会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明授权
    • Unified concept of presence
    • 统一的存在概念
    • US07614060B2
    • 2009-11-03
    • US11413565
    • 2006-04-28
    • Ravi T. RaoSandeep Kishan SinghalTodd R. Manion
    • Ravi T. RaoSandeep Kishan SinghalTodd R. Manion
    • G06F3/00G06F9/44G06F9/46G06F13/00
    • G06Q10/10
    • A method and system may provide a unified concept of presence across all connected hosts by providing a common point of access for all presence-related data on the system. The application abstraction layer may provide a common interface for all presence-enabled applications to access and publish information related to locally or remotely-executing presence applications. The application abstraction layer may push presence data to the presence-enabled applications, or each application may access the layer to gain presence data related to other applications. Also, the application abstraction layer may store all presence data locally or remotely.
    • 方法和系统可以通过为系统上的所有存在相关数据提供公共访问点来提供所有连接的主机上的存在的统一概念。 应用抽象层可以为所有存在使能的应用提供公共接口,以访问和发布与本地或远程执行的存在应用相关的信息。 应用抽象层可以将存在数据推送到启用存在的应用,或者每个应用可以访问该层以获得与其他应用相关的存在数据。 此外,应用程序抽象层可以在本地或远程存储所有存在数据。
    • 32. 发明授权
    • Peer-to-peer identity management interfaces and methods
    • 对等身份管理界面和方法
    • US07613812B2
    • 2009-11-03
    • US10309864
    • 2002-12-04
    • Todd R. ManionRobert D. DonnerGrigori M. Somin
    • Todd R. ManionRobert D. DonnerGrigori M. Somin
    • G06F15/16
    • G06F9/541H04L29/12009H04L29/12594H04L61/3065H04L63/0823H04L67/104H04L67/1057H04L69/329
    • Peer-to-peer (P2P) application programming interfaces (APIs) that allow an application to create, import, export, manage, enumerate, and delete P2P identities are presented. Further, the management of group identity information is provided. APIs abstract away from low level credential and cryptographic functions required to create and manage P2P identities. This management includes retrieval and setting of a friendly name, generation of a cryptographic public/private key pair, retrieval of security information in the form of an XML fragment, and creation of a new name based on an existing identity. Since the P2P environment also allows for the existence of multiple separate groups of peers within the P2P cloud, a preferred embodiment of the present invention also allows for the enumeration of all groups associated with a given identity, for each identity existing for the user.
    • 提出允许应用程序创建,导入,导出,管理,枚举和删除P2P身份的点对点(P2P)应用程序编程接口(API)。 此外,提供组身份信息的管理。 API从创建和管理P2P身份所需的低级凭证和加密功能中抽象出来。 该管理包括检索和设置友好名称,生成加密公钥/私钥对,以XML片段的形式检索安全信息,以及基于现有身份创建新名称。 由于P2P环境还允许在P2P云内存在多个独立的对等体组,所以本发明的优选实施例还允许针对为用户存在的每个身份枚举与给定身份相关联的所有组。
    • 38. 发明授权
    • Peer-to-peer authentication and authorization
    • 对等认证和授权
    • US07350074B2
    • 2008-03-25
    • US11110592
    • 2005-04-20
    • Rohit GuptaTodd R. ManionRavi T. RaoSandeep K. Singhal
    • Rohit GuptaTodd R. ManionRavi T. RaoSandeep K. Singhal
    • H04K1/00H04L9/00H04L9/32
    • H04L9/321H04L9/3265H04L63/0823H04L63/0869H04L2209/80
    • An authentication mechanism uses a trusted people store that can be populated on an individual basis by users of computing devices, and can comprise certificates of entities that the user wishes to allow to act as certification authorities. Consequently, peer-to-peer connections can be made even if neither device presents a certificate or certificate chain signed by a third-party certificate authority, so long as each device present a certificate or certificate chain signed by a device present in the trusted people store. Once authenticated, a remote user can access trusted resources on a host device by having local processes mimic the user and create an appropriate token by changing the user's password or password type to a hash of the user's certificate and then logging the user on. The token can be referenced in a standard manner to determine whether the remote user is authorized to access the trusted resource.
    • 认证机制使用可被计算设备的用户单独填充的受信任的人员存储,并且可以包括用户希望允许作为认证机构的实体的证书。 因此,即使两个设备都没有呈现由第三方认证机构签名的证书或证书链,只要每个设备呈现由可信任人员中存在的设备签名的证书或证书链,就可以进行对等连接 商店。 一旦经过身份验证,远程用户可以通过使本地进程模仿用户并通过将用户的密码或密码类型更改为用户证书的哈希值,然后记录用户来创建适当的令牌来访问主机设备上的受信任资源。 可以以标准方式引用令牌,以确定远程用户是否被授权访问受信任的资源。