Operating M-PHY based communications over serial advanced technology attachment (SATA)-based interface, and related cables, connectors, systems and methods
    2.
    发明授权
    Operating M-PHY based communications over serial advanced technology attachment (SATA)-based interface, and related cables, connectors, systems and methods 有权
    通过基于串行高级技术附件(SATA)的接口和相关电缆,连接器,系统和方法来操作基于M-PHY的通信

    公开(公告)号:US09081908B2

    公开(公告)日:2015-07-14

    申请号:US13678461

    申请日:2012-11-15

    CPC classification number: G06F13/4009 G06F13/385

    Abstract: Operating M-PHY communications protocol over a Serial Advanced Technology Attachment SATA-based interface and related devices, systems, and methods are disclosed. In one embodiment, the system operates the M-PHY communications over a SATA interface. Related cables, connectors, systems, and methods are also disclosed. In particular, embodiments of the present disclosure take the M-PHY standard compliant signals and direct them through a SATA compliant connector (and optionally cable) so as to allow two M-PHY standard compliant devices having SATA connectors to communicate.

    Abstract translation: 通过串行高级技术附件操作M-PHY通信协议公开了基于SATA的接口及相关设备,系统和方法。 在一个实施例中,系统通过SATA接口操作M-PHY通信。 还公开了相关的电缆,连接器,系统和方法。 特别地,本公开的实施例采用符合M-PHY标准的信号,并将它们引导通过SATA兼容连接器(以及可选地电缆),以便允许具有SATA连接器的两个符合M-PHY标准的设备进行通信。

    Secure behavior analysis over trusted execution environment
    3.
    发明授权
    Secure behavior analysis over trusted execution environment 有权
    对可信执行环境的安全行为分析

    公开(公告)号:US09319897B2

    公开(公告)日:2016-04-19

    申请号:US13929082

    申请日:2013-06-27

    Abstract: Systems and methods for recognizing and reacting to malicious or performance-degrading behaviors in a mobile device include observing mobile device behaviors in an observer module within a privileged-normal portion of a secure operating environment to identify a suspicious mobile device behavior. The observer module may generate a concise behavior vector based on the observations, and provide the vector to an analyzer module in an unprivileged-secure portion of the secure operating environment. The vector may be analyzed in the unprivileged-secure portion to determine whether the mobile device behavior is benign, suspicious, malicious, or performance-degrading. If the behavior is found to be suspicious, operations of the observer module may be adjusted, such as to perform deeper observations. If the behavior is found to be malicious or performance-degrading behavior the user and/or a client module may be alerted in a secure, tamper-proof manner.

    Abstract translation: 用于识别和响应移动设备中的恶意或性能降级行为的系统和方法包括观察安全操作环境的特权正常部分内的观察者模块中的移动设备行为以识别可疑移动设备行为。 观察者模块可以基于观察结果生成简洁的行为向量,并且将向量提供给安全操作环境的非特权安全部分中的分析器模块。 可以在非特权安全部分中分析向量,以确定移动设备行为是否是良性的,可疑的,恶意的或性能降级的。 如果发现行为是可疑的,则可以调整观察者模块的操作,例如执行更深的观察。 如果行为被发现是恶意的或降低性能的行为,则用户和/或客户端模块可能以安全,防篡改的方式被提醒。

    SECURE BEHAVIOR ANALYSIS OVER TRUSTED EXECUTION ENVIRONMENT
    5.
    发明申请
    SECURE BEHAVIOR ANALYSIS OVER TRUSTED EXECUTION ENVIRONMENT 有权
    安全行为分析在有害执行环境中

    公开(公告)号:US20140051432A1

    公开(公告)日:2014-02-20

    申请号:US13929082

    申请日:2013-06-27

    Abstract: Systems and methods for recognizing and reacting to malicious or performance-degrading behaviors in a mobile device include observing mobile device behaviors in an observer module within a privileged-normal portion of a secure operating environment to identify a suspicious mobile device behavior. The observer module may generate a concise behavior vector based on the observations, and provide the vector to an analyzer module in an unprivileged-secure portion of the secure operating environment. The vector may be analyzed in the unprivileged-secure portion to determine whether the mobile device behavior is benign, suspicious, malicious, or performance-degrading. If the behavior is found to be suspicious, operations of the observer module may be adjusted, such as to perform deeper observations. If the behavior is found to be malicious or performance-degrading behavior the user and/or a client module may be alerted in a secure, tamper-proof manner.

    Abstract translation: 用于识别和响应移动设备中的恶意或性能降级行为的系统和方法包括观察安全操作环境的特权正常部分内的观察者模块中的移动设备行为以识别可疑移动设备行为。 观察者模块可以基于观察结果生成简洁的行为向量,并且将向量提供给安全操作环境的非特权安全部分中的分析器模块。 可以在非特权安全部分中分析向量,以确定移动设备行为是否是良性的,可疑的,恶意的或性能降级的。 如果发现行为是可疑的,则可以调整观察者模块的操作,例如执行更深的观察。 如果行为被发现是恶意的或降低性能的行为,则用户和/或客户端模块可能以安全,防篡改的方式被提醒。

    SECURE BEHAVIOR ANALYSIS OVER TRUSTED EXECUTION ENVIRONMENT
    6.
    发明申请
    SECURE BEHAVIOR ANALYSIS OVER TRUSTED EXECUTION ENVIRONMENT 有权
    安全行为分析在有害执行环境中

    公开(公告)号:US20160088009A1

    公开(公告)日:2016-03-24

    申请号:US14957850

    申请日:2015-12-03

    Abstract: Systems and methods for recognizing and reacting to malicious or performance-degrading behaviors in a mobile computing device include observing mobile device behaviors in an observer module within a privileged-normal portion of a secure operating environment to identify a suspicious mobile device behavior. The observer module may generate a behavior vector based on the observations, and provide the vector to an analyzer module in an unprivileged-secure portion of the secure operating environment. The vector may be analyzed in the unprivileged-secure portion to determine whether the mobile device behavior is benign, suspicious, malicious, or performance-degrading. If the behavior is found to be suspicious, operations of the observer module may be adjusted, such as to perform deeper observations. If the behavior is found to be malicious or performance-degrading behavior the user and/or a client module may be alerted in a secure, tamper-proof manner.

    Abstract translation: 用于识别和响应移动计算设备中的恶意或性能降级行为的系统和方法包括观察安全操作环境的特权正常部分内的观察者模块中的移动设备行为,以识别可疑移动设备行为。 观察者模块可以基于观察结果生成行为向量,并将向量提供给安全操作环境的非特权安全部分中的分析器模块。 可以在非特权安全部分中分析向量,以确定移动设备行为是否是良性的,可疑的,恶意的或性能降级的。 如果发现行为是可疑的,则可以调整观察者模块的操作,例如执行更深的观察。 如果行为被发现是恶意的或降低性能的行为,则用户和/或客户端模块可能以安全,防篡改的方式被提醒。

    OPERATING M-PHY BASED COMMUNICATIONS OVER SERIAL ADVANCED TECHNOLOGY ATTACHMENT (SATA)-BASED INTERFACE, AND RELATED CABLES, CONNECTORS, SYSTEMS AND METHODS
    8.
    发明申请
    OPERATING M-PHY BASED COMMUNICATIONS OVER SERIAL ADVANCED TECHNOLOGY ATTACHMENT (SATA)-BASED INTERFACE, AND RELATED CABLES, CONNECTORS, SYSTEMS AND METHODS 有权
    串行高级技术附件(SATA) - 接口和相关电缆,连接器,系统和方法操作基于M-PHY的通信

    公开(公告)号:US20140136750A1

    公开(公告)日:2014-05-15

    申请号:US13678461

    申请日:2012-11-15

    CPC classification number: G06F13/4009 G06F13/385

    Abstract: Operating M-PHY communications protocol over a Serial Advanced Technology Attachment SATA-based interface and related devices, systems, and methods are disclosed. In one embodiment, the system operates the M-PHY communications over a SATA interface. Related cables, connectors, systems, and methods are also disclosed. In particular, embodiments of the present disclosure take the M-PHY standard compliant signals and direct them through a SATA compliant connector (and optionally cable) so as to allow two M-PHY standard compliant devices having SATA connectors to communicate.

    Abstract translation: 通过串行高级技术附件操作M-PHY通信协议公开了基于SATA的接口及相关设备,系统和方法。 在一个实施例中,系统通过SATA接口操作M-PHY通信。 还公开了相关的电缆,连接器,系统和方法。 特别地,本公开的实施例采用符合M-PHY标准的信号,并将它们引导通过SATA兼容连接器(以及可选地电缆),以便允许具有SATA连接器的两个符合M-PHY标准的设备进行通信。

    Secure behavior analysis over trusted execution environment

    公开(公告)号:US09756066B2

    公开(公告)日:2017-09-05

    申请号:US14957850

    申请日:2015-12-03

    Abstract: Systems and methods for recognizing and reacting to malicious or performance-degrading behaviors in a mobile computing device include observing mobile device behaviors in an observer module within a privileged-normal portion of a secure operating environment to identify a suspicious mobile device behavior. The observer module may generate a behavior vector based on the observations, and provide the vector to an analyzer module in an unprivileged-secure portion of the secure operating environment. The vector may be analyzed in the unprivileged-secure portion to determine whether the mobile device behavior is benign, suspicious, malicious, or performance-degrading. If the behavior is found to be suspicious, operations of the observer module may be adjusted, such as to perform deeper observations. If the behavior is found to be malicious or performance-degrading behavior the user and/or a client module may be alerted in a secure, tamper-proof manner.

Patent Agency Ranking