BRANCH TARGET COMPUTATION
    1.
    发明申请
    BRANCH TARGET COMPUTATION 审中-公开
    分支目标计算

    公开(公告)号:US20130205124A1

    公开(公告)日:2013-08-08

    申请号:US13366721

    申请日:2012-02-06

    Applicant: Victor Tan

    Inventor: Victor Tan

    Abstract: Embodiments related to conducting and constructing a secure start-up process are disclosed, One embodiment provides, on a computing device, a method of conducting a secure start-up process. The method comprises recognizing the branch instruction, and, in response, calculating an integrity datum of a data segment. The method further comprises obtaining an adjustment datum, and computing a branch target address based on the integrity datum and the adjustment datum.

    Abstract translation: 公开了涉及进行和构建安全启动过程的实施例。一个实施例在计算设备上提供进行安全启动过程的方法。 该方法包括识别分支指令,并且作为响应,计算数据段的完整性数据。 该方法还包括获得调整数据,以及基于完整性数据和调整数据计算分支目标地址。

    COMPOSITING DESKTOP WINDOW MANAGER
    2.
    发明申请
    COMPOSITING DESKTOP WINDOW MANAGER 失效
    组合桌面窗口管理器

    公开(公告)号:US20110072391A1

    公开(公告)日:2011-03-24

    申请号:US12940514

    申请日:2010-11-05

    CPC classification number: G06F3/0481 G06F9/451 G06F2203/04804

    Abstract: A method and system for rendering a desktop on a computer using a composited desktop model operating system are disclosed. A composited desktop window manager, upon receiving content information from application programs, draws the window to a buffer memory for future reference, and takes advantage of advanced graphics hardware and visual effects to render windows based on content on which they are drawn. The windows may also be rendered based on environment variables including virtual light sources. The frame portion of each window may be generated by pixel shading a bitmap having the appearance of frosted glass based on the content of the desktop on top of which the frame is displayed. Legacy support is provided so that the operating system can draw and render windows generated by legacy applications to look consistent with non-legacy application windows.

    Abstract translation: 公开了一种使用合成桌面模型操作系统在计算机上呈现桌面的方法和系统。 合成的桌面窗口管理器在从应用程序接收到内容信息时,将窗口绘制到缓冲存储器以供将来参考,并利用高级图形硬件和视觉效果根据绘制的内容来渲染窗口。 窗口也可以基于包括虚拟光源在内的环境变量来渲染。 每个窗口的框架部分可以通过基于在其上显示框架的桌面的内容的具有磨砂玻璃的外观的位图的像素着色来生成。 提供传统支持,以便操作系统可以绘制和渲染由旧应用程序生成的窗口,使其与非传统应用程序窗口一致。

    One time settable tamper resistant software repository
    3.
    发明申请
    One time settable tamper resistant software repository 有权
    一次可设置的防篡改软件库

    公开(公告)号:US20090199018A1

    公开(公告)日:2009-08-06

    申请号:US12023828

    申请日:2008-01-31

    CPC classification number: G06F21/79 G06F2221/2113

    Abstract: An individualized per device initialization of a computing device is unique relative to the initialization of other computing devices. A common initialization program, common to all computing devices of a particular type such as a game console, may be modified to be unique for each computing device. Modification may comprise the application of at least one individualized per device secret, e.g., key, to at least a portion of the common initialization program such as at least one initialization stage. Initialization is tied to one or more device specific identities. In this way, initialization vulnerabilities discovered on a particular device cannot be exploited en masse on other computing devices because each initialization program stored in each computing device is unique. The device specific nature of the initialization program may be extended to other information input to the computing device in order to prevent unauthorized sharing of information with other computing devices.

    Abstract translation: 相对于其他计算设备的初始化,计算设备的每个设备的个性化初始化是唯一的。 对于诸如游戏控制台的特定类型的所有计算设备通用的公共初始化程序可以被修改为对于每个计算设备是唯一的。 修改可以包括至少一个个体化的每个设备秘密(例如密钥)应用于公共初始化程序的至少一部分,例如至少一个初始化阶段。 初始化与一个或多个设备特定身份相关联。 以这种方式,在特定设备上发现的初始化漏洞不能在其他计算设备上被大量利用,因为存储在每个计算设备中的每个初始化程序是唯一的。 可以将初始化程序的设备特定性质扩展到输入到计算设备的其他信息,以防止与其他计算设备的未经授权的信息共享。

    DEVICE COMPONENT ROLL BACK PROTECTION SCHEME
    5.
    发明申请
    DEVICE COMPONENT ROLL BACK PROTECTION SCHEME 审中-公开
    器件组件回滚保护方案

    公开(公告)号:US20090119744A1

    公开(公告)日:2009-05-07

    申请号:US12016940

    申请日:2008-01-18

    Abstract: Various embodiments of the present disclosure describe techniques for enforcing a subcomponent related security policy for closed computing systems. A closed computing system can include a list of subcomponents that identify the subcomponents it was manufactured with. The list can be used to determine if any currently attached subcomponents are different than the original ones. If a new subcomponent is detected, the device can perform a predetermined action in accordance with a security policy.

    Abstract translation: 本公开的各种实施例描述了用于实施用于封闭计算系统的子组件相关安全策略的技术。 封闭的计算系统可以包括识别其制造的子组件的子组件列表。 该列表可用于确定当前附加的子组件是否与原始子组件不同。 如果检测到新的子组件,则设备可以根据安全策略执行预定的动作。

    TIME BASED PRIORITY MODULUS FOR SECURITY CHALLENGES
    6.
    发明申请
    TIME BASED PRIORITY MODULUS FOR SECURITY CHALLENGES 审中-公开
    基于时间安排的优先权模块

    公开(公告)号:US20090119475A1

    公开(公告)日:2009-05-07

    申请号:US12016937

    申请日:2008-01-18

    CPC classification number: G06F21/31

    Abstract: Systems, methods, and computer readable media are disclosed for making dictionary based attacks difficult and/or time consuming for attackers. In one example embodiment, this can be accomplished by equipping a security service with software and/or circuitry operable to select security questions from different partitions of a question table.

    Abstract translation: 公开了用于使基于字典的攻击对于攻击者来说困难和/或耗时的系统,方法和计算机可读介质。 在一个示例实施例中,这可以通过为安全服务装备具有可操作以从问题表的不同分区选择安全问题的软件和/或电路来实现。

    Methods and arrangements for providing multiple concurrent desktops and workspaces in a shared computing environment
    9.
    发明授权
    Methods and arrangements for providing multiple concurrent desktops and workspaces in a shared computing environment 有权
    在共享计算环境中提供多个并发桌面和工作区的方法和安排

    公开(公告)号:US07127719B2

    公开(公告)日:2006-10-24

    申请号:US10966571

    申请日:2004-10-15

    CPC classification number: G06F9/451

    Abstract: Methods and arrangements are provided for use in multiple user computing environments. These methods and arrangements can be configured to allow for a plurality of separate and concurrent desktops and workspaces within the shared computing environment. One method includes creating a separate desktop thread for each user that is authenticated during a logon process, creating a separate desktop associated with each desktop thread, and maintaining a list of desktop threads that are created. In this manner, several users can be logged on simultaneously. In certain implementations, the method further includes establishing a separate user environment associated with each desktop and launching a separate user shell associated with each desktop. The list of desktop threads allows for selective and/or automatic switching from a first desktop to a second desktop without terminating a desktop thread associated with the first desktop. The methods and arrangements are also applicable to remote process logon and switching.

    Abstract translation: 提供了在多个用户计算环境中使用的方法和布置。 这些方法和布置可以被配置为允许在共享计算环境内的多个单独的和并发的桌面和工作空间。 一种方法包括为登录过程中进行身份验证的每个用户创建单独的桌面线程,创建与每个桌面线程相关联的单独桌面,以及维护创建的桌面线程列表。 以这种方式,几个用户可以同时登录。 在某些实现中,该方法还包括建立与每个桌面相关联的单独的用户环境并且启动与每个桌面相关联的单独的用户外壳。 桌面线程列表允许从第一桌面到第二桌面的选择性和/或自动切换,而不终止与第一台桌面相关联的桌面线程。 方法和布置也适用于远程进程登录和切换。

Patent Agency Ranking