会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Trusted computing platform using a trusted device assembly
    • 使用可信设备组件的可信计算平台
    • US06988250B1
    • 2006-01-17
    • US09913452
    • 2000-02-15
    • Graeme John ProudlerDipankar GuptaLiqun ChenSiani Lynne PearsonBoris BalacheffBruno Edgard Van WilderDavid Chan
    • Graeme John ProudlerDipankar GuptaLiqun ChenSiani Lynne PearsonBoris BalacheffBruno Edgard Van WilderDavid Chan
    • G06F17/50
    • G06F21/445G06F21/34G06F21/57G06F21/606G06F21/64G06F21/85G06F2207/7219G06F2211/009G06F2221/2103
    • In a computing platform, a trusted hardware device (24) is added to the motherboard (20). The trusted hardware device (24) is configured to acquire an integrity metric, for example a hash of the BIOS memory (29), of the computing platform. The trusted hardware device (24) is tamper-resistant, difficult to forge and inaccessible to other functions of the platform. The hash can be used to convince users that that the operation of the platform (hardware or software) has not been subverted in some way, and is safe to interact with in local or remote applications.In more detail, the main processing unit (21) of the computing platform is directed to address the trusted hardware device (24), in advance of the BIOS memory, after release from ‘reset’. The trusted hardware device (24) is configured to receive memory read signals from the main processing unit (21) and, in response, return instructions, in the native language of the main processing unit (21), that instruct the main processing unit to establish the hash and return the value to be stored by the trusted hardware device (24). Since the hash is calculated in advance of any other system operations, this is a relatively strong method of verifying the integrity of the system. Once the hash has been returned, the final instruction calls the BIOS program and the system boot procedure continues as normal.Whenever a user wishes to interact with the computing platform, he first requests the integrity metric, which he compares with an authentic integrity metric that was measured by a trusted party. If the metrics are the same, the platform is verified and interactions can continue. Otherwise, interaction halts on the basis that the operation of the platform may have been subverted.
    • 在计算平台中,将可信硬件设备(24)添加到主板(20)。 可信硬件设备(24)被配置为获取计算平台的完整性度量,例如BIOS存储器(29)的散列。 受信任的硬件设备(24)是防篡改的,难以伪造并且不能访问平台的其他功能。 该哈希可以用于说服用户,平台(硬件或软件)的操作没有以某种方式颠覆,并且可以安全地与本地或远程应用程序进行交互。 更详细地说,计算平台的主处理单元(21)在从“复位”释放之后被引导以在BIOS存储器之前对可信硬件设备(24)进行寻址。 可信硬件设备(24)被配置为从主处理单元(21)接收存储器读取信号,并响应于主处理单元(21)的母语的返回指令,其指示主处理单元 建立散列并返回由可信硬件设备(24)存储的值。 由于散列是在任何其他系统操作之前计算出来的,所以这是验证系统完整性的相对较强的方法。 一旦散列已经返回,最后的指令调用BIOS程序,并且系统引导过程正常进行。 每当用户希望与计算平台进行交互时,他首先请求完整性度量,其与被可信方测量的真实完整性度量进行比较。 如果指标相同,则会验证平台并继续进行交互。 否则,交互停止,基于平台的操作可能已被颠覆。
    • 2. 发明授权
    • Trusted computing platform for restricting use of data
    • 用于限制数据使用的可信计算平台
    • US07526785B1
    • 2009-04-28
    • US10088258
    • 2000-09-25
    • Siani Lynne PearsonLiqun Chen
    • Siani Lynne PearsonLiqun Chen
    • H04N7/167
    • G06F21/84G06F21/57G06F21/85G06F2211/009G06F2221/2103G06F2221/2153
    • A client/server system has a client platform adapted to provide restricted use of data provided by a serve. The client platform comprises a display, secure communications means, and a memory containing image receiving code for receiving data from a server by the secure communication means and for display of such data. The client platform is adapted such that the data received from a server is used for display of the data and not for an unauthorised purpose. A server adapted to provide data to a client platform for restricted use by the client platform comprises a memory containing image sending code for providing an image of data executed on the server, and secure communications means for secure communication of images of data to a client platform. The server is adapted to determine that a client platform is adapted to ensure restricted use of the data before it is sent by the image sending code.
    • 客户机/服务器系统具有适于提供对服务提供的数据的有限使用的客户端平台。 客户平台包括显示器,安全通信装置和包含图像接收代码的存储器,用于通过安全通信装置从服务器接收数据并显示这些数据。 适应客户端平台,使得从服务器接收的数据用于显示数据,而不是用于未经授权的目的。 适于向客户端平台提供数据以供客户端平台限制使用的服务器包括:包含图像发送代码的存储器,用于提供在服务器上执行的数据的图像;以及安全通信装置,用于将数据图像安全地传送到客户端平台 。 服务器适于确定客户端平台适于在数据被图像发送代码发送之前确保其受到有限的使用。
    • 5. 发明授权
    • Trusted computing platform
    • 可信计算平台
    • US07444601B2
    • 2008-10-28
    • US11249820
    • 2005-10-12
    • Graeme John ProudlerDipankar GuptaLiqun ChenSiani Lynne PearsonBoris BalacheffBruno Edgard Van WilderDavid Chan
    • Graeme John ProudlerDipankar GuptaLiqun ChenSiani Lynne PearsonBoris BalacheffBruno Edgard Van WilderDavid Chan
    • G06F17/50
    • G06F21/445G06F21/34G06F21/57G06F21/606G06F21/64G06F21/85G06F2207/7219G06F2211/009G06F2221/2103
    • In a computing platform, a trusted hardware device (24) is added to the motherboard (20). The trusted hardware device (24) is configured to acquire an integrity metric, for example a hash of the BIOS memory (29), of the computing platform. The trusted hardware device (24) is tamper-resistant, difficult to forge and inaccessible to other functions of the platform. The hash can be used to convince users that that the operation of the platform (hardware or software) has not been subverted in some way, and is safe to interact with in local or remote applications.In more detail, the main processing unit (21) of the computing platform is directed to address the trusted hardware device (24), in advance of the BIOS memory, after release from ‘reset’. The trusted hardware device (24) is configured to receive memory read signals from the main processing unit (21) and, in response, return instructions, in the native language of the main processing unit (21), that instruct the main processing unit to establish the hash and return the value to be stored by the trusted hardware device (24). Since the hash is calculated in advance of any other system operations, this is a relatively strong method of verifying the integrity of the system. Once the hash has been returned, the final instruction calls the BIOS program and the system boot procedure continues as normal.Whenever a user wishes to interact with the computing platform, he first requests the integrity metric, which he compares with an authentic integrity metric that was measured by a trusted party. If the metrics are the same, the platform is verified and interactions can continue. Otherwise, interaction halts on the basis that the operation of the platform may have been subverted.
    • 在计算平台中,将可信硬件设备(24)添加到主板(20)。 可信硬件设备(24)被配置为获取计算平台的完整性度量,例如BIOS存储器(29)的散列。 受信任的硬件设备(24)是防篡改的,难以伪造并且不能访问平台的其他功能。 该哈希可以用于说服用户,平台(硬件或软件)的操作没有以某种方式颠覆,并且可以安全地与本地或远程应用程序进行交互。 更详细地说,计算平台的主处理单元(21)在从“复位”释放之后被引导以在BIOS存储器之前对可信硬件设备(24)进行寻址。 可信硬件设备(24)被配置为从主处理单元(21)接收存储器读取信号,并响应于主处理单元(21)的母语的返回指令,其指示主处理单元 建立散列并返回由可信硬件设备(24)存储的值。 由于散列是在任何其他系统操作之前计算出来的,所以这是验证系统完整性的相对较强的方法。 一旦散列已经返回,最后的指令调用BIOS程序,并且系统引导过程正常进行。 每当用户希望与计算平台进行交互时,他首先请求完整性度量,其与被可信方测量的真实完整性度量进行比较。 如果指标相同,则会验证平台并继续进行交互。 否则,交互停止,基于平台的操作可能已被颠覆。
    • 6. 发明授权
    • Electronic commerce system
    • 电子商务系统
    • US07096204B1
    • 2006-08-22
    • US10110280
    • 2000-10-06
    • Liqun ChenBoris BalacheffRoelf du ToitSiani Lynne PearsonDavid Chan
    • Liqun ChenBoris BalacheffRoelf du ToitSiani Lynne PearsonDavid Chan
    • G06Q99/00
    • G06Q30/06G06Q20/02G06Q20/04G06Q20/105G06Q20/12G06Q20/20G06Q20/367G06Q20/3674G06Q20/383G06Q20/385
    • A method of brokering a transaction between a consumer and a vendor by a broker, wherein the consumer, the broker and the vendor are all attached to a public network, the consumer having a secure token containing a true consumer identity. The method comprising the steps of: the consumer obtaining a temporary identity from the broker by using the true consumer identity from the secure token; the consumer selecting a purchase to be made from the vendor; the consumer requesting the purchase from the vendor and providing the temporary identity to the vendor; the vendor requesting transaction authorisation from the broker by forwarding the request and the temporary identity to the broker; the broker matching the temporary identity to a current list of temporary identities, and obtaining the true consumer identity; the broker providing authorisation for the transaction based on transaction details and true consumer identity.
    • 由经纪人代理消费者和供应商之间的交易的方法,其中消费者,经纪商和供应商都连接到公共网络,消费者具有包含真实消费者身份的安全令牌。 该方法包括以下步骤:消费者通过使用来自安全令牌的真实消费者身份从代理获取临时身份; 消费者选择从供应商进行的购买; 消费者请求从供应商购买并向供应商提供临时身份; 供应商通过将请求和临时身份转发给经纪人从代理商请求交易授权; 经纪人将临时身份与当前的临时身份列表进行匹配,并获得真实的消费者身份; 经纪人根据交易细节和真实的消费者身份为交易提供授权。
    • 9. 发明授权
    • Document management system and method
    • 文件管理系统和方法
    • US08364729B2
    • 2013-01-29
    • US13050888
    • 2011-03-17
    • Helen BalinskyLiqun ChenSteven J. Simske
    • Helen BalinskyLiqun ChenSteven J. Simske
    • G06F21/00
    • G06F17/2229G06F21/6227H04L9/14H04L2209/60
    • A document management system includes a document. One or more of a plurality of map-files of the document correspond(s) with a step of a multi-step workflow associated with the document. A random nonce is generated for each of the steps of the multi-step workflow except for an initial step of the multi-step workflow. Each of the random nonces i) is incorporated as a map-file entry into a respective one of the plurality of map-files corresponding with a step of the multi-step workflow that directly precedes the step of the multi-step workflow for which the random nonce is generated and ii) is used to perform a nonce-based initiating operation a respective one of the plurality of map-files corresponding with the step of the multi-step workflow for which the random nonce is generated.
    • 文件管理系统包括文件。 文档的多个地图文件中的一个或多个对应于具有与文档相关联的多步工作流的步骤。 为多步骤工作流程的每个步骤生成随机随机数,除了多步骤工作流程的初始步骤。 随机随机i)中的每一个被并入作为地图文件条目到与多步骤工作流的步骤相对应的多个地图文件中的相应一个,其直接在多步骤工作流的步骤之前,其中 生成随机随机数,并且ii)用于执行对应于生成随机随机数的多步骤工作流的步骤的多个映射文件中的相应一个映射文件的基于事件的发起操作。