会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Application-specific secret generation
    • 特定于应用程序的秘密生成
    • US08422674B2
    • 2013-04-16
    • US11754667
    • 2007-05-29
    • Masana MuraseWilfred E. Plouffe, Jr.Kanna ShimizuVladimir Zbarsky
    • Masana MuraseWilfred E. Plouffe, Jr.Kanna ShimizuVladimir Zbarsky
    • H04L9/00H04L29/06H04L9/28G06F9/24G06F12/14G06F7/04G08B29/00H04K1/00
    • G06F21/52
    • A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access. Dedicated hardware decrypts an encrypted kernel into memory for execution. When an application is to be executed, the kernel computes one or more secrets by cryptographically combining information contained in the application with secret information contained in the kernel itself. The kernel then deletes its secret information and passes the computed secrets to the application. To store data persistently in memory, the application uses one of the computed secrets to encrypt the data prior to storage. If the kernel starts another instance of the same application, the kernel (which will have been re-decrypted to restore the kernel's secrets) will compute the same one or more secrets, thus allowing the second application instance to access the data encrypted by the first application instance.
    • 一种用于保护敏感程序代码和数据(包括永久存储的数据)的未经授权的访问的方法,计算机程序产品和数据处理系统。 专用硬件将加密的内核解密为内存以供执行。 当应用程序被执行时,内核通过将应用程序中包含的信息加密地组合在内核中包含的秘密信息来计算一个或多个秘密。 内核然后删除其秘密信息,并将计算的秘密传递给应用程序。 为了将数据永久存储在内存中,应用程序使用计算的秘密之一在存储之前对数据进行加密。 如果内核启动同一应用程序的另一个实例,内核(将被重新解密以恢复内核的秘密)将计算相同的一个或多个秘密,从而允许第二个应用程序实例访问由第一个 应用程序实例。
    • 4. 发明授权
    • Method and means for tetrahedron/octahedron packing and tetrahedron
extraction for function approximation
    • 四面体/八面体填充和四面体提取的方法和手段,用于函数近似
    • US5390035A
    • 1995-02-14
    • US996805
    • 1992-12-23
    • James M. KassonWilfred E. Plouffe, Jr.
    • James M. KassonWilfred E. Plouffe, Jr.
    • H04N1/60H04N1/46
    • H04N1/6058H04N1/6016
    • The invention concerns the conversion of an input color to an output color using a multi-variable function having an input domain in a first three-dimensional color space and output range in a second m-dimensional color space. The conversion from input to output color subdivides the input domain into polyhedra defined by planar grids of points connected to form a plurality of triangles. The planar grids are projected into the remaining dimension of the function domain. When an input color value is presented, the multi-variable function is used to approximate the input value by computing an approximation of the multi-variable function, which provides a value in the output range. A tetrahedron containing the input color value is extracted from the function domain. The values of the multi-variable function at the tetrahedron vertices are obtained by interpolation. The tetrahedron is subdivided into subtetrahedra. The volumes of the subtetrahedra are calculated and multiplied by the function values. The products are added together and normalized to the volume of the extracted tetrahedron to produce an approximation of the input color. The approximation is provided as the value of the output color.
    • 本发明涉及使用具有在第一三维颜色空间中的输入域和第二m维颜色空间中的输出范围的多变量功能将输入颜色转换为输出颜色。 从输入到输出颜色的转换将输入域细分为由连接形成多个三角形的点的平面网格定义的多面体。 平面网格投影到功能域的剩余维中。 当给出输入颜色值时,多变量函数用于通过计算多变量函数的近似来近似输入值,该多变量函数在输出范围中提供一个值。 从功能域提取包含输入颜色值的四面体。 通过插值获得四面体顶点的多变量函数的值。 四面体被细分成四面体。 计算四面体的体积并乘以函数值。 将产物加在一起并归一化为提取的四面体的体积以产生输入颜色的近似值。 提供近似值作为输出颜色的值。
    • 6. 发明授权
    • Cryptographically-enabled privileged mode execution
    • 密码学启用特权模式执行
    • US08433927B2
    • 2013-04-30
    • US11754678
    • 2007-05-29
    • Wilfred E. Plouffe, Jr.Kanna Shimizu
    • Wilfred E. Plouffe, Jr.Kanna Shimizu
    • G06F12/14G06F9/24G06F7/04H04L29/06H04L9/28G08B29/00H04K1/00
    • G06F12/1458G06F21/51G06F21/572G06F21/74
    • A method, computer program product, and data processing system are disclosed for protecting sensitive program code (and also data) from unauthorized access in a memory space not subject to protection fault detection. In a preferred embodiment, secure initialization hardware loads the sensitive code from a storage location accessible only to the secure initialization hardware itself and decrypts the sensitive code into a portion of the processor-accessible memory space, from which the code is executed. Once execution of the sensitive code has completed, all or at least a portion of the code is deleted before passing control to application software. If the application software needs to cause the sensitive code to be executed, the secure initialization hardware is activated to reload/decrypt a fresh copy of the sensitive code into the memory space and cause the code to be executed. Before control is returned to the application software, the sensitive code is again deleted to prevent unauthorized access.
    • 公开了一种方法,计算机程序产品和数据处理系统,用于在不受保护故障检测的存储器空间中保护敏感程序代码(以及数据)免于未经授权的访问。 在优选实施例中,安全初始化硬件将敏感代码从仅可访问安全初始化硬件本身的存储位置加载,并将敏感代码解密为可执行代码的处理器可访问存储器空间的一部分。 一旦敏感代码的执行完成,则在将控制传递给应用软件之前,所有或至少一部分代码被删除。 如果应用软件需要执行敏感代码,则激活安全初始化硬件,将敏感代码的新鲜副本重新加载/解密到存储器空间中,并使代码被执行。 在控制返回到应用软件之前,敏感代码将被重新删除,以防止未经授权的访问。
    • 7. 发明申请
    • Application-Specific Secret Generation
    • 特定应用程序的秘密生成
    • US20080298581A1
    • 2008-12-04
    • US11754667
    • 2007-05-29
    • Masana MuraseWilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • Masana MuraseWilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • H04L9/00
    • G06F21/52
    • A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access are disclosed. Dedicated hardware decrypts an encrypted kernel into memory for execution. When an application is to be executed, the kernel computes one or more secrets by cryptographically combining information contained in the application with secret information contained in the kernel itself. The kernel then deletes its secret information and passes the computed secrets to the application. To store data persistently in memory, the application uses one of the computed secrets to encrypt the data prior to storage. If the kernel starts another instance of the same application, the kernel (which will have been re-decrypted to restore the kernel's secrets) will compute the same one or more secrets, thus allowing the second application instance to access the data encrypted by the first application instance.
    • 公开了一种用于保护敏感程序代码和数据(包括永久存储的数据)从未经授权的访问的方法,计算机程序产品和数据处理系统。 专用硬件将加密的内核解密为内存以供执行。 当应用程序被执行时,内核通过将应用程序中包含的信息加密地组合在内核中包含的秘密信息来计算一个或多个秘密。 内核然后删除其秘密信息,并将计算的秘密传递给应用程序。 为了将数据永久存储在内存中,应用程序使用计算的秘密之一在存储之前对数据进行加密。 如果内核启动同一应用程序的另一个实例,内核(将被重新解密以恢复内核的秘密)将计算相同的一个或多个秘密,从而允许第二个应用程序实例访问由第一个 应用程序实例。
    • 9. 发明申请
    • Updateable Secure Kernel Extensions
    • 可更新的安全内核扩展
    • US20080301440A1
    • 2008-12-04
    • US11754658
    • 2007-05-29
    • Wilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • Wilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • H04L9/00
    • G06F21/575G06F21/51G06F2221/2143
    • A method, computer program product, and data processing system for providing an updateable encrypted operating kernel are disclosed. In a preferred embodiment, secure initialization hardware decrypts a minimal secure kernel containing sensitive portions of data and/or code into a portion of the processor-accessible memory space, from which the kernel is executed. Most system software functions are not directly supported by the secure kernel but are provided by dynamically loaded kernel extensions that are encrypted with a public key so that they can only be decrypted with a private key possessed by the secure kernel. The public/private key pair is processor-specific. Before passing control to a kernel extension the secure kernel deletes a subset of its sensitive portions, retaining only those sensitive portions needed to perform the task(s) delegated to the kernel extension. Which sensitive portions are retained is determined by a cryptographic key with which the kernel extension is signed.
    • 公开了一种用于提供可更新的加密操作内核的方法,计算机程序产品和数据处理系统。 在优选实施例中,安全初始化硬件将包含敏感部分的数据和/或代码的最小安全内核解密成可执行内核的处理器可访问存储器空间的一部分。 大多数系统软件功能并不直接得到安全内核的支持,而是由使用公钥加密的动态加载内核扩展提供,以便只能使用安全内核拥有的私有密钥进行解密。 公钥/私钥对是处理器特定的。 在将控件传递给内核扩展之前,安全内核将删除其敏感部分的一个子集,只保留执行委托给内核扩展的任务所需的敏感部分。 保留哪些敏感部分由内核扩展名与之签名的加密密钥确定。