会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 32. 发明授权
    • Method, apparatus, and device for providing security among a calling function and a target function
    • 用于在呼叫功能和目标功能之间提供安全性的方法,装置和设备
    • US08516260B2
    • 2013-08-20
    • US12606906
    • 2009-10-27
    • Scott A. Krig
    • Scott A. Krig
    • G06F21/00
    • G06F21/57
    • The device and accompanying apparatus and method provides security among a calling function, such as an any executable code, and at least one target function, such as any executable code that the calling function wishes to have execute. In one example, the device includes an engine operative to perform run-time verification of the signatures of secure interrupt handler code and at least one target function before allowing execution of the at least one target function. If both the secure interrupt handler code's signature and the at least one target function's signature are successfully verified, the at least one target function is allowed to execute.
    • 该装置和伴随的装置和方法提供诸如任何可执行代码的调用功能和至少一个目标函数(诸如调用函数希望执行的任何可执行代码)之间的安全性。 在一个示例中,该设备包括可运行的引擎,用于在允许执行至少一个目标功能之前对安全中断处理程序代码和至少一个目标函数的签名执行运行时验证。 如果成功地验证了安全中断处理程序代码的签名和至少一个目标函数的签名,则允许至少一个目标函数执行。
    • 35. 发明申请
    • Method, Apparatus, and Device for Protecting Against Programming Attacks and/or Data Corruption
    • 用于防止编程攻击和/或数据损坏的方法,装置和装置
    • US20100107249A1
    • 2010-04-29
    • US12606888
    • 2009-10-27
    • Scott A. Krig
    • Scott A. Krig
    • G06F11/00
    • G06F21/57
    • The method and accompanying apparatus and device protects against programming attacks and/or data corruption by computer viruses, malicious code, or other types of corruption. In one example, signature verification policy information that identifies a plurality of policies associated with a plurality of target memory segments is programmed during a secure boot process. The programmed signature verification policy information associated with each of the plurality of target memory segments is then evaluated during run-time. Signature verification is then repeatedly performed, during run-time, on each of the plurality of target memory segments based on the programmed signature verification policy information associated with each target memory segment.
    • 该方法和配套的装置和装置防止计算机病毒,恶意代码或其他类型的损坏的编程攻击和/或数据损坏。 在一个示例中,在安全引导过程期间编程标识与多个目标存储器段相关联的多个策略的签名验证策略信息。 然后在运行时间期间评估与多个目标存储器段中的每一个相关联的编程签名验证策略信息。 基于与每个目标存储器段相关联的编程的签名验证策略信息,在运行期间,在多个目标存储器段中的每一个上重复执行签名验证。