Event handling system
    1.
    发明授权
    Event handling system 失效
    事件处理系统

    公开(公告)号:US08121973B2

    公开(公告)日:2012-02-21

    申请号:US12004980

    申请日:2007-12-20

    Abstract: An event handling system to schedule and translate semantic deductions form Intelligent Agents and sensors into events capable of being made observable by a Recipient system such as monitor that provides a particular view of virtual objects and events is disclosed. The event handling system also encapsulates the system's notion of time. In fact, a human observer can shift the system along the temporal axis (up to the present) in order to replay events, or undertake analyses as a result of speeded-up or slowed-down notions of system time. The event handling system receives events from Clients/Sources via connections through the event handling system Input Portals, and uses Shared Memory as its form of inter-process communication with the Monitors. The event handling system makes events available for a recipient observation sub-system to read and provide their particular view. There can be many Clients and Recipient systems connected to the event handling system at the same time.

    Abstract translation: 公开了一种用于调度和翻译语义扣除的事件处理系统,其将智能代理和传感器转换为能够由收件人系统(例如提供虚拟对象和事件的特定视图的监视器)使其可观察到的事件。 事件处理系统还封装了系统的时间概念。 事实上,人类观察者可以将系统沿着时间轴(直到现在)移动,以便重播事件,或者由于系统时间的加速或减慢的概念进行分析。 事件处理系统通过连接通过事件处理系统输入端口从客户端/源接收事件,并使用共享内存作为与监视器进程间通信的形式。 事件处理系统使得接收者观察子系统可以查看并提供其特定视图。 可以有许多客户端和收件人系统同时连接到事件处理系统。

    Method for providing message document security by deleting predetermined
header portions and attaching predetermined header portions when seal
is validly associated with message or document
    2.
    发明授权
    Method for providing message document security by deleting predetermined header portions and attaching predetermined header portions when seal is validly associated with message or document 失效
    用于通过删除预定标头部分并且当密封与消息或文档有效地相关联时附加预定标题部分来提供消息文档安全性的方法

    公开(公告)号:US5832227A

    公开(公告)日:1998-11-03

    申请号:US481398

    申请日:1995-08-18

    Abstract: The disclosure of the current invention describes a method of handling a message or a document to be released external of a secure computer environment. The message or the document is first directed to a trusted sealing device which displays the message or the document to a human user for visual checking. If the message or document is acceptable to the human user, the method associates the message or the document with a seal produced by the trusted sealing device. The message or the document is then directed along with the associated seal to a gateway which deletes portions of the header and checks the validity of the associated seal. If, as a result of this verification, it is determined that the associated seal is validly associated with the message or the document, the method attaches predetermined header portions to the message or document and communicates the message or the document from the secure computer environment.

    Abstract translation: PCT No.PCT / AU93 / 00644 Sec。 371日期:1995年8月18日 102(e)日期1995年8月18日PCT提交1993年12月14日PCT公布。 出版物WO94 / 14258 日期1994年6月23日本发明的公开内容描述了处理在安全计算机环境外部释放的消息或文档的方法。 消息或文档首先被引导到信任的密封装置,其将消息或文档显示给人类用户进行目视检查。 如果消息或文档是人类可接受的,则该方法将消息或文档与可信密封装置产生的密封相关联。 然后将消息或文档与相关联的密封一起引导到网关,其删除标题的部分并检查相关联的密封的有效性。 如果作为该验证的结果,确定相关联的密封件与消息或文档有效地相关联,则该方法将预定标题部分附加到消息或文档,并从安全计算机环境传送消息或文档。

    Geographic view of a modelling system
    3.
    发明授权
    Geographic view of a modelling system 失效
    建模系统的地理视图

    公开(公告)号:US07250944B2

    公开(公告)日:2007-07-31

    申请号:US10312806

    申请日:2002-04-30

    Abstract: Geo View is a three-dimensional virtual universe in which a real-world or virtual object may be represented by one or more virtual objects whose attributes are derived from attributes of the real-world object via a flexible user-specifiable mapping. Typically a two-dimensional plane located in three-dimensional space is used to visualize the universe of interest. The placement of virtual objects in the universe typically having a shape is governed by the absolute or relative geographical location of the real-world objects, and also by a flexible set of user-specified layout rules. In addition to the visualisation of various objects, the human observer can attach sounds to objects. The representation of real-world objects with rapidly time-changing attributes may be simplified by the use of Synthetic Strobes, flexible user-specified filters which shift changes in the visual attributes of a shape from one time-domain to another.

    Abstract translation: 地理视图是一种三维虚拟宇宙,其中现实世界或虚拟对象可以由一个或多个虚拟对象来表示,该虚拟对象的属性通过灵活的用户可指定映射从真实世界对象的属性派生。 通常,位于三维空间中的二维平面用于可视化感兴趣的宇宙。 通常具有形状的宇宙中的虚拟对象的放置由真实世界对象的绝对或相对地理位置以及用户指定的布局规则的灵活集合来管理。 除了可视化各种物体之外,人类观察者可以将声音附加到物体上。 具有快速时间变化属性的真实世界对象的表示可以通过使用合成色彩,灵活的用户指定的过滤器来简化,该滤镜将形状的视觉属性的变化从一个时域转移到另一个时域。

    Data processing and observation system
    4.
    发明授权
    Data processing and observation system 失效
    数据处理与观察系统

    公开(公告)号:US07085683B2

    公开(公告)日:2006-08-01

    申请号:US10312808

    申请日:2002-04-30

    Abstract: An observation paradigm that works with a collection of the abovementioned elements, to provide a way of observing information infrastructures and data movement in a chosen time frame. The user (human observer) is provided sophisticated controls and interaction mechanisms that will make it easier for them to detect computer network intrusion and critical security management events in real time as well as allow them to better analyze past events. Embodiments may include various combinations of a framework for “intelligent agents”; an event handling system and a high-performance multi-layer observation facility presenting the user with a semantically dense depiction of an information source under consideration, such as a computer network.

    Abstract translation: 一个观察范例,与上述要素的集合一起提供一种在选定的时间框架内观察信息基础设施和数据移动的方式。 用户(人类观察者)提供了复杂的控制和交互机制,使他们更容易实时检测计算机网络入侵和关键安全管理事件,并允许他们更好地分析过去的事件。 实施例可以包括用于“智能代理”的框架的各种组合; 事件处理系统和高性能多层观察设备,向用户呈现正在考虑的信息源的语义密集描绘,诸如计算机网络。

    Data view of a modelling system
    5.
    发明授权
    Data view of a modelling system 失效
    建模系统的数据视图

    公开(公告)号:US07027055B2

    公开(公告)日:2006-04-11

    申请号:US10312788

    申请日:2002-04-30

    Abstract: An observation sub-system is described wherein in three-dimensional (3D) views of objects and their interactions over time are provided. Each different view is based on a fundamental visualization paradigm. Heavily interacting objects can be depicted as being located “close together”. Rules are created so as to define the position of objects not only from the perspective of whether interaction occurred, but also the amount of interaction, and the rate of interaction. Despite using proximity to show whether an object is interacting with another, further visual mechanisms are used for the user to be able to analyze the type of data interaction, and the current state of affairs of interaction within a specified time slice. There are two types of forces acting on objects in the data view universe, gravitational (as a result of the mass of an object) and electrostatic (as a result of the charge on an object).

    Abstract translation: 描述了一种观察子系统,其中提供了对象的三维(3D)视图及其随时间的相互作用。 每个不同的视图都是基于一个基本的可视化范例。 重要的交互对象可以被描述为位于“靠近在一起”。 创建规则,以便定义对象的位置,不仅从交互是否发生的角度,还涉及交互的量以及交互的速度。 尽管使用邻近来显示对象是否与另一对象进行交互,但是使用进一步的视觉机制来使用户能够分析数据交互的类型以及指定时间片内的当前交互状态。 有两种类型的力作用于数据视图中的对象,重力(作为对象的质量的结果)和静电(作为对象上的电荷的结果)。

    Communications security and trusted path method and means
    6.
    发明授权
    Communications security and trusted path method and means 失效
    通信安全和可信路径的方法和手段

    公开(公告)号:US06836548B1

    公开(公告)日:2004-12-28

    申请号:US07970556

    申请日:1992-11-04

    CPC classification number: G06F21/72 G06F21/73 G06F21/84

    Abstract: A trusted path device is described which may be used stand alone or may be retrofitted to a users untrusted computer console or workstation so that an untrusted data input may be displayed on an untrusted display and verified by the user, following which the trusted data can be output to an untrusted or trusted device or network. The output may be encrypted or not, by means of an encryption device which may or may not use a ‘one time pad’ key provided from a structured array of retrievable “one time pad” keys having associated uniquely there with, a serial number which itself need not be encrypted but with which the input data and encrypted output data are uniquely associated. Sufficient “one time pad” keys are provided on a commonly available and physically manageable medium so as to allow much simplified key management procedures while still maintaining high levels of correctness and effectiveness of the encryption processes. Trusted devices as per ITSEC Level 6 may be used to implement the trusted path and encryption devices since the apparatus according to the invention are inherently simple in functionality thereby simplifying conformance with the relevant ITSEC and security equivalent requirements.

    Abstract translation: 描述了可信路径设备,其可以被单独使用或者可以被改造到用户不可信计算机控制台或工作站,使得不可信数据输入可以显示在不可信的显示器上并被用户验证,随后可信数据可以是 输出到不受信任的或可信任的设备或网络。 可以通过加密设备来加密输出,该加密设备可以使用或不使用从具有与其唯一相关联的可检索“一次性密码”键的结构化阵列提供的“一次性密钥”密钥,序列号 本身不需要加密,而是与输入数据和加密输出数据唯一相关联。 在一个普遍可用和物理上可管理的介质上提供了足够的“一次性”键,以便允许大量简化的密钥管理过程,同时仍然保持加密过程的高水平的正确性和有效性。 根据本发明的设备本身就具有简单的功能性,从而简化了与相关ITSEC和安全等效要求的一致性,因此可以使用根据ITSEC 6级的可信设备来实现可信路径和加密设备。

    Complex document security
    7.
    发明授权
    Complex document security 失效
    复杂的文件安全

    公开(公告)号:US5701342A

    公开(公告)日:1997-12-23

    申请号:US481397

    申请日:1995-08-28

    Abstract: A method and means to control the degree to which the presence of covert information may be reduced, eliminated or corrupted in documents created on a computer device (particularly complex documents) before the document is transmitted outside a secure environment in which the document is created. The process of handling a document in a secure environment comprises the preferred step of displaying the document or a predetermined portion thereof in a manner which conforms to the rule that no pixel of the display is written to more than once for the current portion of the document being displayed. Preferably the method includes the steps of creating a document, transforming the document into an intermediate form by defining the content and structure of the document using a predetermined set of document describers, applying the intermediate form of the document to at least one filter adapted to eliminate or corrupt the content and form of any covert information contained within the intermediate form of the document followed by the previously described step of displaying the document in the manner described above.

    Abstract translation: PCT No.PCT / AU93 / 00645 Sec。 371日期:1995年8月28日 102(e)日期1995年8月28日PCT提交1993年12月14日PCT公布。 WO94 / 14259 PCT公开号 日期1994年6月23日一种用于控制在将文档在安全环境之外传输的计算机设备(特别是复杂文档)下创建的文档中可以减少,消除或损坏隐藏信息的存在程度的方法和装置, 创建文档。 在安全环境中处理文档的过程包括以符合规则的方式显示文档或其预定部分的优选步骤,即对于文档的当前部分不将多个显示器的像素写入不止一次 正在显示。 优选地,该方法包括以下步骤:创建文档,通过使用预定的一组文档描述符定义文档的内容和结构将文档变换为中间形式,将文档的中间形式应用于适于消除的文档的至少一个过滤器 或者破坏包含在文档的中间形式中的任何隐蔽信息的内容和形式,其后跟上述以上述方式显示文档的步骤。

    Secure computer architecture
    8.
    发明授权
    Secure computer architecture 失效
    安全的计算机体系结构

    公开(公告)号:US6115819A

    公开(公告)日:2000-09-05

    申请号:US737908

    申请日:1996-11-26

    Abstract: A secure computer architecture having a central processing unit, zero or more memories, at least one input, at least one output and a bus to communicate signals between the components which are all untrusted elements. The computer architecture also includes a trusted access monitor device, a trusted gateway device located between each of the memories, a further trusted gateway device located between each of the inputs and the bus, and a further trusted gateway device located between each of the outputs and the bus, where the access monitor device controls either the one-way or two-way direction of the signals through a respective gateway device. In one aspect of the invention each memory location is each of the zero or more memories, and each input and each output has a respective tag which is representative of a security related attribute associated with the data in that memory location or that input or that output. The trusted access monitor contains tags which are representative of other security attributes of the processes that can be processed by the central processing unit, whereby when the central processing unit attempts to perform an access to data in a memory location or an input operation using the input or an output operation using the output, the access monitor compares the respective tags and controls either the one-way or two-way direction of the signals through a respective gateway device. The architecture disclosed can be adapted to fit within a device which connects to a peripheral input/output port of an untrusted computer device.

    Abstract translation: PCT No.PCT / AU95 / 00296 Sec。 371日期1996年11月26日 102(e)日期1996年11月26日PCT提交1995年5月18日PCT公布。 公开号WO95 / 33239 日期1995年12月7日具有中央处理单元,零个或多个存储器,至少一个输入,至少一个输出和总线的安全计算机体系结构,用于在所有不可信元件之间传送信号。 计算机体系结构还包括信任的访问监控设备,位于每个存储器之间的可信网关设备,位于每个输入和总线之间的另外的可信网关设备,以及位于每个输出和 总线,其中访问监视器设备通过相应的网关设备来控制信号的单向或双向方向。 在本发明的一个方面,每个存储器位置是零个或多个存储器中的每一个,并且每个输入和每个输出具有代表与该存储器位置中的数据相关联的安全相关属性的相应标签,或者该输入或该输出 。 可信访问监视器包含代表可由中央处理单元处理的进程的其他安全属性的标签,由此当中央处理单元尝试使用输入来执行对存储器位置中的数据的访问或输入操作时 或使用输出的输出操作,则访问监视器比较各个标签,并通过相应的网关设备控制信号的单向或双向方向。 所公开的架构可以适于安装在连接到不可信计算机设备的外围输入/输出端口的设备中。

    Event handling system
    10.
    发明申请
    Event handling system 失效
    事件处理系统

    公开(公告)号:US20080216094A1

    公开(公告)日:2008-09-04

    申请号:US12004980

    申请日:2007-12-20

    Abstract: An event handling system to schedule and translate semantic deductions form Intelligent Agents and sensors into events capable of being made observable by a Recipient system such as monitor that provides a particular view of virtual objects and events is disclosed. The event handling system also encapsulates the system's notion of time. In fact, a human observer can shift the system along the temporal axis (up to the present) in order to replay events, or undertake analyses as a result of speeded-up or slowed-down notions of system time. The event handling system receives events from Clients/Sources via connections through the event handling system Input Portals, and uses Shared Memory as its form of inter-process communication with the Monitors. The event handling system makes events available for a recipient observation sub-system to read and provide their particular view. There can be many Clients and Recipient systems connected to the event handling system at the same time.

    Abstract translation: 公开了一种用于调度和翻译语义扣除的事件处理系统,其将智能代理和传感器转换为能够由收件人系统(例如提供虚拟对象和事件的特定视图的监视器)使其可观察到的事件。 事件处理系统还封装了系统的时间概念。 事实上,人类观察者可以将系统沿着时间轴(直到现在)移动,以便重播事件,或者由于系统时间的加速或减慢的概念进行分析。 事件处理系统通过连接通过事件处理系统输入端口从客户端/源接收事件,并使用共享内存作为与监视器进程间通信的形式。 事件处理系统使得接收者观察子系统可以查看并提供其特定视图。 可以有许多客户端和收件人系统同时连接到事件处理系统。

Patent Agency Ranking