会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Methods, Apparatus and Media for Modifying Information
    • 用于修改信息的方法,装置和媒体
    • US20080126405A1
    • 2008-05-29
    • US11563021
    • 2006-11-23
    • Jianwen YinRadhaKrishna Reddy DasariJon HassJavier L. JimenezKhachatur Papanyan
    • Jianwen YinRadhaKrishna Reddy DasariJon HassJavier L. JimenezKhachatur Papanyan
    • G06F17/30
    • G06F17/30607Y10S707/953Y10S707/955
    • A data structure comprising a first set of data fields wherein each data field contains data representing a managed object of an object-oriented model; a second set of data fields wherein each data field contains data representing an instance of a collection class: a third set of data fields wherein each data field contains data representing an instance of a first association class; a fourth set of data fields wherein each data field contains data representing an instance of a data source class, and a fifth set of data fields wherein each data field contains data representing an instance of a second association class. At least one data field of the first set is associated with a data field of the second set by a data field of the third set and the data field of the second set is also associated with a data field of the fourth set by a data field of the fifth set. An information handling system readable medium having stored thereon said data structure. Methods for modifying data of the data structure.
    • 一种数据结构,包括第一组数据字段,其中每个数据字段包含表示面向对象模型的被管理对象的数据; 第二组数据字段,其中每个数据字段包含表示集合类的实例的数据:第三组数据字段,其中每个数据字段包含表示第一关联类的实例的数据; 第四组数据字段,其中每个数据字段包含表示数据源类别的实例的数据,以及第五组数据字段,其中每个数据字段包含表示第二关联类的实例的数据。 第一组的至少一个数据字段由第三组的数据字段与第二组的数据字段相关联,并且第二组的数据字段也与数据字段的第四组的数据字段相关联 的第五集。 一种其上存储有所述数据结构的信息处理系统可读介质。 修改数据结构数据的方法。
    • 2. 发明授权
    • Methods, apparatus and media for modifying information
    • 用于修改信息的方法,设备和媒体
    • US07899845B2
    • 2011-03-01
    • US11563021
    • 2006-11-23
    • Jianwen YinRadhaKrishna Reddy DasariJon HassJavier L. JimenezKhachatur Papanyan
    • Jianwen YinRadhaKrishna Reddy DasariJon HassJavier L. JimenezKhachatur Papanyan
    • G06F17/30
    • G06F17/30607Y10S707/953Y10S707/955
    • A data structure comprising a first set of data fields wherein each data field contains data representing a managed object of an object-oriented model; a second set of data fields wherein each data field contains data representing an instance of a collection class; a third set of data fields wherein each data field contains data representing an instance of a first association class; a fourth set of data fields wherein each data field contains data representing an instance of a data source class; and a fifth set of data fields wherein each data field contains data representing an instance of a second association class. At least one data field of the first set is associated with a data field of the second set by a data field of the third set, and the data field of the second set is also associated with a data field of the fourth set by a data field of the fifth set. An information handling system readable medium having stored thereon said data structure. Methods for modifying data of the data structure.
    • 一种数据结构,包括第一组数据字段,其中每个数据字段包含表示面向对象模型的被管理对象的数据; 第二组数据字段,其中每个数据字段包含表示集合类的实例的数据; 第三组数据字段,其中每个数据字段包含表示第一关联类的实例的数据; 第四组数据字段,其中每个数据字段包含表示数据源类别的实例的数据; 以及第五组数据字段,其中每个数据字段包含表示第二关联类的实例的数据。 第一组的至少一个数据字段由第三组的数据字段与第二组的数据字段相关联,并且第二组的数据字段也通过数据与第四组的数据字段相关联 第五集的领域。 一种其上存储有所述数据结构的信息处理系统可读介质。 修改数据结构数据的方法。
    • 5. 发明申请
    • SINGLE COMMAND FUNCTIONALITY FOR PROVIDING DATA SECURITY AND PREVENTING DATA ACCESS WITHIN A DECOMMISIONED INFORMATION HANDLING SYSTEM
    • 提供数据安全性和防止数据访问在单独的信息处理系统中的单一命令功能
    • US20140025947A1
    • 2014-01-23
    • US13551033
    • 2012-07-17
    • Muhammed JaberJon HassTheodore Webb
    • Muhammed JaberJon HassTheodore Webb
    • G06F21/24
    • G06F21/62G06F21/572G06F21/6218G06F2221/2143
    • A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage devices of configurable components within a system; automatically encrypting, with the KSEK, data that is written to one of the storage devices; configuring the configurable components to prevent access to the stored data unless a valid copy of the KSEK is received from the service processor along with the request for the data; automatically decrypting, with the KSEK, the KSEK-encrypted data that is read from storage device; and in response to receiving a verified request to decommission the system, performing the decommissioning by deleting/erasing the KSEK from a secure storage at which the only instance of the KSEK is maintained. Deletion of the KSEK results in a permanent loss of access to the stored encrypted data within the system because the stored encrypted data cannot be decrypted without the KSEK.
    • 计算机实现的方法包括服务处理器:建立杀死开关加密密钥(KSEK)以为系统内可配置组件的存储设备内的数据提供数据安全性; 使用KSEK自动加密写入其中一个存储设备的数据; 配置可配置组件以防止对存储的数据的访问,除非从服务处理器接收到有效的KSEK副本以及数据的请求; 使用KSEK自动解密从存储设备读取的KSEK加密数据; 并且响应于接收到验证的请求以使系统停止,通过从保持KSEK的唯一实例的安全存储器中删除/擦除KSEK来执行退役。 由于存储的加密数据无法在没有KSEK的情况下被解密,所以删除KSEK导致对系统内存储的加密数据的永久丢失。
    • 6. 发明申请
    • ADVERTISING AND FACILITATING MANAGEMENT ACCESS TO ADDED CAPABILITIES OF INTELLIGENT DEVICES IN A SYSTEM
    • 广告和促进管理访问系统中智能设备的添加能力
    • US20130332605A1
    • 2013-12-12
    • US13494648
    • 2012-06-12
    • Joseph KozlowskiAbeye TeshomeJon Hass
    • Joseph KozlowskiAbeye TeshomeJon Hass
    • G06F15/173
    • G06F9/5044
    • A network interface device (NID) or management access point of a system is configured to: receive requests to register one or more additional capabilities provided by a second intelligent device integrated into the system; in response to the request, register the additional capabilities within a capabilities listing; advertise the additional capabilities as being an available within the system; and respond to a request from an external requestor for access to one of the additional capabilities by forwarding the management protocol and payload to the second intelligent device to enable the second intelligent device to perform all substantive processing required for the request. The NID establishes and maintains a network session between the second intelligent device and any external requestor requesting access to the additional capabilities. In response to receiving a response from the second intelligent device, the NID packages the response and forwards the response to the external requestor.
    • 系统的网络接口设备(NID)或管理接入点被配置为:接收注册由集成到系统中的第二智能设备提供的一个或多个附加功能的请求; 响应于该请求,在能力列表中注册附加功能; 将附加功能宣传为系统内可用的功能; 以及通过将所述管理协议和有效负载转发到所述第二智能设备来响应来自外部请求者的用于访问附加能力之一的请求,以使得所述第二智能设备能够执行所述请求所需的所有实质性处理。 NID建立并维护第二智能设备和请求访问附加功能的任何外部请求者之间的网络会话。 响应于接收到来自第二智能设备的响应,NID封装响应并将响应转发给外部请求者。
    • 7. 发明授权
    • Advertising and facilitating management access to added capabilities of intelligent devices in a system
    • 广告和便利管理访问系统中智能设备的附加功能
    • US08886703B2
    • 2014-11-11
    • US13494648
    • 2012-06-12
    • Joseph KozlowskiAbeye TeshomeJon Hass
    • Joseph KozlowskiAbeye TeshomeJon Hass
    • G06F15/16G06F15/173G06F15/177G06F15/167
    • G06F9/5044
    • A network interface device (NID) or management access point of a system is configured to: receive requests to register one or more additional capabilities provided by a second intelligent device integrated into the system; in response to the request, register the additional capabilities within a capabilities listing; advertise the additional capabilities as being an available within the system; and respond to a request from an external requestor for access to one of the additional capabilities by forwarding the management protocol and payload to the second intelligent device to enable the second intelligent device to perform all substantive processing required for the request. The NID establishes and maintains a network session between the second intelligent device and any external requestor requesting access to the additional capabilities. In response to receiving a response from the second intelligent device, the NID packages the response and forwards the response to the external requestor.
    • 系统的网络接口设备(NID)或管理接入点被配置为:接收注册由集成到系统中的第二智能设备提供的一个或多个附加功能的请求; 响应于该请求,在能力列表中注册附加功能; 将附加功能宣传为系统内可用的功能; 以及通过将所述管理协议和有效负载转发到所述第二智能设备来响应来自外部请求者的用于访问附加能力之一的请求,以使得所述第二智能设备能够执行所述请求所需的所有实质性处理。 NID建立并维护第二智能设备和请求访问附加功能的任何外部请求者之间的网络会话。 响应于接收到来自第二智能设备的响应,NID封装响应并将响应转发给外部请求者。
    • 8. 发明授权
    • Single command functionality for providing data security and preventing data access within a decommissioned information handling system
    • 单一命令功能,用于提供数据安全性并防止已停用的信息处理系统中的数据访问
    • US08938626B2
    • 2015-01-20
    • US13551033
    • 2012-07-17
    • Muhammed JaberJon HassTheodore Webb
    • Muhammed JaberJon HassTheodore Webb
    • G06F21/00G06F21/62
    • G06F21/62G06F21/572G06F21/6218G06F2221/2143
    • A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage devices of configurable components within a system; automatically encrypting, with the KSEK, data that is written to one of the storage devices; configuring the configurable components to prevent access to the stored data unless a valid copy of the KSEK is received from the service processor along with the request for the data; automatically decrypting, with the KSEK, the KSEK-encrypted data that is read from storage device; and in response to receiving a verified request to decommission the system, performing the decommissioning by deleting/erasing the KSEK from a secure storage at which the only instance of the KSEK is maintained. Deletion of the KSEK results in a permanent loss of access to the stored encrypted data within the system because the stored encrypted data cannot be decrypted without the KSEK.
    • 计算机实现的方法包括服务处理器:建立杀死开关加密密钥(KSEK)以为系统内可配置组件的存储设备内的数据提供数据安全性; 使用KSEK自动加密写入其中一个存储设备的数据; 配置可配置组件以防止对存储的数据的访问,除非从服务处理器接收到有效的KSEK副本以及数据的请求; 使用KSEK自动解密从存储设备读取的KSEK加密数据; 并且响应于接收到验证的请求以使系统停止,通过从保持KSEK的唯一实例的安全存储器中删除/擦除KSEK来执行退役。 由于存储的加密数据无法在没有KSEK的情况下被解密,所以删除KSEK导致对系统内存储的加密数据的永久丢失。