会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Tagging mechanism for data path security processing
    • 数据路径安全处理的标记机制
    • US09015467B2
    • 2015-04-21
    • US10728192
    • 2003-12-04
    • Mark L. BuerScott S. McDaniel
    • Mark L. BuerScott S. McDaniel
    • H04L29/06H04L29/12
    • H04L63/0485H04L29/06H04L29/12009H04L29/12839H04L61/6022H04L63/0853H04L63/123H04L69/16H04L69/161H04L69/22
    • Methods and associated systems are disclosed for providing secured data transmission over a data network. Data to be encrypted and encryption information may be sent to a security processor via a packet network so that the security processor may extract the encryption information and use it to encrypt the data. The encryption information may include flow information, security association and/or other cryptographic information, and/or one or more addresses associated with such information. The encryption information may consist of a tag in a header that is appended to packets to be encrypted before the packets are sent to the security processor. The packet and tag header may be encapsulated into an Ethernet packet and routed via an Ethernet connection to the security processor.
    • 公开了用于通过数据网络提供安全数据传输的方法和相关系统。 要加密的数据和加密信息可以经由分组网络发送到安全处理器,使得安全处理器可以提取加密信息并使用它来加密数据。 加密信息可以包括流信息,安全关联和/或其他加密信息,和/或与这些信息相关联的一个或多个地址。 加密信息可以包括在分组被发送到安全处理器之前附加到要加密的分组的报头中的标签。 分组和标签报头可以被封装成以太网分组,并且经由以太网连接路由到安全处理器。
    • 7. 发明授权
    • Hardware security for software processes
    • 软件过程的硬件安全
    • US08677482B2
    • 2014-03-18
    • US12723209
    • 2010-03-12
    • Mark L. Buer
    • Mark L. Buer
    • G06F21/00
    • G06F21/52G06F21/72G06F2221/2153
    • A system and method for secure processing is provided, wherein a monitor application is injected into a secure application binary within the security perimeter of a secure processor. The components of the monitor application are injected into different portions of the application binary utilizing a seed value. In this manner, the positioning of the monitor application in the application binary is altered each time the application binary is booted. After the monitor application is inserted into the application binary, the secure process is passed to the host processor for execution. During execution of the secure process, a system and method is provided for the monitor application to communicate, to the secure processor, attempts to tamper with or attack the secure process.
    • 提供了一种用于安全处理的系统和方法,其中将监视器应用程序注入到安全处理器的安全边界内的安全应用二进制文件中。 使用种子值将监视器应用的组件注入应用二进制的不同部分。 以这种方式,每次应用程序二进制程序引导时,监视器应用程序在应用程序二进制文件中的定位都会发生更改。 将监视器应用程序插入应用程序二进制文件后,将安全进程传递给主机处理器执行。 在执行安全过程期间,提供了一种系统和方法,用于监视应用程序向安全处理器通信尝试篡改或攻击安全过程。