会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Methods for cryptographic delegation and enforcement of dynamic access to stored data
    • 用于密码授权和强制实施对存储数据的动态访问的方法
    • US09559837B2
    • 2017-01-31
    • US14478998
    • 2014-09-05
    • Trustwave Holdings, Inc.
    • John Patrick McGregorMatthew N. White
    • H04L9/06G06F21/62H04L9/08H04L9/32H04L9/14
    • H04L9/0643G06F21/6227H04L9/0618H04L9/0836H04L9/0861H04L9/14H04L9/3242H04L2209/24
    • Efficient methods for assigning, revoking, and realizing access to stored data involve a cryptographic key hierarchy and a set of operations performed on cryptographic keys and performed on the data objects to be protected. In addition to providing confidentiality and integrity for data objects, the methods allow access to selected data objects to be permanently revoked for all entities without requiring all instances of the data objects to be destroyed or overwritten. The methods also support access right modifications for a data object without requiring the re-encryption of the entire data object; instead, certain keys are selectively re-encrypted and re-authenticated to implement access control changes. The key hierarchy is parameterized to enable flexible performance tuning, and to provide efficient random access, keying and other security operations are performed for individual blocks within a data object rather than only for the entire data object.
    • 用于分配,撤销和实现对存储数据的访问的有效方法涉及对密码密钥执行的加密密钥层次和一组操作,并对待保护的数据对象执行。 除了为数据对象提供机密性和完整性之外,该方法允许对所有实体永久撤销对所选数据对象的访问,而不需要销毁或重写数据对象的所有实例。 该方法还支持对数据对象的访问权限修改,而不需要对整个数据对象进行重新加密; 而是选择性地重新加密和重新认证某些密钥以实现访问控制改变。 密钥层次结构被参数化以实现灵活的性能调优,并为数据对象中的各个块而不是仅针对整个数据对象提供有效的随机访问,密钥和其他安全性操作。
    • 2. 发明授权
    • Method for accelerating security and management operations on data segments
    • 加快数据段安全管理操作的方法
    • US08677123B1
    • 2014-03-18
    • US11441613
    • 2006-05-26
    • John Patrick McGregor, Jr.Matthew N. White
    • John Patrick McGregor, Jr.Matthew N. White
    • H04L9/00
    • H04L9/00H03M7/30H04L2209/30
    • A method for improving the performance of data storage and transmission systems involves applying a transformation to one or a plurality of aligned data segment(s) prior to or subsequent to the execution of data management operations. The transformation effectively reduces the number of bits in the data segment that must be employed by the data management operation processing. Data management operations performed on a data segment may include but are not limited to cryptographic security operations and data comparison operations. Since the computation requirements of data management operations can decrease as the bit lengths of input data decrease, the transformation can reduce the latencies of data management operations in hardware or software. Furthermore, performing the transformation on a data segment does not reduce the number of bits needed to encode the data segment, thus maintaining the alignment of a plurality of data segments.
    • 一种用于改善数据存储和传输系统的性能的方法包括在数据管理操作执行之前或之后对一个或多个对齐的数据段应用变换。 该转换有效地减少了数据管理操作处理中必须采用的数据段中的位数。 对数据段执行的数据管理操作可以包括但不限于加密安全操作和数据比较操作。 由于数据管理操作的计算要求随着输入数据的位长度的减少而减少,因此转换可以减少硬件或软件中数据管理操作的延迟。 此外,对数据段执行变换不会减少编码数据段所需的位数,从而保持多个数据段的对准。
    • 8. 发明授权
    • System and method for managing network communications
    • 用于管理网络通信的系统和方法
    • US08819285B1
    • 2014-08-26
    • US10749718
    • 2003-12-31
    • Mark L. WilkinsonRonald J. MillerMichael J. McDaniels
    • Mark L. WilkinsonRonald J. MillerMichael J. McDaniels
    • G06F15/16
    • H04L63/0263H04L61/103H04L61/6009H04L63/1441
    • The invention relates to managing network communications packets on a local segment of a network. If an attack on the network segment is detected, the system creates one or more synthetic hardware addresses for substitution with existing hardware address. If this substitution is maintained in address resolution tables, packets sent to or from an attacker may be monitored, managed, dropped, or responded to in a controlled manner while preventing communication with sensitive devices on the local network segment. If a permissible packet is sent to the synthetic hardware address, the packet may be reformulated by a server, workstation, smart router, or security device, among others and sent with the appropriate hardware address. The synthetic hardware address may be a hardware address not associated with a device on the local network segment. For example, the synthetic hardware address may be synthetic MAC address.
    • 本发明涉及在网络的本地分段上管理网络通信分组。 如果检测到对网段的攻击,则系统创建一个或多个合成硬件地址以替代现有的硬件地址。 如果在地址解析表中维护这种替换,那么发送到攻击者或从攻击者发送的数据包可能受到监控,管理,丢弃或以受控的方式响应,同时防止与本地网段上的敏感设备进行通信。 如果允许的分组被发送到合成硬件地址,则分组可以由服务器,工作站,智能路由器或安全设备等重新配置,并且以适当的硬件地址发送。 合成硬件地址可以是与本地网段上的设备无关的硬件地址。 例如,合成硬件地址可以是合成MAC地址。