会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Configuration of a computing device in a secure manner
    • 以安全的方式配置计算设备
    • US07809949B2
    • 2010-10-05
    • US11191133
    • 2005-07-26
    • Christopher R. WysockiAlan Ward
    • Christopher R. WysockiAlan Ward
    • H04L9/32
    • H04L63/10G06Q20/3678H04L63/123
    • In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital signature generated based on the configuration indication. Generation of the digital signature accounts for a unique identifier nominally associated with the computing device. The received configuration indication is verified to be authentic including processing the unique identifier, the received configuration indication and the received digital signature. The computing device is operated or interoperated with in accordance with the received configuration indication. In one example, a service interoperates with the computing device. For example, the computing device may be a portable media player, and the service may provide media to the computing device based on a capacity indication of the configuration indication.
    • 根据广泛的方面,提供了一种用于安全地配置计算设备的方法。 配置指示被接收到计算设备中,包括接收基于配置指示生成的数字签名。 数字签名的生成考虑了名义上与计算设备相关联的唯一标识符。 所接收的配置指示被验证为真实的,包括处理唯一标识符,接收到的配置指示和接收到的数字签名。 计算设备根据接收到的配置指示进行操作或互操作。 在一个示例中,服务与计算设备互操作。 例如,计算设备可以是便携式媒体播放器,并且服务可以基于配置指示的容量指示向计算设备提供媒体。
    • 7. 发明申请
    • SECURE CONFIGURATION OF COMPUTING DEVICE
    • 计算设备的安全配置
    • US20120297199A1
    • 2012-11-22
    • US13531357
    • 2012-06-22
    • Christopher R. WysockiAlan Ward
    • Christopher R. WysockiAlan Ward
    • H04L9/32
    • H04L63/10G06Q20/3678H04L63/123
    • In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital signature generated based on the configuration indication. Generation of the digital signature accounts for a unique identifier nominally associated with the computing device. The received configuration indication may be verified to be authentic including processing the unique identifier, the received configuration indication and the received digital signature. The computing device may be operated or interoperated with in accordance with the received configuration indication. In one example, a service interoperates with the computing device. For example, the computing device may be a portable media player, and the service may provide media to the computing device based on a capacity indication of the configuration indication.
    • 根据广泛的方面,提供了一种用于安全地配置计算设备的方法。 配置指示被接收到计算设备中,包括接收基于配置指示生成的数字签名。 数字签名的生成考虑了名义上与计算设备相关联的唯一标识符。 所接收的配置指示可以被验证为真实的,包括处理唯一标识符,接收到的配置指示和所接收的数字签名。 计算设备可以根据接收到的配置指示来操作或互操作。 在一个示例中,服务与计算设备互操作。 例如,计算设备可以是便携式媒体播放器,并且服务可以基于配置指示的容量指示向计算设备提供媒体。