会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 21. 发明申请
    • System and Method for Virtualized Hypervisor to Detect Insertion of Removable Media
    • 虚拟化管理程序的系统和方法,用于检测可移动介质的插入
    • US20080127309A1
    • 2008-05-29
    • US11564832
    • 2006-11-29
    • David Carroll ChallenerDaryl CromerHoward Jeffrey LockerRandall Scott Springfield
    • David Carroll ChallenerDaryl CromerHoward Jeffrey LockerRandall Scott Springfield
    • G06F21/20
    • H04L63/10G06F21/552G06F2221/2153
    • A system and method for using a client-side hypervisor in conjunction with a secure network-side monitoring mechanism to detect removable media insertions since a client's last network session with the secure network is presented. The hypervisor uses a “client-side insertion value” to track the number of times that a user inserts removable media into a socket located on the client. When the client is connected to the secure network, the client's hypervisor notifies the secure network of each insertion and the secure network increments a “secure network-side tracker value.” For each login request, the client includes the client-side insertion value, which the secure network compares against its secure network-side tracker value. When the two values are different, the secure network sends an action request to the client, such as a request to perform a full system scan. Once the client performs the action, the client's hypervisor resets its client-side insertion value and attempts to logon to the secure network again.
    • 提出了客户端管理程序与安全网络侧监视机制结合使用以检测可移动介质插入的系统和方法,因为客户端与安全网络的最后一次网络会话。 管理程序使用“客户端插入值”来跟踪用户将可移动媒体插入位于客户端上的套接字的次数。 当客户端连接到安全网络时,客户端的管理程序会将安全网络通知每个插入,并且安全网络会增加“安全网络侧跟踪器值”。 对于每个登录请求,客户端包括客户端插入值,安全网络与安全网络侧跟踪器值进行比较。 当两个值不同时,安全网络向客户端发送动作请求,例如执行完整系统扫描的请求。 一旦客户端执行操作,客户端的管理程序将重置其客户端插入值,并尝试再次登录到安全网络。
    • 23. 发明授权
    • Method and system for verifying binding of an initial trusted device to a secured processing system
    • 用于验证初始可信设备与安全处理系统的绑定的方法和系统
    • US07143287B2
    • 2006-11-28
    • US10970461
    • 2004-10-21
    • Steven A. BadeDavid Carroll Challener
    • Steven A. BadeDavid Carroll Challener
    • G06F17/30
    • G06F21/57
    • A method and system for verifying binding of an initial trusted device to a secured processing system binds an initial device or replacement when no binding information is available from another device in the system. A platform credential is issued only when a valid binding is verified, by sending a proof of binding to a credential provider, such as the manufacturer. The method secures against security breaches that can occur when a device is removed from the system during the binding process. The binding information is generated in the device upon installation and includes system identification information so that at each initialization, upon return of binding information from the system to the device, the device can ensure that it is installed in the proper system and abort operation if the system does not match.
    • 用于验证初始可信设备与安全处理系统的绑定的方法和系统在没有绑定信息可用于系统中的另一设备时绑定初始设备或替换。 只有当有效的绑定被验证时,才通过发送绑定到证书提供商(如制造商)的证明来颁发平台凭据。 该方法可以防止在绑定过程中从系统中删除设备时可能发生的安全漏洞。 捆绑信息在安装时在设备中生成,并且包括系统识别信息,使得在每次初始化时,从系统返回到设备的绑定信息,设备可以确保其被安装在适当的系统中并且如果 系统不匹配。
    • 26. 发明授权
    • Method and system for automated migration of user settings to a replacement computer system
    • 将用户设置自动迁移到替换计算机系统的方法和系统
    • US06182212B2
    • 2001-01-30
    • US09211072
    • 1998-12-14
    • Barry Douglas AtkinsDavid Carroll ChallenerRichard Wayne Cheston
    • Barry Douglas AtkinsDavid Carroll ChallenerRichard Wayne Cheston
    • G06F9445
    • G06F9/4451
    • A method and system are disclosed for automating migration of user system settings from an existing computer system to a replacement computer system in response to a user input. Selected portions of the registry, or central hierarchial data base within the existing computer system are automatically copied and stored in response a user input. A plurality of application program interface (API) routines are then initiated to retrieve and store selected settings within the existing computer system. Adapter binding information for all adapters within the existing computer system are retrieved and stored. The selected portions of the registry, selected settings and adapter binding information are then transferred to the replacement computer system and copied into appropriate registry keys, directories and files, effectively transferring the system settings from the existing computer system to the replacement computer system.
    • 公开了一种用于响应于用户输入自动将用户系统设置从现有计算机系统迁移到替换计算机系统的方法和系统。 注册表的所选部分或现有计算机系统中的中央分层数据库将自动复制并存储以响应用户输入。 然后启动多个应用程序接口(API)例程以检索和存储现有计算机系统内的所选设置。 检索并存储现有计算机系统内所有适配器的适配器绑定信息。 然后将注册表,选定设置和适配器绑定信息的选定部分传输到替换计算机系统并复制到适当的注册表项,目录和文件中,将系统设置从现有计算机系统有效地传输到更换计算机系统。
    • 30. 发明授权
    • Securely creating an endorsement certificate in an insecure environment
    • 在不安全的环境中安全地创建背书证书
    • US08495361B2
    • 2013-07-23
    • US11858971
    • 2007-09-21
    • Ryan Charles CathermanDavid Carroll ChallenerJames Patrick Hoff
    • Ryan Charles CathermanDavid Carroll ChallenerJames Patrick Hoff
    • H04L29/06
    • G06F21/57
    • A method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured TPMs. The endorsement keys are generated for the TPM. The TPM vendor selects an N-byte secret and stores the N-byte secret in the TPM along with the endorsement keys. The secret number cannot be read outside of the TPM. The secret number is also provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key with a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the TPM only when a match is confirmed.
    • 一种用于确保制造TPM的签注密钥的安全兼容创建和签名的方法和系统。 为TPM生成认可密钥。 TPM供应商选择一个N字节的秘密,并将N字节的秘密与支持密钥一起存储在TPM中。 无法在TPM之外读取密码。 秘密编号也提供给OEM的凭据服务器。 在认可密钥(EK)凭证处理过程中,TPM产生一个签名密钥,其包括公开密钥和密钥的散列以及公开密钥。 凭证服务器将签名密钥内的散列与接收到的公钥(来自认可密钥)和供应商提供的秘密的第二散列进行匹配。 仅当匹配确认时,EK证书才会生成并插入到TPM中。