会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Trusted execution environment virtual machine cloning
    • 可信执行环境虚拟机克隆
    • US08954965B2
    • 2015-02-10
    • US13566250
    • 2012-08-03
    • Mark F. NovakAndrew John LaymanMagnus NyströmStefan Thom
    • Mark F. NovakAndrew John LaymanMagnus NyströmStefan Thom
    • G06F9/455
    • G06F21/53
    • Cloning of a virtual machine having a trusted executed environment such as a software-based trusted platform module. In order to clone the virtual machine, the virtual machine state of the source virtual machine is copied to formulate a target virtual machine state that is to be associated with a target virtual machine. The target virtual machine is a clone of the source virtual machine state, and thus the storage hierarchy of the trusted execution environment may be the same for the trusted execution environment in the source and target virtual machine states. However, because the identity of the target virtual machine is different than that of the source virtual machine, the endorsement hierarchy of the target virtual machine state is altered such that it is based on the identity of the target virtual machine, rather than the source virtual machine.
    • 克隆具有可信执行环境的虚拟机,例如基于软件的可信平台模块。 为了克隆虚拟机,将复制源虚拟机的虚拟机状态以制定与目标虚拟机相关联的目标虚拟机状态。 目标虚拟机是源虚拟机状态的克隆,因此受信任执行环境的存储层次结构对于源虚拟机状态和目标虚拟机状态中的受信任执行环境可能相同。 然而,由于目标虚拟机的身份与源虚拟机的身份不同,所以目标虚拟机状态的认可层级被改变,使得其基于目标虚拟机的身份而不是源虚拟机 机。
    • 4. 发明申请
    • TRUSTED EXECUTION ENVIRONMENT VIRTUAL MACHINE CLONING
    • 实施执行环境虚拟机克隆
    • US20140040890A1
    • 2014-02-06
    • US13566250
    • 2012-08-03
    • Mark F. NovakAndrew John LaymanMagnus NyströmStefan Thom
    • Mark F. NovakAndrew John LaymanMagnus NyströmStefan Thom
    • G06F9/455
    • G06F21/53
    • Cloning of a virtual machine having a trusted executed environment such as a software-based trusted platform module. In order to clone the virtual machine, the virtual machine state of the source virtual machine is copied to formulate a target virtual machine state that is to be associated with a target virtual machine. The target virtual machine is a clone of the source virtual machine state, and thus the storage hierarchy of the trusted execution environment may be the same for the trusted execution environment in the source and target virtual machine states. However, because the identity of the target virtual machine is different than that of the source virtual machine, the endorsement hierarchy of the target virtual machine state is altered such that it is based on the identity of the target virtual machine, rather than the source virtual machine.
    • 克隆具有可信执行环境的虚拟机,例如基于软件的可信平台模块。 为了克隆虚拟机,将复制源虚拟机的虚拟机状态以制定与目标虚拟机相关联的目标虚拟机状态。 目标虚拟机是源虚拟机状态的克隆,因此受信任执行环境的存储层次结构对于源虚拟机状态和目标虚拟机状态中的受信任执行环境可能相同。 然而,由于目标虚拟机的身份与源虚拟机的身份不同,所以目标虚拟机状态的认可层级被改变,使得其基于目标虚拟机的身份而不是源虚拟机 机。
    • 6. 发明授权
    • Authentication method and apparatus utilizing proof-of-authentication module
    • 使用认证证明模块的认证方法和设备
    • US07562221B2
    • 2009-07-14
    • US11530998
    • 2006-09-12
    • Magnus NyströmAnders RundgrenWilliam M. Duane
    • Magnus NyströmAnders RundgrenWilliam M. Duane
    • H04L9/32
    • G06Q20/3674G06F21/41H04L9/3213H04L9/3228H04L63/0807H04L63/0815H04L63/0838
    • A single sign-on technique allows multiple accesses to one or more applications or other resources using a proof-of-authentication module operating in conjunction with a standard authentication component. The application or other resource issues an authentication information request to the standard authentication component responsive to an access request from the user. The application or other resource receives, responsive to the authentication information request, a proof-of-authentication value from the standard authentication component, and authenticates the user based on the proof-of-authentication value. The standard authentication component interacts with the proof-of-authentication module to obtain the proof-of-authentication value. The proof-of-authentication module is configured to generate multiple proof-of-authentication values for authentication of respective access requests of the user.
    • 单一登录技术允许使用与标准认证组件一起运行的认证证明模块对一个或多个应用程序或其他资源进行多次访问。 响应于来自用户的访问请求,应用或其他资源向标准认证组件发出认证信息请求。 应用程序或其他资源响应于认证信息请求接收来自标准认证组件的认证证明值,并且基于认证证明​​值对用户进行认证。 标准认证组件与认证证明模块交互以获得认证证明值。 身份验证模块被配置为生成用于认证用户的各个访问请求的多个认证证明值。
    • 9. 发明授权
    • Secure seed generation protocol
    • 安全的种子生成协议
    • US07979707B2
    • 2011-07-12
    • US10549542
    • 2004-07-09
    • Peter RöstinMagnus NyströmWilliam M. Duane
    • Peter RöstinMagnus NyströmWilliam M. Duane
    • H04L9/32H04L9/12
    • H04L9/3234H04L9/06H04L9/0869H04L9/3242H04L9/3271H04L63/061H04L63/0823H04L63/0853H04L2209/20H04L2209/56H04L2209/80
    • Techniques for secure generation of a seed for use in performing one or more cryptographic operations, utilizing a seed generation protocol carried out by a seed generation client (110c) and a seed generation server (110s). The seed generation server (110s) provides a first string to the seed generation client (110c). The seed generation client (110c) generates a second string, encrypts the second string utilizing a key (216), and sends the encrypted second string to the seed generation server (110s). The seed generation client (110c) generates the seed as a function of at least the first string and the second string. The seed generation server (110s) decrypts the encrypted second string (222) and independently generates the seed as a function of at least the first string and the second string.
    • 利用由种子生成客户端(110c)和种子生成服务器(110s)进行的种子生成协议,用于安全地生成用于执行一个或多个密码操作的种子的技术。 种子生成服务器(110s)向种子生成客户端(110c)提供第一串。 种子生成客户机(110c)生成第二串,利用密钥(216)对第二串进行加密,并将加密的第二串发送到种子生成服务器(110s)。 种子生成客户端(110c)根据至少第一串和第二串的函数生成种子。 种子生成服务器(110s)解密加密的第二串(222),并且独立地生成作为至少第一串和第二串的函数的种子。