会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明申请
    • Determining a merged security policy for a computer system
    • 确定计算机系统的合并安全策略
    • US20090007219A1
    • 2009-01-01
    • US11823837
    • 2007-06-28
    • David AbzarianGerardo Diaz CuellarMark VaymanEran Yariv
    • David AbzarianGerardo Diaz CuellarMark VaymanEran Yariv
    • G06F17/00
    • H04L63/20G06F21/577H04L63/0263
    • Embodiments of the invention described herein are directed to a mechanism for determining whether at least one operation will be effective in view of at least one security policy. In exemplary implementations, determining whether at least one operation will be effective in view of at least one security policy may comprise determining a merged security policy for a computer system by merging security policies for the computer system from two or more sources. The security policies may be security policies set by a user and/or an administrator of the computer system, may be security policies of a computer network to which the computer system is connected, or may be security policies of one or more other computer systems that are above the computer system in a computer network hierarchy.
    • 本文描述的本发明的实施例涉及用于根据至少一个安全策略来确定至少一个操作是否有效的机制。 在示例性实现中,鉴于至少一个安全策略确定至少一个操作是否有效可以包括通过从两个或更多个源合并计算机系统的安全策略来确定计算机系统的合并安全策略。 安全策略可以是由用户和/或计算机系统的管理员设置的安全策略,可以是计算机系统连接到的计算机网络的安全策略,或者可以是一个或多个其他计算机系统的安全策略, 在计算机网络层次结构中的计算机系统之上。
    • 42. 发明授权
    • Transient storage device configuration silo
    • 瞬态存储设备配置仓
    • US08930655B2
    • 2015-01-06
    • US12356055
    • 2009-01-19
    • David AbzarianHarish S. KulkarniTodd Carpenter
    • David AbzarianHarish S. KulkarniTodd Carpenter
    • G06F12/14G06F21/78G06F21/31
    • G06F3/0622G06F3/0637G06F3/0673G06F21/31G06F21/78G06F2221/2129
    • A device configuration silo is arranged to be accessed as an IEEE 1667-compatible silo which exposes interfaces to a host application to make changes to the presence of one or more other silos, as well as make changes to silo configurations on a per-silo basis for data and method sharing among silos across the ACTs on a storage device such as a transient storage device. The interfaces exposed by the device configuration silo are arranged to enable an authenticated provisioner, like administrator in a corporate network environment, to perform configuration changes to silos after the storage device is released into the field through a secure provisioning mechanism. In addition, users may make configuration changes to silos at runtime in some usage scenarios, for example to enable discrete portions of functionality on a storage device, by using a secure secondary authentication mechanism that is exposed by the device configuration silo.
    • 设备配置仓被布置为作为IEEE 1667兼容筒仓进行访问,其暴露到主机应用的接口以改变一个或多个其他仓库的存在,以及在基于每个仓的基础上对仓仓配置进行改变 用于跨存储设备(如瞬态存储设备)上的ACT之间的数据和方法共享。 被设备配置筒仓暴露的接口被布置成使经认证的提供者(例如企业网络环境中的管理员)能够通过安全供应机制将存储设备释放到现场之后对孤岛进行配置更改。 此外,用户可以在某些使用情况下在运行时对配置进行更改,例如通过使用由设备配置筒仓公开的安全辅助认证机制来实现存储设备上的功能的分立部分。
    • 43. 发明授权
    • Device side host integrity validation
    • 设备端主机完整性验证
    • US08806220B2
    • 2014-08-12
    • US12349516
    • 2009-01-07
    • David AbzarianTodd L. CarpenterHarish S. KulkarniSalahuddin J. Khan
    • David AbzarianTodd L. CarpenterHarish S. KulkarniSalahuddin J. Khan
    • G06F11/30G06F21/00
    • G06F12/1416G06F21/57G06F2212/1052G06F2221/2101
    • Described is a technology by which a transient storage device or secure execution environment-based (e.g., including an embedded processor) device validates a host computer system. The device compares hashes of host system data against valid hashes maintained in protected storage of the device. The host data may be a file, data block, and/or memory contents. The device takes action when the host system data does not match the information in protected storage, such as to log information about the mismatch and/or provide an indication of validation failure, e.g., via an LED and/or display screen output. Further, the comparison may be part of a boot process validation, and the action may prevent the boot process from continuing, or replace an invalid file. Alternatively, the validation may take place at anytime.
    • 描述了一种瞬态存储设备或基于安全执行环境(例如,包括嵌入式处理器)设备验证主计算机系统的技术。 该设备将主机系统数据的哈希值与在设备的受保护存储中维护的有效散列进行比较。 主机数据可以是文件,数据块和/或存储器内容。 当主机系统数据与受保护存储器中的信息不匹配时,该装置采取行动,例如记录关于不匹配的信息和/或提供验证失败的指示,例如经由LED和/或显示屏幕输出。 此外,比较可以是引导过程验证的一部分,并且该操作可以阻止引导过程继续或替换无效文件。 或者,验证可以在任何时间进行。
    • 47. 发明授权
    • Firewall with policy hints
    • 具有策略提示的防火墙
    • US08584227B2
    • 2013-11-12
    • US11801211
    • 2007-05-09
    • David AbzarianGerardo Diaz CuellarSatheesh S. Dabbiru
    • David AbzarianGerardo Diaz CuellarSatheesh S. Dabbiru
    • H04L29/06
    • H04L63/20
    • A firewall helps a user make a decision regarding network access for an application executing on a computing device by providing “hints” to the user about an appropriate network access policy. If at least one previously set firewall policy for the application exists in a context different from a current context, the user may be presented with information based on a previously set firewall policy. The information may be prioritized based on a source of the previously set firewall policy and other factors, to provide the user with a hint that facilitates making the decision appropriate in the current context. A programming interface to the firewall allows third party applications to specify a format in which hints are provided to the user.
    • 防火墙通过向用户提供关于适当的网络访问策略的“提示”,帮助用户做出关于在计算设备上执行的应用的网络访问的决定。 如果在与当前上下文不同的上下文中存在用于应用的至少一个先前设置的防火墙策略,则可以基于先前设置的防火墙策略来呈现用户的信息。 可以基于先前设置的防火墙策略的来源和其他因素对信息进行优先级,以向用户提供有助于使决策在当前上下文中适当的提示。 防火墙的编程接口允许第三方应用程序指定向用户提供提示的格式。
    • 50. 发明授权
    • Capturing and loading operating system states
    • 捕获和加载操作系统状态
    • US08209501B2
    • 2012-06-26
    • US12435737
    • 2009-05-05
    • David AbzarianTodd L. CarpenterHarish S. Kulkarni
    • David AbzarianTodd L. CarpenterHarish S. Kulkarni
    • G06F13/00
    • G06F17/3007G06F9/4418
    • Operating system states capture and loading technique embodiments are presented that involve the capture and loading of baseline system states. This is accomplished, in one embodiment, by storing the states of a computer's operating system memory that it is desired to restore at a future time. No changes are permitted to the persisted storage associated with the computer. Instead, changes that would have been made to the persisted storage during an ensuing computing session, had they not been prevented, are stored in a separate computing session file. Whenever it is desired to return the operating system to its baseline condition, the stored baseline system memory states are loaded into the operating system memory, in lieu of the operating system memory's current states.
    • 提出了涉及捕获和加载基线系统状态的操作系统状态捕获和加载技术实施例。 这在一个实施例中通过存储希望在将来的时间恢复的计算机的操作系统存储器的状态来实现。 与计算机相关联的持久存储器不允许更改。 相反,如果没有阻止在随后的计算会话期间对持久存储进行的更改将被存储在单独的计算会话文件中。 无论何时需要将操作系统恢复到其基准状态,存储的基线系统存储器状态将被加载到操作系统存储器中,以代替操作系统存储器的当前状态。