会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Securing software by enforcing data flow integrity
    • 通过执行数据流完整性来保护软件
    • US09390261B2
    • 2016-07-12
    • US12306188
    • 2007-05-04
    • Manuel CostaMiguel CastroTim Harris
    • Manuel CostaMiguel CastroTim Harris
    • G06F9/44G06F21/54G06F21/52
    • G06F21/54G06F21/52
    • The majority of such software attacks exploit software vulnerabilities or flaws to write data to unintended locations. For example, control-data attacks exploit buffer overflows or other vulnerabilities to overwrite a return address in the stack, a function pointer, or some other piece of control data. Non-control-data attacks exploit similar vulnerabilities to overwrite security critical data without subverting the intended control flow in the program. We describe a method for securing software against both control-data and non-control-data attacks. A static analysis is carried out to determine data flow information for a software program. Data-flow tracking instructions are formed in order to track data flow during execution or emulation of that software. Also, checking instructions are formed to check the tracked data flow against the static analysis results and thereby identify potential attacks or errors. Optional optimisations are described to reduce the resulting additional overheads.
    • 大多数此类软件攻击利用软件漏洞或漏洞将数据写入非预期位置。 例如,控制数据攻击利用缓冲区溢出或其他漏洞来覆盖堆栈中的返回地址,函数指针或其他一些控制数据。 非控制数据攻击利用类似的漏洞来覆盖安全关键数据,而不会破坏程序中的预期控制流程。 我们描述一种用于保护软件免受控制数据和非控制数据攻击的方法。 进行静态分析以确定软件程序的数据流信息。 形成数据流跟踪指令,以便在执行或仿真该软件期间跟踪数据流。 此外,形成检查指令以根据静态分析结果检查跟踪的数据流,从而识别潜在的攻击或错误。 描述可选优化,以减少所产生的额外开销。
    • 2. 发明申请
    • Securing Software By Enforcing Data Flow Integrity
    • 通过执行数据流完整性来保护软件
    • US20090282393A1
    • 2009-11-12
    • US12306188
    • 2007-05-04
    • Manuel CostaMiguel CastroTim Harris
    • Manuel CostaMiguel CastroTim Harris
    • G06F9/06
    • G06F21/54G06F21/52
    • The majority of such software attacks exploit software vulnerabilities or flaws to write data to unintended locations. For example, control-data attacks exploit buffer overflows or other vulnerabilities to overwrite a return address in the stack, a function pointer, or some other piece of control data. Non-control-data attacks exploit similar vulnerabilities to overwrite security critical data without subverting the intended control flow in the program. We describe a method for securing software against both control-data and non-control-data attacks. A static analysis is carried out to determine data flow information for a software program. Data-flow tracking instructions are formed in order to track data flow during execution or emulation of that software. Also, checking instructions are formed to check the tracked data flow against the static analysis results and thereby identify potential attacks or errors. Optional optimisations are described to reduce the resulting additional overheads.
    • 大多数此类软件攻击利用软件漏洞或漏洞将数据写入非预期位置。 例如,控制数据攻击利用缓冲区溢出或其他漏洞来覆盖堆栈中的返回地址,函数指针或其他一些控制数据。 非控制数据攻击利用类似的漏洞来覆盖安全关键数据,而不会破坏程序中的预期控制流程。 我们描述一种保护软件免受控制数据和非控制数据攻击的方法。 进行静态分析以确定软件程序的数据流信息。 形成数据流跟踪指令,以便在执行或仿真该软件期间跟踪数据流。 此外,形成检查指令以根据静态分析结果检查跟踪的数据流,从而识别潜在的攻击或错误。 描述可选优化,以减少所产生的额外开销。
    • 3. 发明授权
    • Method and apparatus for measuring piston ring tension
    • 用于测量活塞环张力的方法和装置
    • US06196063B1
    • 2001-03-06
    • US09088802
    • 1998-06-02
    • Yasuo KasaiYukio InoueTim HarrisNaoki EbisuiEric Ellington
    • Yasuo KasaiYukio InoueTim HarrisNaoki EbisuiEric Ellington
    • G01M1500
    • G01M13/005
    • An apparatus for measuring tension of piston rings includes a cylindrical support fixture having a circumferential groove formed therearound for receiving and holding a piston ring. A rigid base supports a plurality of components of the apparatus. A strong, thin band, formed from a material sufficiently strong to withstand repeated applications of pulling force thereto, is mounted to the base, and is held between two clamps. The band has a loop formed therein, for receiving the support fixture with a piston ring mounted therein. The apparatus also includes reciprocally movable structure for tightening the band around the support fixture, such as a slidably movable clamp assembly at one end of the band. The apparatus further includes mechanism for measuring tension on the band, and fluid activatable mechanism for vertically reciprocating a portion of the support fixture. In a preferred embodiment, the reciprocating mechanism is pneumatically activatable, such as by compressed air.
    • 用于测量活塞环张力的装置包括圆柱形支撑固定件,其具有围绕其形成的周向槽,用于容纳和保持活塞环。 刚性基座支撑设备的多个部件。 由足够坚固以承受拉力反复施加的材料形成的坚固的薄带安装在基座上,并被夹持在两个夹具之间。 该带具有形成在其中的环,用于接收安装在其中的活塞环的支撑固定件。 该装置还包括用于将带缠绕在支撑固定件周围的可往复移动的结构,例如在带的一端处的可滑动地移动的夹具组件。 该装置还包括用于测量带上的张力的机构,以及用于使支撑夹具的一部分垂直往复运动的流体可激活机构。 在优选实施例中,往复运动机构是可气动激活的,例如通过压缩空气。