会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • RAPID SIGNATURES FOR PROTECTING VULNERABLE BROWSER CONFIGURATIONS
    • 用于保护易受攻击的浏览器配置的快速签名
    • US20090144828A1
    • 2009-06-04
    • US11949818
    • 2007-12-04
    • Matthew W. Thomlinson
    • Matthew W. Thomlinson
    • G06F21/00
    • G06F21/56G06F21/52G06F21/554G06F21/577
    • Architecture for distributing rules-based, targeted vulnerability signatures to an application (e.g., a browser) in order to block exploitation of vulnerable objects (e.g., ActiveX controls) or protocols. The architecture provides a significant reduction in the window of vulnerability, thereby improving the user experience in the software products. The solution employs text in a configuration file (a realtime rule), which is fine-grained, works on both vendor-created and third-party controls, and is completely compatible except under attack conditions (and thus quick to deploy with minimal testing). Publication of the rule does not block legal uses of the vulnerable control and would not require a full testing procedure. Further, a vulnerable control with a proper vulnerability signature is as safe as running a fully-fixed control. The architecture can be extended to arbitrary binary behaviors, and shell protocols.
    • 用于向应用程序(例如浏览器)分发基于规则的有针对性的漏洞签名以便阻止对脆弱对象(例如,ActiveX控件)或协议的利用的体系结构。 该架构大大减少了漏洞的窗口,从而提高了软件产品的用户体验。 该解决方案在配置文件(实时规则)中采用文本,这是一个细粒度的,可以在供应商创建的和第三方的控件上运行,除了受到攻击的条件之外,因此完全兼容(因此,通过最少的测试可快速部署) 。 该规则的公布不会阻止易受攻击的控制的合法使用,并且不需要完整的测试程序。 此外,具有适当漏洞签名的易受攻击的控制与运行完全固定的控制一样安全。 该架构可以扩展到任意的二进制行为和shell协议。
    • 2. 发明授权
    • Blind encryption
    • 盲加密
    • US5761311A
    • 1998-06-02
    • US838695
    • 1997-04-09
    • Jeffrey F. SpelmanMatthew W. Thomlinson
    • Jeffrey F. SpelmanMatthew W. Thomlinson
    • G07F7/10H04L9/08H04L9/30
    • G07F7/1016G06Q20/085H04L9/302H04L2209/04H04L2209/56
    • A method of processing encrypted communications sent by a first party, the method including the steps of: receiving from the first party a message that has a first part, a second part, a third part and a fourth part, wherein the first part includes a first block of information that is encrypted by using a key k1, the second part includes a second block of information that is encrypted by using a key k2, the third part includes a third block of information that is encrypted by using a key R, and the fourth part includes a fourth block of information that is encrypted by using the key R, wherein the third block of information includes k1 and the fourth block of information includes k2; blinding the fourth part; sending the third part and the blinded fourth part to a recryptor; receiving from the recryptor the k1 key re-encrypted by using a first key; and receiving from the recryptor a fifth block of information which is the blinded fourth block of information that has been encrypted by using a second key.
    • 一种处理由第一方发送的加密通信的方法,所述方法包括以下步骤:从所述第一方接收具有第一部分,第二部分,第三部分和第四部分的消息,其中所述第一部分包括 通过使用密钥k1加密的第一信息块,第二部分包括通过使用密钥k2加密的第二信息块,第三部分包括通过使用密钥R加密的第三信息块,以及 第四部分包括通过使用密钥R加密的第四信息块,其中第三信息块包括k1,第四信息块包括k2; 盲目的第四部分; 将第三部分和盲人第四部分发送给重新加注者; 从重新加密器接收通过使用第一密钥重新加密的k1密钥; 并且从重新加密器接收第五个信息块,该第五块信息是通过使用第二密钥被加密的盲目的第四个信息块。
    • 9. 发明授权
    • Secure prompting
    • 安全提示
    • US07996682B2
    • 2011-08-09
    • US11251946
    • 2005-10-17
    • Klaus U. SchutzMatthew W. ThomlinsonScott A. Field
    • Klaus U. SchutzMatthew W. ThomlinsonScott A. Field
    • G06F21/00
    • G06F21/57
    • Techniques are described herein for securely prompting a user to confirm sensitive operations, input sensitive information or the like. The techniques include receiving or intercepting calls from applications to prompting routines. When a call to a prompting routine is received or intercepted a hint may be provided to the user to switch to a secure desktop. When the user switches from the user desktop to the secure desktop the particular prompt is displayed. The input to the prompt is received on the secure desktop and verified to have been provided by the user. The user input or a representation of the input is then returned to the application running on the user desktop. Using these techniques, interception of prompting messages by malware does not result in sensitive information being revealed. Furthermore, spoofing of new messages by malware does not lead to the dismissal of critical prompting.
    • 这里描述了用于安全地提示用户确认敏感操作,输入敏感信息等的技术。 这些技术包括接收或拦截来自应用程序的呼叫以提示例程。 当接收或拦截对提示例程的调用时,可以向用户提供切换到安全桌面的提示。 当用户从用户桌面切换到安全桌面时,会显示特定的提示。 在安全桌面上接收到提示的输入,并验证其已由用户提供。 用户输入或输入的表示然后返回到在用户桌面上运行的应用程序。 使用这些技术,通过恶意软件拦截提示消息不会导致敏感信息被显示。 此外,恶意软件欺骗新消息不会导致关键提示被解雇。