会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and system for automated migration of user settings to a replacement computer system
    • 将用户设置自动迁移到替换计算机系统的方法和系统
    • US06182212B2
    • 2001-01-30
    • US09211072
    • 1998-12-14
    • Barry Douglas AtkinsDavid Carroll ChallenerRichard Wayne Cheston
    • Barry Douglas AtkinsDavid Carroll ChallenerRichard Wayne Cheston
    • G06F9445
    • G06F9/4451
    • A method and system are disclosed for automating migration of user system settings from an existing computer system to a replacement computer system in response to a user input. Selected portions of the registry, or central hierarchial data base within the existing computer system are automatically copied and stored in response a user input. A plurality of application program interface (API) routines are then initiated to retrieve and store selected settings within the existing computer system. Adapter binding information for all adapters within the existing computer system are retrieved and stored. The selected portions of the registry, selected settings and adapter binding information are then transferred to the replacement computer system and copied into appropriate registry keys, directories and files, effectively transferring the system settings from the existing computer system to the replacement computer system.
    • 公开了一种用于响应于用户输入自动将用户系统设置从现有计算机系统迁移到替换计算机系统的方法和系统。 注册表的所选部分或现有计算机系统中的中央分层数据库将自动复制并存储以响应用户输入。 然后启动多个应用程序接口(API)例程以检索和存储现有计算机系统内的所选设置。 检索并存储现有计算机系统内所有适配器的适配器绑定信息。 然后将注册表,选定设置和适配器绑定信息的选定部分传输到替换计算机系统并复制到适当的注册表项,目录和文件中,将系统设置从现有计算机系统有效地传输到更换计算机系统。
    • 9. 发明授权
    • Authenticating suspect data using key tables
    • 使用关键表验证可疑数据
    • US08024579B2
    • 2011-09-20
    • US11647932
    • 2006-12-29
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • G06F11/30
    • G06F21/57G06F21/51H04L9/0897H04L9/3236
    • A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
    • 用于认证可疑代码的系统和方法包括以下步骤:接收可信平台模块的第一实例的可疑代码; 将可疑代码加载到与处理器可操作地相关联的可信任的平台模块设备中,其中可疑代码被加载到可信平台模块设备内的屏蔽位置之外; 从表中检索验证公钥并将其存储在可信平台模块设备中的寄存器中,由可疑代码索引的验证公钥; 并从表中检索散列算法,由可疑代码索引的哈希算法。 运行散列算法以导出第一散列值; 然后,使用验证公钥,解密第二哈希值以导出第二解密哈希值。 比较两个哈希值; 并且在确定匹配时,可疑代码被加载到处理器的屏蔽位置以供处理器执行。