会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明授权
    • Technique for handling subsequent user identification and password requests with identity change within a certificate-based host session
    • 用于在基于证书的主机会话内处理后续用户标识和密码请求的技术用于身份更改
    • US06976164B1
    • 2005-12-13
    • US09619912
    • 2000-07-19
    • Julie H. KingSusan D. KirkmanDaniel J. LabrecqueLinwood H. Overby, Jr.Steven Wayne Pogue
    • Julie H. KingSusan D. KirkmanDaniel J. LabrecqueLinwood H. Overby, Jr.Steven Wayne Pogue
    • G06F11/30H04L9/00H04L29/06G04K1/00
    • H04L63/0815G06Q20/202G06Q20/367H04L63/0823Y10S707/99939
    • The present invention provides a method, system, and computer program product which enables changing user credentials that are used to access legacy host applications and/or systems which provide legacy host data during a secure host access session which is authenticated using a digital certificate and is protected by a host-based security system, such as RACF (Resource Access Control Facility, a product offered by the IBM Corporation), where these changed credentials are used to authenticate a user after previously-provided credentials have been used for authentication earlier in the same session. The changed credentials may belong to the same user, where that user happens to have a different user ID and/or password for different legacy host applications and wishes to change from accessing one legacy host application to accessing another. Or, the changed credentials may be used to enable a different user to interact with the same legacy host application used by the previously-authenticated user. The disclosed technique may also be used advantageously to authenticate a user for accessing an application, when the user's credentials are not changing.
    • 本发明提供一种方法,系统和计算机程序产品,其能够改变用于访问传统主机应用的用户凭证和/或在使用数字证书认证的安全主机访问会话期间提供传统主机数据的系统,并且是 受基于主机的安全系统的保护,例如RACF(资源访问控制设施,IBM公司提供的产品),其中这些更改的凭据用于在之前提供的凭据在 相同的会话 已更改的凭据可能属于同一用户,其中该用户恰好具有不同的传统主机应用程序的不同用户ID和/或密码,并希望从访问一个旧主机应用程序改变为访问另一个。 或者,更改的凭证可以用于使不同的用户能够与先前认证的用户使用的相同的遗留主机应用交互。 当用户的凭证不改变时,所公开的技术也可以有利地用于认证用户访问应用。
    • 12. 发明授权
    • Policy-based security certificate filtering
    • 基于策略的安全证书过滤
    • US08458768B2
    • 2013-06-04
    • US13111907
    • 2011-05-19
    • Roy F. BrabsonBarry MosakowskiLinwood H. Overby, Jr.
    • Roy F. BrabsonBarry MosakowskiLinwood H. Overby, Jr.
    • H04L29/06
    • H04L63/0823G06F21/33H04L9/3265H04L63/0227H04L63/12H04L63/166H04L2209/80
    • Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i.e., treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i.e., treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.
    • 策略过滤服务内置在执行环境的安全处理中,用于解决如何处理通信实体的数字安全证书,而不需要通过证书颁发机构(“CA”)链与实体相关联的根证书的本地副本 。 可以使用指示证书筛选条件的一组规则(或其他策略格式)来指定策略。 在确定所需的根CA证书不可用时,优选地在握手期间调用该过滤。 在一种方法中,策略使用规则来规定允许证书的条件(即被视为已被验证)以及指定证书被阻止的条件的其他规则(即被视为无效)。 优选地,按照大多数特定到最小特定的顺序来评估和执行策略规则。
    • 14. 发明授权
    • Secure sharing of transport layer security session keys with trusted enforcement points
    • 传输层安全会话密钥与可信执行点的安全共享
    • US07992200B2
    • 2011-08-02
    • US11778396
    • 2007-07-16
    • David G. Kuehr-McLarenLinwood H. Overby, Jr.
    • David G. Kuehr-McLarenLinwood H. Overby, Jr.
    • G06F9/00G06F15/16
    • H04L63/166
    • Embodiments of the present invention address deficiencies of the art in respect to security enforcement point operability in a TLS secured communications path and provide a novel and non-obvious method, system and computer program product for the secure sharing of TLS session keys with trusted enforcement points. In one embodiment of the invention, a method for securely sharing TLS session keys with trusted enforcement points can be provided. The method can include conducting a TLS handshake with a TLS client to extract and decrypt a session key for a TLS session with the TLS client traversing at least one security enforcement point. The method further can include providing the session key to a communicatively coupled key server for distribution to the at least one security enforcement point. Finally, the method can include engaging in secure communications with the TLS client over the TLS session.
    • 本发明的实施例解决了在TLS安全通信路径中的安全执行点可操作性方面本领域的缺陷,并提供了一种新颖且不显眼的方法,系统和计算机程序产品,用于与可信执行点安全共享TLS会话密钥 。 在本发明的一个实施例中,可以提供一种用可靠执行点安全地共享TLS会话密钥的方法。 该方法可以包括与TLS客户端进行TLS握手,以提取和解密与TLS客户端穿过至少一个安全执行点的TLS会话的会话密钥。 该方法还可以包括将会话密钥提供给通信耦合的密钥服务器以分发给至少一个安全执行点。 最后,该方法可以包括通过TLS会话与TLS客户端进行安全通信。
    • 18. 发明授权
    • Secure sharing of transport layer security session keys with trusted enforcement points
    • 传输层安全会话密钥与可信执行点的安全共享
    • US08752162B2
    • 2014-06-10
    • US13158388
    • 2011-06-11
    • David G. Kuehr-McLarenLinwood H. Overby, Jr.
    • David G. Kuehr-McLarenLinwood H. Overby, Jr.
    • G06F9/00
    • H04L63/166
    • Embodiments of the present invention address deficiencies of the art in respect to security enforcement point operability in a TLS secured communications path and provide a novel and non-obvious method, system and computer program product for the secure sharing of TLS session keys with trusted enforcement points. In one embodiment of the invention, a method for securely sharing TLS session keys with trusted enforcement points can be provided. The method can include conducting a TLS handshake with a TLS client to extract and decrypt a session key for a TLS session with the TLS client traversing at least one security enforcement point. The method further can include providing the session key to a communicatively coupled key server for distribution to the at least one security enforcement point. Finally, the method can include engaging in secure communications with the TLS client over the TLS session.
    • 本发明的实施例解决了在TLS安全通信路径中关于安全执行点可操作性的本领域的缺陷,并提供了一种新颖且非显而易见的方法,系统和计算机程序产品,用于与可信执行点安全共享TLS会话密钥 。 在本发明的一个实施例中,可以提供一种用可靠执行点安全地共享TLS会话密钥的方法。 该方法可以包括与TLS客户端进行TLS握手,以提取和解密与TLS客户端穿过至少一个安全执行点的TLS会话的会话密钥。 该方法还可以包括将会话密钥提供给通信耦合的密钥服务器以分发给至少一个安全执行点。 最后,该方法可以包括通过TLS会话与TLS客户端进行安全通信。
    • 19. 发明授权
    • Managing remote host visibility in a proxy server environment
    • 在代理服务器环境中管理远程主机可见性
    • US08195806B2
    • 2012-06-05
    • US11778406
    • 2007-07-16
    • Linwood H. Overby, Jr.Jeffery L. Smith
    • Linwood H. Overby, Jr.Jeffery L. Smith
    • G06F15/16
    • H04L29/12547H04L29/12509H04L61/2567H04L61/2582H04L63/0281H04L63/0407H04L67/2814
    • Embodiments of the present invention address deficiencies of the art in respect to the visibility of an IP address for a remote resource behind a proxy server and provide a novel and non-obvious method, system and computer program product for managing remote host visibility in a proxy server environment. In one embodiment of the invention, a method for managing remote resource visibility in a proxy server environment can be provided. The method can include establishing a secure connection between a proxy server and a destination server, proxying different connections between different remote hosts and the destination server through the proxy server, providing remote host information for each of the different remote hosts, including IP address, port and protocol, for example, to the destination server over the secure connection, and mapping each provided IP address to an IP address for a corresponding one of the proxied different connections.
    • 本发明的实施例解决了关于代理服务器后面的远程资源的IP地址的可见性的本领域的缺点,并且提供了一种用于管理代理中的远程主机可见性的新颖且非显而易见的方法,系统和计算机程序产品 服务器环境。 在本发明的一个实施例中,可以提供用于在代理服务器环境中管理远程资源可见性的方法。 该方法可以包括在代理服务器和目标服务器之间建立安全连接,通过代理服务器代理不同远程主机和目标服务器之间的不同连接,为每个不同的远程主机提供远程主机信息,包括IP地址,端口 和协议,例如通过安全连接到目的地服务器,并将每个提供的IP地址映射到代理的不同连接中的相应一个的IP地址。
    • 20. 发明授权
    • Policy-based security certificate filtering
    • 基于策略的安全证书过滤
    • US07984479B2
    • 2011-07-19
    • US11405069
    • 2006-04-17
    • Roy F. BrabsonBarry MosakowskiLinwood H. Overby, Jr.
    • Roy F. BrabsonBarry MosakowskiLinwood H. Overby, Jr.
    • G06F17/00H04L29/06H04L9/32
    • H04L63/0823G06F21/33H04L9/3265H04L63/0227H04L63/12H04L63/166H04L2209/80
    • Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i.e., treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i.e., treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.
    • 策略过滤服务内置在执行环境的安全处理中,用于解决如何处理通信实体的数字安全证书,而不需要通过证书颁发机构(“CA”)链与实体关联的根证书的本地副本 。 可以使用指示证书筛选条件的一组规则(或其他策略格式)来指定策略。 在确定所需的根CA证书不可用时,优选地在握手期间调用该过滤。 在一种方法中,策略使用规则来规定允许证书的条件(即被视为已被验证)以及指定证书被阻止的条件的其他规则(即被视为无效)。 优选地,按照大多数特定到最小特定的顺序来评估和执行策略规则。