Encrypted chunk-based rapid data encryption policy compliance
    1.
    发明授权
    Encrypted chunk-based rapid data encryption policy compliance 有权
    加密的基于块的快速数据加密策略合规性

    公开(公告)号:US08689279B2

    公开(公告)日:2014-04-01

    申请号:US13221699

    申请日:2011-08-30

    IPC分类号: G06F17/00

    摘要: To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, an encrypted chunks map is accessed. The encrypted chunks map identifies whether, for each chunk of sectors of a storage volume, the sectors in the chunk are unencrypted. In response to a request to write content to a sector, the encrypted chunks map is checked to determine whether a chunk that includes the sector is unencrypted. If the chunk that includes the sector is unencrypted, then the sectors in the chunk are encrypted, and the content is encrypted and written to the sector. If the chunk that includes the sector is encrypted or not in use, then the content is encrypted and written to the sector.

    摘要翻译: 为了遵守计算设备的策略,指示在激活策略之后由计算设备写入存储卷的数据被加密,则访问加密的块映射。 加密的块映射识别对于存储卷的扇区的每个块,是否未加密块中的扇区。 响应于将内容写入扇区的请求,检查加密的块映射以确定包括扇区的块是否未被加密。 如果包含扇区的块是未加密的,则块中的扇区被加密,并且内容被加密并写入扇区。 如果包含扇区的块被加密或不被使用,则内容被加密并写入扇区。

    ENCRYPTED CHUNK-BASED RAPID DATA ENCRYPTION POLICY COMPLIANCE
    2.
    发明申请
    ENCRYPTED CHUNK-BASED RAPID DATA ENCRYPTION POLICY COMPLIANCE 有权
    基于CHUNK的快速数据加密策略合规性

    公开(公告)号:US20130054977A1

    公开(公告)日:2013-02-28

    申请号:US13221699

    申请日:2011-08-30

    IPC分类号: G06F12/14

    摘要: To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, an encrypted chunks map is accessed. The encrypted chunks map identifies whether, for each chunk of sectors of a storage volume, the sectors in the chunk are unencrypted. In response to a request to write content to a sector, the encrypted chunks map is checked to determine whether a chunk that includes the sector is unencrypted. If the chunk that includes the sector is unencrypted, then the sectors in the chunk are encrypted, and the content is encrypted and written to the sector. If the chunk that includes the sector is encrypted or not in use, then the content is encrypted and written to the sector.

    摘要翻译: 为了遵守计算设备的策略,指示在激活策略之后由计算设备写入存储卷的数据被加密,则访问加密的块映射。 加密的块映射识别对于存储卷的扇区的每个块,是否未加密块中的扇区。 响应于将内容写入扇区的请求,检查加密的块映射以确定包括扇区的块是否未被加密。 如果包含扇区的块未被加密,则块中的扇区被加密,并且内容被加密并写入扇区。 如果包含扇区的块被加密或不被使用,则内容被加密并写入扇区。

    Sector map-based rapid data encryption policy compliance
    4.
    发明授权
    Sector map-based rapid data encryption policy compliance 有权
    基于行业地图的快速数据加密策略合规

    公开(公告)号:US08874935B2

    公开(公告)日:2014-10-28

    申请号:US13221629

    申请日:2011-08-30

    IPC分类号: G06F11/30 G06F9/00 G06F12/14

    摘要: To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The sector map identifies one or more sectors of a storage volume and also identifies, for each of the one or more sectors of the storage volume, a signature of the content of the sector. In response to a request to read the content of a sector, the content of the sector is returned without decrypting the content if the sector is one of the one or more sectors and the signature of the content of the sector matches the signature of the sector identified in the sector map. Otherwise, the content of the sector is decrypted and the decrypted content is returned.

    摘要翻译: 为了遵守计算设备的策略,指示在激活策略之后计算设备写入存储卷的数据被加密,则访问扇区映射。 扇区映射识别存储卷的一个或多个扇区,并且还针对存储卷的一个或多个扇区中的每一个标识扇区内容的签名。 响应于读取扇区的内容的请求,如果扇区是一个或多个扇区中的一个或多个扇区的一个,并且扇区的内容的签名与扇区的签名匹配,则返回扇区的内容而不解密内容 在扇区图中确定。 否则,扇区的内容被解密,并且返回解密的内容。

    Use of software update policies
    7.
    发明授权
    Use of software update policies 有权
    使用软件更新策略

    公开(公告)号:US08364598B2

    公开(公告)日:2013-01-29

    申请号:US12578533

    申请日:2009-10-13

    IPC分类号: G06F21/00

    CPC分类号: G06F8/61 G06F8/65 G06F9/44505

    摘要: A portable device may be roamed from one host to another. In one example, the portable device stores software that is to be executed by a host. The host may maintain a policy that governs which software may be executed on the host. When the portable device is connected to a host, the host checks the software version installed on the guest to determine whether that software version is compatible with the host's policy. If the guest's software does not comply with the host's policy, then the host installs a compatible version. If the guest's version complies with the policy and is newer than the host's version, then the host copies the guest's version to the host and propagates it to other guests. In this way, newer versions of software propagate between hosts and guests, while also respecting specific execution policies of the various hosts.

    摘要翻译: 便携式设备可以从一个主机漫游到另一个主机。 在一个示例中,便携式设备存储要由主机执行的软件。 主机可以维护一个管理可以在主机上执行哪个软件的策略。 当便携式设备连接到主机时,主机将检查安装在客户机上的软件版本,以确定该软件版本是否与主机策略兼容。 如果客人的软件不符合主机的策略,则主机将安装兼容版本。 如果客人的版本符合该策略,并且比主机版本更新,则主机会将客人的版本复制到主机,并将其传播给其他来宾。 这样,较新版本的软件在主机和客户端之间传播,同时也遵守各种主机的特定执行策略。

    Cryptographic key attack mitigation
    8.
    发明授权
    Cryptographic key attack mitigation 有权
    加密密钥攻击缓解

    公开(公告)号:US08503674B2

    公开(公告)日:2013-08-06

    申请号:US13097035

    申请日:2011-04-28

    IPC分类号: H04L9/00

    摘要: Cryptographic keys and, subsequently, the data they are intended to protect, are safeguarded from unwarranted attacks utilizing various systems and methodologies designed to minimize the time period in which meaningful versions of cryptographic keys exist in accessible memory, and therefore, are vulnerable. Cryptographic keys, and consequently the data they are intended to protect, can alternatively, or also, be protected from attackers utilizing systems and a methodology that employs a removable storage device for providing authentication factors used in the encryption and decryption processing. Cryptographic keys and protected data can alternatively, or also, be protected with a system and methodology that supports data separation on the storage device(s) of a computing device. Cryptographic keys and the data they are intended to protect can alternatively, or also, be protected employing a system and methodology of virtual compartmentalization that effectively segregates key management from protected data.

    摘要翻译: 使用各种系统和方法来保护加密密钥以及随后保护的数据免受无理的攻击,这些系统和方法旨在最小化可访问存储器中存在有意义的密码密钥版本的时间段,因此易受攻击。 加密密钥以及因此它们旨在保护的数据可以替代地或也可以利用系统和使用可移动存储设备提供加密和解密处理中使用的认证因子的方法来防止攻击者。 加密密钥和受保护数据可以替代地或者也可以通过支持计算设备的存储设备上的数据分离的系统和方法进行保护。 可以使用虚拟分区的系统和方法来保护加密密钥及其旨在保护的数据,或者也可以使用有效地将密钥管理与受保护数据隔离的虚拟分区的方法进行保护。

    USE OF SOFTWARE UPDATE POLICIES
    10.
    发明申请
    USE OF SOFTWARE UPDATE POLICIES 有权
    使用软件更新政策

    公开(公告)号:US20110088025A1

    公开(公告)日:2011-04-14

    申请号:US12578533

    申请日:2009-10-13

    IPC分类号: G06F9/44

    CPC分类号: G06F8/61 G06F8/65 G06F9/44505

    摘要: A portable device may be roamed from one host to another. In one example, the portable device stores software that is to be executed by a host. The host may maintain a policy that governs which software may be executed on the host. When the portable device is connected to a host, the host checks the software version installed on the guest to determine whether that software version is compatible with the host's policy. If the guest's software does not comply with the host's policy, then the host installs a compatible version. If the guest's version complies with the policy and is newer than the host's version, then the host copies the guest's version to the host and propagates it to other guests. In this way, newer versions of software propagate between hosts and guests, while also respecting specific execution policies of the various hosts.

    摘要翻译: 便携式设备可以从一个主机漫游到另一个主机。 在一个示例中,便携式设备存储要由主机执行的软件。 主机可以维护一个管理可以在主机上执行哪个软件的策略。 当便携式设备连接到主机时,主机将检查安装在客户机上的软件版本,以确定该软件版本是否与主机策略兼容。 如果客人的软件不符合主机的策略,则主机将安装兼容版本。 如果客人的版本符合该策略,并且比主机版本更新,则主机会将客人的版本复制到主机,并将其传播给其他来宾。 这样,较新版本的软件在主机和客户端之间传播,同时也遵守各种主机的特定执行策略。