会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • METHODS AND APPARATUSES FOR PRIVACY IN LOCATION-AWARE SYSTEMS
    • 位置识别系统隐私的方法和设备
    • US20100024045A1
    • 2010-01-28
    • US11772196
    • 2007-06-30
    • Manoj R. SastryMichael J. CovingtonRam Krishnan
    • Manoj R. SastryMichael J. CovingtonRam Krishnan
    • G06F21/24
    • G06F21/6245G06F2221/2111H04W4/029H04W12/00503H04W12/02
    • In one embodiment a method is disclosed for accepting and enforcing user selectable privacy settings for context awareness including location awareness data on a computing platform. The method may identify a requestor, assign a privacy setting to the requester then detect a request for location information from the requestor. The method may transmit location information to the requester based on the user selected privacy setting. The user selected privacy setting may have a granularity assigned to each requestor based on a privacy preference and the method may entirely block the location information from being disclosed or the method may modify the granularity/accuracy of the location information based on the privacy setting to report context of an appropriate level of granularity according to the privacy setting configured by the user. Other embodiments are also disclosed.
    • 在一个实施例中,公开了用于接受和执行用户可选隐私设置的方法,用于包括计算平台上的位置感知数据的上下文感知。 该方法可以标识请求者,向请求者分配隐私设置,然后从请求者检测位置信息的请求。 该方法可以基于用户选择的隐私设置将位置信息发送到请求者。 用户选择的隐私设置可以基于隐私偏好而具有分配给每个请求者的粒度,并且该方法可以完全阻止位置信息被公开,或者该方法可以基于隐私设置来报告位置信息的粒度/准确性以报告 根据用户配置的隐私设置,具有适当的粒度级别的上下文。 还公开了其他实施例。
    • 2. 发明授权
    • Reliable reporting of location data
    • 可靠的位置数据报告
    • US07965702B2
    • 2011-06-21
    • US11368374
    • 2006-03-03
    • Michael J. CovingtonManoj R. SastryFarid AdrangiDeepak J. ManoharShao-Cheng Wang
    • Michael J. CovingtonManoj R. SastryFarid AdrangiDeepak J. ManoharShao-Cheng Wang
    • H04L12/66G06F7/04G06F9/455
    • H04L12/2856G06F21/57G06F21/64G06F2221/2111H04L12/2898H04L29/06027H04L65/1053H04L65/1069H04L67/18H04M2242/04H04W88/18
    • A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call. Other embodiments may be described.
    • 诸如具有电话功能的移动设备(诸如因特网协议语音(VoIP)电话应用)的机器被配置有安全环境,其中位置提供商在(更可靠)或外部(较不可靠)的机器中 可以确定机器的位置数据,并将其安全地提供给电话应用程序,以将其并入用于呼叫被呼叫者的呼叫建立。 可以通过使用一个或多个英特尔的LaGrande技术(LT),Vanderpool Technology(VT)或可信平台模块(TPM)来创建安全环境。 LT和VT允许在机器内定义安全的独立组件,例如通过将其实例化为虚拟机,TPM允许组件对数据进行加密签名,以便于确保位置数据未被篡改。 包括加密安全的位置数据的电话呼叫建立的接收者可以验证位置数据并接受呼叫。 可以描述其他实施例。
    • 3. 发明申请
    • Reliable reporting of location data
    • 可靠的位置数据报告
    • US20070153715A1
    • 2007-07-05
    • US11368374
    • 2006-03-03
    • Michael J. CovingtonManoj R. SastryFarid AdrangiDeepak J. ManoharShao-Cheng Wang
    • Michael J. CovingtonManoj R. SastryFarid AdrangiDeepak J. ManoharShao-Cheng Wang
    • H04L12/56H04J3/08
    • H04L12/2856G06F21/57G06F21/64G06F2221/2111H04L12/2898H04L29/06027H04L65/1053H04L65/1069H04L67/18H04M2242/04H04W88/18
    • A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call. Other embodiments may be described.
    • 诸如具有电话功能的移动设备(诸如因特网协议语音(VoIP)电话应用)的机器被配置有安全环境,其中位置提供商在(更可靠)或外部(较不可靠)的机器中 可以确定机器的位置数据,并将其安全地提供给电话应用程序,以将其并入用于呼叫被呼叫者的呼叫建立。 安全环境可以通过使用一个或多个英特尔的LaGrande技术(LT),Vanderpool技术(VT)或可信平台模块(TPM)来创建。 LT和VT允许在机器内定义安全的独立组件,例如通过将其实例化为虚拟机,TPM允许组件对数据进行加密签名,以便于确保位置数据未被篡改。 包括加密安全的位置数据的电话呼叫建立的接收者可以验证位置数据并接受呼叫。 可以描述其他实施例。
    • 4. 发明授权
    • Reliable reporting of location data
    • 可靠的位置数据报告
    • US08804701B2
    • 2014-08-12
    • US13113888
    • 2011-05-23
    • Michael J. CovingtonManoj R. SastryFarid AdrangiDeepak J. ManoharShao-Cheng Wang
    • Michael J. CovingtonManoj R. SastryFarid AdrangiDeepak J. ManoharShao-Cheng Wang
    • G06F21/00H04L9/00G06F9/455
    • H04L12/2856G06F21/57G06F21/64G06F2221/2111H04L12/2898H04L29/06027H04L65/1053H04L65/1069H04L67/18H04M2242/04H04W88/18
    • A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call. Other embodiments may be described.
    • 诸如具有电话功能的移动设备(诸如因特网协议语音(VoIP)电话应用)的机器被配置有安全环境,其中位置提供商在(更可靠)或外部(较不可靠)的机器中 可以确定机器的位置数据,并将其安全地提供给电话应用程序,以将其并入用于呼叫被呼叫者的呼叫建立。 可以通过使用一个或多个英特尔的LaGrande技术(LT),Vanderpool Technology(VT)或可信平台模块(TPM)来创建安全环境。 LT和VT允许在机器内定义安全的独立组件,例如通过将其实例化为虚拟机,TPM允许组件对数据进行加密签名,以便于确保位置数据未被篡改。 包括加密安全的位置数据的电话呼叫建立的接收者可以验证位置数据并接受呼叫。 可以描述其他实施例。
    • 5. 发明申请
    • Reliable Reporting Of Location Data
    • 位置数据的可靠报告
    • US20110225626A1
    • 2011-09-15
    • US13113888
    • 2011-05-23
    • Michael J. CovingtonManoj R. SastryFarid AdrangiDeepak J. ManoharShao-Cheng Wang
    • Michael J. CovingtonManoj R. SastryFarid AdrangiDeepak J. ManoharShao-Cheng Wang
    • G06F21/00
    • H04L12/2856G06F21/57G06F21/64G06F2221/2111H04L12/2898H04L29/06027H04L65/1053H04L65/1069H04L67/18H04M2242/04H04W88/18
    • A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call. Other embodiments may be described.
    • 诸如具有电话功能的移动设备(诸如因特网协议语音(VoIP)电话应用)的机器被配置有安全环境,其中位置提供商在(更可靠)或外部(较不可靠)的机器中 可以确定机器的位置数据,并将其安全地提供给电话应用程序,以将其并入用于呼叫被呼叫者的呼叫建立。 可以通过使用一个或多个英特尔的LaGrande技术(LT),Vanderpool Technology(VT)或可信平台模块(TPM)来创建安全环境。 LT和VT允许在机器内定义安全的独立组件,例如通过将其实例化为虚拟机,TPM允许组件对数据进行加密签名,以便于确保位置数据未被篡改。 包括加密安全的位置数据的电话呼叫建立的接收者可以验证位置数据并接受呼叫。 可以描述其他实施例。
    • 10. 发明授权
    • Method for enforcing resource access control in computer systems
    • 在计算机系统中执行资源访问控制的方法
    • US08789170B2
    • 2014-07-22
    • US12890040
    • 2010-09-24
    • Manoj R. SastryIoannis T. SchoinasDaniel M. Cermak
    • Manoj R. SastryIoannis T. SchoinasDaniel M. Cermak
    • G06F12/14
    • H04L63/10G06F12/1458G06F21/6218G06F21/78
    • A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs.
    • 一种执行对系统资源和资产的访问控制的方法和系统。 与系统中发起事务的设备相关联的安全属性将自动生成并使用事务消息进行转发。 安全属性传达分配给每个启动器的访问权限。 在系统中实现一个或多个安全执行机制以根据访问策略要求评估安全属性以访问诸如存储器,寄存器,地址范围等的各种系统资产和资源。如果由安全属性标识的特权指示访问 允许请求,允许交易进行。 启动器方案的安全属性提供跨系统设计的模块化,一致的安全访问实施方案。