会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • PROTECTING USER CREDENTIALS FROM A COMPUTING DEVICE
    • 从计算机设备保护用户凭证
    • US20130205360A1
    • 2013-08-08
    • US13368731
    • 2012-02-08
    • Mark F. NovakAndrew J. Layman
    • Mark F. NovakAndrew J. Layman
    • G06F21/00
    • H04L63/102H04L63/0815H04L63/083H04L63/0853H04L63/0884H04L2463/102
    • Protecting user credentials from a computing device includes establishing a secure session between a computing device and an identity provider (e.g., a Web service). Parameters of the secure session are communicated to a credential service, which renegotiates or resumes the secure session to establish a new secure session between the credential service and the identity provider. User credentials are passed from the credential service to the identity provider via the new secure session, but the computing device does not have the parameters of the new secure session and thus does not have access to the passed user credentials. The credential service then renegotiates or resumes the secure session again to establish an additional secure session between the credential service and the identity provider. Parameters of the additional secure session are communicated to the computing device to allow the computing device to continue communicating securely with the identity provider.
    • 保护来自计算设备的用户凭证包括在计算设备和身份提供商(例如,Web服务)之间建立安全会话。 安全会话的参数被传送到凭证服务,该凭证服务重新协商或恢复安全会话以在证书服务和身份提供者之间建立新的安全会话。 用户凭证通过新的安全会话从凭证服务传递给身份提供者,但计算设备不具有新安全会话的参数,因此无法访问所传递的用户凭据。 然后,凭证服务再次重新协商或恢复安全会话,以在凭证服务和身份提供商之间建立额外的安全会话。 附加安全会话的参数被传送到计算设备以允许计算设备继续与身份提供商通信。
    • 5. 发明授权
    • Protecting password from attack
    • 保护密码免受攻击
    • US08365264B2
    • 2013-01-29
    • US12577711
    • 2009-10-12
    • Mark F. Novak
    • Mark F. Novak
    • H04L29/06
    • H04L63/1441G06F21/31G06F21/55H04L63/083H04L63/0869
    • A password may be provided along with a validation code, which can help prevent the password from being sent to the wrong recipient. When a password is created, a validation code may be created based on (a) the password, and (b) the identity of the target of authentication (TA) to which the password is intended to be sent. When a user is requested to provide a password, validation component intercepts the request and asks the user to enter both the password and validation code. The validation component then re-calculates the validation code based on the entered password and on the TA that is requesting the password. If the re-calculated validation code matches the validation code entered by the user, then the password is released to the user agent that the user uses to communicate with the TA, and the user agent sends the password to the requesting TA.
    • 可以提供密码以及验证码,这有助于防止将密码发送到错误的接收者。 当创建密码时,可以基于(a)密码和(b)要发送密码的认证目标(TA)的身份来创建验证码。 当请求用户提供密码时,验证组件拦截请求,并要求用户输入密码和验证码。 验证组件然后根据输入的密码和正在请求密码的TA重新计算验证码。 如果重新计算的验证码与用户输入的验证码匹配,则将密码释放给用户与TA通信的用户代理,并且用户代理将密码发送到请求的TA。
    • 7. 发明授权
    • Graphics data processing apparatus with draw and advance operation
    • 图形数据处理设备带有绘制和提前操作
    • US5162784A
    • 1992-11-10
    • US522409
    • 1990-05-10
    • Karl M. GuttagMark F. NovakMichael D. AsalNeil TebbuttJerry R. Van Aken
    • Karl M. GuttagMark F. NovakMichael D. AsalNeil TebbuttJerry R. Van Aken
    • G06T1/20G09G5/393
    • G06T1/20G09G5/393G09G2340/10
    • The graphics data processor of the present invention offers as a single instruction in its instruction set a draw and advance operation. A first data register stores a set of X and Y coordinates. In a first embodiment, a predetermined color code is stored at the pixel address of a bit mapped display memory indicated by the X and Y coordinates the first data register upon execution of the the draw and advance instruction. The X and Y coordinates stored in the first data register are then advanced by addition of X and Y coordinates stored in a second data register. A second embodiment is similar except that the color code stored at the X and Y coordinates of the first date register is recalled for combining with the predetermined color code and the combined result stored at that pixel location. The predetermined color code is preferrably stored in another data register. By proper selection of the X and Y coordinate data stored in the second data register either the X or the Y coordinate may be altered alone or both may be simultaneously changed. Provision of signed X and Y coordinate values in the second register enables either the X or Y coordinate to be incremented of decremented. This instruction serves to enhance the speed at which a line or computed curve may by drawn in the bit mapped display.
    • 本发明的图形数据处理器在其指令集中作为单个指令提供绘图和提前操作。 第一数据寄存器存储一组X和Y坐标。 在第一实施例中,在由X和Y指示的位映射显示存储器的像素地址处存储预定色码,并且在执行绘图和提前指令时对第一数据寄存器进行坐标。 然后通过加上存储在第二数据寄存器中的X和Y坐标来提前存储在第一数据寄存器中的X和Y坐标。 第二实施例是类似的,除了存储在第一日期寄存器的X和Y坐标处的颜色代码被调用以与预定颜色代码组合,并且存储在该像素位置处的组合结果。 预定的颜色代码优选地存储在另一个数据寄存器中。 通过对存储在第二数据寄存器中的X和Y坐标数据的适当选择,可以单独改变X或Y坐标,或者可以同时改变两者。 在第二个寄存器中提供有符号的X和Y坐标值可以使X或Y坐标递增递减。 该指令用于提高在位映射显示中绘制线或计算曲线的速度。
    • 8. 发明授权
    • Trusted execution environment virtual machine cloning
    • 可信执行环境虚拟机克隆
    • US08954965B2
    • 2015-02-10
    • US13566250
    • 2012-08-03
    • Mark F. NovakAndrew John LaymanMagnus NyströmStefan Thom
    • Mark F. NovakAndrew John LaymanMagnus NyströmStefan Thom
    • G06F9/455
    • G06F21/53
    • Cloning of a virtual machine having a trusted executed environment such as a software-based trusted platform module. In order to clone the virtual machine, the virtual machine state of the source virtual machine is copied to formulate a target virtual machine state that is to be associated with a target virtual machine. The target virtual machine is a clone of the source virtual machine state, and thus the storage hierarchy of the trusted execution environment may be the same for the trusted execution environment in the source and target virtual machine states. However, because the identity of the target virtual machine is different than that of the source virtual machine, the endorsement hierarchy of the target virtual machine state is altered such that it is based on the identity of the target virtual machine, rather than the source virtual machine.
    • 克隆具有可信执行环境的虚拟机,例如基于软件的可信平台模块。 为了克隆虚拟机,将复制源虚拟机的虚拟机状态以制定与目标虚拟机相关联的目标虚拟机状态。 目标虚拟机是源虚拟机状态的克隆,因此受信任执行环境的存储层次结构对于源虚拟机状态和目标虚拟机状态中的受信任执行环境可能相同。 然而,由于目标虚拟机的身份与源虚拟机的身份不同,所以目标虚拟机状态的认可层级被改变,使得其基于目标虚拟机的身份而不是源虚拟机 机。