Method and apparatus for multiple inclusion offsets for security protocols
    21.
    发明申请
    Method and apparatus for multiple inclusion offsets for security protocols 审中-公开
    用于安全协议的多重包含偏移的方法和装置

    公开(公告)号:US20080022388A1

    公开(公告)日:2008-01-24

    申请号:US11478986

    申请日:2006-06-30

    IPC分类号: G06F15/16

    CPC分类号: H04L63/105

    摘要: A method and apparatus to define multiple zones in a data packet for inclusion in processing by security operations of a security protocol. In one embodiment, each defined zone has an associated list of security operations to which the zone is subjected. In another embodiment, the list of security operations for a zone includes parameters to be passed when performing the security operations on the zone.

    摘要翻译: 一种在数据分组中定义多个区域以包括在安全协议的安全操作的处理中的方法和装置。 在一个实施例中,每个定义的区域具有该区域经受的安全操作的关联列表。 在另一个实施例中,区域的安全操作的列表包括在区域上执行安全操作时要传递的参数。

    Using sequestered memory for host software communications
    22.
    发明申请
    Using sequestered memory for host software communications 审中-公开
    使用隔离存储器进行主机软件通信

    公开(公告)号:US20070088857A1

    公开(公告)日:2007-04-19

    申请号:US11241333

    申请日:2005-09-30

    IPC分类号: G06F3/00

    CPC分类号: G06F21/53 G06F21/556

    摘要: Host software, such as device drivers, may be able to communicate through a platform interface with one another and with adjunct processors. This interface may be provided by enabling such communications to be snooped and then directed through an adjunct or service processor to sequestered memory locations. The sequestered memory locations may be associated with status registers to announce the availability of information transfers. In addition, the sequestered memory may be made relatively invisible to components running on the host system.

    摘要翻译: 诸如设备驱动程序的主机软件可能能够通过平台接口彼此进行通信,并且可以与辅助处理器进行通信。 可以通过使这种通信被窥探,然后通过附件或服务处理器引导到隔离的存储器位置来提供该接口。 隔离存储器位置可以与状态寄存器相关联,以宣布信息传输的可用性。 此外,隔离存储器可以对于在主机系统上运行的组件相对不可见。

    Systems and methods for secure host resource management
    23.
    发明申请
    Systems and methods for secure host resource management 有权
    用于安全主机资源管理的系统和方法

    公开(公告)号:US20070006236A1

    公开(公告)日:2007-01-04

    申请号:US11173885

    申请日:2005-06-30

    IPC分类号: G06F9/46 G06F9/44

    CPC分类号: G06F12/0866 G06F13/387

    摘要: Systems and methods are described herein to provide for secure host resource management on a computing device. Other embodiments include apparatus and system for management of one or more host device drivers from an isolated execution environment. Further embodiments include methods for querying and receiving event data from manageable resources on a host device. Further embodiments include data structures for the reporting of event data from one or more host device drivers to one or more capability modules.

    摘要翻译: 这里描述了系统和方法来提供计算设备上的安全的主机资源管理。 其他实施例包括用于从隔离执行环境管理一个或多个主机设备驱动器的装置和系统。 另外的实施例包括用于从主机设备上的可管理资源查询和接收事件数据的方法。 另外的实施例包括用于将事件数据从一个或多个主机设备驱动程序报告给一个或多个能力模块的数据结构。

    Method and apparatus for securing and validating paged memory system
    24.
    发明申请
    Method and apparatus for securing and validating paged memory system 审中-公开
    用于保护和验证分页存储系统的方法和装置

    公开(公告)号:US20070005935A1

    公开(公告)日:2007-01-04

    申请号:US11173301

    申请日:2005-06-30

    IPC分类号: G06F12/00

    摘要: A service processor monitors the state of a physical memory and a virtual memory support circuit of a host processor. A second memory, accessible only to the service processor, stores information to permit the service processor to detect changes to pages of the physical memory. Other similar apparatus, and methods to use such apparatus, are described and claimed.

    摘要翻译: 服务处理器监视主机处理器的物理存储器和虚拟存储器支持电路的状态。 只能由服务处理器访问的第二存储器存储信息以允许服务处理器检测对物理存储器的页面的改变。 描述和要求保护其它类似的装置和使用这种装置的方法。

    Methods and apparatus for detecting patterns in a data stream
    27.
    发明申请
    Methods and apparatus for detecting patterns in a data stream 有权
    用于检测数据流中的模式的方法和装置

    公开(公告)号:US20050135380A1

    公开(公告)日:2005-06-23

    申请号:US10744709

    申请日:2003-12-23

    CPC分类号: H04L63/1441 G06F17/2705

    摘要: In some embodiments, a method includes generating a prefix trie for a set of patterns, generating a suffix trie for the set of patterns, and establishing respective links between nodes of the prefix trie and respective corresponding nodes of the suffix trie. In some embodiments, a method includes adding a suffix to a suffix tree, so that the suffix (which is at least a portion of a pattern) is represented in the tree by a path that begins at a first node and ends at a second node, and associating with at least the first node and the second node a pattern identifier that identifies the pattern.

    摘要翻译: 在一些实施例中,一种方法包括为一组模式生成前缀特里,为该模式集合生成后缀特里,以及在前缀特里的节点和后缀特里的相应对应节点之间建立相应的链接。 在一些实施例中,一种方法包括向后缀树添加后缀,使得后缀(其是模式的至少一部分)在树中由在第一节点开始并在第二节点结束的路径来表示 并且至少与第一节点和第二节点相关联的是识别模式的模式标识符。

    Full 3D interaction on mobile devices
    28.
    发明授权
    Full 3D interaction on mobile devices 有权
    在移动设备上进行全3D互动

    公开(公告)号:US09335888B2

    公开(公告)日:2016-05-10

    申请号:US13996088

    申请日:2011-12-27

    摘要: Systems and methods may provide for displaying a three-dimensional (3D) environment on a screen of a mobile device, and identifying a user interaction with an area behind the mobile device. In addition, the 3D environment can be modified based at least in part on the first user interaction. Moreover, the 3D environment may be modified based on movements of the mobile device as well as user interactions with the mobile device, allowing the user to navigate through the virtual 3D environment by moving the mobile/handheld device.

    摘要翻译: 系统和方法可以提供在移动设备的屏幕上显示三维(3D)环境,并且识别与移动设备后面区域的用户交互。 另外,可以至少部分地基于第一用户交互来修改3D环境。 此外,可以基于移动设备的移动以及用户与移动设备的交互来修改3D环境,从而允许用户通过移动移动/手持设备在虚拟3D环境中导航。

    Detection and reporting of virtualization malware in computer processor environments
    30.
    发明授权
    Detection and reporting of virtualization malware in computer processor environments 有权
    在计算机处理器环境中检测和报告虚拟化恶意软件

    公开(公告)号:US08417945B2

    公开(公告)日:2013-04-09

    申请号:US12165155

    申请日:2008-06-30

    IPC分类号: H04L29/06

    摘要: Methods and systems to detect virtualization of computer system resources, such as by malware, include methods and systems to evaluate information corresponding to a computer processor operating environment, outside of or secure from the operating environment, which may include one or more of a system management mode of operation and a management controller system. Information may include processor register values. Information may be obtained from within the operating environment, such as with a host application running within the operating environment. Information may be obtained outside of the operating environment, such as from a system state map. Information obtained from within the operating environment may be compared to corresponding information obtained outside of the operating environment. Direct memory address (DMA) translation information may be used to determine whether an operating environment is remapping DMA accesses. Page tables, interrupt tables, and segmentation tables may be used to reconstruct a view of linear memory corresponding to the operating environment, which may be scanned for malware or authorized code and data.

    摘要翻译: 检测诸如恶意软件的计算机系统资源的虚拟化的方法和系统包括评估与操作环境之外或安全的操作环境相对应的计算机处理器操作环境的信息的方法和系统,其可以包括一个或多个系统管理 操作模式和管理控制器系统。 信息可能包括处理器寄存器值。 可以在操作环境内获得信息,例如在操作环境中运行的主机应用程序。 信息可以在操作环境之外获取,例如从系统状态图。 从操作环境中获取的信息可以与在操作环境之外获得的相应信息进行比较。 可以使用直接存储器地址(DMA)转换信息来确定操作环境是否重映射DMA访问。 页表,中断表和分段表可以用于重构与操作环境相对应的线性存储器的视图,其可以扫描恶意软件或授权的代码和数据。