Dik
Bryan J. Dik, Fort Collins, CO US
Patent application number | Description | Published |
---|---|---|
20150248632 | Computer Implemented Method For Personal Attribute Valuation And Matching With Occupations And Organizations - A computer implemented system and method for personal attribute valuation and match with occupations and organizations which provides computer elements and computer code which functions to calculate a congruence index which provides an objective measure of person to occupation fit and person to organization fit. | 09-03-2015 |
Casper H. Dik, Amersfoort NL
Patent application number | Description | Published |
---|---|---|
20100070775 | METHOD AND SYSTEM FOR DETECTING MODIFIED PAGES - A method for validating program execution. The method involves identifying a program from a second computer system, obtaining, by a first computer system, a first copy of a page for a file of the program from a second computer system, calculating a hash value for the first copy, storing the first copy in a local memory of the first computer system, storing the hash value for the first copy, and executing the program on the first computer system, where the first copy is removed from the local memory during execution of the program. The method further involves obtaining a second copy of the page from the second computer system, calculating a hash for the second copy, determining whether the hash value for the first copy is equal to the hash value for the second copy, and performing an appropriate action in response to the determination. | 03-18-2010 |
Casper H. Dik, Amsterdam NL
Patent application number | Description | Published |
---|---|---|
20100031012 | CORE INITIALIZATION CODE VALIDATION - Files essential to the boot sequence are validated as they are executed. As core boot files are loaded and executed by a computers a hash of the files is created and extended into configuration registers. Core operating system files are verified by the boot loader using a digital signature, and the public key used to verify the digital signature is recorded in a configuration register. Core operating system files verified by the boot loader include a list of hash values, which is used by the operating system to validate the other files as they are executed. User assurance that the system has booted correctly is achieved by comparing the state of configuration registers to previously stored values reflecting the expected state of the registers. Upon the state of the configuration registers matching what is expected, data previously selected by the user is retrieved and recognized by the user. | 02-04-2010 |
20100031355 | UNVALIDATED PRIVILEGE CAP - A method for securely accessing an executable file object includes a step in which a request from the target process to access the executable file object is received by an operating system component, and the object is examined for validity before access is allowed. For objects that cannot be validated, the process is run with privileges bounded by the privilege cap, if the privilege cap permits execution of the object. | 02-04-2010 |