Secure identification of executable file for reliability determination entity
    2.
    发明专利
    Secure identification of executable file for reliability determination entity 有权
    用于可靠性确定实体的可执行文件的安全确定

    公开(公告)号:JP2005129045A

    公开(公告)日:2005-05-19

    申请号:JP2004295110

    申请日:2004-10-07

    CPC classification number: G06F21/62

    Abstract: PROBLEM TO BE SOLVED: To supply authentication information to be used for a resource provider who supplies a resource to authenticate a resource recipient to the resource recipient. SOLUTION: A resource 12 is acquired from a resource provider (RP) 10 for a resource requester (RR) 14 operating on a computing device 18. The RR 14 is provided with an identify descriptor(id) 20 including security relevance information to designate an environment where the RR 14 is operating. A code identity code(code ID) 22 is calculated based on the loaded RR14 and id 20. The RP 10 verifies that the code ID calculated in the request of the resource 12 is matched with one of one or more valid codes ID 22 for the identified RR 14, and concludes that the RR 14 and id 20 are reliable, and the RP 10 supplies the requested resource 12 to the RR 14, and responds to the transferred request. COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:提供用于提供资源的资源提供者的认证信息,以向资源接收者认证资源接收者。 解决方案:从用于在计算设备18上运行的资源请求者(RR)14的资源提供者(RP)10获取资源12.RR14具有包括安全相关信息的标识描述符(id)20 指定RR 14运行的环境。 基于加载的RR14和ID20计算代码标识码(代码ID)22 .RR 10验证在资源12的请求中计算的代码ID与一个或多个有效代码ID 22中的一个匹配,用于 标识的RR 14,并且得出结论,RR 14和ID 20是可靠的,并且RP 10将请求的资源12提供给RR14,并且响应于所传送的请求。 版权所有(C)2005,JPO&NCIPI

    Integration of high-assurance feature into application through application factoring
    3.
    发明专利
    Integration of high-assurance feature into application through application factoring 有权
    通过应用因素将高保真特征集成到应用中

    公开(公告)号:JP2005129033A

    公开(公告)日:2005-05-19

    申请号:JP2004278411

    申请日:2004-09-24

    CPC classification number: G06F21/53

    Abstract: PROBLEM TO BE SOLVED: To execute, in parallel with each other, a large-scale system having advanced features and a small-scale system for providing high-level security. SOLUTION: An application's functionality is partitioned into two groups depending on whether or not a specific operation like processing of secret data is executed. Separate software objects (processors) are created to perform these two groups of operations. A trusted processor handles secure data and runs in a high-assurance environment. When another processor detects secure data, that data are sent to the trusted processor. The data are wrapped in such a way that allows it to be routed to the trusted processor, and prevents the data from being deciphered by any entity other than the trusted processor. An infrastructure is provided that wraps objects, routes the objects to the correct processor, and allows their integrity to be attested through a chain of trust leading back to a base component that is known to be trustworthy. COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:并行执行具有高级特征的大型系统和用于提供高级安全性的小规模系统。 解决方案:根据是否执行特定操作(如处理秘密数据),将应用程序的功能划分为两组。 创建独立的软件对象(处理器)来执行这两组操作。 值得信赖的处理器处理安全数据并在高保证环境中运行。 当另一个处理器检测到安全数据时,该数据被发送到可信处理器。 数据被包装成允许其被路由到可信处理器的方式,并且防止数据被除了可信处理器之外的任何实体解密。 提供了一个基础设施,用于包装对象,将对象路由到正确的处理器,并通过一个信任链来验证其完整性,并将其引导回已知可靠的基础组件。 版权所有(C)2005,JPO&NCIPI

    USING SCENARIO-RELATED INFORMATION TO CUSTOMIZE USER EXPERIENCES
    5.
    发明公开
    USING SCENARIO-RELATED INFORMATION TO CUSTOMIZE USER EXPERIENCES 审中-公开
    情景相关信息个性化的用户使用感受

    公开(公告)号:EP2126724A4

    公开(公告)日:2011-03-16

    申请号:EP08731375

    申请日:2008-03-04

    Applicant: MICROSOFT CORP

    CPC classification number: G06F17/3089 G06F17/30643 G06F17/30867

    Abstract: Methods for using scenario solution-related information to generate customized user experiences are provided. Upon receiving a user query, a plurality of results is returned, each result being representative of a scenario solution which may be utilized to address a particular issue relevant to the received query. At the time of authoring, each scenario solution is organized based upon one or more keywords and/or one or more categories (i.e., namespaces). Data associated with a namespace/keyword corresponding to a returned search result may be mined to determine information beyond basic scenario solution search results that may be of interest to the user. As the namespace(s)/keyword(s) in association with which to organize a particular executable scenario solution is determined by the author of the scenario solution, other information associated with the same namespace/keyword (and/or a namespace/keyword having a relationship thereto) is likely to be more relevant than information organized based upon keywords alone.

    10.
    发明专利
    未知

    公开(公告)号:BRPI0404008A

    公开(公告)日:2005-06-21

    申请号:BRPI0404008

    申请日:2004-09-23

    Applicant: MICROSOFT CORP

    Abstract: Application factoring or partitioning is used to integrate secure features into a conventional application. An application's functionality is partitioned into two sets according to whether a given action does, or does not, involve the handling of sensitive data. Separate software objects (processors) are created to perform these two sets of actions. A trusted processor handles secure data and runs in a high-assurance environment. When another processor encounters secure data, that data is sent to the trusted processor. The data is wrapped in such a way that allows it to be routed to the trusted processor, and prevents the data from being deciphered by any entity other than the trusted processor. An infrastructure is provided that wraps objects, routes them to the correct processor, and allows their integrity to be attested through a chain of trust leading back to base component that is known to be trustworthy.

Patent Agency Ranking