会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • METHODS AND APPARATUS FOR DISPLAYING VIDEO DESPITE A NONFUNCTIONAL OPERATING SYSTEM
    • 显示屏幕非功能操作系统的方法和装置
    • WO2014047798A1
    • 2014-04-03
    • PCT/CN2012/081989
    • 2012-09-26
    • INTEL CORPORATIONOUYANG, QianCONG, YangYAO, JiewenZIMMER, Vincent J.
    • OUYANG, QianCONG, YangYAO, JiewenZIMMER, Vincent J.
    • G06F13/38
    • H04N5/44H04L12/1827H04N21/41415H04N21/443H04N21/488H04N21/812
    • A first video messaging service, running on top of an operating system in a data processing system, automatically presents a first video message. After using the first video messaging service to present the first video message, the data processing system automatically determines whether the first video messaging service has become nonfunctional. In response to determining that the first video messaging service has become nonfunctional, the data processing system automatically uses a backup video messaging service to present a second video message. The backup video messaging service operates in a boot environment. In one embodiment, the data processing system is configured to provide digital signage, the first video messaging service presents content for the digital signage when the operating system is operational, and the second video messaging service presents content for the digital signage when the operating system is nonfunctional. Other embodiments are described and claimed.
    • 在数据处理系统中的操作系统之上运行的第一视频消息服务自动呈现第一视频消息。 在使用第一视频消息服务呈现第一视频消息之后,数据处理系统自动地确定第一视频消息服务是否已经变得不起作用。 为了响应于确定第一视频消息收发服务变得不起作用,数据处理系统自动使用备份视频消息服务来呈现第二视频消息。 备份视频消息服务在引导环境中运行。 在一个实施例中,数据处理系统被配置为提供数字标牌,当操作系统可操作时,第一视频消息收发服务呈现用于数字标牌的内容,并且当操作系统为 非功能性。 描述和要求保护其他实施例。
    • 6. 发明申请
    • FIRMWARE SENSOR LAYER
    • 固件传感器层
    • WO2015196347A1
    • 2015-12-30
    • PCT/CN2014/080587
    • 2014-06-24
    • INTEL CORPORATIONHANEBUTTE, Ulf R.YAO, JiewenZIMMER, Vincent J.
    • HANEBUTTE, Ulf R.YAO, JiewenZIMMER, Vincent J.
    • G06F15/177
    • G06F9/4401G06F21/575G06F21/62
    • Computing devices,computer-readable storage media,and methods associated with providing an operating system (OS)-absent firmware sensor layer to support a boot process are disclosed herein.In embodiments, acomputing device may include a processor and firmware to be operated on the processor. The firmware may include one or more modules and a sensor layer. The sensor layer may be configured to receive,in the OS-absent environment,sensor data produced by a plurality of sensors. The sensor layer may be further configured to selectively provide the sensor data to the one or more modules via an interface of the sensor layer that abstracts the plurality of sensors. Other embodiments may be described and/or claimed.
    • 本文公开了计算设备,计算机可读存储介质和与提供操作系统(OS)的固件传感器层相关联以支持引导过程的方法。在实施例中,计算设备可以包括处理器和要在 处理器。 固件可以包括一个或多个模块和传感器层。 传感器层可以被配置为在不存在OS的环境中接收由多个传感器产生的传感器数据。 传感器层可以被进一步配置成经由传感器层的接口抽取多个传感器来选择性地将传感器数据提供给一个或多个模块。 可以描述和/或要求保护其他实施例。
    • 8. 发明申请
    • MANAGEABILITY ENGINE AND AUTOMATIC FIRMWARE VALIDATION
    • WO2019119408A1
    • 2019-06-27
    • PCT/CN2017/117970
    • 2017-12-22
    • INTEL CORPORATIONYAO, JiewenZIMMER, Vincent J.
    • YAO, JiewenZIMMER, Vincent J.
    • G06F9/445
    • Malicious attacks have moved from higher level virus attacks on software and data files operating on a device, to subverting the firmware underlying the device, where the firmware will compromise operation of the device even after attempts to remove the virus, unwanted programs, or other activity due to the subversion. If the firmware is compromised then even a clean reinstall of all software and/or services on the device may only result in a clean device that is then subsequently compromised again. Although device manufacturers may update a firmware to remove the vulnerability, there remains a problem in getting users to actually perform the update. To facilitate device security, a database or databases of firmware may be maintained where their status of vulnerable (bad) or not (good) is maintained and various options are presented for scanning firmware for vulnerabilities, out of band or manually, and pulling/pushing updates as desired to automatically update a device or prompt a user for updating. Updates may be mandatory per a policy and/or controlled by user preference. Looking for vulnerabilities may be device driven, or managed by an external entity. As new vulnerabilities are discovered, existing firmware may be checked for the vulnerability, and if found, devices having vulnerable firmware may be updated. New firmware may be recorded in the database (s) and the database (s) periodically scanned for vulnerabilities.
    • 9. 发明申请
    • TECHNIQUES FOR COORDINATING DEVICE BOOT SECURITY
    • 协调设备引导安全的技术
    • WO2017107122A1
    • 2017-06-29
    • PCT/CN2015/098651
    • 2015-12-24
    • INTEL CORPORATIONYAO, JiewenZIMMER, Vincent J.LI, WeiPOORNACHANDRAN, RajeshMUDUSURU, Giri P.
    • YAO, JiewenZIMMER, Vincent J.LI, WeiPOORNACHANDRAN, RajeshMUDUSURU, Giri P.
    • G06F21/57
    • G06F21/57G06F21/575
    • Techniques for providing and maintaining protection of firmware routines that form part of a chain of trust through successive processing environments. An apparatus may include a first processor component (550); a volatile storage (562) coupled to the first processor component; an enclave component to, in a pre-OS operating environment, generate a secure enclave within a portion of the volatile storage to restrict access to a secured firmware loaded into the secure enclave; a first firmware driver (646) to, in the pre-OS operating environment, provide a first API to enable unsecured firmware to call a support routine of the secured firmware from outside the secure enclave; and a second firmware driver (647) to, in an OS operating environment that replaces the pre-OS operating environment, provide a second API to enable an OS of the OS operating environment to call the support routine from outside the secure enclave.
    • 通过连续处理环境提供并维护构成信任链一部分的固件例程的保护技术。 一种装置可以包括第一处理器组件(550); 耦合到第一处理器组件的易失性存储器(562) 用于在OS前操作环境中在易失性存储器的一部分内生成安全区域以限制对加载到安全区域中的安全固件的访问的区域组件; 第一固件驱动程序(646),用于在OS前操作环境中提供第一API以使得不安全固件能够从安全区域外部调用安全固件的支持例程; 以及第二固件驱动程序(647),用于在替换操作系统前操作环境的操作系统操作环境中提供第二API以使操作系统操作环境的操作系统能够从安全飞地外调用支持例程。 p>