会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Invoking externally assisted calls from an isolated environment
    • 从孤立的环境调用外部辅助呼叫
    • US07934063B2
    • 2011-04-26
    • US11693406
    • 2007-03-29
    • Masana MuraseWilfred E. Plouffe, Jr.Masaharu SakamotoKanna ShimizuVladimir Zbarsky
    • Masana MuraseWilfred E. Plouffe, Jr.Masaharu SakamotoKanna ShimizuVladimir Zbarsky
    • G06F13/28
    • G06F9/544
    • A method of invoking power processor element (PPE) serviced C library functions on a synergistic processing element (SPE) running in isolated mode. When the SPE initiates a PPE-serviced function, an SPE stub routine allocates a parameter buffer in an open area of a local store (LS) memory within the SPE. The LS memory includes an open area accessible to the PPE, and an isolated area inaccessible to the PPE. The SPE stub routine copies function parameters corresponding to the PPE-serviced function to a buffer within the open area of the LS memory, and writes a message word, which contains an identification variable of the PPE-serviced function and a location variable of the function parameters, to the open area. When execution is temporarily suspended on the SPE, the PPE reads the message word from the open area of the LS memory and executes the PPE-serviced function.
    • 一种在隔离模式下运行的协同处理元件(SPE)上调用功率处理器元件(PPE)服务C库函数的方法。 当SPE启动PPE服务功能时,SPE stub例程在SPE内的本地存储(LS)存储器的打开区域中分配参数缓冲区。 LS存储器包括PPE可访问的开放区域和PPE无法访问的隔离区域。 SPE存根例程将对应于PPE服务功能的功能参数复制到LS存储器的开放区域内的缓冲区,并写入一个消息字,其中包含PPE服务功能的标识变量和功能的位置变量 参数,到开放区域。 当执行暂停在SPE上时,PPE从LS存储器的打开区域读取消息字,并执行PPE服务功能。
    • 3. 发明申请
    • Cryptographic Secure Program Overlays
    • 密码安全程序覆盖
    • US20080301468A1
    • 2008-12-04
    • US11754649
    • 2007-05-29
    • Masana MuraseWilfred E. Plouffe, JR.Kanna ShimizuMasaharu SakamotoVladimir Zbarsky
    • Masana MuraseWilfred E. Plouffe, JR.Kanna ShimizuMasaharu SakamotoVladimir Zbarsky
    • G06F12/14
    • G06F12/1458G06F21/52G06F21/575G06F21/79G06F2221/2143
    • A method, computer program product, and data processing system for executing larger-than-physical-memory applications while protecting sensitive program code (and also data) from unauthorized access in a memory space not subject to protection fault or page fault detection are disclosed. Large applications are accommodated by providing a mechanism for secure program overlays, in which a single large application is broken into two or more smaller applications (overlays) that can be executed from the same memory space by overwriting one of the smaller applications with another of the smaller applications when the latter needs to be executed. So that the data may be shared among these smaller applications, each of the applications contains embedded cryptographic keys, which may be used to encrypt or decrypt information to be stored persistently while control is transferred from one application to the other.
    • 公开了一种用于执行大于物理存储器应用的方法,计算机程序产品和数据处理系统,同时在不受保护故障或页面故障检测的存储器空间中保护敏感程序代码(以及数据)以防未经授权的访问。 通过提供用于安全程序覆盖的机制来容纳大的应用程序,其中单个大型应用程序被分解成可以从相同存储器空间执行的两个或更多个更小的应用程序(覆盖层),通过用另一个 较小的应用程序,当后者需要执行。 为了使数据可以在这些较小的应用程序之间共享,每个应用程序都包含嵌入式加密密钥,这些密钥可用于加密或解密持续存储的信息,同时控制从一个应用程序传输到另一个应用程序。
    • 5. 发明授权
    • Application-specific secret generation
    • 特定于应用程序的秘密生成
    • US08422674B2
    • 2013-04-16
    • US11754667
    • 2007-05-29
    • Masana MuraseWilfred E. Plouffe, Jr.Kanna ShimizuVladimir Zbarsky
    • Masana MuraseWilfred E. Plouffe, Jr.Kanna ShimizuVladimir Zbarsky
    • H04L9/00H04L29/06H04L9/28G06F9/24G06F12/14G06F7/04G08B29/00H04K1/00
    • G06F21/52
    • A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access. Dedicated hardware decrypts an encrypted kernel into memory for execution. When an application is to be executed, the kernel computes one or more secrets by cryptographically combining information contained in the application with secret information contained in the kernel itself. The kernel then deletes its secret information and passes the computed secrets to the application. To store data persistently in memory, the application uses one of the computed secrets to encrypt the data prior to storage. If the kernel starts another instance of the same application, the kernel (which will have been re-decrypted to restore the kernel's secrets) will compute the same one or more secrets, thus allowing the second application instance to access the data encrypted by the first application instance.
    • 一种用于保护敏感程序代码和数据(包括永久存储的数据)的未经授权的访问的方法,计算机程序产品和数据处理系统。 专用硬件将加密的内核解密为内存以供执行。 当应用程序被执行时,内核通过将应用程序中包含的信息加密地组合在内核中包含的秘密信息来计算一个或多个秘密。 内核然后删除其秘密信息,并将计算的秘密传递给应用程序。 为了将数据永久存储在内存中,应用程序使用计算的秘密之一在存储之前对数据进行加密。 如果内核启动同一应用程序的另一个实例,内核(将被重新解密以恢复内核的秘密)将计算相同的一个或多个秘密,从而允许第二个应用程序实例访问由第一个 应用程序实例。
    • 6. 发明申请
    • Application-Specific Secret Generation
    • 特定应用程序的秘密生成
    • US20080298581A1
    • 2008-12-04
    • US11754667
    • 2007-05-29
    • Masana MuraseWilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • Masana MuraseWilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • H04L9/00
    • G06F21/52
    • A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access are disclosed. Dedicated hardware decrypts an encrypted kernel into memory for execution. When an application is to be executed, the kernel computes one or more secrets by cryptographically combining information contained in the application with secret information contained in the kernel itself. The kernel then deletes its secret information and passes the computed secrets to the application. To store data persistently in memory, the application uses one of the computed secrets to encrypt the data prior to storage. If the kernel starts another instance of the same application, the kernel (which will have been re-decrypted to restore the kernel's secrets) will compute the same one or more secrets, thus allowing the second application instance to access the data encrypted by the first application instance.
    • 公开了一种用于保护敏感程序代码和数据(包括永久存储的数据)从未经授权的访问的方法,计算机程序产品和数据处理系统。 专用硬件将加密的内核解密为内存以供执行。 当应用程序被执行时,内核通过将应用程序中包含的信息加密地组合在内核中包含的秘密信息来计算一个或多个秘密。 内核然后删除其秘密信息,并将计算的秘密传递给应用程序。 为了将数据永久存储在内存中,应用程序使用计算的秘密之一在存储之前对数据进行加密。 如果内核启动同一应用程序的另一个实例,内核(将被重新解密以恢复内核的秘密)将计算相同的一个或多个秘密,从而允许第二个应用程序实例访问由第一个 应用程序实例。
    • 7. 发明申请
    • Support for Multiple Security Policies on a Unified Authentication Architecture
    • 支持统一认证体系结构中的多个安全策略
    • US20090086974A1
    • 2009-04-02
    • US11866020
    • 2007-10-02
    • Masana MuraseWilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • Masana MuraseWilfred E. Plouffe, JR.Kanna ShimizuVladimir Zbarsky
    • H04L9/30H04L9/32
    • H04L9/3247G06F21/51H04L9/0836H04L2209/56
    • A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate only from trusted sources are disclosed. In a preferred embodiment, a secure operating kernel maintains a “key ring” containing keys corresponding to trusted software vendors. The secure kernel uses vendor keys to verify that a given application was signed by an approved vendor. To make it possible for independent developers to develop software for the herein-described platform, a “global key pair” is provided in which both the public and private keys of the pair are publicly known, so that anyone may sign an application with the global key. Such an application may be allowed to execute by including the global key pair's public key in the key ring as a “vendor key” or, conversely, it may be disallowed by excluding the global public key from the key ring.
    • 公开了一种方法,计算机程序产品和数据处理系统,用于确保在数据处理系统中执行的应用仅来自可信源。 在优选实施例中,安全操作内核维护包含与可信软件供应商对应的密钥的“密钥环”。 安全内核使用供应商密钥来验证给定的应用程序是否由经过批准的供应商签名。 为了使独立开发人员能够为本文所述的平台开发软件,提供了一种“全局密钥对”,其中该对的公钥和私钥都是公知的,以便任何人可以使用全局 键。 可以通过将密钥环中的全局密钥对的公钥作为“供应商密钥”来包括全局密钥对的公钥来执行这样的应用,或者相反地,可以通过从密钥环中排除全局公钥来实现。
    • 8. 发明授权
    • Support for multiple security policies on a unified authentication architecture
    • 支持统一认证架构上的多个安全策略
    • US08166304B2
    • 2012-04-24
    • US11866020
    • 2007-10-02
    • Masana MuraseWilfred E. Plouffe, Jr.Kanna ShimizuVladimir Zbarsky
    • Masana MuraseWilfred E. Plouffe, Jr.Kanna ShimizuVladimir Zbarsky
    • G06F21/00
    • H04L9/3247G06F21/51H04L9/0836H04L2209/56
    • A method, computer program product, and data processing system are disclosed for ensuring that applications executed in the data processing system originate only from trusted sources are disclosed. In a preferred embodiment, a secure operating kernel maintains a “key ring” containing keys corresponding to trusted software vendors. The secure kernel uses vendor keys to verify that a given application was signed by an approved vendor. To make it possible for independent developers to develop software for the herein-described platform, a “global key pair” is provided in which both the public and private keys of the pair are publicly known, so that anyone may sign an application with the global key. Such an application may be allowed to execute by including the global key pair's public key in the key ring as a “vendor key” or, conversely, it may be disallowed by excluding the global public key from the key ring.
    • 公开了一种方法,计算机程序产品和数据处理系统,用于确保在数据处理系统中执行的应用仅来自可信源。 在优选实施例中,安全操作内核维护包含与可信软件供应商对应的密钥的“密钥环”。 安全内核使用供应商密钥来验证给定的应用程序是否由经过批准的供应商签名。 为了使独立开发人员能够为本文描述的平台开发软件,提供了一个“全局密钥对”,其中该对的公钥和私钥都是公知的,以便任何人都可以使用全局 键。 可以通过将密钥环中的全局密钥对的公钥作为“供应商密钥”来包括全局密钥对的公钥来执行这样的应用,或者相反地,可以通过从密钥环中排除全局公钥来实现。