会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Process for transparently enforcing protection domains and access control as well as auditing operations in software components
    • 在软件组件中透明执行保护域和访问控制以及审核操作的过程
    • US06317868B1
    • 2001-11-13
    • US09168125
    • 1998-10-07
    • Robert GrimmBrian N. Bershad
    • Robert GrimmBrian N. Bershad
    • G06F944
    • G06F21/125
    • An original software component is modified in accordance with a site's security policy provisions prior to being executed by a component system or computer at the site. The original software component is intercepted by an introspection service running on a server or on the component system prior to execution on the component system. The introspection service analyzes the software component by parsing it, and based on the information it determines, a security policy service instructs an interposition service how to modify the software component so that it conforms to the security policy service requirements. The interposition service thus produces a modified software component by inserting code for security initialization and for imposing security operations on the original component operations. When the modified software component is executed, an enforcement service follows the security operations that were injected into the software component, which instruct the enforcement service on associating component system objects with security identifiers. For example, a security identifier is associated with the software component. In addition, the enforcement service determines when and how to perform access checks, protection domain transfers, and auditing during execution of the modified software component. Any of the services noted above can be executed by the computer intended to execute the software component or by a separate server.
    • 原始软件组件在由站点的组件系统或计算机执行之前,根据站点的安全策略规定进行修改。 在组件系统上执行之前,原始软件组件被在服务器或组件系统上运行的内省服务拦截。 内省服务通过解析来分析软件组件,并根据其确定的信息,安全策略服务指示插入服务如何修改软件组件,使其符合安全策略服务要求。 插入服务因此通过插入用于安全初始化的代码并且对原始组件操作施加安全操作来产生修改的软件组件。 当修改的软件组件被执行时,执行服务遵循被注入到软件组件中的安全操作,其指示强制服务将组件系统对象与安全标识符相关联。 例如,安全标识符与软件组件相关联。 此外,执行服务确定在修改的软件组件的执行期间何时以及如何执行访问检查,保护域传输和审核。 上述任何服务都可以由计算机执行软件组件的计算机执行,也可以由单独的服务器执行。
    • 5. 发明授权
    • Discovering code and data in a binary executable program
    • 在二进制可执行程序中发现代码和数据
    • US6014513A
    • 2000-01-11
    • US996839
    • 1997-12-23
    • Geoffrey Michael VoelkerTheodore H. RomerAlastair WolmanDennis Chua LeeBrian N. BershadJohn Bradley ChenHenry M. LevyWayne Anthony Wong
    • Geoffrey Michael VoelkerTheodore H. RomerAlastair WolmanDennis Chua LeeBrian N. BershadJohn Bradley ChenHenry M. LevyWayne Anthony Wong
    • G06F9/44G06F9/445
    • G06F8/75
    • A computer software tool used for automatically identifying code portions and data portions of a binary executable software program in which the code portions include machine instructions that are of arbitrary length. Software products are typically distributed as binary, executable files, which comprise a string of binary values. In general, an executable file has no structure or meaning, except as determined by its behavior when dynamically executed, one instruction at a time, by a digital computer. The software tool determines a set of addresses for any known code and data portions. The tool is then used to disassemble machine instructions, beginning at a starting address for each known code portion, to identify the target addresses of other code portions and other data portions. Other sections of the binary executable software program that could be either code or data are then analyzed to identify additionAL code and data portions. As new portions are identified, the steps are repeated, until no further code or data portions are identifiable. The binary executable software program may include a plurality of executable modules. The entry addresses for each executable module and any addresses for code portions and data portions referenced and identified by any debug address, any export address, and any relocation address is added to the set of addresses. The binary executable software program is then executed to dynamically identify other executable modules so that the set of addresses can be further extended.
    • 一种用于自动识别二进制可执行软件程序的代码部分和数据部分的计算机软件工具,其中代码部分包括任意长度的机器指令。 软件产品通常以二进制可执行文件的形式分发,其中包含一串二进制值。 通常,一个可执行文件没有结构或意义,除非是由数字计算机一次动态执行,一次一个指令确定的。 软件工具为任何已知的代码和数据部分确定一组地址。 然后,该工具用于从每个已知代码部分的起始地址开始分解机器指令,以识别其他代码部分和其他数据部分的目标地址。 然后分析可以是代码或数据的二进制可执行软件程序的其他部分,以识别附加代码和数据部分。 当识别出新的部分时,重复这些步骤,直到没有进一步的代码或数据部分被识别为止。 二进制可执行软件程序可以包括多个可执行模块。 每个可执行模块的入口地址和由任何调试地址,任何导出地址和任何重定位地址引用和标识的代码部分和数据部分的任何地址被添加到地址集合。 然后执行二进制可执行软件程序以动态地识别其他可执行模块,使得该组地址可以进一步扩展。
    • 7. 发明授权
    • Process for rewriting executable content on a network server or desktop machine in order to enforce site specific properties
    • 在网络服务器或台式机上重写可执行内容的过程,以便强制执行站点特定的属性
    • US06865735B1
    • 2005-03-08
    • US09168178
    • 1998-10-07
    • Emin Gun SirerBrian N. Bershad
    • Emin Gun SirerBrian N. Bershad
    • G06F9/45
    • G06F8/52G06F21/51G06F21/52
    • A program or program snippet is rewritten to conform to site-specific properties prior to being executed by a target host. The program or program snippet directed to a target host from a known or unknown source is either intercepted by a server before reaching the target host or can be redirected from the target host to the server to effect its rewriting. The program is parsed in its external representation, converting it to an internal representation that is inspected and analyzed with reference to a site-specific properties database. A summary of the program's properties is then compared to the site-specific properties database by a binary rewriting engine, which produces a rewritten program in an internal representation. If appropriate, the program or program snippet is rewritten to convert it to a format suitable for execution on the target host. Furthermore, certifications may be added to the rewritten program to mark that the rewritten program obeys site-specific constraints. The rewriting service thus produces a program in an appropriate target representation that conforms to site-specific properties. These properties may relate to security, auditing, optimization, monitoring, threading, and/or management of the rewritten program.
    • 在目标主机执行之前,程序或程序代码段被重写为符合特定于站点的属性。 在到达目标主机之前由服务器拦截或者可以将目标主机从目标主机重定向到服务器以实现其重写,从已知或未知来源导向目标主机的程序或程序代码段。 该程序以其外部表示方式进行解析,将其转换为内部表示,并通过参考特定于站点的属性数据库进行检查和分析。 然后通过二进制重写引擎将程序属性的摘要与特定于站点的属性数据库进行比较,该引擎在内部表示中生成重写的程序。 如果适当,程序或程序代码段被重写,以将其转换为适合在目标主机上执行的格式。 此外,可以将重新编写的程序添加到重写程序中以标记重写的程序符合特定于站点的约束。 因此,重写服务产生符合站点特定属性的适当目标表示中的程序。 这些属性可能涉及重写程序的安全性,审计,优化,监控,线程化和/或管理。