会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明授权
    • Autonomic binding of subsystems to system to prevent theft
    • 子系统自动绑定到系统以防盗窃
    • US07269725B2
    • 2007-09-11
    • US10738183
    • 2003-12-17
    • Daryl C. CromerHoward J. LockerRandall S. Springfield
    • Daryl C. CromerHoward J. LockerRandall S. Springfield
    • G06F1/24G06F9/00
    • G06F21/6272G06F1/183G06F21/575G06F21/88G06F2221/2129
    • A method is provided of uniquely binding, through connection, a subsystem device having restricted information space for storing code, to a system having a structure for generating and delivering a unique code to identify the system to the information storage space in the subsystem. The method comprises determining if the information storage space in the subsystem has information therein when the subsystem is connected to the system. If no information is contained in the information storage space in the subsystem, the system writes the unique code from the system to the information storage space in the subsystem. If information is in the information storage space, that information is compared with the unique code in the system, and operation of the system is allowed if, and only if, the information in the information storage space matches the unique code generated by the system. A structure for performing this method is also provided.
    • 提供了一种通过连接将具有用于存储代码的受限信息空间的子系统设备唯一地绑定到具有用于生成和递送唯一代码以将系统识别到子系统中的信息存储空间的结构的系统的方法。 该方法包括当子系统连接到系统时确定子系统中的信息存储空间是否具有信息。 如果子系统的信息存储空间中没有信息,则系统将唯一的代码写入子系统中的信息存储空间。 如果信息在信息存储空间中,则该信息与系统中的唯一代码进行比较,并且仅当信息存储空间中的信息与系统生成的唯一代码匹配时才允许系统的操作。 还提供了一种用于执行该方法的结构。
    • 9. 发明授权
    • Method for controlling file access on computer systems
    • 控制计算机系统文件访问的方法
    • US08086873B2
    • 2011-12-27
    • US11446737
    • 2006-06-05
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • G06F12/14
    • G06F12/1475G06F21/78
    • A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.
    • 公开了一种用于控制计算机系统上的文件访问的方法。 最初,在计算机系统中提供虚拟机管理器(VMM)。 响应于写入请求,VMM确定位置字段是否有效。 如果位置字段无效,则VMM将写请求信息写入存储设备; 但是如果位置字段有效,则VMM在将写入请求信息写入存储设备之前对写入请求信息进行加密。 响应于读取请求,VMM再次确定位置字段是否有效。 如果位置字段无效,则VMM将读取请求信息发送给读取请求者; 但是,如果位置字段有效,则VMM在将读取请求信息发送给读取请求者之前解密读取请求信息。