会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • SYSTEMS FOR VALIDATING HARDWARE DEVICES
    • 用于验证硬件设备的系统
    • US20130067236A1
    • 2013-03-14
    • US13230401
    • 2011-09-12
    • Thomas RussoDavid AbzarianNidhi S. SanghaiPak Kiu Chung
    • Thomas RussoDavid AbzarianNidhi S. SanghaiPak Kiu Chung
    • G06F21/00
    • G06F21/44G06F21/00G06F21/50G06F21/57G06F21/72G06F21/73G06F21/81
    • A computing environment in which devices interoperate with a plurality of hardware components. Inconsistencies in user experience when operating devices that may use different components are avoided by generating a signature for the components. The signature may be computed as a function of a first key and one or more parameter values obtainable from the component. The signature and parameter values may be stored in the component's memory, and may be obtainable while the component is in operation as part of the computing device. The device may validate the component by performing at least one function based on the signature, the one or more parameter values obtainable from the component, and a second key, which may or may not be identical to the first key. The device may change its interaction with the component, depending on whether the component was successfully validated.
    • 设备与多个硬件组件互操作的计算环境。 通过生成组件的签名来避免操作可能使用不同组件的设备时用户体验的不一致。 签名可以作为第一密钥和从该组件获得的一个或多个参数值的函数来计算。 签名和参数值可以存储在组件的存储器中,并且可以在组件作为计算设备的一部分运行时获得。 设备可以通过基于签名执行至少一个功能来验证组件,该功能可从该组件获得的一个或多个参数值以及与第一个键可能不同的第二个键。 该设备可能会更改其与组件的交互,具体取决于组件是否已成功验证。
    • 3. 发明授权
    • Multi-profile interface specific network security policies
    • 多配置界面特定的网络安全策略
    • US08201234B2
    • 2012-06-12
    • US11746478
    • 2007-05-09
    • Gerardo Diaz-CuellarDavid AbzarianLokesh Srinivas KoppoluEran Yariv
    • Gerardo Diaz-CuellarDavid AbzarianLokesh Srinivas KoppoluEran Yariv
    • H04L29/06
    • H04L63/20H04L63/0428H04L63/08
    • Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a first data field including data defining a parameter to be applied based on the network security policy. The network security policy defines at least one of the following: a firewall rule and a connection security rule. The data structure also includes a second data field having data specifying restrictions of the parameter included in the first data field. The parameter in the first data field and the restrictions in the second data field form the schema for expressing the network security policy to be processed. The network security policy manages communications between a computing device and at least one other computing device.
    • 计算机可读介质,其上存储有用于定义表示网络安全策略的模式的数据结构。 数据结构包括第一数据字段,包括基于网络安全策略定义要应用的参数的数据。 网络安全策略定义以下至少一个:防火墙规则和连接安全规则。 数据结构还包括具有指定包含在第一数据字段中的参数的限制的数据的第二数据字段。 第一数据字段中的参数和第二数据字段中的限制形成用于表示要处理的网络安全策略的模式。 网络安全策略管理计算设备与至少一个其他计算设备之间的通信。
    • 5. 发明授权
    • Device-side inline pattern matching and policy enforcement
    • 设备端内联模式匹配和策略执行
    • US08091115B2
    • 2012-01-03
    • US12245060
    • 2008-10-03
    • David AbzarianTodd L. CarpenterHarish S. KulkarniMark A. MyersDavid J. Steeves
    • David AbzarianTodd L. CarpenterHarish S. KulkarniMark A. MyersDavid J. Steeves
    • H04L29/06
    • G06F21/554G06F21/56G06F21/78G06F21/85
    • Inline pattern matching and policy enforcement may be implemented by a memory storage device. In an example embodiment, a device-implemented method includes acts of receiving, intercepting, and performing and conditional acts of invoking or permitting. A request from a host to perform a memory access operation is received at a memory storage device. Data flowing between an I/O channel and physical storage of the memory storage device is intercepted. A pattern matching procedure is performed on the data with reference to multiple target patterns in real-time while the data is being intercepted. If a pattern match is detected between the data and a target pattern, a policy enforcement mechanism is invoked. If a pattern match is not detected between the data and the multiple target patterns, the request from the host to perform the memory access operation is permitted.
    • 内联模式匹配和策略实施可以由存储器存储设备实现。 在示例实施例中,设备实现的方法包括接收,拦截和执行以及调用或许可的条件动作的动作。 在存储器存储设备处接收来自主机执行存储器访问操作的请求。 在I / O通道和存储器存储设备的物理存储之间流动的数据被截取。 在数据被截获的同时,实时参照多个目标模式对数据执行模式匹配过程。 如果在数据和目标模式之间检测到模式匹配,则调用策略实施机制。 如果在数据和多个目标模式之间未检测到模式匹配,则允许来自主机执行存储器访问操作的请求。
    • 6. 发明申请
    • VERIFIABLE ADVERTISEMENT PRESENTATION
    • 可验证的广告介绍
    • US20100312653A1
    • 2010-12-09
    • US12478786
    • 2009-06-05
    • Todd L. CarpenterDavid AbzarianSeshagiri Panchapagesan
    • Todd L. CarpenterDavid AbzarianSeshagiri Panchapagesan
    • G06Q30/00H04L9/32G06K9/00
    • G06Q30/0277G06Q30/02
    • The described implementations relate to verifiable advertisement (Ad) presentation in a computing realm, such as a web-based computing realm. In one case verifiable advertisement presentation (VAP) tools can receive advertising (Ad) content to be presented on the computing device. The Ad content can include device-specific data that is uniquely associated with the computing device. The Ad content can be presented on the computing device. The VAP tools can validate that the Ad content was presented on the computing device. In some cases, the validation can include performing a validation function on at least one portion of the Ad content. Performing the function can serve to identify whether the presented content matches sent Ad content.
    • 所描述的实现涉及计算领域中的可验证广告(Ad)呈现,诸如基于网络的计算领域。 在一种情况下,可验证的广告呈现(VAP)工具可以接收要呈现在计算设备上的广告(Ad)内容。 广告内容可以包括与计算设备唯一相关联的设备专用数据。 广告内容可以显示在计算设备上。 VAP工具可以验证广告内容是否显示在计算设备上。 在某些情况下,验证可以包括在Ad内容的至少一部分上执行验证功能。 执行该功能可用于识别呈现的内容是否与发送的广告内容相匹配。
    • 7. 发明申请
    • Device Enforced File Level Protection
    • 设备强制文件级保护
    • US20100199108A1
    • 2010-08-05
    • US12364523
    • 2009-02-03
    • David AbzarianHarish S. KulkarniTodd L. CarpenterCinthya R. Urasaki
    • David AbzarianHarish S. KulkarniTodd L. CarpenterCinthya R. Urasaki
    • G06F12/14
    • G06F21/805
    • Described is a technology by which files that are hardware protected on a storage device, such as a USB flash drive, are managed on a host, including by integration with an existing file system. Each file maintained on a storage device is associated with a protection attribute that corresponds to that file's device hardware protection level. Requests directed towards accessing metadata or actual file data are processed based upon the protection attribute and a state of authentication, e.g., to allow or deny access, show file icons along with their level of protection, change levels, and so forth. Also described is splitting a file system file table into multiple file tables, one file table for each level of protection. Entries in the split file tables are maintained based on each file's current level; space allocation tracking entries are also maintained to track the space used by other split tables.
    • 描述了通过在主机上管理诸如USB闪存驱动器的存储设备上被硬件保护的文件的技术,包括通过与现有文件系统的集成。 存储设备上维护的每个文件都与保护属性相关联,该属性对应于该文件的设备硬件保护级别。 基于保护属性和认证状态(例如,允许或拒绝访问)显示文件图标以及其保护级别,改变级别等来处理针对访问元数据或实际文件数据的请求。 还描述了将文件系统文件表分割成多个文件表,一个文件表用于每个级别的保护。 分割文件表中的条目将根据每个文件的当前级别进行维护; 还维护空间分配跟踪条目以跟踪其他拆分表使用的空间。
    • 8. 发明授权
    • Edge traversal service dormancy
    • 边缘遍历服务休眠
    • US07707294B2
    • 2010-04-27
    • US11823029
    • 2007-06-26
    • David AbzarianMichael R. SurkanSalahuddin C. J. KhanAmit A. SehgalMohit Talwar
    • David AbzarianMichael R. SurkanSalahuddin C. J. KhanAmit A. SehgalMohit Talwar
    • G06F15/16G06F15/177G06F15/173
    • H04L63/029H04L69/16
    • A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons.
    • 当主机的应用程序或服务(统称为“进程”)通过边缘遍历服务接受未经请求的流量时,系统将在主机中维护休眠状态,在主机中不发送信标(或“气泡”)。 当至少一个应用程序或服务通过边缘遍历服务开始接受未经请求的流量时,主机进入合格状态并开始发送信标。 随着每个附加应用程序或服务开始接受这种流量,维护接受的应用程序和服务的数量。 随着应用程序和服务终止这种流量的接受,接受申请和服务的数量减少了。 当最后一个应用程序或服务通过边缘遍历服务终止接受未经请求的流量时,主机重新进入休眠状态并停止其信标的传输。