会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 71. 发明申请
    • Last line of defense ensuring and enforcing sufficiently valid/current code
    • 最后一道防线确保并执行足够有效/现行的代码
    • US20060156008A1
    • 2006-07-13
    • US11034377
    • 2005-01-12
    • Alexander Frank
    • Alexander Frank
    • H04L9/00
    • G06F21/57G06F2221/2135G06F2221/2137G06F2221/2139G06F2221/2153
    • A computer is adapted for self-validation using a dedicated validation circuit or process. The validation circuit may include a timing circuit for activating the validation process, a verification circuit for verifying the computer is in compliance with a pre-determined set of conditions and an enforcement circuit for imposing a sanction on the computer when the computer is found in a non-compliant state. The validation circuit may include cryptographic circuitry or processes for hashing and digital signature verification. The validation circuit is preferable small and portable to help ensure that the validation circuit itself is not vulnerable to a widespread attack. A self-validation method for use by a computer is also disclosed.
    • 计算机适用于使用专用验证电路或过程的自我验证。 验证电路可以包括用于激活验证过程的定时电路,用于验证计算机符合预定条件集合的验证电路和用于在计算机被发现时在计算机上施加制裁的强制电路 不合规状态。 验证电路可以包括加密电路或用于散列和数字签名验证的过程。 验证电路较小且便于携带,以确保验证电路本身不易受到广泛的攻击。 还公开了一种由计算机使用的自验证方法。
    • 74. 发明申请
    • SYSTEM AND METHOD FOR CONFIDENTIAL REMOTE COMPUTING
    • 用于机密远程计算的系统和方法
    • US20150264024A1
    • 2015-09-17
    • US14214936
    • 2014-03-15
    • Alexander Frank
    • Alexander Frank
    • H04L29/06
    • H04L63/08H04L63/107H04L63/14
    • A system, method, device and protocols are disclosed. Each and combined they protect computation and data hosted on remote computing resources from first party attacks.First party attacks refer to attacks that are launched by agents (employees, contractors, etc.) of the hosting facility. Such attacks can be launched by the first patty agents, or some other adversary exploiting the privileges of the first party agent.This invention allows customers to submit workloads to a remote computing facility, e.g. a datacenter or cloud computing, with the assurance that the administrators of the remote computers cannot access the workload computation and data.The invention scales effectively from a single compute-server device to a whole datacenter with numerous compute-servers. It interoperates and may utilize VMM and VM deployment architectures. The invention allows varying degrees of datacenter operations access to the workload ranging from virtually none in the most strict case, to limited access to enable monitoring and maintenance of the workload.This invention can be applied to existing cloud computing and other datacenters with off the self computing components. Further it can be applied to existing computing resource commonly in use in such facilities. Further, the invention is applicable to a wide variety of settings including single computers, computer labs, datacenters and public and private cloud computing services.
    • 公开了一种系统,方法,设备和协议。 每个组合它们保护远程计算资源上托管的计算和数据免受第一方攻击。 第一方攻击是指托管设施的代理(员工,承包商等)发起的攻击。 这种攻击可以由第一代理代理人或利用第一方代理人的特权的其他对手发起。 本发明允许客户将工作负载提交给远程计算设备,例如, 数据中心或云计算,确保远程计算机的管理员无法访问工作负载计算和数据。 本发明有效地从单个计算服务器设备扩展到具有许多计算服务器的整个数据中心。 它可以互操作并且可以利用VMM和VM部署架构。 本发明允许不同程度的数据中心操作访问工作负载,在最严格的情况下几乎不存在,到有限的访问以允许监视和维护工作负载。 本发明可以应用于现有的云计算和其他数据中心,而不考虑自身计算组件。 此外,它可以应用于通常在这样的设施中使用的现有计算资源。 此外,本发明可应用于各种设置,包括单个计算机,计算机实验室,数据中心以及公共和私有云计算服务。
    • 76. 发明授权
    • Leveraging active firewalls for network intrusion detection and retardation of attack
    • 利用主动防火墙进行网络入侵检测和阻止攻击
    • US08170020B2
    • 2012-05-01
    • US11298411
    • 2005-12-08
    • Robert Ian OliverAlexander Frank
    • Robert Ian OliverAlexander Frank
    • H04L12/28G06F7/04
    • H04L63/0227H04L63/1408
    • A computer network firewall or network filter functions normally to pass data on open ports to a respective service or data source associated with an open port. In addition, traffic arriving on closed ports may be directed to a handler for analysis and response. The handler may analyze and catalog the source and type of traffic arriving on the closed ports. The handler may then send a response with either a fixed response or data tailored to the type and nature of the traffic. The handler may respond slowly to cause the source of the traffic to wait for the response, thereby slowing the speed at which a potential attacker can identify valid targets and proceed past non-valid targets.
    • 计算机网络防火墙或网络过滤器可以正常工作,将开放端口上的数据传递到与开放端口相关联的相应服务或数据源。 此外,到达封闭港口的流量可能被引导到处理程序进行分析和响应。 处理程序可以分析和编目到达封闭端口的流量的来源和类型。 然后,处理程序可以发送具有针对流量的类型和性质的固定响应或数据的响应。 处理程序可能会缓慢响应,导致流量来源等待响应,从而降低潜在攻击者可以识别有效目标并进入非有效目标的速度。