会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • TRUSTED LANGUAGE RUNTIME ON A MOBILE PLATFORM
    • 在移动平台上的TRUSTED语言运行
    • US20120331550A1
    • 2012-12-27
    • US13167699
    • 2011-06-24
    • Himanshu RajNuno SantosPaul EnglandStefan SaroiuAlastair Wolman
    • Himanshu RajNuno SantosPaul EnglandStefan SaroiuAlastair Wolman
    • G06F21/00
    • G06F21/575G06F21/53
    • Disclosed is a trusted language runtime (TLR) architecture that provides abstractions for developing a runtime for executing trusted applications or portions thereof securely on a mobile device (e.g., a smartphone). TLR offers at least two abstractions to mobile developers: a trustbox and a trustlet. The trustbox is a runtime environment that offers code and data integrity, and confidentiality. Code and data running inside a trustbox cannot be read or modified by any code running outside the trustbox. A trustlet is the code portion of an application that runs inside a trustbox. With TLR, programmers can write applications in .NET and specify which parts of the application handle sensitive data, and thus, run inside the trustbox. With the TLR, the developer places these parts in a trustlet class, and the TLR provides all support needed to run the parts in the trustbox.
    • 公开了一种可信赖语言运行时(TLR)架构,其提供用于开发用于在移动设备(例如,智能电话机)上执行可信应用或其部分的运行时的抽象。 TLR至少向移动开发人员提供两个抽象:一个信托框和一个信托。 trustbox是提供代码和数据完整性以及机密性的运行时环境。 在信托箱内运行的代码和数据不能被任何在信托箱外部运行的代码读取或修改。 trustlet是在一个信任框内运行的应用程序的代码部分。 使用TLR,程序员可以在.NET中编写应用程序,并指定应用程序的哪些部分处理敏感数据,从而在trustbox内运行。 使用TLR,开发人员将这些部件放置在trustlet类中,并且TLR提供在trustbox中运行部件所需的所有支持。
    • 7. 发明申请
    • Trusted Snapshot Generation
    • 信任快照生成
    • US20120324236A1
    • 2012-12-20
    • US13161520
    • 2011-06-16
    • Abhinav SrivastavaHimanshu RajPaul EnglandParag Sharma
    • Abhinav SrivastavaHimanshu RajPaul EnglandParag Sharma
    • G06F21/24
    • G06F21/64G06F9/45558G06F21/57G06F2009/45587G06F2221/2103G06F2221/2153H04L9/3234H04L63/0823H04L63/0876H04L2209/127
    • A hypervisor provides a snapshot protocol that generates a verifiable snapshot of a target machine. The verifiable snapshot includes a snapshot and a signed quote. In one implementation, a challenger requests a snapshot of the target machine. In response to the snapshot request, the hypervisor initiates Copy-on-Write (CoW) protection for the target machine. The hypervisor snapshots and hashes each of the memory pages and the virtual central processing unit (CPU) of the target machine. The hypervisor generates a composite hash by merging all individual memory page hashes and the CPU state hash. The hypervisor requests a quote including integrity indicators of all trusted components and the composite hash. The quote uses a cryptographic signature from a trusted platform module, which ensures that any compromise of the integrity of the snapshot is detectable. The snapshot and signed quote are returned to the challenger for verification.
    • 虚拟机管理程序提供生成目标计算机的可验证快照的快照协议。 可验证的快照包括快照和签名报价。 在一个实现中,挑战者请求目标机器的快照。 响应于快照请求,管理程序启动目标机器的写时复制(CoW)保护。 管理程序快照并对目标机器的每个存储器页面和虚拟中央处理单元(CPU)进行散列。 管理程序通过合并所有单独的内存页哈希和CPU状态哈希值来生成复合散列。 虚拟机管理程序请求包括所有可信组件和组合散列的完整性指示符的引用。 报价使用来自可信平台模块的加密签名,可确保对快照完整性的任何妥协都是可检测的。 快照和签名报价返回给挑战者进行验证。
    • 9. 发明授权
    • Coupled symbiotic operating system
    • 耦合共生操作系统
    • US08738890B2
    • 2014-05-27
    • US13178908
    • 2011-07-08
    • Paul EnglandJork LoeserLuis Irun-Briz
    • Paul EnglandJork LoeserLuis Irun-Briz
    • G06F9/52G06F12/08
    • G06F12/1036G06F9/545G06F12/109G06F2212/656
    • A single application can be executed across multiple execution environments in an efficient manner if at least a relevant portion of the virtual memory assigned to the application was equally accessible by each of the multiple execution environments. A request by a process in one execution environment can, thereby, be directed to an operating system, or other core software, in another execution environment and can be made by a shadow of the requesting process in the same manner as the original request was made by the requesting process itself. Because of the memory invariance between the execution environments, the results of the request will be equally accessible to the original requesting process even though the underlying software that responded to the request may be executing in a different execution environment. A similar thread invariance can be maintained to provide for accurate translation of requests between execution environments.
    • 如果分配给应用的虚拟存储器的至少相关部分可以被多个执行环境中的每个执行环境同等地访问,则可以以有效的方式在多个执行环境中执行单个应用。 一个执行环境中的进程的请求可以由此被引导到另一执行环境中的操作系统或其他核心软件,并且可以以与原始请求相同的方式通过请求进程的阴影来进行 通过请求过程本身。 由于执行环境之间的内存不变性,即使响应请求的底层软件可能在不同的执行环境中执行,原始请求进程的请求结果也可以同样访问。 可以维护类似的线程不变性,以便在执行环境之间提供精确的请求转换。