会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明授权
    • Method for securely communicating remote control commands in a computer
network
    • 在计算机网络中安全地通信远程控制命令的方法
    • US6119228A
    • 2000-09-12
    • US916273
    • 1997-08-22
    • Michael F. AngeloDavid L. CollinsDonald D. KimKenneth A. Jansen
    • Michael F. AngeloDavid L. CollinsDonald D. KimKenneth A. Jansen
    • G06F1/26G06F13/00G06F15/00G09C1/00H04L12/24H04L29/06H02J13/00
    • H04L41/28H04L63/0442H04L63/065H04L63/123
    • A method for providing secure remote control commands in a distributing computer environment. In the preferred embodiment of the invention, a network administrator or network management software creates a shutdown record, including an index or time stamp, for powering down a specified network computer(s). Prior to broadcast over the network, a secure one-way hash function is performed on the shutdown record. The result of the one-way hash function is encrypted using the network administrator's private key, thereby generating a digital signature that can be verified by specially configured network nodes. The digital signature is appended to the original shutdown record prior to broadcast to the network. Upon receiving the broadcast message, the targeted network computer(s) validates the broadcast message by verifying the digital signature of the packet or frame. The validation process is performed by decrypting the hash value representation of the shutdown record using the network administrator's public key. A one-way hash function is also performed on the original shutdown record portion of the received message. If the two values match, the broadcast message is determined to be authentic and the shutdown control code is executed. The invention insures that the shutdown command was neither modified in transit nor originated from an unauthorized source.
    • 一种用于在分发计算机环境中提供安全远程控制命令的方法。 在本发明的优选实施例中,网络管理员或网络管理软件创建关闭记录,包括用于断电指定的网络计算机的索引或时间戳。 在通过网络广播之前,对关闭记录执行安全的单向散列函数。 使用网络管理员的私钥对单向散列函数的结果进行加密,从而生成可由特殊配置的网络节点进行验证的数字签名。 数字签名在广播到网络之前附加到原始关闭记录。 在接收到广播消息时,目标网络计算机通过验证分组或帧的数字签名来验证广播消息。 验证过程通过使用网络管理员的公钥解密关闭记录的散列值表示来执行。 还对接收到的消息的原始关闭记录部分执行单向散列函数。 如果两个值相匹配,则确定广播消息是可信的,并且执行关闭控制代码。 本发明确保了关闭命令在传输过程中既未被修改也不是源自未经授权的源。
    • 8. 发明授权
    • Compact mounting of chip card reader at front of computer device bay area
    • 芯片读卡器紧凑型安装在计算机设备托架区域前面
    • US6116509A
    • 2000-09-12
    • US115068
    • 1998-07-14
    • Michael F. AngeloAndrew Brown
    • Michael F. AngeloAndrew Brown
    • G06F1/18G06K7/00G06F17/00G06K13/00
    • G06F1/181G06F1/183G06K7/0013
    • The read head portion of a chip card reader is compactly mounted on the rear side of a front device bay faceplate in a computer in a manner permitting a peripheral device, representatively a hard disk drive, to be mounted in the device bay immediately behind the read head. To permit this installation of both the card read head and the peripheral device at the same computer drive bay, the read head is installed on the rear side of the faceplate at an acute angle relative thereto, with the card entry opening in the read head being aligned with a card insertion slot formed in the faceplate and being inclined at the read head installation angle. The electronics associated with the read head are also compactly mounted on the rear side of the faceplate. The angling of the read head relative to the device bay faceplate substantially reduces the rearward projection thereof toward the associated drive bay to an extent permitting the read head to be disposed entirely forwardly of the disk drive within the drive bay.
    • 芯片读卡器的读取头部分以允许外围设备(代表性的是硬盘驱动器)安装在设备托架中的紧靠在读取器之后的方式紧凑地安装在计算机的前面设备托架面板的后侧上 头。 为了允许在相同的计算机驱动器托架上安装卡读取头和外围设备,读取头以相对于其的锐角安装在面板的后侧,读取头中的卡片入口为 与形成在面板中的卡插入槽对准,并以读头安装角度倾斜。 与读头相关联的电子仪器也紧凑地安装在面板的后侧。 读头相对于设备舱面板的角度基本上减小了朝向相关联的驱动器托架的向后突出,使得读头完全位于驱动器托架内的盘驱动器的前方。
    • 9. 发明授权
    • Secure updating of non-volatile memory
    • 安全更新非易失性存储器
    • US6085299A
    • 2000-07-04
    • US974734
    • 1997-11-19
    • Michael F. AngeloCraig A. MillerDavid R. Wooten
    • Michael F. AngeloCraig A. MillerDavid R. Wooten
    • G06F1/00G06F11/00G06F12/14G06F21/00G06F12/16
    • G06F21/56G06F11/004G06F21/572G06F12/1433G06F2211/1097
    • A secure start-up system for a computer enables a flash memory to be reset in a secured way. Various operations are carried out to make sure that the reset is an authorized one, and to avoid unauthorized, e.g. virus, infiltration. These operations include multiple tests to avoid the probability of the reset being unauthorized. Any one or more than one of the following can be used. Flashing is only authorized when a special flash enable bit is set in the non-volatile memory. This flash enable bit is reset during every startup cycle. Flashing is only authorized from a cold boot as opposed from a warm boot. This minimizes the possibility of a computer routine authorizing flashing by a software reset. Flashing is only authorized from a floppy. This prevents a virus from writing the flashing routine to the boot sector of a non-removable disc. The user is warned prior to flashing, and asked to confirm. Finally, contents of the flashing routine can be checked using some kind of checking algorithm such as a secure hash algorithm.
    • 用于计算机的安全启动系统使得可以以安全的方式重置闪存。 执行各种操作以确保复位是授权的,并且避免未经授权的复位。 病毒,渗透。 这些操作包括多个测试,以避免重置未经授权的可能性。 可以使用以下任何一个或多于一个。 只有在非易失性存储器中设置了特殊闪光使能位时,闪存才被授权。 每个启动周期中,该闪存使能位都被复位。 闪电只能从冷启动授权,而不是热启动。 这样可以最大程度地减少计算机程序授权通过软件重置闪烁的可能性。 闪烁只能从软盘授权。 这样可以防止病毒将闪存例程写入不可移动光盘的引导扇区。 在闪烁之前警告用户,并要求确认。 最后,可以使用诸如安全散列算法的某种检查算法检查闪烁例程的内容。
    • 10. 发明授权
    • Copy protection for recorded media
    • 复制保护记录媒体
    • US5923754A
    • 1999-07-13
    • US850729
    • 1997-05-02
    • Michael F. AngeloDaniel J. Driscoll
    • Michael F. AngeloDaniel J. Driscoll
    • G11B20/00H04N5/913H04L9/00
    • G11B20/0021G11B20/00086G11B20/00514G11B20/00673H04N5/913H04N2005/91364
    • A method and apparatus for securely transferring an encrypted-data key and a medium key, from a media storage such as a DVD disk to an output device in a computer system, using a randomly generated first secure transfer key generated by a disk drive of the computer system, the first key having a uniqueness factor derived from a phase locked loop circuitry. The first secure transfer key is combined with an output key stored in the output device forming a second secure transfer key. The second secure transfer key is used to encrypt the data key and the medium key to form a third secure transfer key. The third secure transfer key is passed to the output device where the data key and the medium key are decrypted. The data key and the medium key are then used by the output device to decrypt encrypted program data from the disk.
    • 一种用于将加密数据密钥和介质密钥从诸如DVD盘的媒体存储器安全地传送到计算机系统中的输出设备的方法和装置,其使用随机生成的第一安全传输密钥 计算机系统,第一个键具有源自锁相环电路的唯一因子。 第一安全传送密钥与存储在输出设备中的输出密钥组合,形成第二安全传输密钥。 第二安全传输密钥用于加密数据密钥和介质密钥以形成第三安全传输密钥。 第三个安全传输密钥被传递到数据密钥和介质密钥被解密的输出设备。 然后,数据密钥和介质密钥由输出设备用于从磁盘解密加密的程序数据。