Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

37results about "Computer security arrangements" patented technology

Methods for combating malicious software

ActiveUS20090077664A1Memory loss protectionError detection/correctionCausal treeData segment
A method for combating malware monitors all attempts by any software executing on a computer to write data to the computer's digital storage medium and records details of the attempts in a system database having a causal tree structure. The method also intercepts unauthorized attempts by executing objects to modify the memory allocated to other executing objects or to modify a selected set of protected objects stored on the digital storage medium, and may also intercept write attempts by executing objects that have a buffer overflow or that are executing in a data segment of memory. The method may include a procedure for switching the computer into a quasi-safe mode that disables all non-essential processes. Preferably, the database is automatically organized into software packages classified by malware threat level. Entire or packages or portions thereof may be easily selected and neutralized by a local or remote user.
Owner:ROBOT GENIUS

Methods for Single Signon (SSO) Using Decentralized Password and Credential Management

ActiveUS20130166918A1Decentralized credential managementShorten the timeUser identity/authority verificationComputer security arrangementsDistributed serversEnd to end security
A method for single sign-on (SSO) that provides decentralized credential management using end-to-end security. Credential (and other personal user information) management is decentralized in that encryption is performed locally on the user's computer. The user's encrypted credentials may be stored by the login server and / or a plurality of distributed servers / databases (such as a cloud). The login server never has access to the user's credentials or other personal information. When the user wants to use single sign-on, he enters his password into his browser and the browser submits the encrypted / hashed password to the login server for validation. Upon validation, the browser receives the user's encrypted credentials. The credentials are decrypted by the browser and provided to relevant websites to automatically log the user in.
Owner:SHAHBAZI MAJID +1

Strong authentication token usable with a plurality of independent application providers

ActiveUS20110099384A1Low costCost can be dividedMultiple keys/algorithms usageDigital data processing detailsPersonalizationUnique identifier
The present invention defines a strong authentication token for generating different dynamic credentials for different application providers comprising an input interface providing an output representing an application provider indicator; a secret key storage for storing one or more secret keys; a variability source for providing a dynamic variable value; a key providing agent for providing an application provider specific key as a function of said application provider indicator using one or more keys stored in said secret key storage; a cryptographic agent for cryptographically combining said application provider specific key with said dynamic variable value using symmetric cryptography; a transformation agent coupled to said cryptographic agent for transforming an output of said cryptographic agent to produce a dynamic credential; and an output interface to output said dynamic credential.
The present invention defines furthermore a method to manage the secret keys of strong authentication tokens that can generate dynamic credentials for more than one supported application provider or application provider group using different secret keys for each supported application provider or application provider group comprising generating for each of a batch of strong authentication tokens a token specific master key; personalising each token of said batch with the token specific master key associated with said token; generating for each of a plurality of supported application providers or application provider groups a set of application provider specific token keys, one application provider specific token key for each token of said batch, whereby each application provider specific token key of each of said sets is derived from that token's token specific master key and a unique identifier or indicator of that application provider or application provider group; providing to each application provider or an entity that is responsible for the verification on behalf of said application provider of the dynamic credentials that are generated for said application provider, the corresponding set of application provider specific token keys.
Owner:ONESPAN NORTH AMERICA INC

Centralized Device Virtualization Layer For Heterogeneous Processing Units

ActiveUS20100146620A1Operational speed enhancementResource allocationVirtualizationOperational system
A method for providing an operating system access to devices, including enumerating hardware devices and virtualized devices, where resources associated with a first hardware device are divided into guest physical resources creating a software virtualized device, and multiple instances of resources associated with a second hardware device are advertised thereby creating a hardware virtualized device. First and second permission lists are generated that specify which operating systems are permitted to access the software virtualized device and the hardware virtualized device, respectively. First and second sets of virtual address maps are generated, where each set maps an address space associated with either the software virtualized device or the hardware virtualized device into an address space associated with each operating system included in the corresponding permission list. The method further includes arbitrating access requests from each of the plurality of operating systems based on the permission lists and the virtual address maps.
Owner:NVIDIA CORP

Malware detection system with contextual analysis

A computerized method for detecting malware associated with an object. The method includes operations of analyzing an object to obtain a first set of attributes, where the first set of attributes include one or more characteristics associated with the object. Furthermore, the object is processed with a virtual machine to obtain a second set of attributes. The second set of attributes corresponds to one or more monitored behaviors of the virtual machine during processing of the object. Thereafter, a threat index is determined based, at least in part, on a combination of at least one attribute of the first set of attributes and at least one attribute of the second set of attributes. The threat index represents a probability of maliciousness associated with the object.
Owner:FIREEYE SECURITY HLDG US LLC

System and Method for Detecting and Evicting Malicious Vehicles in a Vehicle Communications Network

ActiveUS20110214178A1Improve performanceReduce impactMemory loss protectionError detection/correctionMathematical modelSimulation
In a vehicle communication network, some vehicles may be used by attackers to send false information to other vehicles which may jeopardize the safety of other vehicles. Vehicles should be able to detect malicious communications activities and to mitigate the impact of malicious vehicles by evicting (eliminating) suspected malicious vehicles from the system. Evicting a vehicle is to ignore the messages sent from the vehicle for a specified time period. Voting and sacrifice principles are combined using a mathematical model based on the “Mafia Game”. The Mafia Game model focuses on the relative size of the group of attackers within a neighborhood necessary to dominate the entire network in the neighborhood (i.e., to eventually evict all the innocent vehicles).
Owner:PERSPECTA LABS INC

Encrypting and authenticating equipment with dual safety chips

The invention discloses an encrypting and authenticating equipment with dual safety chips, belonging to the technical field of identity authentication. The equipment comprises a shell, a USB plug outside the shell, a first safety chip, a second safety chip and a radio-frequency antenna, wherein the first safety chip, the second safety chip and the radio-frequency antenna are encapsulated in the shell; the first safety chip is connected with the USB plug, is connected with the second safety chip in the shell, and is also connected with an external system host computer by the USB plug; the second safety chip is connected with the radio-frequency antenna and is connected with a radio-frequency receiving terminal by the radio-frequency antenna; and the first safety chip and the second safety chip carry out communication with each other by an I/O interface. In the invention, two safety chips are used, the two safety chips are internally embedded in an intelligent card embedding software system respectively, thus realizing one corresponding application respectively; and the mutual independence of the two safety chips is effectively ensured, the safe and convenient multi-application formsare realized, furthermore, the two safety chips can realize the safe communication by the I/O interface.
Owner:BEIJING HUADA ZHIBAO ELECTRONICS SYST

System and method for securing computers against computer viruses

ActiveUS8458797B1Memory loss protectionDigital data processing detailsProgramming languageAntidote
In one embodiment, an antivirus mechanism (e.g., antivirus program) in a computer initiates shielding procedures in response to a triggering event indicative of a presence of a virus in the computer, the virus being of a type not recognized by the antivirus program. The shielding procedures advantageously protect important components of the computer while the antivirus program does not have the requisite antidote to directly deal with the virus.
Owner:TREND MICRO INC

File encryption operation method and file encryption operation system

The invention discloses a file encryption operation method and a file encryption operation system. The method comprises the steps of: receiving a file operation instruction; transferring an encrypted target file according to the file operation instruction; carrying out memory decryption on the encrypted target file according to key information corresponding to the encrypted target file, and operating the encrypted target file after memory decryption. According to the scheme disclosed by the invention, the password of the encrypted target file does not need to be manually input; opening and operating of the file can be achieved by decrypting the file without a manual operation, and the operating efficiency of the key information is improved. On the other hand, the encrypted target file is decrypted by the key information in the memory; the decrypted file is stored in the memory, and a permanent file is not generated, therefore, the password is not stolen by the others, and the operating security of the encrypted file is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD +1

Mesh communications network having mesh ports

A method for communicating over a mesh network established between a plurality of devices is disclosed. Each device has a wireless radio and the method involves launching a mesh service on each device, the mesh service being operable to cause a processor circuit of the device to provide functionality for controlling the wireless radio for communication between devices over the mesh network. Each device has at least one application running on the device, the at least one application being associated with a mesh port, the mesh port being used to designate data transmissions as being associated with instances of a specific application running on at least some of the devices in the plurality of devices, the at least one application and the mesh service on each device being in data communication. The method also involves, in response to a specific application running on a device requesting the mesh service to provide access to the mesh network for communication via a specific mesh port, causing the mesh service to determine whether the specific application is authorized for communications on the specific mesh port, and if the specific application is authorized, processing requests from the application to communicate on the specific mesh port over the mesh network and forwarding data transmissions associated with the specific mesh port to the specific application, and if the specific application is not authorized, declining requests from the application to communicate on the specific mesh port over the mesh network and preventing access by the specific application to data transmissions associated with the specific mesh port.
Owner:LEFT OF THE DOT MEDIA

Access permission control method, access permission control device and access permission control system

ActiveCN102750493AIncrease flexibilityGuaranteed uptimeComputer security arrangementsUser PrivilegeApplication programming interface
The embodiment of the invention provides an access permission control method, an access permission control device and an access permission control system. The access permission control method comprises the following steps that first user information and first visit object information transmitted through an application programming interface when application program invokes the application programming interface are obtained; when a first user corresponding to the first user information does not have the access permission of system resources indicated by the first visit object information, virtual resources are visited according to the first visit object information to generate the first visit result, and in addition, the first visit result is returned to application program through the application program interface. The access permission control method, the access permission control device and the access permission control system provided by the embodiment of the invention have the advantages that when users do not have the access permission of the system resources, the normal operation of the application program can be ensured through visiting the virtual resources, the abnormal exit is avoided, and the operation reliability of the application program and the flexibility of user permission setting are greatly improved.
Owner:HUAWEI DEVICE CO LTD

Method for controlling production quantity of set-top boxes

InactiveCN101944195APrevent copyingCopyright protectionComputer security arrangementsResourcesStopped workCPUID
In order to solve the technical problem that a conventional set-top box is easy to crack and copy, the invention provides a method for controlling the production quantity of set-top boxes. The method comprises the following steps of: encrypting CPUid and a set-top box sequence number by adopting a DES algorithm; storing encrypted data into a server; and verifying whether pairing information is correct when the set-top box is turned on every time, if not correct, the set-top box stops working so as to limit the production quantity of the set-top boxes. The method has the advantages that: simple implementation, low cost and not easy cracking; and the quantity of the set-top boxes can be controlled by binding the CPUid and the set-top sequence number so as to prevent the software of the set-top box from being copied and protect the copyright of the software of the set-top box.
Owner:KONKA GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products