会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Individualized per device initialization of computing devices in avoidance of mass exploitation of vulnerabilities
    • 个性化每个设备初始化计算设备以避免大规模利用漏洞
    • US08661234B2
    • 2014-02-25
    • US12023828
    • 2008-01-31
    • Sebastian LangeAdam Gabriel PoulosVictor Tan
    • Sebastian LangeAdam Gabriel PoulosVictor Tan
    • G06F9/00
    • G06F21/79G06F2221/2113
    • An individualized per device initialization of a computing device is unique relative to the initialization of other computing devices. A common initialization program, common to all computing devices of a particular type such as a game console, may be modified to be unique for each computing device. Modification may comprise the application of at least one individualized per device secret, e.g., key, to at least a portion of the common initialization program such as at least one initialization stage. Initialization is tied to one or more device specific identities. In this way, initialization vulnerabilities discovered on a particular device cannot be exploited en masse on other computing devices because each initialization program stored in each computing device is unique. The device specific nature of the initialization program may be extended to other information input to the computing device in order to prevent unauthorized sharing of information with other computing devices.
    • 相对于其他计算设备的初始化,计算设备的每个设备的个性化初始化是唯一的。 对于诸如游戏控制台的特定类型的所有计算设备通用的公共初始化程序可以被修改为对于每个计算设备是唯一的。 修改可以包括至少一个个体化的每个设备秘密(例如密钥)应用于公共初始化程序的至少一部分,例如至少一个初始化阶段。 初始化与一个或多个设备特定身份相关联。 以这种方式,在特定设备上发现的初始化漏洞不能在其他计算设备上被大量利用,因为存储在每个计算设备中的每个初始化程序是唯一的。 可以将初始化程序的设备特定性质扩展到输入到计算设备的其他信息,以防止与其他计算设备的未经授权的信息共享。
    • 2. 发明申请
    • One time settable tamper resistant software repository
    • 一次可设置的防篡改软件库
    • US20090199018A1
    • 2009-08-06
    • US12023828
    • 2008-01-31
    • Sebastian LangeAdam Gabriel PoulosVictor Tan
    • Sebastian LangeAdam Gabriel PoulosVictor Tan
    • G06F12/14
    • G06F21/79G06F2221/2113
    • An individualized per device initialization of a computing device is unique relative to the initialization of other computing devices. A common initialization program, common to all computing devices of a particular type such as a game console, may be modified to be unique for each computing device. Modification may comprise the application of at least one individualized per device secret, e.g., key, to at least a portion of the common initialization program such as at least one initialization stage. Initialization is tied to one or more device specific identities. In this way, initialization vulnerabilities discovered on a particular device cannot be exploited en masse on other computing devices because each initialization program stored in each computing device is unique. The device specific nature of the initialization program may be extended to other information input to the computing device in order to prevent unauthorized sharing of information with other computing devices.
    • 相对于其他计算设备的初始化,计算设备的每个设备的个性化初始化是唯一的。 对于诸如游戏控制台的特定类型的所有计算设备通用的公共初始化程序可以被修改为对于每个计算设备是唯一的。 修改可以包括至少一个个体化的每个设备秘密(例如密钥)应用于公共初始化程序的至少一部分,例如至少一个初始化阶段。 初始化与一个或多个设备特定身份相关联。 以这种方式,在特定设备上发现的初始化漏洞不能在其他计算设备上被大量利用,因为存储在每个计算设备中的每个初始化程序是唯一的。 可以将初始化程序的设备特定性质扩展到输入到计算设备的其他信息,以防止与其他计算设备的未经授权的信息共享。
    • 3. 发明授权
    • One time settable tamper resistant software repository
    • 一次可设置的防篡改软件库
    • US08656190B2
    • 2014-02-18
    • US12023614
    • 2008-01-31
    • Sebastian LangeAdam Gabriel PoulosVictor Tan
    • Sebastian LangeAdam Gabriel PoulosVictor Tan
    • G06F11/30
    • G06F21/79G06F12/1491G06F2221/2113
    • A one-time-settable tamper resistant software repository may be used in any computing system to store system information such as security violations and policies for responding to them. A one-time-settable tamper resistant software repository may be cryptographically signed, encrypted with a per device key and accessible by only the most privileged software executed by a computing device, e.g., hypervisor or operating system kernel. A one-time-settable tamper resistant software repository may be mirrored in RAM for performance. Recordable event fields in a software repository may be one-time-settable without the ability to reset them in a field operation mode whereas they may be resettable in a different mode such as a manufacturing mode. Memory allocated to a one-time-settable tamper resistant software repository may be reset, reclaimed, reassigned, scaled and otherwise flexibly adapted to changing conditions and priorities in the lifespan of a computing device, which may be particularly useful for service-backed consumer devices.
    • 可以在任何计算系统中使用一次性设置的防篡改软件存储库来存储系统信息,例如安全违规和用于对其进行响应的策略。 一次性设置的防篡改软件存储库可以被加密地签名,用每个设备密钥加密,并且只能由计算设备(例如,管理程序或操作系统内核)执行的最特权的软件访问。 一次性设置的防篡改软件存储库可以镜像到RAM中以实现性能。 软件仓库中的可记录事件字段可以是一次性设置的,而无需在现场操作模式下复位它们,而它们可以以诸如制造模式的不同模式被重置。 分配给一次性可设置的防篡改软件存储库的内存可以被重置,回收,重新分配,缩放以及其他灵活地适应于在计算设备的寿命内的变化的条件和优先级,其可能对于服务支持的消费者设备特别有用 。
    • 4. 发明申请
    • ONE TIME SETTABLE TAMPER RESISTANT SOFTWARE REPOSITORY
    • 一次性防篡改软件报告
    • US20090199017A1
    • 2009-08-06
    • US12023614
    • 2008-01-31
    • Sebastian LangeAdam Gabriel PoulosVictor Tan
    • Sebastian LangeAdam Gabriel PoulosVictor Tan
    • G06F12/14
    • G06F21/79G06F12/1491G06F2221/2113
    • A one-time-settable tamper resistant software repository may be used in any computing system to store system information such as security violations and policies for responding to them. A one-time-settable tamper resistant software repository may be cryptographically signed, encrypted with a per device key and accessible by only the most privileged software executed by a computing device, e.g., hypervisor or operating system kernel. A one-time-settable tamper resistant software repository may be mirrored in RAM for performance. Recordable event fields in a software repository may be one-time-settable without the ability to reset them in a field operation mode whereas they may be resettable in a different mode such as a manufacturing mode. Memory allocated to a one-time-settable tamper resistant software repository may be reset, reclaimed, reassigned, scaled and otherwise flexibly adapted to changing conditions and priorities in the lifespan of a computing device, which may be particularly useful for service-backed consumer devices.
    • 可以在任何计算系统中使用一次性设置的防篡改软件存储库来存储系统信息,例如安全违规和用于对其进行响应的策略。 一次性设置的防篡改软件存储库可以被加密地签名,用每个设备密钥加密,并且只能由计算设备(例如,管理程序或操作系统内核)执行的最特权的软件访问。 一次性设置的防篡改软件存储库可以镜像到RAM中以实现性能。 软件仓库中的可记录事件字段可以是一次性设置的,而无需在现场操作模式下复位它们,而它们可以以诸如制造模式的不同模式被重置。 分配给一次性可设置的防篡改软件存储库的内存可以被重置,回收,重新分配,缩放以及其他灵活地适应于在计算设备的寿命内的变化的条件和优先级,其可能对于服务支持的消费者设备特别有用 。
    • 7. 发明授权
    • Prevention of exploitation of update rollback
    • 防止更新回滚的利用
    • US08756694B2
    • 2014-06-17
    • US11731817
    • 2007-03-30
    • Stephane G. PlanteAdam Gabriel Poulos
    • Stephane G. PlanteAdam Gabriel Poulos
    • H04L29/06
    • H04L63/1441G06F8/65G06F21/629G06F2221/2105G06F2221/2109G06F2221/2129G06F2221/2147H04L63/123
    • The exploitation of rolling back a system configuration to a previous system configuration is prevented by querying the update status of the system and comparing the received response with an expected response. If the comparison indicates that the update version of the system is older than the expected update version, the system is determined to have been rolled back. Accordingly, appropriate action is taken, such as sending a warning to the system, stopping the system from operating, disabling selected features, disconnecting the system from a network, banning the system from future connections to the network, and/or installing an update. The query can include a request for update version numbers of updates, times when updates were applied, predetermined questions, and an indication of the system (e.g., machine serial number, unique ID value).
    • 通过查询系统的更新状态并将接收到的响应与预期响应进行比较来防止将系统配置回滚到先前系统配置的利用。 如果比较表明系统的更新版本比预期的更新版本更早,则系统确定已经回滚。 因此,采取适当的措施,例如向系统发出警告,停止系统运行,禁用所选功能,断开系统与网络的连接,禁止系统与将来连接到网络和/或安装更新。 该查询可以包括更新更新版本号,应用更新时间,预定问题和系统指示(例如,机器序列号,唯一ID值)的请求。