会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • System and method for protecting data streams in hardware components
    • 用于保护硬件组件中数据流的系统和方法
    • US07502471B2
    • 2009-03-10
    • US11277012
    • 2006-03-20
    • Henrique MalvarPaul England
    • Henrique MalvarPaul England
    • H04N7/167
    • H04K1/02G11B20/00086G11B20/0021H04N5/913H04N7/1675H04N2005/91364
    • A scrambling architecture protects data streams in the operating system and hardware components of a computer by scrambling the otherwise raw data prior to the data being handled by the operating system. Scrambled content is passed to a filter graph (or other processing system) where the content is processed while scrambled. A scrambler also generates a random signal based on a first key and a second key. After processing, the scrambled data is passed to a driver for output. A driver may implement a descrambler to detect tone patterns in the content and recovers the first key from varying amplitudes of the tone patterns. The descrambler may also receive the second key via a separate channel and generates the same random signal using the recovered first key and the second key. The descrambler subtracts the tone patterns and the random signal from the scrambled content to restore the content.
    • 加扰架构通过在操作系统处理数据之前加扰原始数据来保护计算机的操作系统和硬件组件中的数据流。 加扰的内容被传递到滤波器图(或其他处理系统),其中内容被加扰处理。 加扰器还基于第一密钥和第二密钥生成随机信号。 处理后,将加扰的数据传递给驱动程序进行输出。 驱动器可以实现解扰器来检测内容中的音调模式,并从不同的音调模式的幅度恢复第一个键。 解扰器还可以经由单独的信道接收第二密钥,并使用恢复的第一密钥和第二密钥生成相同的随机信号。 解扰器从加扰的内容中减去音调模式和随机信号以恢复内容。
    • 2. 发明申请
    • System and Method for Protecting Data Streams in Hardware Components
    • US20060149678A1
    • 2006-07-06
    • US11276371
    • 2006-02-27
    • Henrique MalvarPaul England
    • Henrique MalvarPaul England
    • G06Q99/00
    • H04K1/02G11B20/00086G11B20/0021H04N5/913H04N7/1675H04N2005/91364
    • A scrambling architecture protects data streams in the operating system and hardware components of a computer by scrambling the otherwise raw data prior to the data being handled by the operating system. The architecture has a scrambler implemented at either the client or the server that adds noise to the content. More specifically, the scrambler produces periodic sets of tone patterns having varying amplitudes based on a first key. The scrambler also generates a random signal based on the first key and a second key. The tone patterns and random signal are added to the content to scramble the content. The scrambled content is then passed to the filter graph (or other processing system) where the content is processed while scrambled. Any attacker attempting to siphon off the bits during processing will steal only noisy data, which is worthless for redistribution or copying purposes. After processing, the scrambled data is passed to a driver for output. The driver implements a descrambler to unscramble the content by subtracting out the random noise signal. The descrambler detects the tone patterns in the content and recovers the first key from the varying amplitudes of the tone patterns. The descrambler also receives the second key via a separate channel (e.g., a cryptographically secured path) and generates the same random signal using the recovered first key and the second key. The descrambler subtracts the tone patterns and the random signal from the scrambled content to restore the content.
    • 3. 发明申请
    • System and Method for Protecting Data Streams in Hardware Components
    • 用于保护硬件组件中数据流的系统和方法
    • US20060156412A1
    • 2006-07-13
    • US11277012
    • 2006-03-20
    • Henrique MalvarPaul England
    • Henrique MalvarPaul England
    • H04N7/16H04L9/32G06F17/30G06F7/04G06K9/00H03M1/68H04K1/00H04L9/00
    • H04K1/02G11B20/00086G11B20/0021H04N5/913H04N7/1675H04N2005/91364
    • A scrambling architecture protects data streams in the operating system and hardware components of a computer by scrambling the otherwise raw data prior to the data being handled by the operating system. The architecture has a scrambler implemented at either the client or the server that adds noise to the content. More specifically, the scrambler produces periodic sets of tone patterns having varying amplitudes based on a first key. The scrambler also generates a random signal based on the first key and a second key. The tone patterns and random signal are added to the content to scramble the content. The scrambled content is then passed to the filter graph (or other processing system) where the content is processed while scrambled. Any attacker attempting to siphon off the bits during processing will steal only noisy data, which is worthless for redistribution or copying purposes. After processing, the scrambled data is passed to a driver for output. The driver implements a descrambler to unscramble the content by subtracting out the random noise signal. The descrambler detects the tone patterns in the content and recovers the first key from the varying amplitudes of the tone patterns. The descrambler also receives the second key via a separate channel (e.g., a cryptographically secured path) and generates the same random signal using the recovered first key and the second key. The descrambler subtracts the tone patterns and the random signal from the scrambled content to restore the content.
    • 加扰架构通过在操作系统处理数据之前加扰原始数据来保护计算机的操作系统和硬件组件中的数据流。 该架构具有在客户端或服务器上实现的加扰器,从而对内容增加噪声。 更具体地,扰频器基于第一密钥产生具有变化幅度的周期性音调模式集合。 加扰器还基于第一密钥和第二密钥生成随机信号。 将音调模式和随机信号添加到内容以加扰内容。 然后,加扰的内容被传递到滤波器图(或其他处理系统),其中处理内容被加扰。 任何在处理过程中试图虹吸位的攻击者都将窃取嘈杂的数据,这对于重新分配或复制目的是无价值的。 处理后,将加扰的数据传递给驱动程序进行输出。 驱动器通过减去随机噪声信号实现解扰器来解扰内容。 解扰器检测内容中的音调模式,并从音调模式的变化幅度恢复第一个键。 解扰器还经由单独的信道(例如,密码保护的路径)接收第二密钥,并且使用恢复的第一密钥和第二密钥生成相同的随机信号。 解扰器从加扰的内容中减去音调模式和随机信号以恢复内容。
    • 4. 发明授权
    • System and method for protecting data streams in hardware components
    • 用于保护硬件组件中数据流的系统和方法
    • US07069590B1
    • 2006-06-27
    • US09507478
    • 2000-02-17
    • Henrique MalvarPaul England
    • Henrique MalvarPaul England
    • H04L9/00
    • H04K1/02G11B20/00086G11B20/0021H04N5/913H04N7/1675H04N2005/91364
    • A scrambling architecture protects data streams in the operating system and hardware components of a computer by scrambling the otherwise raw data prior to the data being handled by the operating system. The architecture has a scrambler implemented at either the client or the server that adds noise to the content. More specifically, the scrambler produces periodic sets of tone patterns having varying amplitudes based on a first key. The scrambler also generates a random signal based on the first key and a second key. The tone patterns and random signal are added to the content to scramble the content. The scrambled content is then passed to the filter graph (or other processing system) where the content is processed while scrambled. Any attacker attempting to siphon off the bits during processing will steal only noisy data, which is worthless for redistribution or copying purposes. After processing, the scrambled data is passed to a driver for output. The driver implements a descrambler to unscramble the content by subtracting out the random noise signal. The descrambler detects the tone patterns in the content and recovers the first key from the varying amplitudes of the tone patterns. The descrambler also receives the second key via a separate channel (e.g., a cryptographically secured path) and generates the same random signal using the recovered first key and the second key. The descrambler subtracts the tone patterns and the random signal from the scrambled content to restore the content.
    • 加扰架构通过在操作系统处理数据之前加扰原始数据来保护计算机的操作系统和硬件组件中的数据流。 该架构具有在客户端或服务器上实现的加扰器,从而对内容增加噪声。 更具体地,扰频器基于第一密钥产生具有变化幅度的周期性音调模式集合。 加扰器还基于第一密钥和第二密钥生成随机信号。 将音调模式和随机信号添加到内容以加扰内容。 然后,加扰的内容被传递到滤波器图(或其他处理系统),其中处理内容被加扰。 任何在处理过程中试图虹吸位的攻击者都将窃取嘈杂的数据,这对于重新分配或复制目的是无价值的。 处理后,将加扰的数据传递给驱动程序进行输出。 驱动器通过减去随机噪声信号实现解扰器来解扰内容。 解扰器检测内容中的音调模式,并从音调模式的变化幅度恢复第一个键。 解扰器还经由单独的信道(例如,密码保护的路径)接收第二密钥,并且使用恢复的第一密钥和第二密钥生成相同的随机信号。 解扰器从加扰的内容中减去音调模式和随机信号以恢复内容。
    • 7. 发明授权
    • Coupled symbiotic operating system
    • 耦合共生操作系统
    • US08738890B2
    • 2014-05-27
    • US13178908
    • 2011-07-08
    • Paul EnglandJork LoeserLuis Irun-Briz
    • Paul EnglandJork LoeserLuis Irun-Briz
    • G06F9/52G06F12/08
    • G06F12/1036G06F9/545G06F12/109G06F2212/656
    • A single application can be executed across multiple execution environments in an efficient manner if at least a relevant portion of the virtual memory assigned to the application was equally accessible by each of the multiple execution environments. A request by a process in one execution environment can, thereby, be directed to an operating system, or other core software, in another execution environment and can be made by a shadow of the requesting process in the same manner as the original request was made by the requesting process itself. Because of the memory invariance between the execution environments, the results of the request will be equally accessible to the original requesting process even though the underlying software that responded to the request may be executing in a different execution environment. A similar thread invariance can be maintained to provide for accurate translation of requests between execution environments.
    • 如果分配给应用的虚拟存储器的至少相关部分可以被多个执行环境中的每个执行环境同等地访问,则可以以有效的方式在多个执行环境中执行单个应用。 一个执行环境中的进程的请求可以由此被引导到另一执行环境中的操作系统或其他核心软件,并且可以以与原始请求相同的方式通过请求进程的阴影来进行 通过请求过程本身。 由于执行环境之间的内存不变性,即使响应请求的底层软件可能在不同的执行环境中执行,原始请求进程的请求结果也可以同样访问。 可以维护类似的线程不变性,以便在执行环境之间提供精确的请求转换。
    • 10. 发明授权
    • Secure execution environment on external device
    • 外部设备上的安全执行环境
    • US08352740B2
    • 2013-01-08
    • US12125929
    • 2008-05-23
    • Paul England
    • Paul England
    • G06F21/00
    • H04L9/0897H04L9/3234H04L9/3263H04L9/3271H04L2209/76
    • A device, such as a smartcard, may be externally-connected to a host platform and may be used to enhance or extend security services provided by the host platform's Trusted Platform Module (TPM). The device and the platform exchange keys in order to facilitate reliable identification of the platform by the device and vice versa, and to support cryptographic tunneling. A proxy component on the host device tunnels information between the platform and the device, and also provides the device with access to the TPM's services such as sealing and attestation. The device can provide secure services to the platform, and may condition provision of these services on conditions such as confirming the platform's identity through the exchanged keys, or platform state measurements reported by the TPM.
    • 诸如智能卡的设备可以被外部连接到主机平台,并且可以用于增强或扩展由主机平台的可信平台模块(TPM)提供的安全服务。 设备和平台交换密钥,以便于设备对平台的可靠识别,反之亦然,并支持加密隧道。 主机上的代理组件可以在平台和设备之间隧道传输信息,还可以让设备访问TPM的服务,如密封和认证。 该设备可以向平台提供安全服务,并且可以在诸如通过交换的密钥确认平台的身份或由TPM报告的平台状态测量的条件下对这些服务的提供进行调节。