会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Software authorization utilizing software reputation
    • 软件授权利用软件声誉
    • US08615801B2
    • 2013-12-24
    • US11515160
    • 2006-08-31
    • David B. CrossThekkthalackal Varugis KurienScott A. Field
    • David B. CrossThekkthalackal Varugis KurienScott A. Field
    • G06F11/00G06F12/14G06B23/00
    • G06F21/57G06F21/51
    • Software is authorized in accordance with a reputation of the software. A trust in the author and/or publisher of the software is determined via digital signatures and/or CoAs, and a reputation of the software is utilized to determine the intent of the software. The reputation of the software can be determined via a local service, such as an enterprise IT department and/or via a reputation determination service. When software is downloaded or to be executed, the trust in the author/publisher is determined using digital signatures and/or CoAs associated with the software. If the author/publisher is determined to be trusted, a service is called to determine the reputation of the software. The software can be installed and/or executed dependent upon the reputation of the software and trustworthiness of the author/publisher.
    • 软件根据软件的声誉授权。 通过数字签名和/或CoA来确定软件的作者和/或发行者的信任,并且利用软件的声誉来确定软件的意图。 软件的声誉可以通过本地服务(如企业IT部门)和/或通过信誉确定服务来确定。 当软件被下载或要执行时,使用与该软件相关联的数字签名和/或CoAs确定作者/发行者的信任。 如果作者/发行者被确定为受信任,则调用服务来确定软件的声誉。 该软件可以根据软件的声誉和作者/出版商的可靠性进行安装和/或执行。
    • 6. 发明授权
    • Encryption of system paging file
    • 加密系统页面文件
    • US07325115B2
    • 2008-01-29
    • US10721562
    • 2003-11-25
    • Benjamin A. LeisDavid B. CrossDuncan G. BryceJianrong GuRajeev Y. NagarScott A. Field
    • Benjamin A. LeisDavid B. CrossDuncan G. BryceJianrong GuRajeev Y. NagarScott A. Field
    • G06F12/00
    • G06F12/145G06F21/62G06F21/6281G06F21/80G06F2221/2143
    • An operating system copies data from memory pages into a paging file on disk, in order to free up space in the memory. A mechanism is disclosed that causes the data to be encrypted as it is copied into the paging file, thereby protecting the paged data from unauthorized (or otherwise undesired) observation. The data that is stored in the paging file is encrypted with a session key, that is generated shortly after the machine on which the paging file exists is started. The session key, which is used both for encryption and decryption of the paging file data, is stored in volatile memory, so that the key is not persisted across boots of the machine. Since the key is not persisted across boots, old paging file data that was stored prior to the most recent boot cannot be recovered in clear text, thereby protecting the data from observation.
    • 操作系统将数据从内存页复制到磁盘上的页面文件中,以释放内存中的空间。 公开了一种机制,使得数据在被复制到寻呼文件中时被加密,从而保护分页数据免受未经授权(或以其他方式不希望的)观察。 存储在页面文件中的数据使用会话密钥进行加密,会话密钥是在启动了分页文件的计算机之后不久生成的。 用于分页文件数据的加密和解密的会话密钥存储在易失性存储器中,使得密钥不会在机器的引导上持久存储。 由于密钥在整个引导过程中不会持久存在,所以在最新引导之前存储的旧页面文件数据无法以明文形式恢复,从而保护数据免受观察。
    • 7. 发明申请
    • Software authorization utilizing software reputation
    • 软件授权利用软件声誉
    • US20080072049A1
    • 2008-03-20
    • US11515160
    • 2006-08-31
    • David B. CrossThekkthalackal Varugis KurienScott A. Field
    • David B. CrossThekkthalackal Varugis KurienScott A. Field
    • H04L9/00
    • G06F21/57G06F21/51
    • Software is authorized in accordance with a reputation of the software. A trust in the author and/or publisher of the software is determined via digital signatures and/or CoAs, and a reputation of the software is utilized to determine the intent of the software. The reputation of the software can be determined via a local service, such as an enterprise IT department and/or via a reputation determination service. When software is downloaded or to be executed, the trust in the author/publisher is determined using digital signatures and/or CoAs associated with the software. If the author/publisher is determined to be trusted, a service is called to determine the reputation of the software. The software can be installed and/or executed dependent upon the reputation of the software and trustworthiness of the author/publisher.
    • 软件根据软件的声誉授权。 通过数字签名和/或CoA来确定软件的作者和/或发行者的信任,并且利用软件的声誉来确定软件的意图。 软件的声誉可以通过本地服务(如企业IT部门)和/或通过信誉确定服务来确定。 当软件被下载或要执行时,使用与该软件相关联的数字签名和/或CoAs确定作者/发行者的信任。 如果作者/发行者被确定为受信任,则调用服务来确定软件的声誉。 该软件可以根据软件的声誉和作者/出版商的可靠性进行安装和/或执行。
    • 9. 发明授权
    • Secure prompting
    • 安全提示
    • US07996682B2
    • 2011-08-09
    • US11251946
    • 2005-10-17
    • Klaus U. SchutzMatthew W. ThomlinsonScott A. Field
    • Klaus U. SchutzMatthew W. ThomlinsonScott A. Field
    • G06F21/00
    • G06F21/57
    • Techniques are described herein for securely prompting a user to confirm sensitive operations, input sensitive information or the like. The techniques include receiving or intercepting calls from applications to prompting routines. When a call to a prompting routine is received or intercepted a hint may be provided to the user to switch to a secure desktop. When the user switches from the user desktop to the secure desktop the particular prompt is displayed. The input to the prompt is received on the secure desktop and verified to have been provided by the user. The user input or a representation of the input is then returned to the application running on the user desktop. Using these techniques, interception of prompting messages by malware does not result in sensitive information being revealed. Furthermore, spoofing of new messages by malware does not lead to the dismissal of critical prompting.
    • 这里描述了用于安全地提示用户确认敏感操作,输入敏感信息等的技术。 这些技术包括接收或拦截来自应用程序的呼叫以提示例程。 当接收或拦截对提示例程的调用时,可以向用户提供切换到安全桌面的提示。 当用户从用户桌面切换到安全桌面时,会显示特定的提示。 在安全桌面上接收到提示的输入,并验证其已由用户提供。 用户输入或输入的表示然后返回到在用户桌面上运行的应用程序。 使用这些技术,通过恶意软件拦截提示消息不会导致敏感信息被显示。 此外,恶意软件欺骗新消息不会导致关键提示被解雇。
    • 10. 发明授权
    • Privilege restriction enforcement in a distributed system
    • 分布式系统中的特权限制执行
    • US07757281B2
    • 2010-07-13
    • US11450597
    • 2006-06-09
    • Scott A. FieldLiqiang ZhuPeter T. BrundrettPaul J. Leach
    • Scott A. FieldLiqiang ZhuPeter T. BrundrettPaul J. Leach
    • G06F7/04
    • H04L63/102
    • Remote administrative privileges in a distributed system are disabled by default. To administer a remote system, express action is taken to elevate a user status to obtain remote administrative privileges. When local and remote systems communicate, information pertaining to the status of the logged on user is included in the communications. If the user wishes to legitimately administer a remote system, the user provides an explicit request. The request is processed. If the user is configured as an administrator of the remote system and the request contains an indication that the user's administrative status has been elevated, an authorization token is generated. The authorization token is utilized by the remote system to allow the user to administer the remote system.
    • 默认情况下,分布式系统中的远程管理权限将被禁用。 要管理远程系统,请采取行动来提升用户状态以获得远程管理权限。 当本地和远程系统进行通信时,通信中包含与登录用户状态有关的信息。 如果用户希望合法地管理远程系统,则用户提供明确的请求。 请求被处理。 如果用户配置为远程系统的管理员,并且该请求包含用户的管理状态提升的指示,则会生成授权令牌。 远程系统利用授权令牌允许用户管理远程系统。