会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Method for enforcing resource access control in computer systems
    • 在计算机系统中执行资源访问控制的方法
    • US08789170B2
    • 2014-07-22
    • US12890040
    • 2010-09-24
    • Manoj R. SastryIoannis T. SchoinasDaniel M. Cermak
    • Manoj R. SastryIoannis T. SchoinasDaniel M. Cermak
    • G06F12/14
    • H04L63/10G06F12/1458G06F21/6218G06F21/78
    • A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs.
    • 一种执行对系统资源和资产的访问控制的方法和系统。 与系统中发起事务的设备相关联的安全属性将自动生成并使用事务消息进行转发。 安全属性传达分配给每个启动器的访问权限。 在系统中实现一个或多个安全执行机制以根据访问策略要求评估安全属性以访问诸如存储器,寄存器,地址范围等的各种系统资产和资源。如果由安全属性标识的特权指示访问 允许请求,允许交易进行。 启动器方案的安全属性提供跨系统设计的模块化,一致的安全访问实施方案。
    • 9. 发明申请
    • METHOD FOR ENFORCING RESOURCE ACCESS CONTROL IN COMPUTER SYSTEMS
    • 在计算机系统中执行资源访问控制的方法
    • US20120079590A1
    • 2012-03-29
    • US12890040
    • 2010-09-24
    • Manoj R. SastryIoannis T. SchoinasDaniel M. Cermak
    • Manoj R. SastryIoannis T. SchoinasDaniel M. Cermak
    • G06F12/14
    • H04L63/10G06F12/1458G06F21/6218G06F21/78
    • A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs.
    • 一种执行对系统资源和资产的访问控制的方法和系统。 与系统中发起事务的设备相关联的安全属性将自动生成并使用事务消息进行转发。 安全属性传达分配给每个启动器的访问权限。 在系统中实现一个或多个安全执行机制以根据访问策略要求评估安全属性以访问诸如存储器,寄存器,地址范围等的各种系统资产和资源。如果由安全属性标识的特权指示访问 允许请求,允许交易进行。 启动器方案的安全属性提供跨系统设计的模块化,一致的安全访问实施方案。
    • 10. 发明授权
    • Reliable reporting of location data
    • 可靠的位置数据报告
    • US07965702B2
    • 2011-06-21
    • US11368374
    • 2006-03-03
    • Michael J. CovingtonManoj R. SastryFarid AdrangiDeepak J. ManoharShao-Cheng Wang
    • Michael J. CovingtonManoj R. SastryFarid AdrangiDeepak J. ManoharShao-Cheng Wang
    • H04L12/66G06F7/04G06F9/455
    • H04L12/2856G06F21/57G06F21/64G06F2221/2111H04L12/2898H04L29/06027H04L65/1053H04L65/1069H04L67/18H04M2242/04H04W88/18
    • A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call. Other embodiments may be described.
    • 诸如具有电话功能的移动设备(诸如因特网协议语音(VoIP)电话应用)的机器被配置有安全环境,其中位置提供商在(更可靠)或外部(较不可靠)的机器中 可以确定机器的位置数据,并将其安全地提供给电话应用程序,以将其并入用于呼叫被呼叫者的呼叫建立。 可以通过使用一个或多个英特尔的LaGrande技术(LT),Vanderpool Technology(VT)或可信平台模块(TPM)来创建安全环境。 LT和VT允许在机器内定义安全的独立组件,例如通过将其实例化为虚拟机,TPM允许组件对数据进行加密签名,以便于确保位置数据未被篡改。 包括加密安全的位置数据的电话呼叫建立的接收者可以验证位置数据并接受呼叫。 可以描述其他实施例。