会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Hardware security for software processes
    • 软件过程的硬件安全
    • US08677482B2
    • 2014-03-18
    • US12723209
    • 2010-03-12
    • Mark L. Buer
    • Mark L. Buer
    • G06F21/00
    • G06F21/52G06F21/72G06F2221/2153
    • A system and method for secure processing is provided, wherein a monitor application is injected into a secure application binary within the security perimeter of a secure processor. The components of the monitor application are injected into different portions of the application binary utilizing a seed value. In this manner, the positioning of the monitor application in the application binary is altered each time the application binary is booted. After the monitor application is inserted into the application binary, the secure process is passed to the host processor for execution. During execution of the secure process, a system and method is provided for the monitor application to communicate, to the secure processor, attempts to tamper with or attack the secure process.
    • 提供了一种用于安全处理的系统和方法,其中将监视器应用程序注入到安全处理器的安全边界内的安全应用二进制文件中。 使用种子值将监视器应用的组件注入应用二进制的不同部分。 以这种方式,每次应用程序二进制程序引导时,监视器应用程序在应用程序二进制文件中的定位都会发生更改。 将监视器应用程序插入应用程序二进制文件后,将安全进程传递给主机处理器执行。 在执行安全过程期间,提供了一种系统和方法,用于监视应用程序向安全处理器通信尝试篡改或攻击安全过程。
    • 7. 发明授权
    • System and method for control of security configurations
    • 用于控制安全配置的系统和方法
    • US08225087B2
    • 2012-07-17
    • US12275551
    • 2008-11-21
    • Mark L. Buer
    • Mark L. Buer
    • H04L29/06
    • G06F21/57
    • Systems and methods are disclosed for using cryptographic techniques to configure data processing systems. A configuration manager cryptographically controls the configuration of a system by ensuring that only authorized users or applications can change the configuration. For example, requests to change configuration information may include authenticated and/or encrypted data. These cryptographic techniques are employed to enable and/or disable functions, features and capabilities of a system. For example, a system may be reconfigured to provide strong or weak encryption based on parameters in the configuration information.
    • 公开了使用密码技术配置数据处理系统的系统和方法。 配置管理器通过确保只有授权的用户或应用程序可以更改配置来加密地控制系统的配置。 例如,改变配置信息的请求可以包括经认证和/或加密的数据。 采用这些加密技术来启用和/或禁用系统的功能,特征和能力。 例如,可以重新配置系统以基于配置信息中的参数来提供强或弱加密。