会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 72. 发明申请
    • DETERMINATION BY CIRCUITRY OF PRESENCE OF AUTHORIZED AND/OR MALICIOUS DATA
    • 通过电路确定授权和/或恶意数据的存在
    • US20100325729A1
    • 2010-12-23
    • US12487878
    • 2009-06-19
    • Hormuzd M. KhosraviVincent E. Von BokernMen Long
    • Hormuzd M. KhosraviVincent E. Von BokernMen Long
    • G06F21/00
    • G06F21/565
    • An embodiment may include circuitry that may be comprised in a host. The host may include memory and a host processor to execute an operating system. The circuitry may be to determine, independently of the operating system and the host processor, the authenticity of signature list information, based at least in part upon authentication information received by the circuitry from a remote server. The circuitry also may be to determine, independently of the operating system and the host processor, based at least in part upon comparison of at least one portion of the signature list information with at least one portion of contents of the memory, whether authorized and/or malicious data are present in the at least one portion of the contents of the memory. Of course, many variations, modifications, and alternatives are possible without departing from this embodiment.
    • 实施例可以包括可以包括在主机中的电路。 主机可以包括存储器和主机处理器来执行操作系统。 该电路可以至少部分地基于电路从远程服务器接收的认证信息来独立于操作系统和主处理器来确定签名列表信息的真实性。 电路还可以至少部分地基于对签名列表信息的至少一部分与存储器的内容的至少一部分进行比较来独立于操作系统和主处理器来确定是否授权和/ 或恶意数据存在于存储器的内容的至少一部分中。 当然,在不偏离本实施例的情况下,可以进行许多变化,修改和替换。
    • 73. 发明申请
    • Efficient Key Derivation for End-To-End Network Security with Traffic Visibility
    • 针对具有流量可见性的端到端网络安全性的高效关键推导
    • US20100135498A1
    • 2010-06-03
    • US12327137
    • 2008-12-03
    • Men LongJesse WalkerKaranvir Grewal
    • Men LongJesse WalkerKaranvir Grewal
    • H04L9/08H04L9/00
    • H04L9/0866H04L9/0631H04L63/0428H04L63/06H04L2209/125
    • Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes the derivation key to information technology monitoring devices and a server to provide traffic visibility. For large key sizes, the key may be derived using a derivation formula as follows: client_key—MSB=AES128(base_key_1, client_ID),   (1) client_key—LSB=AES128(base_key_2, client_ID+pad), and   (2) client_key=client_key_MSB∥client_key_LSB, where (1) and (2) are executed in parallel. The client key and a client identifier may be used so that end-to-end security may be achieved.
    • 端到端安全性和流量可见性可以由使用控制器的系统来实现,所述控制器基于在每个数据分组中传送的导出密钥和客户端标识符来导出每个客户端不同的密码密钥。 控制器将派生密钥分发到信息技术监控设备和服务器,以提供流量可视性。 对于较大的密钥大小,密钥可以使用以下推导公式导出:client_key-MSB = AES128(base_key_1,client_ID),(1)client_key-LSB = AES128(base_key_2,client_ID + pad)和(2)cli​​ent_key = client_key_MSB‖client_key_LSB,其中(1)和(2)并行执行。 可以使用客户端密钥和客户端标识符,以便可以实现端到端的安全性。