会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Dynamic fine-grained dependency analysis for a functional language
    • 功能语言的动态细粒度依赖性分析
    • US5940619A
    • 1999-08-17
    • US738150
    • 1996-10-25
    • Martin AbadiJames J. HorningButler W. LampsonRoy LevinJean-Jacques LevyYuan Yu
    • Martin AbadiJames J. HorningButler W. LampsonRoy LevinJean-Jacques LevyYuan Yu
    • G06F9/44G06F9/45
    • G06F8/311G06F8/433G06F9/45508
    • In a computerized method, a computer program is analyzed while the program is interpreted. The program is expressed in a first memory as input values and functions. Some of the input values are complex values which can have a plurality of component values. Each function operates on combinations of the input values and the functions of the program. The program is interpreted in a processor connected to the first memory. The processor is also connected to a second memory to store result values produced during the interpretation. Selected input values, components of the complex values, and functions are named only if the selected values, components, and functions are necessary to produce a selected result value. For each function of the program, the function which is interpreted, the input values on which the function depends, and the result value produced by the function during interpretation, are recorded in the second memory to dynamically perform a precise dependency analysis of the program.
    • 在计算机化方法中,在解释程序时分析计算机程序。 该程序在第一个存储器中表示为输入值和函数。 一些输入值是可以具有多个分量值的复数值。 每个功能按照程序的输入值和功能的组合进行操作。 该程序在连接到第一存储器的处理器中解释。 处理器还连接到第二存储器以存储在解释期间产生的结果值。 选定的输入值,复数值的组成部分和功能仅在选定的值,组件和功能需要产生选定的结果值时进行命名。 对于程序的每个功能,解释的功能,功能所依赖的输入值和解释期间由功能产生的结果值被记录在第二存储器中以动态地执行程序的精确的依赖性分析。
    • 2. 发明授权
    • Method and apparatus for end-to-end encryption of a data packet in a
computer network
    • 用于计算机网络中的数据分组的端到端加密的方法和装置
    • US5594869A
    • 1997-01-14
    • US432331
    • 1995-05-01
    • William R. HaweButler W. LampsonAmar Gupta
    • William R. HaweButler W. LampsonAmar Gupta
    • H04L29/06G06F7/00
    • H04L63/0485H04L29/06H04L63/12H04L63/162
    • A technique to facilitate decryption processing of information packets transmitted over a communication network after encryption in accordance with a specific network protocol, the details of which may be subject to later change as standards are developed or modified. Programmable registers are used in the decryption process to hold information for identifying an incoming information packet as being subject to the specific protocol and requiring decryption, and identifying a starting location of a data field to be decrypted. Specifically one programmable register contains a first offset locating an identifier field in the packet, in which a cryptographic identifier will be found if the packet is one conforming to the protocol; another programmable register contains a cryptographic identifier value that will be found in the identifier field if decryption is to be performed, and a third programmable register contains a second offset to locate the beginning of a data field to be decrypted.
    • 一种用于根据特定网络协议在加密之后通过通信网络传送的信息分组的解密处理的技术,其细节可能随着标准的开发或修改而随之而变化。 解密过程中使用可编程寄存器来保存用于识别进入信息包的信息为受特定协议的约束,并且需要解密,以及识别要被解密的数据字段的起始位置。 具体地,一个可编程寄存器包含定位分组中的标识符字段的第一偏移,其中如果分组是符合该协议的密钥标识符,将找到密码标识符; 另一个可编程寄存器包含将要在执行解密时在标识符字段中找到的加密标识符值,并且第三可编程寄存器包含第二偏移量以定位待解密的数据字段的开始。
    • 6. 发明授权
    • Hierarchical trusted code for content protection in computers
    • 计算机内容保护的层次可信代码
    • US07496769B2
    • 2009-02-24
    • US11018065
    • 2004-12-20
    • Butler W. LampsonPaul England
    • Butler W. LampsonPaul England
    • H04L9/00H04K1/00
    • G06Q10/10G06F21/57
    • An architecture for protecting premium content in a nonsecure computer environment executes only a small number of code modules in a secure memory. The modules are arranged in a hierarchy of trust, where a module names other modules that it is willing to trust, and those modules in turn name other modules that they are willing to trust. A secure loader loads a security manager that oversees a number of content-providing modules for manipulating the content. A memory manager assigns permissions to various pages of the secure memory. The memory has rings of different security. The security model can be extended to program modules and other devices on the computer's bus, such as DMA controllers and peripherals.
    • 在非安全计算机环境中保护优质内容的架构仅在安全存储器中执行少量代码模块。 这些模块被布置在信任层级中,其中模块命名它愿意信任的其他模块,而这些模块又命名他们愿意信任的其他模块。 安全加载器加载一个安全管理器,该管理器负责监视用于操纵内容的多个内容提供模块。 内存管理员将权限分配给安全内存的各个页面。 内存具有不同安全性的环。 安全模型可以扩展到计算机总线上的程序模块和其他设备,如DMA控制器和外设。
    • 10. 发明授权
    • Pipelined cryptography processor and method for its use in communication
networks
    • 流水线密码处理器及其在通信网络中的应用
    • US5161193A
    • 1992-11-03
    • US546632
    • 1990-06-29
    • Butler W. LampsonWilliam R. HaweAmar GuptaBarry A. Spinney
    • Butler W. LampsonWilliam R. HaweAmar GuptaBarry A. Spinney
    • H04L29/02
    • H04L29/02
    • Cryptographic apparatus, and a related method for its operation, for in-line encryption and decryption of data packets transmitted in a communication network. A full-duplex cryptographic processor is positioned between two in-line processing entities of a network architecture. For example, in a fiber distributed data interface (FDDI) network, the processor is positioned between a media access control (MAC) sublayer and a ring memory controller (RMC). Incoming information packets are analyzed to decide whether or not they contain encrypted data and, if they do, are subject to decryption before forwarding. Outbound information packets have their data portions encrypted if called for, and are usually forwarded toward the network communication medium. Cryptographic processing in both directions is performed in real time as each packet is streamed through the processor. The processing of outbound information packets includes using optional data paths for looping of the processed information back in a reverse direction, to permit the host system to perform local encryption or decryption for various purposes.
    • 加密装置及其操作的相关方法,用于在通信网络中发送的数据分组的在线加密和解密。 全双工加密处理器位于网络架构的两个在线处理实体之间。 例如,在光纤分布式数据接口(FDDI)网络中,处理器位于介质访问控制(MAC)子层和环形存储器控制器(RMC)之间。 分析传入信息包以决定它们是否包含加密数据,如果是,则在转发之前进行解密。 出站信息包的数据部分被加密,通常被转发给网络通信媒体。 每个数据包通过处理器流式传输,实时执行两个方向的加密处理。 出站信息包的处理包括使用可选的数据路径将处理的信息反向循环,以允许主机系统为各种目的执行本地加密或解密。