会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 71. 发明授权
    • Removable storage device data protection
    • 可移动存储设备数据保护
    • US09495562B2
    • 2016-11-15
    • US13189837
    • 2011-07-25
    • David RiveraRod D. Waltermann
    • David RiveraRod D. Waltermann
    • G06F21/78G06F3/06
    • G06F21/78G06F3/0614G06F3/0644G06F2221/2105
    • Devices, methods and products are described that provide removable storage device data protection. One aspect provides a method comprising: ascertaining a protected removable storage device connected to an information handling device, said protected removable storage device having a first partition for storing data according to a first file system type, and a second partition for storing user data according to a second file system type; and responsive to said information handling device recognizing said second file system type, querying for user credentials to decrypt a data encryption key used to encrypt said user data of said second partition. Other embodiments are described.
    • 描述了提供可移动存储设备数据保护的设备,方法和产品。 一个方面提供一种方法,包括:确定连接到信息处理装置的受保护的可移动存储装置,所述受保护的可移除存储装置具有根据第一文件系统类型存储数据的第一分区,以及根据第一文件系统类型存储用户数据的第二分区 第二种文件系统类型; 并且响应于所述信息处理设备识别所述第二文件系统类型,查询用户凭证来解密用于加密所述第二分区的所述用户数据的数据加密密钥。 描述其他实施例。
    • 73. 发明授权
    • Apparatus, system and method for storage cache deduplication
    • 用于存储高速缓存重复数据消除的装置,系统和方法
    • US08190823B2
    • 2012-05-29
    • US12233264
    • 2008-09-18
    • Rod D. WaltermannMark Charles Davis
    • Rod D. WaltermannMark Charles Davis
    • G06F12/00
    • G06F12/0873G06F12/0868G06F2212/263
    • An apparatus, system, and method are disclosed for deduplicating storage cache data. A storage cache partition table has at least one entry associating a specified storage address range with one or more specified storage partitions. A deduplication module creates an entry in the storage cache partition table wherein the specified storage partitions contain identical data to one another within the specified storage address range thus requiring only one copy of the identical data to be cached in a storage cache. A read module accepts a storage address within a storage partition of a storage subsystem, to locate an entry wherein the specified storage address range contains the storage address, and to determine whether the storage partition is among the one or more specified storage partitions if such an entry is found.
    • 公开了用于重复数据删除存储高速缓存数据的装置,系统和方法。 存储高速缓存分区表具有至少一个将指定的存储地址范围与一个或多个指定的存储分区相关联的条目。 重复数据消除模块在存储高速缓存分区表中创建条目,其中指定的存储分区在指定的存储地址范围内彼此包含相同的数据,因此仅需要将相同数据的一个副本缓存在存储高速缓存中。 读取模块接受存储子系统的存储分区内的存储地址,以定位其中指定的存储地址范围包含存储地址的条目,并且如果这样的一个或多个存储分区 找到条目。
    • 76. 发明授权
    • Authenticating suspect data using key tables
    • 使用关键表验证可疑数据
    • US08024579B2
    • 2011-09-20
    • US11647932
    • 2006-12-29
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • G06F11/30
    • G06F21/57G06F21/51H04L9/0897H04L9/3236
    • A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
    • 用于认证可疑代码的系统和方法包括以下步骤:接收可信平台模块的第一实例的可疑代码; 将可疑代码加载到与处理器可操作地相关联的可信任的平台模块设备中,其中可疑代码被加载到可信平台模块设备内的屏蔽位置之外; 从表中检索验证公钥并将其存储在可信平台模块设备中的寄存器中,由可疑代码索引的验证公钥; 并从表中检索散列算法,由可疑代码索引的哈希算法。 运行散列算法以导出第一散列值; 然后,使用验证公钥,解密第二哈希值以导出第二解密哈希值。 比较两个哈希值; 并且在确定匹配时,可疑代码被加载到处理器的屏蔽位置以供处理器执行。
    • 80. 发明申请
    • Authenticating suspect data using key tables
    • 使用关键表验证可疑数据
    • US20080162932A1
    • 2008-07-03
    • US11647932
    • 2006-12-29
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • H04L9/14
    • G06F21/57G06F21/51H04L9/0897H04L9/3236
    • A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
    • 用于认证可疑代码的系统和方法包括以下步骤:接收可信平台模块的第一实例的可疑代码; 将可疑代码加载到与处理器可操作地相关联的可信任的平台模块设备中,其中可疑代码被加载到可信平台模块设备内的屏蔽位置之外; 从表中检索验证公钥并将其存储在可信平台模块设备中的寄存器中,由可疑代码索引的验证公钥; 并从表中检索散列算法,由可疑代码索引的哈希算法。 运行散列算法以导出第一散列值; 然后,使用验证公钥,解密第二哈希值以导出第二解密哈希值。 比较两个哈希值; 并且在确定匹配时,可疑代码被加载到处理器的屏蔽位置以供处理器执行。