Control flow integrity
    41.
    发明申请
    Control flow integrity 审中-公开
    控制流程完整性

    公开(公告)号:US20130024676A1

    公开(公告)日:2013-01-24

    申请号:US13136024

    申请日:2011-07-19

    Abstract: In at least some embodiments, a processor in accordance with the present disclosure is operable to enforce control flow integrity. For examiner, a processor may comprise logic operable to execute a control flow integrity instruction specified to verify changes in control flow and respond to verification failure by at least one of a trap or an exception.

    Abstract translation: 在至少一些实施例中,根据本公开的处理器可操作以执行控制流完整性。 对于检查者,处理器可以包括可操作以执行指定用于验证控制流程中的变化并且通过陷阱或异常中的至少一个来响应验证失败的控制流完整性指令的逻辑。

    Processor configured to allocate resources using an entitlement vector
    44.
    发明授权
    Processor configured to allocate resources using an entitlement vector 有权
    配置为使用授权向量分配资源的处理器

    公开(公告)号:US09098608B2

    公开(公告)日:2015-08-04

    申请号:US13317834

    申请日:2011-10-28

    Abstract: An embodiment or embodiments of an information handling apparatus are adapted to facilitate resource allocation using an entitlement vector comprising multiple fields that are respectively directed to multiple different resources or capabilities. In illustrative embodiments, an information handling apparatus can comprise an entitlement vector configured with a plurality of bit fields at least partly corresponding to a plurality of resources and operable to specify the resources used by at least one object of a plurality of a plurality of objects. The information handling apparatus can further comprise logic operable to allocate the resources to the at least one object based on entitlement as specified by the entitlement vector.

    Abstract translation: 信息处理装置的实施例或实施例适于使用包括分别针对多个不同资源或能力的多个字段的授权向量促进资源分配。 在说明性实施例中,信息处理设备可以包括配置有至少部分对应于多个资源的多个位域的授权向量,并且可操作以指定由多个对象中的至少一个对象使用的资源。 信息处理装置还可以包括可操作以基于授权向量所指定的授权将资源分配给至少一个对象的逻辑。

    Relationship Based Trust Verification Schema
    48.
    发明申请
    Relationship Based Trust Verification Schema 审中-公开
    基于关系的信任验证模式

    公开(公告)号:US20130133054A1

    公开(公告)日:2013-05-23

    申请号:US13552502

    申请日:2012-07-18

    CPC classification number: G06F21/316

    Abstract: A computationally-implemented method, in accordance with certain example embodiments, may include, but is not limited to: receiving at a computer device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computer device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computer device a decision associated with the authentication request, the decision based at least partially on a trust verification schema generated from a relational mapping of the one or more behavioral fingerprints associated with the one or more network accessible users. In addition to the foregoing, other aspects are presented in the claims, drawings, and written description forming a part of the present disclosure.

    Abstract translation: 根据某些示例实施例的计算实现的方法可以包括但不限于:在计算机设备处接收与一个或多个网络可访问用户相关联的一个或多个行为指纹; 在所述计算机设备处接收认证请求,所述认证请求与所述一个或多个网络可访问用户的一个或多个所提议的事务相关联; 以及从所述计算机设备发送与所述认证请求相关联的决定,所述决定至少部分地基于从与所述一个或多个网络可访问用户相关联的所述一个或多个行为指纹的关系映射生成的信任验证模式。 除了上述之外,其他方面在形成本公开的一部分的权利要求书,附图和书面描述中给出。

Patent Agency Ranking