$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure software registration and integrity assessment in a computer system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0678722 (1996-07-11)
발명자 / 주소
  • Angelo Michael F.
출원인 / 주소
  • Compaq Computer Corporation
대리인 / 주소
    Akin, Gump, Strauss, Hauer & Feld, L.L.P.
인용정보 피인용 횟수 : 282  인용 특허 : 5

초록

A method for providing secure registration and integrity assessment of software in a computer system is disclosed. A secure hash table is created containing a list of secure programs that the user wants to validate prior to execution. The table contains a secure hash value (i.e., a value generated b

대표청구항

[ What is claimed is:] [1.] A method for providing secure registration and integrity assessment of software in a computer system having a processor incorporating system management capabilities, the computer system also having a stored table containing a modification detection value for each program

이 특허에 인용된 특허 (5)

  1. Pearce John J. (DelValle TX), Apparatus and method for limiting access to mass storage devices in a computer system.
  2. Jablon David P. (Shrewsbury MA) Hanley Nora E. (Shrewsbury MA), Method and apparatus for assessing integrity of computer system software.
  3. Fischer Addison M. (4073 Merchantile Ave. Naples FL 33942), Method for protecting a volatile file using a single hash.
  4. Pearce John J. (Austin TX), Operation system independent polled interface for extension BIOS (XBIOS) operations.
  5. Miller Craig A. (Tomball TX) Dhareshwar Yatin (Bombay TX INX) Heller Edmund G. (Spring TX) Garrett Michael R. (Houston TX), Transparent, secure computer virus detection method and apparatus.

이 특허를 인용한 특허 (282)

  1. Sahita, Ravi; Savagaonkar, Uday, Adaptive integrity verification of software using integrity manifest of pre-defined authorized software listing.
  2. Li, Jun; Wang, Kai; Feng, Rongfeng; Xu, Na, Anti-virus method based on security chip.
  3. Sobel,William; McCorkendale,Bruce, Antivirus scanning in a hard-linked environment.
  4. Swanson, Robert C.; Bulusu, Mallik; Zimmer, Vincent J., Apparatus and method for accessing a secure partition in non-volatile storage by a host system enabled after the system exits a first instance of a secure mode.
  5. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  6. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  7. Brickell, Ernest F., Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information.
  8. Brickell,Ernest F., Apparatus and method for proving the denial of a direct proof signature.
  9. Kozuch,Michael A.; Sutton, II,James A.; Grawrock,David; Neiger,Gilbert; Uhlig,Richard A.; Burgess,Bradley G.; Poisner,David I.; Hall,Clifford D.; Glew,Andy; Smith, III,Lawrence O.; George,Robert, Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment.
  10. Hobson, Louis B.; Piwonka, Mark A.; Ziarnik, Gregory P., Apparatus for determining during a power-on sequence, a value to be written to a first register in a secure area and the same value to a second register in non-secure area, which during a protected mode, the value is compared such that if it is equal, enabling writing to a memory.
  11. Radatti, Peter V., Apparatus, methods and articles of manufacture for securing computer networks.
  12. Challener,David Carroll; Freeman,Joseph Wayne; Goodman,Steven Dale; Springfield,Randall Scott, Apparatus, system, and method for sealing a data repository to a trusted computing platform.
  13. Grawrock,David W., Attestation using both fixed token and portable token.
  14. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  15. Glew,Andrew F.; Sutton,James A.; Smith,Lawrence O.; Grawrock,David W.; Neiger,Gilbert; Kozuch,Michael A., Authenticated code module.
  16. Angelo,Michael F.; Novoa,Manuel, Authentication and verification for use of software.
  17. Anderson, W. Kyle; Bonhaus, Daryl, Automated identification and clean-up of malicious computer code.
  18. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  19. Dennis, Lowell B., Boot record recovery.
  20. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  21. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  22. Susaki Seiichi,JPX ; Umeki Hisashi,JPX ; Umezawa Katsuyuki,JPX ; Miyazaki Seiji,JPX ; Matsunaga Kazuo,JPX ; Kitagawa Makoto,JPX, Client-server system for controlling access rights to certain services by a user of a client terminal.
  23. England, Paul, Client-side boot domains and boot rules.
  24. England, Paul, Client-side boot domains and boot rules.
  25. England,Paul, Client-side boot domains and boot rules.
  26. James ; Jr. Don R. ; Hess Randall L. ; Kane Jeffrey D., Computer method and apparatus to prompt for administrative password to flash a corrupted non-volatile memory.
  27. Saunier, Louisa, Computer security method and computer system.
  28. Angelo, Michael F.; Wisecup, George David; Collins, David L., Computer system having security features for authenticating different components.
  29. Welborn, Kimberly Joyce; Welborn, Christopher Michael, Computer virus avoidance system and mechanism.
  30. Martinek,Michael G.; Jackson,Mark D.; Yoseloff,Mark L., Computerized gaming system, method and apparatus.
  31. Yoseloff, Mark L.; Jackson, Mark D.; Martinek, Michael G.; Brower, Donald A.; DeJournett, John L., Computerized gaming system, method and apparatus.
  32. Good,Thomas E.; DiFalco,Robert A.; Kim,Gene Ho, Computing apparatus with automatic integrity reference generation and maintenance.
  33. Ghose, Kanad, Continuous run-time validation of program execution: a practical approach.
  34. Bennett,Steve; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Zou,Xiang; Kozuch,Michael A., Control over faults occurring during the operation of guest software in the virtual-machine architecture.
  35. Bennett,Steve; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael A., Control register access virtualization performance improvement in the virtual-machine architecture.
  36. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  37. Herbert, Howard C.; Davis, Derek L., Cryptographically protected paging subsystem.
  38. Herbert,Howard C.; Davis,Derek L., Cryptographically protected paging system.
  39. Platt, David C., Cryptographically signed filesystem.
  40. Platt,David C., Cryptographically signed filesystem.
  41. Morishita, Takuya, Data encipherment apparatus and illegal alteration prevention system.
  42. Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; LeMay, Steven G.; Nelson, Dwayne R.; Palchetti, Johnny; Benbrahim, Jamal, Decoupling of the graphical presentation of a game from the presentation logic.
  43. Sallam,Ahmed, Detecting computer worms as they arrive at local computers through open network shares.
  44. Satish, Sourabh; Hernacki, Brian, Detecting new or modified portions of code.
  45. Fischer, Stephen A.; Gotze, Kevin C.; Bulygin, Yuriy; Brannock, Kirk D., Detection of return oriented programming attacks.
  46. Fischer, Stephen A.; Gotze, Kevin C.; Bulygin, Yuriy; Brannock, Kirk D., Detection of return oriented programming attacks.
  47. Fischer, Stephen A.; Gotze, Kevin C.; Bulygin, Yuriy; Brannock, Kirk D., Detection of return oriented programming attacks.
  48. Fischer, Stephen A.; Gotze, Kevin C.; Bulygin, Yuriy; Brannock, Kirk D., Detection of return oriented programming attacks.
  49. Grawrock,David W., Device and method for disabling an override hardware pin assertion.
  50. Szor,Peter, Dynamic detection of computer worms.
  51. Millard, John, Efficient file scanning using input-output hints.
  52. Kissel,Timo S., Efficient scanning of stream based data.
  53. Jackson, Mark D.; Martinek, Michael G., Encryption in a secure computerized gaming system.
  54. Jackson,Mark D.; Martinek,Michael G., Encryption in a secure computerized gaming system.
  55. Fontenot, Nathan D.; Schopp, Joel H.; Strosaker, Michael T.; Wilson, George C., Extending platform trust during program updates.
  56. Weber,Frederick D.; Gulick,Dale E.; Strongin,Geoffrey S., External locking mechanism for personal computer memory locations.
  57. Goodman,Steven Dale; Hoff,James Patrick; Springfield,Randall Scott; Ward,James Peter, Flash update using a trusted platform module.
  58. Viljoen,Pieter; Vogel,Gregory D., Forward application compatible firewall.
  59. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  60. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  61. Taylor, Eric F.; Gatto, Jean-Marie; Brunet de Courssou, Thierry, Gaming machine having game play suspension and resumption features using biometrically-based authentication and method of operating same.
  62. Gatto, Jean-Marie; Brunet de Courssou, Thierry, Gaming machine having multi-stage failure recovery feature and method of operating same.
  63. Kudelski, Henri; Gaumain, Serge, Generating a root key for decryption of a transmission key allowing secure communications.
  64. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  65. Uhlig,Richard; Anderson,Andrew V.; Bennett,Steve; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert, Handling faults associated with operation of guest software in the virtual-machine architecture.
  66. Shoemaker, Charles H.; Boles, Colby D; Elsbree, John E; Weinberg, Mark J; Newell, Mark S; Niethammer, Michelle V; Fulmer, David, Hardware-based software authenticator.
  67. Clift, Neill; Wijeratna, Thushara K., Identifying malware that employs stealth techniques.
  68. Chateau,Alain; Azema,Jerome; Haidamous,Constantin, Indirect data protection using random key encryption.
  69. Nishiguchi, Naoki; Kawai, Jun, Information processing apparatus, information processing method and record medium.
  70. Troxel, Gregory Donald, Integrity checking at high data rates.
  71. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  72. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  73. Chen, Ling Tony; Multerer, Boyd Cannon, Licensing the use of a particular feature of software.
  74. Chen, Ling Tony; Benaloh, Josh, Licensing the use of software on a particular CPU.
  75. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  76. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  77. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  78. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  79. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  80. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  81. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  82. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  83. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  84. Hodson, Orion; Gunawi, Haryadi; Hunt, Galen C., Master and subordinate operating system kernels for heterogeneous multiprocessor systems.
  85. Kozuch,Michael; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Schoenberg,Sebastian; Uhlig,Richard, Mechanism for providing power management through virtualization.
  86. Hall, Clifford D.; Campbell, Randolph L., Mechanism for remapping post virtual machine memory pages.
  87. Bennett,Steven M.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Neiger,Gilbert; Uhlig,Richard, Mechanism to control hardware interrupt acknowledgement in a virtual machine system.
  88. Tanaka, Yoshiyuki; Nakamura, Hiroshi; Sukegawa, Hiroshi; Nakabayashi, Mikito; Kawamoto, Kazuya, Memory device storing identifying information and memory card including the same.
  89. Yoshiyuki Tanaka JP; Hiroshi Nakamura JP; Hiroshi Sukegawa JP; Mikito Nakabayashi JP; Kazuya Kawamoto JP, Memory system.
  90. Mantyla,Janne, Method and a system for evaluating the reliability of a program in an electronic device, and an electronic device.
  91. Brickell, Ernest; Graunke, Gary; Stevens, William A.; Vembu, Balaji, Method and apparatus for authenticated, recoverable key distribution with no database secrets.
  92. DeTreville,John, Method and apparatus for authenticating an open system application to a portable IC device.
  93. DeTreville,John D., Method and apparatus for authenticating an open system application to a portable IC device.
  94. Cota Robles,Erik; Chou,Stephen; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Method and apparatus for constructing host processor soft devices independent of the host processor operating system.
  95. McGee, William G.; Langford, Glenn C.; Van Oorschot, Paul C., Method and apparatus for controlling program execution and program distribution.
  96. Bennett, Steven M.; Anderson, Andrew V.; Cota Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  97. Bennett, Steven M.; Anderson, Andrew V.; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  98. Gatto,Jean Marie; Brunet de Courssou,Thierry, Method and apparatus for fast transaction commit over unreliable networks.
  99. Angelo,Michael F.; McMahan,Larry N.; Powers,Richard D., Method and apparatus for initializing multiple security modules.
  100. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  101. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  102. Kozuch, Michael A.; Sutton, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  103. El-Moussa, Fadi Ali; Paverd, Andrew, Method and apparatus for modifying a computer program in a trusted manner.
  104. Angelo,Michael F.; Neufeld,E David; Heisey,David, Method and apparatus for providing security for a computer system.
  105. Anderson, Andrew V.; Kägi, Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  106. Anderson,Andrew V.; K��gi,Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  107. Angelo,Michael F.; Wisecup,George David; Collins,David L., Method and apparatus to provide enhanced computer protection.
  108. Neufeld,E. David; Angelo,Michael F., Method and apparatus to provide secure communication between systems.
  109. Hall, Robert J., Method and device for detecting computer intrusion.
  110. Hall, Robert J., Method and device for detecting computer network intrusions.
  111. Bancel, Frédéric; Berard, Nicolas, Method and device for protecting a memory against attacks by error injection.
  112. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  113. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  114. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  115. Audebert,Yves Louis Gabriel; Clemot,Olivier, Method and system for authenticating a personal security device vis-��-vis at least one remote computer system.
  116. Audebert,Yves Louis Gabriel; Clemot,Olivier, Method and system for authentication through a communications pipe.
  117. Charbonneau, Marc, Method and system for detecting a secure state of a computer system.
  118. Moore, Brian J.; Leshinsky, Yan, Method and system for enabling offline detection of software updates.
  119. Audebert, Yves Louis Gabriel; Clemot, Olivier, Method and system for establishing a communications pipe between a personal security device and a remote computer system.
  120. Arnold, Todd Weston; Challener, David Carroll, Method and system for providing limited-life machine-specific passwords for data processing systems.
  121. Zimmer, Vincent J.; Rothman, Michael A.; Dorwin, David, Method and system for recovery from an error in a computing device by transferring control from a virtual machine monitor to separate firmware instructions.
  122. Audebert, Yves Louis Gabriel; Clemot, Olivier, Method and system for remote activation and management of personal security devices.
  123. Audebert,Yves Louis Gabriel; Clemot,Olivier, Method and system for remote management of personal security devices.
  124. Audebert,Yves Louis Gabriel; Clemot,Olivier, Method and system for scripting commands and data for use by a personal security device.
  125. Nagabhushan, Gayathri; Sahita, Ravi; Khosravi, Hormuzd; Grover, Satyajit, Method and system for whitelisting software components.
  126. Murray, Douglas G., Method and system verifying product licenses using hardware and product identifications.
  127. Jackson, Mark D., Method for developing gaming programs compatible with a computerized gaming operating system and apparatus.
  128. Thomas,Martin; Schneider,Klaus; Aue,Axel, Method for protecting a microcomputer system against manipulation of data stored in a storage arrangement of the microcomputer system.
  129. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jevasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  130. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  131. Brickell,Ernie F., Method of confirming a secure key exchange.
  132. Bocking, Andrew; Hardy, Michael Thomas; Roberts, Phillip; Rawlins, Rudy; Hanson, Ronald, Method of customizing a standardized IT policy.
  133. Roberts, Phillip; Hanson, Ronald J. J.; Rawlins, Rudy Eugene, Method of customizing a standardized IT policy.
  134. Roberts, Phillip; Hanson, Ronald J.J.; Rawlins, Rudy Eugene, Method of customizing a standardized IT policy.
  135. Roberts, Phillip; Rawlins, Rudy; Hanson, Ron, Method of customizing a standardized IT policy.
  136. Yoshida, Fumiyuki, Method of detecting software falsification, apparatus configured to detect software falsification, and computer-readable storage medium.
  137. Cromer, Daryl Carvis; Freeman, Joseph Wayne; Goodman, Steven Dale; Springfield, Randall Scott; Ward, James Peter, Method of providing enhanced security in a remotely managed computer system.
  138. Lim Ju-Hyung,KRX, Method of updating a BIOS ROM.
  139. Freeman,Joseph Wayne; Springfield,Randall Scott; Goodman,Steven Dale; Karpel,Isaac, Method to use secure passwords in an unsecure program environment.
  140. Vilppola, Kari M.; Manttari, Tommmi O., Method, apparatus, and computer program for providing application security.
  141. Zimmer,Vincent J.; Rothman,Michael A., Methods and apparatus for implementing a secure resume.
  142. Pearson, Adrian R.; Thornburg, Christopher Andrew; Brown, Steven J.; Munguia, Peter R., Methods and apparatus to protect memory regions during low-power states.
  143. Pearson, Adrian R.; Thornburg, Christopher Andrew; Brown, Steven J.; Munguia, Peter R., Methods and apparatus to protect memory regions during low-power states.
  144. Pearson, Adrian R.; Thornburg, Christopher Andrew; Brown, Steven J.; Munguia, Peter R., Methods and apparatus to protect memory regions during low-power states.
  145. Lutnaes, Sturla, Methods and devices for transferring security data between memories.
  146. Dewan, Prashant; Durham, David, Methods and systems to directly render an image and correlate corresponding user input in a secure memory domain.
  147. Taylor, Neil W., Methods for detecting executable code which has been altered.
  148. Taylor, Neil W., Methods for detecting executable code which has been altered.
  149. Davidov, Mlkhail, Mitigation of function pointer overwrite attacks.
  150. Bumiller, George B.; Buckley, Adrian, Mobile software terminal identifier.
  151. Bumiller,George B.; Buckley,Adrian, Mobile software terminal identifier.
  152. Millard,John; Spiegel,Mark, Opening computer files quickly and safely over a network.
  153. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Operating system upgrades in a trusted operating system environment.
  154. Bennett, Steven M.; Anderson, Andrew V.; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard; Zou, Xiang; Smith, III, Lawrence; Rodgers, Scott, Optimizing processor-managed resources based on the behavior of a virtual machine monitor.
  155. Bennett, Steven M.; Anderson, Andrew V.; Jeyasingh, Stalinselvaraj; Kägi, Alain; Neiger, Gilbert; Uhlig, Richard; Zou, Xiang; Smith, Lawrence; Rodgers, Scott, Optimizing processor-managed resources based on the behavior of a virtual machine monitor.
  156. Martinek, Michael G.; Jackson, Mark D.; Downs, III, Justin G., Pass-through live validation device and method.
  157. Nachenberg, Carey; Weinstein, Alex, Pattern matching using embedded functions.
  158. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  159. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  160. Herbert,Howard C.; Grawrock,David W.; Ellison,Carl M.; Golliver,Roger A.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for remote attestation of a platform.
  161. Rowe, Richard E.; Moser, Timothy W.; Schaefer, Craig Michael; Iddings, Cara; Nelson, Dwayne R., Pluggable modular gaming modifiers and configuration templates for gaming environments.
  162. Marr, Michael David; Brender, Scott A., Portion-level in-memory module authentication.
  163. Oerting, Timothy J.; Lafornara, Philip J.; Oliver, Robert Ian; Brender, Scott A.; Marr, Michael David, Portion-level in-memory module authentication.
  164. Jeschke, KoniKaye; Jorlett, Devon; Cunningham, James R., Predictive assessment of network risks.
  165. Sobel, William E.; Kennedy, Mark, Preventing unauthorized loading of late binding code into a process.
  166. Moran, Douglas R.; Acharya, Satish; Bogin, Zohar; Galloway, Sean G., Prioritized address decoder.
  167. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard, Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor.
  168. Matsushima, Hideki; Hirota, Teruto; Shoda, Yukie; Harada, Shunji, Program execution device.
  169. Matsushima, Hideki; Hirota, Teruto; Shoda, Yukie; Harada, Shunji, Program execution device.
  170. Matsushima, Hideki; Hirota, Teruto; Shoda, Yukie; Harada, Shunji, Program execution device.
  171. Mester,Michael L.; Gunsalus,Bradley W., Propagation protection within a network.
  172. Millard,John, Protecting a computer coupled to a network from malicious code infections.
  173. Fischer, Stephen A., Protection against return oriented programming attacks.
  174. Fischer, Stephen A., Protection against return oriented programming attacks.
  175. Fischer, Stephen A., Protection against return oriented programming attacks.
  176. Bennett,Steven M.; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K��gi,Alain; Neiger,Gilbert; Uhlig,Richard; Mondal,Sanjoy K.; Brandt,Jason, Providing support for single stepping a virtual machine in a virtual machine environment.
  177. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  178. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  179. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  180. Uhlig,Richard; Neiger,Gilbert; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Bennett,Steven M, Reclaiming existing fields in address translation data structures to extend control over memory accesses.
  181. Datta, Sham M.; Kumar, Mohan J.; Brickell, Ernie; Schoinas, Ioannis T.; Sutton, James A., Reconfiguring a secure system.
  182. Datta, Sham M.; Kumar, Mohan J.; Sutton, James A.; Brickell, Ernie; Schoinas, Ioannis T., Reconfiguring a secure system.
  183. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  184. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  185. Feinleib, David A.; Gulledge, Carl L.; Haroun, Wassef; Kempin, Joachim; Kolb, Kurt; Moran, Brian K.; Stubbs, Edward L.; Swed, Jacob D., Restricted software and hardware usage on a computer.
  186. Feinleib, David A.; Gulledge, Carl L.; Haroun, Wassef; Kempin, Joachim; Kolb, Kurt; Moran, Brian K.; Stubbs, Edward L.; Swed, Jacob D., Restricted software and hardware usage on a computer.
  187. Feinleib, David A.; Gulledge, Carl L.; Haroun, Wassef; Kempin, Joachim; Kolb, Kurt; Moran, Brian K.; Stubbs, Edward L.; Swed, Jacob D., Restricted software and hardware usage on a computer.
  188. Feinleib, David A.; Gulledge, Carl L.; Haroun, Wassef; Kempin, Joachim; Kolb, Kurt; Moran, Brian K.; Stubbs, Edward L.; Swed, Jacob D., Restricted software and hardware usage on a computer.
  189. Balard, Eric; Chateau, Alain; Azema, Jerome, Run-time firmware authentication.
  190. Khan, Salahuddin Christopher Jules; Abzarian, David, Safe hashing for network traffic.
  191. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  192. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  193. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  194. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  195. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  196. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  197. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  198. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  199. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  200. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  201. Hunt, Galen C.; Larus, James R.; Gounares, Alexander G.; Endres, Raymond E., Secure and stable hosting of third-party extensions to web services.
  202. England,Paul; Lampson,Butler W., Secure execution of program code.
  203. Azema, Jerome; Chateau, Alain; Balard, Eric, Secure management of configuration parameters in a computing platform.
  204. Dahan,Franck; Roussel,Christian; Chateau,Alain; Cumming,Peter, Secure mode for processors supporting interrupts.
  205. Durham, David; Khosravi, Hormuzd M.; Blumenthal, Uri; Long, Men, Secure platform voucher service for software components within an execution environment.
  206. Abu-Husein, Loay, Secure storage and execution of processor control programs by encryption and a program loader/decryption mechanism.
  207. Durham, David M.; Khosravi, Hormuzd M.; Blumenthal, Uri; Long, Men, Secure vault service for software components within an execution environment.
  208. Durham, David M.; Khosravi, Hormuzd M.; Blumenthal, Uri; Long, Men, Secure vault service for software components within an execution environment.
  209. Durham, David M; Khosravi, Hormuzd M; Blumenthal, Uri; Long, Men, Secure vault service for software components within an execution environment.
  210. Durham, David; Khosravi, Hormuzd; Blumenthal, Uri; Long, Men, Secure vault service for software components within an execution environment.
  211. Nachenberg,Carey; Szor,Peter, Selective detection of malicious computer code.
  212. Nachenberg,Carey, Signature driven cache extension for stream based scanning.
  213. Schluessler, Travis; Durham, David; Cox, George; Grewal, Karanvir Ken, Signed manifest for run-time verification of software program identity and integrity.
  214. Neiger,Gilbert; Anderson,Andrew V.; Bennett,Steven M.; Brandt,Jason; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K채gi,Alain; Mondal,Sanjoy K.; Parthasarathy,Rajesh; Rodgers,Dion; Smith,Lawrence O.; Uhlig,Richard A., Support for nested fault in a virtual machine environment.
  215. Kahandaliyanage, Shawn, System and method for application program operation on a wireless device.
  216. Kahandaliyanage, Shawn, System and method for application program operation on a wireless device.
  217. Kahandaliyanage, Shawn R., System and method for application program operation on a wireless device.
  218. Morais, Dinarte R., System and method for applying security to memory reads and writes.
  219. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  220. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  221. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  222. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  223. Shaw,Ronald D., System and method for communication of keyboard and touchpad inputs as HID packets embedded on a SMBus.
  224. Mayer, Yaron; Dechovich, Zak, System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages.
  225. Neiger, Gilbert; Bennett, Steven M.; Cota-Robles, Erik; Schoenberg, Sebastian; Hall, Clifford D.; Rodgers, Dion; Smith, Lawrence O.; Anderson, Andrew V.; Uhlig, Richard A.; Kozuch, Michael; Glew, Andy, System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time.
  226. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  227. Bailey, Abdul M.; Tang, Di; Khanna, Rahul; Zimmer, Vincent J.; Li, Kevin Y.; Edwards, James W., System and method for facilitating wireless communication during a pre-boot phase of a computing device.
  228. Hecksel David L. ; Duderstadt Russel A., System and method for product registration.
  229. Morais, Dinarte R., System and method for secure execution of program code.
  230. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  231. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  232. Bodis, Michael Louis; Sui, Jiayuan; Goodes, Grant Stewart; Liem, Clifford, System and method for securely binding and node-locking program execution to a trusted signature authority.
  233. Madduri, Hari Haranath, System and method for self policing of authorized configuration by end points.
  234. Morais, Dinarte R.; Andrews, Jeffrey A.; Hall, William E., System and method for using address bits to affect encryption.
  235. Morais,Dinarte R.; Andrews,Jeffrey A., System and method for using address bits to form an index into secure memory.
  236. Morais,Dinarte R.; Andrews,Jeffrey A., System and method for using address bits to signal security attributes of data in the address space.
  237. Morais, Dinarte R.; Andrews, Jeffrey A., System and method for using address lines to control memory usage.
  238. Ghose, Kanad, System and method for validating program execution at run-time.
  239. Ghose, Kanad, System and method for validating program execution at run-time.
  240. Ghose, Kanad, System and method for validating program execution at run-time using control flow signatures.
  241. Ghose, Kanad, System and method for validating program execution at run-time using control flow signatures.
  242. Ghose, Kanad, System and method for validating program execution at run-time using control flow signatures.
  243. Slodki, Zenon; Zhao, Xiaoding; Wichmann, Cliff, System and method for validation and enforcement of application security.
  244. Paul C. Drews, System and method for verifying the integrity and authorization of software before execution in a local platform.
  245. Little, Herbert Anthony; Clark, David; Owen, Russell Norman; Totzke, Scott William; Adams, Neil Patrick; Brown, Michael Stephen, System and method of installing software applications on electronic devices.
  246. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  247. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  248. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  249. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  250. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  251. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  252. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  253. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  254. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  255. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  256. Little, Herbert A.; Clark, David R., System and method of owner control of electronic devices.
  257. Little, Herbert A.; Clark, David R., System and method of owner control of electronic devices.
  258. Park, Su Wan; Kim, Geon Lyang; Lim, Kyung Soo; Lim, Jae Deok; Kim, Jeong Nyeo, System and method of verifying integrity of software.
  259. Jin, Hongxia; Lotspiech, Jeffrey Bruce, System and method to proactively detect software tampering.
  260. Jin,Hongxia; Lotspiech,Jeffrey Bruce, System and method to proactively detect software tampering.
  261. Angelo, Michael F.; Wisecup, George David; Collins, David L., System for validating a bios program and memory coupled therewith by using a boot block program having a validation routine.
  262. Bombalier, Ernesto Luis, Systems and methods for evaluating adherence to a project control process.
  263. Ostergren, Brian H.; Heutchy, Eric D., Systems and methods for free demonstration of online premium content prior to purchase.
  264. Thompson, Tracy; Bombalier, Ernesto L., Systems and methods for protecting proprietary data.
  265. Piwonka, Mark A.; Desselle, Bernard D.; Hobson, Louis B., Systems and methods of determining a trust level from system management mode.
  266. Dive-Reclus, Corinne, Tamper evident removable media storing executable code.
  267. Rothman,Michael A.; Zimmer,Vincent J.; Dorwin,David K., Technique for reconstituting a pre-boot firmware environment after launch of an operating system.
  268. Bennett, Steven M.; Neiger, Gilbert; Anderson, Andrew V., Timer offsetting mechanism in a virtual machine environment.
  269. Cota Robles,Erik; Schoenberg,Sebastian; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor.
  270. Ferguson, Niels T.; Stonich, Stacy N., Transactional sealed storage.
  271. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  272. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  273. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Transferring application secrets in a trusted operating system environment.
  274. Balacheff, Boris; Ali, Valiuddin Y.; Wang, Lan, Trusted component update system and method.
  275. Wiseman,Willard M.; Grawrock,David W., Trusted platform apparatus, system, and method.
  276. Grawrock, David, Trusted platform module for generating sealed data.
  277. Brackett,Charles Cameron, Ultrasound imaging system having computer virus protection.
  278. Neiger,Gilbert; Bennett,Steven M.; K��gi,Alain; Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Uhlig,Richard; Cota Robles,Erik; Rodgers,Scott; Smith,Lawrence, Use of multiple virtual machine monitors to handle privileged events.
  279. Rajagopal, Priya; Savagaonkar, Uday; Durham, David; Sahita, Ravi; Khosravi, Hormuzd, Validating a memory type modification attempt.
  280. Bennett,Steven M.; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael; Smith,Lawrence; Rodgers,Scott, Vectoring an interrupt or exception upon resuming operation of a virtual machine.
  281. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard; Schoenberg, Sebastian, Virtual translation lookaside buffer.
  282. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Virtual translation lookaside buffer.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로