会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Trusted computing platform using a trusted device assembly
    • 使用可信设备组件的可信计算平台
    • US06988250B1
    • 2006-01-17
    • US09913452
    • 2000-02-15
    • Graeme John ProudlerDipankar GuptaLiqun ChenSiani Lynne PearsonBoris BalacheffBruno Edgard Van WilderDavid Chan
    • Graeme John ProudlerDipankar GuptaLiqun ChenSiani Lynne PearsonBoris BalacheffBruno Edgard Van WilderDavid Chan
    • G06F17/50
    • G06F21/445G06F21/34G06F21/57G06F21/606G06F21/64G06F21/85G06F2207/7219G06F2211/009G06F2221/2103
    • In a computing platform, a trusted hardware device (24) is added to the motherboard (20). The trusted hardware device (24) is configured to acquire an integrity metric, for example a hash of the BIOS memory (29), of the computing platform. The trusted hardware device (24) is tamper-resistant, difficult to forge and inaccessible to other functions of the platform. The hash can be used to convince users that that the operation of the platform (hardware or software) has not been subverted in some way, and is safe to interact with in local or remote applications.In more detail, the main processing unit (21) of the computing platform is directed to address the trusted hardware device (24), in advance of the BIOS memory, after release from ‘reset’. The trusted hardware device (24) is configured to receive memory read signals from the main processing unit (21) and, in response, return instructions, in the native language of the main processing unit (21), that instruct the main processing unit to establish the hash and return the value to be stored by the trusted hardware device (24). Since the hash is calculated in advance of any other system operations, this is a relatively strong method of verifying the integrity of the system. Once the hash has been returned, the final instruction calls the BIOS program and the system boot procedure continues as normal.Whenever a user wishes to interact with the computing platform, he first requests the integrity metric, which he compares with an authentic integrity metric that was measured by a trusted party. If the metrics are the same, the platform is verified and interactions can continue. Otherwise, interaction halts on the basis that the operation of the platform may have been subverted.
    • 在计算平台中,将可信硬件设备(24)添加到主板(20)。 可信硬件设备(24)被配置为获取计算平台的完整性度量,例如BIOS存储器(29)的散列。 受信任的硬件设备(24)是防篡改的,难以伪造并且不能访问平台的其他功能。 该哈希可以用于说服用户,平台(硬件或软件)的操作没有以某种方式颠覆,并且可以安全地与本地或远程应用程序进行交互。 更详细地说,计算平台的主处理单元(21)在从“复位”释放之后被引导以在BIOS存储器之前对可信硬件设备(24)进行寻址。 可信硬件设备(24)被配置为从主处理单元(21)接收存储器读取信号,并响应于主处理单元(21)的母语的返回指令,其指示主处理单元 建立散列并返回由可信硬件设备(24)存储的值。 由于散列是在任何其他系统操作之前计算出来的,所以这是验证系统完整性的相对较强的方法。 一旦散列已经返回,最后的指令调用BIOS程序,并且系统引导过程正常进行。 每当用户希望与计算平台进行交互时,他首先请求完整性度量,其与被可信方测量的真实完整性度量进行比较。 如果指标相同,则会验证平台并继续进行交互。 否则,交互停止,基于平台的操作可能已被颠覆。
    • 3. 发明授权
    • Trusted computing platform for restricting use of data
    • 用于限制数据使用的可信计算平台
    • US07526785B1
    • 2009-04-28
    • US10088258
    • 2000-09-25
    • Siani Lynne PearsonLiqun Chen
    • Siani Lynne PearsonLiqun Chen
    • H04N7/167
    • G06F21/84G06F21/57G06F21/85G06F2211/009G06F2221/2103G06F2221/2153
    • A client/server system has a client platform adapted to provide restricted use of data provided by a serve. The client platform comprises a display, secure communications means, and a memory containing image receiving code for receiving data from a server by the secure communication means and for display of such data. The client platform is adapted such that the data received from a server is used for display of the data and not for an unauthorised purpose. A server adapted to provide data to a client platform for restricted use by the client platform comprises a memory containing image sending code for providing an image of data executed on the server, and secure communications means for secure communication of images of data to a client platform. The server is adapted to determine that a client platform is adapted to ensure restricted use of the data before it is sent by the image sending code.
    • 客户机/服务器系统具有适于提供对服务提供的数据的有限使用的客户端平台。 客户平台包括显示器,安全通信装置和包含图像接收代码的存储器,用于通过安全通信装置从服务器接收数据并显示这些数据。 适应客户端平台,使得从服务器接收的数据用于显示数据,而不是用于未经授权的目的。 适于向客户端平台提供数据以供客户端平台限制使用的服务器包括:包含图像发送代码的存储器,用于提供在服务器上执行的数据的图像;以及安全通信装置,用于将数据图像安全地传送到客户端平台 。 服务器适于确定客户端平台适于在数据被图像发送代码发送之前确保其受到有限的使用。
    • 5. 发明授权
    • Trusted computing platform
    • 可信计算平台
    • US07444601B2
    • 2008-10-28
    • US11249820
    • 2005-10-12
    • Graeme John ProudlerDipankar GuptaLiqun ChenSiani Lynne PearsonBoris BalacheffBruno Edgard Van WilderDavid Chan
    • Graeme John ProudlerDipankar GuptaLiqun ChenSiani Lynne PearsonBoris BalacheffBruno Edgard Van WilderDavid Chan
    • G06F17/50
    • G06F21/445G06F21/34G06F21/57G06F21/606G06F21/64G06F21/85G06F2207/7219G06F2211/009G06F2221/2103
    • In a computing platform, a trusted hardware device (24) is added to the motherboard (20). The trusted hardware device (24) is configured to acquire an integrity metric, for example a hash of the BIOS memory (29), of the computing platform. The trusted hardware device (24) is tamper-resistant, difficult to forge and inaccessible to other functions of the platform. The hash can be used to convince users that that the operation of the platform (hardware or software) has not been subverted in some way, and is safe to interact with in local or remote applications.In more detail, the main processing unit (21) of the computing platform is directed to address the trusted hardware device (24), in advance of the BIOS memory, after release from ‘reset’. The trusted hardware device (24) is configured to receive memory read signals from the main processing unit (21) and, in response, return instructions, in the native language of the main processing unit (21), that instruct the main processing unit to establish the hash and return the value to be stored by the trusted hardware device (24). Since the hash is calculated in advance of any other system operations, this is a relatively strong method of verifying the integrity of the system. Once the hash has been returned, the final instruction calls the BIOS program and the system boot procedure continues as normal.Whenever a user wishes to interact with the computing platform, he first requests the integrity metric, which he compares with an authentic integrity metric that was measured by a trusted party. If the metrics are the same, the platform is verified and interactions can continue. Otherwise, interaction halts on the basis that the operation of the platform may have been subverted.
    • 在计算平台中,将可信硬件设备(24)添加到主板(20)。 可信硬件设备(24)被配置为获取计算平台的完整性度量,例如BIOS存储器(29)的散列。 受信任的硬件设备(24)是防篡改的,难以伪造并且不能访问平台的其他功能。 该哈希可以用于说服用户,平台(硬件或软件)的操作没有以某种方式颠覆,并且可以安全地与本地或远程应用程序进行交互。 更详细地说,计算平台的主处理单元(21)在从“复位”释放之后被引导以在BIOS存储器之前对可信硬件设备(24)进行寻址。 可信硬件设备(24)被配置为从主处理单元(21)接收存储器读取信号,并响应于主处理单元(21)的母语的返回指令,其指示主处理单元 建立散列并返回由可信硬件设备(24)存储的值。 由于散列是在任何其他系统操作之前计算出来的,所以这是验证系统完整性的相对较强的方法。 一旦散列已经返回,最后的指令调用BIOS程序,并且系统引导过程正常进行。 每当用户希望与计算平台进行交互时,他首先请求完整性度量,其与被可信方测量的真实完整性度量进行比较。 如果指标相同,则会验证平台并继续进行交互。 否则,交互停止,基于平台的操作可能已被颠覆。
    • 6. 发明授权
    • Electronic commerce system
    • 电子商务系统
    • US07096204B1
    • 2006-08-22
    • US10110280
    • 2000-10-06
    • Liqun ChenBoris BalacheffRoelf du ToitSiani Lynne PearsonDavid Chan
    • Liqun ChenBoris BalacheffRoelf du ToitSiani Lynne PearsonDavid Chan
    • G06Q99/00
    • G06Q30/06G06Q20/02G06Q20/04G06Q20/105G06Q20/12G06Q20/20G06Q20/367G06Q20/3674G06Q20/383G06Q20/385
    • A method of brokering a transaction between a consumer and a vendor by a broker, wherein the consumer, the broker and the vendor are all attached to a public network, the consumer having a secure token containing a true consumer identity. The method comprising the steps of: the consumer obtaining a temporary identity from the broker by using the true consumer identity from the secure token; the consumer selecting a purchase to be made from the vendor; the consumer requesting the purchase from the vendor and providing the temporary identity to the vendor; the vendor requesting transaction authorisation from the broker by forwarding the request and the temporary identity to the broker; the broker matching the temporary identity to a current list of temporary identities, and obtaining the true consumer identity; the broker providing authorisation for the transaction based on transaction details and true consumer identity.
    • 由经纪人代理消费者和供应商之间的交易的方法,其中消费者,经纪商和供应商都连接到公共网络,消费者具有包含真实消费者身份的安全令牌。 该方法包括以下步骤:消费者通过使用来自安全令牌的真实消费者身份从代理获取临时身份; 消费者选择从供应商进行的购买; 消费者请求从供应商购买并向供应商提供临时身份; 供应商通过将请求和临时身份转发给经纪人从代理商请求交易授权; 经纪人将临时身份与当前的临时身份列表进行匹配,并获得真实的消费者身份; 经纪人根据交易细节和真实的消费者身份为交易提供授权。
    • 7. 发明授权
    • Method and apparatus for identifying a voice caller
    • 用于识别语音呼叫者的方法和装置
    • US07634656B2
    • 2009-12-15
    • US10241894
    • 2002-09-12
    • Siani Lynne Pearson
    • Siani Lynne Pearson
    • H04L9/32
    • H04L63/0442H04L29/06027H04L63/0407H04L63/08H04L63/0823H04L65/1006H04M1/2535H04M1/57H04M1/571H04M3/42042H04M7/006H04M2242/22
    • A voice call system and a method and apparatus for identifying a voice caller are disclosed. The system includes a call originator apparatus 10 and a called party apparatus 20. At least one trusted user identity is formed at the call originator apparatus 10, ideally in a trusted platform module 12 configured according to a Trusted Computing Platform Alliance (TCPA) specification. The called party apparatus 20 checks the trusted user identity when establishing a new voice call. Advantageously, an identity of the voice caller using the call originator apparatus is confirmed in a reliable and trustworthy manner, even when the voice call is transported over an inherently insecure medium, e.g. an open computing system like the internet 30. Preferred embodiments of the invention use IP telephony, such as SIP (session initiation protocol) or H.323 standard voice telephony.
    • 公开了用于识别语音呼叫者的语音呼叫系统和方法和装置。 该系统包括呼叫发起者装置10和被叫方装置20.在呼叫发起者装置10中形成至少一个可信用户身份,理想地在根据可信计算平台联盟(TCPA)规范配置的信任平台模块12中。 被叫方装置20在建立新的语音呼叫时检查可信用户身份。 有利的是,即使当语音呼叫通过固有不安全的介质传输时,也可以以可靠和可靠的方式确认语音呼叫者使用呼叫发起者装置的身份。 诸如互联网的开放式计算系统30.本发明的优选实施例使用IP电话,例如SIP(会话发起协议)或H.323标准语音电话。
    • 8. 发明授权
    • Privacy management of personal data
    • 个人资料的隐私管理
    • US07398393B2
    • 2008-07-08
    • US10767868
    • 2004-01-28
    • Marco Casassa MontKeith Alexander HarrisonMartin SadlerSiani Lynne Pearson
    • Marco Casassa MontKeith Alexander HarrisonMartin SadlerSiani Lynne Pearson
    • H04L9/32
    • H04L63/0435H04L9/083H04L9/3073H04L63/062H04L2209/56H04L2209/68H04L2209/76
    • When sending personal data to a recipient, the data owner encrypts the data using both a public data item provided by a trusted party and an encryption key string formed using at least policy data indicative of conditions to be satisfied before access is given to the personal data. The encryption key string is typically also provided to the recipient along with the encrypted personal data. To decrypt the personal data, the recipient sends the encryption key string to the trusted party with a request for the decryption key. The trusted party determines the required decryption key using the encryption key string and private data used in deriving its public data, and provides it to the requesting recipient. However, the decryption key is either not determined or not made available until the trusted party is satisfied that the associated policy conditions have been met by the recipient.
    • 当向收件人发送个人数据时,数据所有者使用由受信任方提供的公共数据项和至少指示要在个人数据访问之前要满足的条件的策略数据形成的加密密钥串来加密数据 。 加密密钥字符串通常也与加密的个人数据一起提供给接收者。 为了解密个人数据,接收方通过请求解密密钥将加密密钥字符串发送给信任方。 可信方使用加密密钥串和用于导出其公共数据的私有数据来确定所需的解密密钥,并将其提供给请求的接收者。 然而,解密密钥在被信任方满足接收者已经满足相关联的策略条件之前,未被确定或不被提供。