会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 56. 发明申请
    • Method and Apparatus for Providing Centralized User Authorization to Allow Secure Sign-On to a Computer System
    • 提供集中用户授权以允许安全登录到计算机系统的方法和装置
    • US20080148389A1
    • 2008-06-19
    • US11612092
    • 2006-12-18
    • Howard LockerDaryl CromerRandall S. SpringfieldRod D. Waltermann
    • Howard LockerDaryl CromerRandall S. SpringfieldRod D. Waltermann
    • G06F7/04
    • G06F21/575
    • A method for providing centralized user authorization to allow secure sign-on to a computer system is disclosed. In response to a user attempting to boot up a computer system, a message is sent to a trusted server by a hypervisor within the computer to request a new hard drive password for the computer system. If the user is not authorized to access the computer system, a packet is sent by the trusted server to instruct the hypervisor to stop any boot process on the computer system. If the user is authorized to access the computer system, a packet containing a partial hard drive password is sent by the trusted server to the computer system. The packet is then encrypted with a system public key by the computer system to yield the partial hard drive password. The computer system subsequently combines the partial hard drive password with a user password to generate a new complete hard drive password to continue with the boot process.
    • 公开了一种用于提供集中式用户授权以允许对计算机系统进行安全登录的方法。 响应于尝试启动计算机系统的用户,由计算机内的虚拟机管理程序向可信服务器发送消息,以请求计算机系统的新的硬盘驱动器密码。 如果用户没有权限访问计算机系统,则可信服务器发送一个数据包,以指示管理程序停止计算机系统上的任何引导过程。 如果用户被授权访问计算机系统,则包含部分硬盘驱动器密码的分组由可信服务器发送到计算机系统。 然后,计算机系统使用系统公钥对数据包进行加密,以产生部分硬盘驱动器密码。 计算机系统随后将部分硬盘驱动器密码与用户密码相结合,以生成新的完整硬盘驱动器密码,以继续引导过程。
    • 58. 发明申请
    • Method for controlling file access on computer systems
    • 控制计算机系统文件访问的方法
    • US20070283169A1
    • 2007-12-06
    • US11446737
    • 2006-06-05
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • H04L9/00G06F12/14H04L9/32G06F11/30
    • G06F12/1475G06F21/78
    • A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.
    • 公开了一种用于控制计算机系统上的文件访问的方法。 最初,在计算机系统中提供虚拟机管理器(VMM)。 响应于写入请求,VMM确定位置字段是否有效。 如果位置字段无效,则VMM将写请求信息写入存储设备; 但是如果位置字段有效,则VMM在将写入请求信息写入存储设备之前对写入请求信息进行加密。 响应于读取请求,VMM再次确定位置字段是否有效。 如果位置字段无效,则VMM将读取请求信息发送给读取请求者; 但是,如果位置字段有效,则VMM在将读取请求信息发送给读取请求者之前解密读取请求信息。
    • 60. 发明授权
    • Reducing start-up time and avoiding customer-induced system failures for personal computers
    • 减少启动时间,避免客户导致的个人电脑系统故障
    • US06721885B1
    • 2004-04-13
    • US09658130
    • 2000-09-08
    • Joseph Wayne FreemanJoseph Franklin GarveySteven D. GoodmanWilliam Fred Keown, Jr.Randall S. Springfield
    • Joseph Wayne FreemanJoseph Franklin GarveySteven D. GoodmanWilliam Fred Keown, Jr.Randall S. Springfield
    • G06F15177
    • G06F9/4401G06F11/2289
    • Disclosed is a method for reducing power-up time and avoiding customer-induced failures of computer systems during power-up. An intrusion switch, which is connected to the inside frame of the computer system is utilized. The intrusion switch signals the BIOS of the computer system whenever the cover of the computer's system unit is opened. The BIOS controls the POST operation during power-up of the computer system. During an initial power-up of the computer system, the POST configuration code examines and configures the hardware and sets the applicable registers, etc. At the end of the POST configuration code, the register values are stored in non-volatile storage. During a subsequent power-up of the computer system, a check is made to see if the cover of the system had been opened. When the cover has not been opened, the BIOS assumes that no changed has occurred in the hardware configuration and the BIOS restores the register values from non-volatile storage without completing the POST operation. When the cover has been opened, the BIOS discards the register values and initiates the POST operation, i.e., a full configuration operation is performed and new values stored in the registers and non-volatile storage element.
    • 公开了一种在上电期间减少上电时间并避免客户导致的计算机系统故障的方法。 使用连接到计算机系统的内部框架的入侵开关。 每当打开计算机系统单元的盖子时,入侵开关就会通知计算机系统的BIOS。 BIOS在电脑系统启动期间控制POST操作。 在计算机系统的初始上电期间,POST配置代码检查和配置硬件并设置适用的寄存器等。在POST配置代码结束时,寄存器值存储在非易失性存储器中。 在计算机系统的随后上电期间,检查系统的盖是否已打开。 当盖子尚未打开时,BIOS假定在硬件配置中没有发生任何变化,BIOS会从非易失性存储器中恢复寄存器值,而无需完成POST操作。 当盖子打开时,BIOS将丢弃寄存器值并启动POST操作,即执行完整配置操作,并将新值存储在寄存器和非易失性存储元件中。