) associated with video, the ACP including authorization rules and cryptographic information associated with an encryption policy; encrypting the video according to the encryption policy; and encoding the encrypted video with the authorization rules and the cryptographic information, which may be used to decrypt and render the encoded video. As an example, an authorized receiver device having credentials and/or capabilities matched to the authorization rules may extract the ACP information from the encrypted video and use it to decrypt and properly render the video. The method may further include visually encoding the encrypted video with at least portions of the authorization rules and the cryptographic information, such that the visually encoded video is renderable as the video by an authorized device, but is renderable as visually unintelligible video by an unauthorized device.
    • 介绍了多媒体视频的密码访问控制。 一种方法包括:生成与视频相关联的访问控制策略(ACP)作为元数据,所述ACP包括与加密策略相关联的授权规则和加密信息; 根据加密策略加密视频; 并使用可用于解密和呈现编码视频的授权规则和密码信息对加密的视频进行编码。 作为示例,具有与授权规则匹配的凭证和/或能力的授权接收机设备可以从加密的视频中提取ACP信息,并使用它来解密并适当地呈现视频。 该方法还可以包括使用授权规则和密码信息的至少一部分来视觉地编码加密的视频,使得视觉编码的视频可以由授权设备呈现为视频,但是可被未经授权的设备呈现为视觉上难以理解的视频 。