System and Method for Component Trust Model in Peer-to-Peer Service Composition
    1.
    发明申请
    System and Method for Component Trust Model in Peer-to-Peer Service Composition 审中-公开
    对等服务组合中组件信任模型的系统和方法

    公开(公告)号:US20110010533A1

    公开(公告)日:2011-01-13

    申请号:US11991498

    申请日:2006-09-12

    Abstract: A system is provided for composition trust binding in a peer-to-peer network environment. The system includes: a service requestor (21) residing on a peer (22) in the network and able to invoke a service (23) residing on another peer (24) in the network. The service requestor is also able to communicate a composition trust binding to the peer hosting the service, where the composition trust binding i a set of rules that define a collection of allowable software components which may be invoked by the service. A validation agent (25) ensures that the service executes in accordance with the binding.

    Abstract translation: 提供了一种用于对等网络环境中的组合信任绑定的系统。 该系统包括:驻留在网络中的对等体(22)上并能够调用驻留在网络中的另一对等体(24)上的服务(23)的服务请求者(21)。 服务请求者还能够将组合信任绑定到托管服务的对等体,其中组合信任绑定我定义可由服务调用的许可软件组件的集合的一组规则。 验证代理(25)确保服务根据绑定执行。

    Using hardware to secure areas of long term storage in CE devices
    3.
    发明授权
    Using hardware to secure areas of long term storage in CE devices 有权
    使用硬件来确保CE设备中的长期存储区域

    公开(公告)号:US07502946B2

    公开(公告)日:2009-03-10

    申请号:US11038969

    申请日:2005-01-20

    Abstract: A system includes long-term storage (e.g., flash memory) for storing sensitive data and critical components of a consumer electronic (CE) device such as an operating system (OS) kernel, private cryptographic key values, security applications, and firmware configurations, for example. Security hardware/software designates and restricts access to secured portions of long-term storage that contain the critical components. Requests for access to these secured portions are addressed by the security hardware/software, which authenticates a cryptographic authorization code received with the request. Read-write access to the secured portions is allowed for download and installation of, for example, a software or firmware upgrade if the cryptographic authorization code is authenticated.

    Abstract translation: 系统包括用于存储敏感数据的长期存储(例如闪速存储器)和诸如操作系统(OS)内核,专用密码值,安全应用和固件配置的消费电子(CE)设备的关键组件, 例如。 安全硬件/软件指定并限制对包含关键组件的长期存储的安全部分的访问。 访问这些安全部分的请求由安全硬件/软件来解决,安全硬件/软件对用该请求接收的密码授权码进行认证。 如果加密授权码被认证,允许对安全部分的读写访问进行下载和安装,例如软件或固件升级。

    Table driven method for calculating arithmetic inverse for use in cryptography

    公开(公告)号:US07068785B2

    公开(公告)日:2006-06-27

    申请号:US10067563

    申请日:2002-02-05

    CPC classification number: G06F7/721

    Abstract: A method for calculating the arithmetic inverse of a number V modulo U, where U is a prime number, that may be used in cryptography, uses a modified extended greatest common divisor (GCD) algorithm that includes a plurality of reduction steps and a plurality of inverse calculations. In this algorithm, the values U and V are assigned to respective temporary variables U3 and V3 and initial values are assigned to respective temporary variables U2 and V2. The algorithm then tests a condition and, if the condition tests true, combines multiple ones of the plurality of reduction steps and multiple ones of the inverse calculations into a single iteration of the GCD algorithm.

Patent Agency Ranking