Expression grouping and evaluation
    3.
    发明授权
    Expression grouping and evaluation 失效
    表达分组和评估

    公开(公告)号:US07437666B2

    公开(公告)日:2008-10-14

    申请号:US10889273

    申请日:2004-07-12

    IPC分类号: G06F17/00

    摘要: An apparatus comprises a stylesheet compiler and a document processor. The stylesheet compiler is configured to identify expressions in a stylesheet and is configured to generate one or more expression trees representing the expressions. Expressions having one or more common nodes are represented as children of a subtree that represents the common nodes. Coupled to receive a document and the expression tree, the document processor is configured to evaluate the expressions represented in the one or more expression trees against the document.

    摘要翻译: 一种装置包括样式表编译器和文档处理器。 样式表编译器被配置为识别样式表中的表达式,并且被配置为生成表示表达式的一个或多个表达式树。 具有一个或多个公共节点的表达式表示为表示公共节点的子树的子节点。 为了接收文档和表达式树,文档处理器被配置为针对文档来评估表示在一个或多个表达式树中的表达式。

    Method For Enforcing Resource Access Control In Computer Systems
    4.
    发明申请
    Method For Enforcing Resource Access Control In Computer Systems 审中-公开
    在计算机系统中执行资源访问控制的方法

    公开(公告)号:US20140298408A1

    公开(公告)日:2014-10-02

    申请号:US14304307

    申请日:2014-06-13

    IPC分类号: H04L29/06

    摘要: A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs.

    摘要翻译: 一种执行对系统资源和资产的访问控制的方法和系统。 与系统中发起事务的设备相关联的安全属性将自动生成并使用事务消息进行转发。 安全属性传达分配给每个启动器的访问权限。 在系统中实现一个或多个安全执行机制以根据访问策略要求评估安全属性以访问诸如存储器,寄存器,地址范围等的各种系统资产和资源。如果由安全属性标识的特权指示访问 允许请求,允许交易进行。 启动器方案的安全属性提供跨系统设计的模块化,一致的安全访问实施方案。

    METHOD, APPARATUS, SYSTEM FOR QUALIFYING CPU TRANSACTIONS WITH SECURITY ATTRIBUTES
    5.
    发明申请
    METHOD, APPARATUS, SYSTEM FOR QUALIFYING CPU TRANSACTIONS WITH SECURITY ATTRIBUTES 有权
    方法,装置,用于对具有安全属性的CPU交易进行质量评估的系统

    公开(公告)号:US20140282819A1

    公开(公告)日:2014-09-18

    申请号:US13828676

    申请日:2013-03-14

    IPC分类号: G06F21/62

    CPC分类号: G06F21/74 G06F21/57 G06F21/78

    摘要: Method, apparatus, and system for qualifying CPU transactions with security attributes. Immutable security attributes are generated for transactions initiator by a CPU or processor core that identifying the execution mode of the CPU/core being trusted or untrusted. The transactions may be targeted to an Input/Output (I/O) device or system memory via which a protected asset may be accessed. Policy enforcement logic blocks are implemented at various points in the apparatus or system that allow or deny transactions access to protected assets based on the immutable security attributes generated for the transactions. In one aspect, a multiple-level security scheme is implemented under which a mode register is updated via a first transaction to indicate the CPU/core is operating in a trusted execution mode, and security attributes are generated for a second transaction using execution mode indicia in the mode register to verify the transaction is from a trusted initiator.

    摘要翻译: 用于对具有安全属性的CPU事务进行限定的方法,设备和系统。 由CPU或处理器核心为事务发起者生成不可变的安全属性,用于识别CPU /核心被信任或不可信任的执行模式。 这些事务可以被定向到可被访问受保护资产的输入/输出(I / O)设备或系统存储器。 策略执行逻辑块在设备或系统中的不同点实现,其允许或拒绝事务基于为事务生成的不可变安全属性而访问被保护资产。 在一个方面,实现多级安全方案,在该级别下,通过第一事务来更新模式寄存器以指示CPU /核心以可信执行模式运行,并且使用执行模式标记为第二事务生成安全属性 在模式寄存器中验证事务来自可信发起者。

    Method for enforcing resource access control in computer systems
    6.
    发明授权
    Method for enforcing resource access control in computer systems 有权
    在计算机系统中执行资源访问控制的方法

    公开(公告)号:US08789170B2

    公开(公告)日:2014-07-22

    申请号:US12890040

    申请日:2010-09-24

    IPC分类号: G06F12/14

    摘要: A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs.

    摘要翻译: 一种执行对系统资源和资产的访问控制的方法和系统。 与系统中发起事务的设备相关联的安全属性将自动生成并使用事务消息进行转发。 安全属性传达分配给每个启动器的访问权限。 在系统中实现一个或多个安全执行机制以根据访问策略要求评估安全属性以访问诸如存储器,寄存器,地址范围等的各种系统资产和资源。如果由安全属性标识的特权指示访问 允许请求,允许交易进行。 启动器方案的安全属性提供跨系统设计的模块化,一致的安全访问实施方案。

    Device for structured data transformation
    7.
    发明授权
    Device for structured data transformation 有权
    用于结构化数据转换的设备

    公开(公告)号:US07328403B2

    公开(公告)日:2008-02-05

    申请号:US10889547

    申请日:2004-07-12

    IPC分类号: G06F15/00

    CPC分类号: G06F17/30569 G06F17/30908

    摘要: Numerous embodiments of structured data transformation are disclosed. Some embodiments include characterizing at least a portion of an expression in a stylesheet as evaluatable at a phase wherein the phase is one of a compile phase, a parse phase, or a transformation phase of applying the stylesheet to a document to transform the document in a document transformation appliance, applying at least a portion of the expression to the document in the phase determined in the characterizing, combining results from applying the at least a portion of the expression and from applying other expressions to the document to generate a transformed document, and outputting the transformed document or saving the transformed document to memory.

    摘要翻译: 公开了许多结构化数据变换的实施例。 一些实施例包括将样式表中的表达式的至少一部分表征为在阶段可评估的阶段,其中阶段是将样式表应用于文档以将文档变换为文档的编译阶段,解析阶段或变换阶段之一 文档转换装置,将表达式的至少一部分应用于在表征中确定的阶段中确定的阶段中,将结果应用于表达的至少一部分并将其他表达应用于文档以生成转换文档,以及 输出变换的文档或将转换的文档保存到存储器。

    METHOD FOR ENFORCING RESOURCE ACCESS CONTROL IN COMPUTER SYSTEMS
    8.
    发明申请
    METHOD FOR ENFORCING RESOURCE ACCESS CONTROL IN COMPUTER SYSTEMS 有权
    在计算机系统中执行资源访问控制的方法

    公开(公告)号:US20120079590A1

    公开(公告)日:2012-03-29

    申请号:US12890040

    申请日:2010-09-24

    IPC分类号: G06F12/14

    摘要: A method and system for enforcing access control to system resources and assets. Security attributes associated with devices that initiate transactions in the system are automatically generated and forwarded with transaction messages. The security attributes convey access privileges assigned to each initiator. One or more security enforcement mechanisms are implemented in the system to evaluate the security attributes against access policy requirements to access various system assets and resources, such as memory, registers, address ranges, etc. If the privileges identified by the security attributes indicate the access request is permitted, the transaction is allowed to proceed. The security attributes of the initiator scheme provides a modular, consistent secure access enforcement scheme across system designs.

    摘要翻译: 一种执行对系统资源和资产的访问控制的方法和系统。 与系统中发起事务的设备相关联的安全属性将自动生成并使用事务消息进行转发。 安全属性传达分配给每个启动器的访问权限。 在系统中实现一个或多个安全执行机制以根据访问策略要求评估安全属性以访问诸如存储器,寄存器,地址范围等的各种系统资产和资源。如果由安全属性标识的特权指示访问 允许请求,允许交易进行。 启动器方案的安全属性提供跨系统设计的模块化,一致的安全访问实施方案。