Providing user on computer operating system with full privileges token and limited privileges token
    21.
    发明申请
    Providing user on computer operating system with full privileges token and limited privileges token 有权
    在计算机操作系统上为用户提供完全权限令牌和有限权限令牌

    公开(公告)号:US20070005961A1

    公开(公告)日:2007-01-04

    申请号:US11171744

    申请日:2005-06-30

    摘要: An operating system for a computing device has a first session for a user that includes a first base process that has a first privileges token attached thereto. The first privileges token includes substantially a full set of privileges of the user on the operating system. The operating system also has a second session for the user that includes a second base process that has a second privileges token attached thereto. The second privileges token is derived from the first privileges token and includes only a minimum set of privileges of the user on the operating system. Thus, the second, limited token does not have all privileges associated with the first, full token but instead has a limited set of privileges and not extra privileges that could be employed to take actions that would be harmful, deceptive, or malicious.

    摘要翻译: 用于计算设备的操作系统具有用于用户的第一会话,所述第一会话包括具有连接到其的第一权限令牌的第一基本进程。 第一权限令牌在操作系统上基本上包括用户的一整套特权。 操作系统还具有用户的第二会话,其包括具有附加到其的第二权限令牌的第二基本进程。 第二个权限令牌是从第一个权限令牌导出的,并且仅包含操作系统上用户的一组最小权限。 因此,第二个有限令牌不具有与第一个完整令牌相关联的所有权限,而是具有一组有限的权限,而不是可以用于采取有害,欺骗性或恶意行为的额外权限。

    Secure boot
    22.
    发明申请
    Secure boot 审中-公开
    安全启动

    公开(公告)号:US20060236122A1

    公开(公告)日:2006-10-19

    申请号:US11106756

    申请日:2005-04-15

    IPC分类号: G06F12/14

    摘要: Systems and methods for performing integrity verifications for computer programs to run on computing systems are provided. An integrity check is completed before passing execution control to the next level of an operating system or before allowing a program to run. The integrity check involves the use of a locally stored key to determine if a program has been modified or tampered with prior to execution. If the check shows that the program has not been altered, the program will execute and, during the boot process, allow execution control to be transferred to the next level. If, however, the check confirms that the program has been modified, the computing system does not allow the program to run.

    摘要翻译: 提供了用于执行计算机程序在计算系统上运行的完整性校验的系统和方法。 在将执行控制传递到操作系统的下一个级别之前或允许程序运行之前,完整性检查完成。 完整性检查涉及使用本地存储的密钥来确定在执行之前程序是否被修改或篡改。 如果检查显示程序未被更改,则程序将执行,并且在引导过程中允许将执行控制转移到下一级。 但是,如果检查确认程序已被修改,则计算系统不允许程序运行。

    Vehicle Network Interface Tool
    23.
    发明申请

    公开(公告)号:US20180063098A1

    公开(公告)日:2018-03-01

    申请号:US15249670

    申请日:2016-08-29

    IPC分类号: H04L29/06 G06F21/60

    摘要: A vehicle network interface tool electrically connects a computing device to an electronic control unit of a motor vehicle. The vehicle network interface tool includes a vehicle communications port to receive vehicle network data from the electronic control unit of the motor vehicle. A crypto-processor decrypts the vehicle network data and creates computing device readable data. A main processor receives the computing device readable data and transmits it to a computing device port. A computing device port is in electrical communication with the main processor. The computing device receives the computing device readable data from said main processor and transmits the computing device readable data to the computing device for analysis. Being able to receive and decrypt encrypted data keeps the integrity of the ECU security preventing hacks to the ECU.

    Systems and methods for updating a secure boot process on a computer with a hardware security module
    24.
    发明授权
    Systems and methods for updating a secure boot process on a computer with a hardware security module 有权
    使用硬件安全模块在计算机上更新安全引导过程的系统和方法

    公开(公告)号:US08028172B2

    公开(公告)日:2011-09-27

    申请号:US11036018

    申请日:2005-01-14

    IPC分类号: H04L9/32

    CPC分类号: G06F21/575

    摘要: Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be maintained by inspecting a log of TPM activity, determining data that prevented a secret to unseal, and returning the data to an original state. In situations where this type of recovery is not workable, techniques for authenticating a user may be used, allowing the authenticated user to bypass the security features of the boot process and reseal the boot secrets to platform configuration register (PCR) values that may have changed. Finally, a secure boot process may be upgraded by migrating TPM sealed secrets to a temporary storage location, updating one or more aspects of a secure boot process, and resealing the secrets to the resulting new platform configuration. Other advantages and features of the invention are described below.

    摘要翻译: 提供了系统和方法,用于在具有可信平台模块(TPM)的计算机上维护和更新安全引导过程。 可以通过检查TPM活动的日志来确定启动过程,确定防止秘密解密的数据,并将数据返回到原始状态。 在这种类型的恢复不可行的情况下,可以使用用于验证用户的技术,允许经过身份验证的用户绕过引导过程的安全特征并将启动秘密重新密封到可能已经改变的平台配置寄存器(PCR)值 。 最后,可以通过将TPM密封的秘密迁移到临时存储位置来升级安全引导过程,更新安全引导过程的一个或多个方面,以及将密码重新密封到所得到的新平台配置。 下面描述本发明的其它优点和特征。

    Providing user on computer operating system with full privileges token and limited privileges token
    25.
    发明授权
    Providing user on computer operating system with full privileges token and limited privileges token 有权
    在计算机操作系统上为用户提供完全权限令牌和有限权限令牌

    公开(公告)号:US07636851B2

    公开(公告)日:2009-12-22

    申请号:US11171744

    申请日:2005-06-30

    IPC分类号: G06F21/00

    摘要: An operating system for a computing device has a first session for a user that includes a first base process that has a first privileges token attached thereto. The first privileges token includes substantially a full set of privileges of the user on the operating system. The operating system also has a second session for the user that includes a second base process that has a second privileges token attached thereto. The second privileges token is derived from the first privileges token and includes only a minimum set of privileges of the user on the operating system. Thus, the second, limited token does not have all privileges associated with the first, full token but instead has a limited set of privileges and not extra privileges that could be employed to take actions that would be harmful, deceptive, or malicious.

    摘要翻译: 用于计算设备的操作系统具有用于用户的第一会话,所述第一会话包括具有连接到其的第一权限令牌的第一基本进程。 第一权限令牌在操作系统上基本上包括用户的一整套特权。 操作系统还具有用户的第二会话,其包括具有附加到其的第二权限令牌的第二基本进程。 第二个权限令牌是从第一个权限令牌导出的,并且仅包含操作系统上用户的一组最小权限。 因此,第二个有限令牌不具有与第一个完整令牌相关联的所有权限,而是具有一组有限的权限,而不是可以用于采取有害,欺骗性或恶意行为的额外权限。

    Rights Elevator
    26.
    发明申请
    Rights Elevator 有权
    权利电梯

    公开(公告)号:US20060242422A1

    公开(公告)日:2006-10-26

    申请号:US11276715

    申请日:2006-03-10

    IPC分类号: H04L9/00

    CPC分类号: G06F21/6218

    摘要: Systems and/or methods are described that enable a user to elevate his or her rights. In one embodiment, these systems and/or methods detect a task which is not authorized for a user account. Responsive to detecting the task, the embodiment presents a different user account that is authorized to allow the task and information relating to the task.

    摘要翻译: 描述使用户能够提升他或她的权利的系统和/或方法。 在一个实施例中,这些系统和/或方法检测未被授权用于用户帐户的任务。 该实施例响应于检测任务,呈现出被授权允许与该任务相关的任务和信息的不同用户帐户。