会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 9. 发明申请
    • CRYPTOGRAPHIC KEY ATTACK MITIGATION
    • CRYPTOGRAPHIC KEY攻击缓解
    • US20120275596A1
    • 2012-11-01
    • US13097035
    • 2011-04-28
    • Octavian T. UrecheInnokentiy BasmovGrigory B. LyakhovitskiyStefan Thom
    • Octavian T. UrecheInnokentiy BasmovGrigory B. LyakhovitskiyStefan Thom
    • H04L9/14
    • G06F21/60H04L9/002H04L9/0822H04L9/0877H04L9/0897
    • Cryptographic keys and, subsequently, the data they are intended to protect, are safeguarded from unwarranted attacks utilizing various systems and methodologies designed to minimize the time period in which meaningful versions of cryptographic keys exist in accessible memory, and therefore, are vulnerable. Cryptographic keys, and consequently the data they are intended to protect, can alternatively, or also, be protected from attackers utilizing systems and a methodology that employs a removable storage device for providing authentication factors used in the encryption and decryption processing. Cryptographic keys and protected data can alternatively, or also, be protected with a system and methodology that supports data separation on the storage device(s) of a computing device. Cryptographic keys and the data they are intended to protect can alternatively, or also, be protected employing a system and methodology of virtual compartmentalization that effectively segregates key management from protected data.
    • 使用各种系统和方法来保护加密密钥以及随后保护的数据免受无理的攻击,这些系统和方法旨在最小化可访问存储器中存在有意义的密码密钥版本的时间段,因此易受攻击。 加密密钥以及因此它们旨在保护的数据可以替代地或也可以利用系统和使用可移动存储设备提供加密和解密处理中使用的认证因子的方法来防止攻击者。 加密密钥和受保护数据可以替代地或者也可以通过支持计算设备的存储设备上的数据分离的系统和方法进行保护。 可以使用虚拟分区的系统和方法来保护加密密钥及其旨在保护的数据,或者也可以使用有效地将密钥管理与受保护数据隔离的虚拟分区的方法进行保护。
    • 10. 发明授权
    • Use of software update policies
    • 使用软件更新策略
    • US08364598B2
    • 2013-01-29
    • US12578533
    • 2009-10-13
    • Innokentiy BasmovTroy A. FunkOctavian T. Ureche
    • Innokentiy BasmovTroy A. FunkOctavian T. Ureche
    • G06F21/00
    • G06F8/61G06F8/65G06F9/44505
    • A portable device may be roamed from one host to another. In one example, the portable device stores software that is to be executed by a host. The host may maintain a policy that governs which software may be executed on the host. When the portable device is connected to a host, the host checks the software version installed on the guest to determine whether that software version is compatible with the host's policy. If the guest's software does not comply with the host's policy, then the host installs a compatible version. If the guest's version complies with the policy and is newer than the host's version, then the host copies the guest's version to the host and propagates it to other guests. In this way, newer versions of software propagate between hosts and guests, while also respecting specific execution policies of the various hosts.
    • 便携式设备可以从一个主机漫游到另一个主机。 在一个示例中,便携式设备存储要由主机执行的软件。 主机可以维护一个管理可以在主机上执行哪个软件的策略。 当便携式设备连接到主机时,主机将检查安装在客户机上的软件版本,以确定该软件版本是否与主机策略兼容。 如果客人的软件不符合主机的策略,则主机将安装兼容版本。 如果客人的版本符合该策略,并且比主机版本更新,则主机会将客人的版本复制到主机,并将其传播给其他来宾。 这样,较新版本的软件在主机和客户端之间传播,同时也遵守各种主机的特定执行策略。