会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Secure telecommunications
    • 安全通信
    • US5455861A
    • 1995-10-03
    • US113155
    • 1993-08-27
    • David W. FaucherDaniel N. HeerMichael M. KaplanDavid P. Maher
    • David W. FaucherDaniel N. HeerMichael M. KaplanDavid P. Maher
    • H04Q3/545H04K1/00H04L9/10H04L9/14H04M11/00H04Q3/00H04L9/00H04M1/19H04N1/44
    • H04K1/00H04Q3/0016
    • A security node disposed in the telecommunications network connecting calling and called parties transforms information (which can be voice, data, facsimile, video and other types of calls or messages) encrypted in a first format to (a) encrypted information in a different format or to (b) non-encrypted information, and vice-versa. The node is accessible from any location connected to the network. By routing calls or messages originated by the calling party and destined for the called party via the security node, and providing appropriate control signals to the node, the information may be encrypted only over a portion of the transmission path between the parties, and clear over the remainder of the transmission path. Alternatively, the information may be encrypted in different portions of the path using different encryption algorithms. This arrangement enables the parties to obtain relatively secure communications even if only one party has a security device at the originating or terminating end, or if the parties have security devices using different handshaking protocols and encryption algorithms.
    • 设置在连接主叫和被叫方的电信网络中的安全节点将以第一格式加密的信息(可以是语音,数据,传真,视频和其他类型的呼叫或消息)转换为(a)不同格式的加密信息, 到(b)非加密信息,反之亦然。 该节点可从连接到网络的任何位置访问。 通过路由由主叫方发起并通过安全节点发往被叫方的呼叫或消息,并向节点提供适当的控制信号,该信息可以仅在双方之间的传输路径的一部分上被加密,并且清除 传输路径的其余部分。 或者,可以使用不同的加密算法在路径的不同部分中加密该信息。 这种安排使得即使只有一方在始发或终端具有安全设备,或者如果各方具有使用不同的握手协议和加密算法的安全设备,则各方可以获得相对安全的通信。
    • 2. 发明授权
    • Kernel mode protection
    • 内核模式保护
    • US06282657B1
    • 2001-08-28
    • US09154357
    • 1998-09-16
    • Michael M. KaplanTimothy OberPeter Reed
    • Michael M. KaplanTimothy OberPeter Reed
    • G06F1300
    • G06F21/72G06F8/60G06F9/46G06F12/1491G06F21/74G06F21/79G06F21/82H04L9/00H04L2209/12
    • A protection circuit operates in a user or kernel mode. In the kernel mode, a kernel memory is accessible only by a secure kernel. A processor is reset if a security violation occurs, such as by attempting to access kernel memory in user mode. A program fetch supervisor circuit compares addresses to a predetermined address to determine if a security violation has occurred. A data fetch supervisor circuit compares data addresses to a protected memory address range. A security violation occurs if the data address is in protected memory, which resets the processor. A method of kernel mode protection includes fetching a program opcode or data operand. If the program opcode or data operand is from kernel memory and the processor is in user mode, the processor is reset. If an opcode is fetched from user memory while in kernel mode, the processor reverts to user mode.
    • 保护电路以用户或内核模式运行。 在内核模式下,只能由安全内核访问内核内存。 如果发生安全冲突,例如通过尝试以用户模式访问内核内存,则会重新处理器。 程序提取管理器电路将地址与预定地址进行比较,以确定是否发生了安全冲突。 数据提取管理器电路将数据地址与受保护的存储器地址范围进行比较。 如果数据地址处于受保护的内存中,则会发生安全冲突,这会重置处理器。 内核模式保护的方法包括获取程序操作码或数据操作数。 如果程序操作码或数据操作数来自内存内存,并且处理器处于用户模式,则处理器将被复位。 如果在内核模式下从用户存储器中获取操作码,则处理器将恢复到用户模式。
    • 5. 发明授权
    • Kernel mode protection
    • US06631472B2
    • 2003-10-07
    • US09897670
    • 2001-07-02
    • Michael M. KaplanTimothy OberPeter Reed
    • Michael M. KaplanTimothy OberPeter Reed
    • G06F1300
    • G06F21/72G06F8/60G06F9/46G06F12/1491G06F21/74G06F21/79G06F21/82H04L9/00H04L2209/12
    • A kernel mode protection circuit includes a processor, a program counter, a kernel program fetch supervisor circuit, a kernel data fetch supervisor circuit, a program memory, a data memory, a flip-flop circuit and two AND circuits. The data memory includes two user memories, protected registers and random access memory (RAM). The program memory includes two user memories and a kernel read only memory (ROM). The circuit may operate in either a user mode (kernel ROM is not accessible) or a kernel mode (kernel ROM is accessible). When in the kernel mode the kernel RAM and certain protected registers are accessible only by a secure kernel. The kernel mode control circuit will reset the processor should a security violation occur, such as attempting to access the kernel RAM while in the user mode. The kernel program fetch supervisor circuit monitors and compares an address within the program counter to a predetermined address, stored within the kernel program fetch supervisor circuit, to determine if a security violation has occurred. The kernel data fetch supervisor circuit monitors and compares the data address to addresses defining a protected memory area. A security violation will occur if the data address is within the protected memory address range and the processor will be reset. A method of kernel mode protection includes the step of fetching a program opcode. If the program opcode is from the kernel memory, the processor is reset. If the program opcode is from a user memory, then the processor may fetch the data operand. If the data operand is fetched from the kernel memory, the processor is reset. If the data operand is fetched from a user memory, the processor is permitted to enter the kernel memory. If a program opcodes is fetched from the kernel memory the processor may continue to fetch operands from either the kernel memory or the data memory. The processor remains in kernel mode and continues to fetch program opcodes until all of the opcodes have been fetched, or until an opcode fetched is from the user memory. If an opcode fetched is from the user memory, the processor switches back to user mode.
    • 7. 发明授权
    • Secure telecommunications
    • 安全通信
    • US5594798A
    • 1997-01-14
    • US468168
    • 1995-06-06
    • Richard V. CoxMichael M. Kaplan
    • Richard V. CoxMichael M. Kaplan
    • H04M3/22H04K1/00H04M1/24H04M3/00H04M3/16H04M3/42H04M11/00H04Q3/00H04N9/12H04M1/68
    • H04Q3/0016H04K1/00H04M3/16H04M3/42H04M2203/609
    • A security node disposed in the telecommunications network connecting calling and called parties transforms information (which can be voice, data, facsimile, video and other types of calls or messages) encrypted in a first format to (a) encrypted information in a different format or to (b) non-encrypted information, and vice-versa. The node is accessible from any location connected to the network. By routing calls or messages originated by the calling party and destined for the called party via the security node, and providing appropriate control signals to the node, the information may be encrypted only over a portion of the transmission path between the parties, and clear over the remainder of the transmission path. Alternatively, the information may be encrypted in different portions of the path using different encryption algorithms. This arrangement enables the parties to obtain relatively secure communications even if only one party has a security device at the originating or terminating end, or if the parties have security devices using different handshaking protocols and encryption algorithms.
    • 设置在连接主叫和被叫方的电信网络中的安全节点将以第一格式加密的信息(可以是语音,数据,传真,视频和其他类型的呼叫或消息)转换为(a)不同格式的加密信息, 到(b)非加密信息,反之亦然。 该节点可从连接到网络的任何位置访问。 通过路由由主叫方发起并通过安全节点发往被叫方的呼叫或消息,并向节点提供适当的控制信号,该信息可以仅在双方之间的传输路径的一部分上加密,并且清除 传输路径的其余部分。 或者,可以使用不同的加密算法在路径的不同部分中加密该信息。 这种安排使得即使只有一方在始发或终端具有安全设备,或者如果各方具有使用不同的握手协议和加密算法的安全设备,则各方可以获得相对安全的通信。