Capability Access Management for Processes
    3.
    发明申请
    Capability Access Management for Processes 审中-公开
    流程的能力访问管理

    公开(公告)号:US20130061316A1

    公开(公告)日:2013-03-07

    申请号:US13225945

    申请日:2011-09-06

    IPC分类号: G06F21/00

    摘要: Capability access management techniques for processes are described. In one or more implementations, a token is formed having one or more security identifiers that reference capabilities described in a manifest for the executable code responsive to an input received to initiate execution of executable code installed on the computing device. The one or more processes formed through execution of the executable code on the computing device are associated with the token, the token usable to manage access of the one or more processes to the capabilities of the computing device.

    摘要翻译: 描述进程的能力访问管理技术。 在一个或多个实现中,形成具有一个或多个安全标识符的令牌,所述安全标识符响应于接收到的输入来引用可执行代码的清单中描述的能力,以启动安装在计算设备上的可执行代码的执行。 通过在计算设备上执行可执行代码形成的一个或多个过程与令牌相关联,令牌可用于管理一个或多个进程对计算设备的能力的访问。

    Cryptography correctness detection methods and apparatuses
    8.
    发明授权
    Cryptography correctness detection methods and apparatuses 有权
    加密正确性检测方法和装置

    公开(公告)号:US07602903B2

    公开(公告)日:2009-10-13

    申请号:US10759636

    申请日:2004-01-16

    IPC分类号: H04L9/00

    CPC分类号: G06F21/602 H04L9/088

    摘要: Methods and apparatuses are provided that can inform certain processes and/or even the user about the relative strength/weakness of cryptography services being used. In certain methods, for example, at least one cryptography service parameter threshold is established. The method further includes, selectively detecting a request for at least one cryptography service, and selectively performing at least one correctness detection action based on the requested cryptography service and the cryptography service parameter threshold. The cryptography service parameter threshold identifies acceptable/unacceptable cryptography algorithms, acceptable/unacceptable cryptography key size parameters, acceptable/unacceptable cryptography seed size parameters, and other like parameters that the requested cryptography service information can be compared with.

    摘要翻译: 提供了可以向某些进程和/或甚至用户通知正在使用的加密服务的相对强度/弱点的方法和装置。 在某些方法中,例如,建立至少一个密码服务参数阈值。 该方法还包括:选择性地检测对至少一个密码服务的请求,以及基于所请求的密码服务和密码服务参数阈值选择性地执行至少一个正确性检测动作。 加密服务参数阈值识别可接受/不可接受的加密算法,可接受/不可接受的加密密钥大小参数,可接受/不可接受的加密种子大小参数以及可以与所请求的密码服务信息进行比较的其他类似参数。

    Trust level activation
    10.
    发明授权
    Trust level activation 有权
    信任级激活

    公开(公告)号:US08973158B2

    公开(公告)日:2015-03-03

    申请号:US13186474

    申请日:2011-07-20

    IPC分类号: H04L29/06 G06F21/53

    摘要: An isolation execution environment provides an application with limited resources to execute an application. The application may require access to secured resources associated with a particular trust level that are outside of the isolation execution environment. A trust activation engine determines the trust level associated with a request for a resource and operates differently based on the trust level. A broker process may be used to execute components providing access to resources having a partial trust level in an execution environment that is separate from the isolation execution environment.

    摘要翻译: 隔离执行环境为应用程序提供有限的资源来执行应用程序。 应用程序可能需要访问与隔离执行环境之外的特定信任级别相关联的安全资源。 信任激活引擎确定与资源请求相关联的信任级别,并基于信任级别进行不同的操作。 代理进程可以用于执行提供对具有与隔离执行环境分离的执行环境中的部分信任级别的资源的访问的组件。