会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Storage area network external security device
    • 存储区域网络外部安全设备
    • US08832842B1
    • 2014-09-09
    • US10680579
    • 2003-10-07
    • James P. Hughes
    • James P. Hughes
    • G06F11/00G06F21/56G06F21/60H04L29/06
    • G06F21/567G06F21/57G06F21/606H04L63/0281H04L63/105H04L63/145
    • An external security device is provided in the communication path between devices of different security levels. A higher security device needs only to trust the security of the external device, rather than relying on operating system and file system software that cannot be assured. The external security device blocks access requests that may be using covert channels, but returns status information that indicates that the request is successful. The external security device may then audit access requests to provide a higher level of accountability. The external security device also handles data duplication to prevent or significantly reduce the threat of traffic analysis.
    • 在不同安全级别的设备之间的通信路径中提供外部安全设备。 更高的安全设备只需要信任外部设备的安全性,而不是依靠不能放心的操作系统和文件系统软件。 外部安全设备阻止可能使用隐蔽通道的访问请求,但返回指示请求成功的状态信息。 然后,外部安全设备可以审核访问请求以提供更高级别的问责。 外部安全设备还处理数据重复,以防止或显着降低流量分析的威胁。
    • 3. 发明授权
    • Method and apparatus for securely registering hardware and/or software components in a computer system
    • 用于在计算机系统中安全地注册硬件和/或软件组件的方法和装置
    • US08064606B2
    • 2011-11-22
    • US11939416
    • 2007-11-13
    • Christoph L. SchubaJames P. HughesDaniel E. Smith
    • Christoph L. SchubaJames P. HughesDaniel E. Smith
    • H04L9/00G06Q30/00G06F21/00H04L9/14H04L29/06H04M1/68
    • H04L9/0825
    • A system that securely registers components in a first system is presented. During operation, the first system receives a request from an intermediary system to obtain configuration information related to the components in the first system. In response to the request, the first system: (1) encrypts configuration information for the first system using a first encryption key; (2) encrypts the first encryption key using a second encryption key; and (3) sends the encrypted configuration information and the encrypted first encryption key to the intermediary system so that the intermediary system can forward the encrypted configuration information and the encrypted first encryption key to the second system, whereby the encrypted configuration information is cryptographically opaque to the intermediary system. Next, the second system uses the configuration information to register the components in the first system.
    • 介绍了在第一个系统中安全地注册组件的系统。 在操作期间,第一系统接收来自中间系统的请求以获得与第一系统中的组件相关的配置信息。 响应于该请求,第一系统:(1)使用第一加密密钥加密第一系统的配置信息; (2)使用第二加密密钥加密第一加密密钥; 和(3)将加密的配置信息和加密的第一加密密钥发送到中间系统,使得中间系统可以将加密的配置信息和加密的第一加密密钥转发到第二系统,由此加密的配置信息对于 中介制度。 接下来,第二系统使用配置信息来注册第一系统中的组件。
    • 7. 发明申请
    • System and Method for Secure Data Storage
    • 用于安全数据存储的系统和方法
    • US20080189558A1
    • 2008-08-07
    • US11670059
    • 2007-02-01
    • James P. HughesGeorge R. Nelson
    • James P. HughesGeorge R. Nelson
    • G06F12/14
    • H04L67/1097G06F21/80
    • A system and a method for secure data storage includes one or more data storage devices. A storage area network places the one or more data storage devices in communication with one or more user interfaces. A secure data solution includes a log structured driver interfacing with the one or more data storage devices to encrypt and secure data stored thereon. The log structured driver encrypts and decrypts data into a plurality of segments created on the one or more data storage devices. The system includes a traffic masking pattern that is used to obscure activity on the system from potential attackers.
    • 用于安全数据存储的系统和方法包括一个或多个数据存储设备。 存储区域网络将一个或多个数据存储设备与一个或多个用户界面通信。 安全数据解决方案包括与一个或多个数据存储设备接口的日志结构驱动程序,用于加密和保护存储在其上的数据。 日志结构化驱动程序将数据加密和解密成在一个或多个数据存储设备上创建的多个段。 该系统包括用于从潜在的攻击者模糊系统活动的流量屏蔽模式。
    • 10. 发明授权
    • System and method for storing data using a virtual worm file system
    • 使用虚拟蠕虫文件系统存储数据的系统和方法
    • US08631235B2
    • 2014-01-14
    • US11835752
    • 2007-08-08
    • James P. Hughes
    • James P. Hughes
    • H04L29/06
    • H04L63/123G06F21/64G06F2221/2151H04L9/3297H04L63/0442H04L67/1097H04L2463/121
    • A system and method for storing data in a virtual file system using write once read many (WORM) protection includes a WORM server in communication with one or more storage devices and a controller in communication with the WORM server. A first time stamping process for creating a first time stamp for a data object based on instructions applied by the controller for storage on the WORM server. A second time stamping process for creating a second time stamp for the data object for storage on the WORM server. The second time stamping process creates the second time stamp for the data object and first time stamp to ensure the integrity of the data object stored on the system.
    • 使用一次写入许多(WORM)保护将数据存储在虚拟文件系统中的系统和方法包括与一个或多个存储设备通信的WORM服务器和与WORM服务器通信的控制器。 基于由控制器应用于WORM服务器上存储的指令,为数据对象创建第一个时间戳的第一次冲压过程。 第二次冲压过程,用于为WORM服务器上存储的数据对象创建第二个时间戳。 第二次冲压过程为数据对象和第一时间戳创建第二个时间戳,以确保存储在系统上的数据对象的完整性。