会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Systems and methods for authenticating communications in a network medium
    • 用于在网络介质中认证通信的系统和方法
    • US20050100166A1
    • 2005-05-12
    • US10703437
    • 2003-11-10
    • Diana SmettersKenneth ConleyBryan PendletonGlenn DurfeeSteve CousinsDirk BalfanzHadar Shemtov
    • Diana SmettersKenneth ConleyBryan PendletonGlenn DurfeeSteve CousinsDirk BalfanzHadar Shemtov
    • G09C1/00B23C5/10H04L9/32H04L29/06H04L9/00G06F11/30
    • H04L63/08H04L63/0492H04L63/065H04L63/12
    • A location-limited channel is implemented using physical exchanges of physical tokens. The physical tokens are implemented using writeable or re-writeable storage media. Location-limited channels, when used to implement pre-authentication protocols, provide demonstrative identification and authenticity. A group originator loads pre-authentication information and a network location from a communication device onto the location-limited physical token channel. The location-limited physical token channel is passed to another participant, who copies the originator's pre-authentication information and location onto that participant's communication device. That participant then adds that participant's own pre-authentication information and network location onto the location-limited physical token channel. This is repeated until the last participant passes the location-limited physical token channel back to the group originator. The originator thus has pre-authentication information and network locations for all other participants. The originator establishes secure communications with each participant based on the originator' and that participant's shared information.
    • 使用物理令牌的物理交换来实现位置限制信道。 物理令牌使用可写或可重写的存储介质实现。 位置限制通道用于实现预认证协议时,提供说明性识别和真实性。 组发起者将来自通信设备的预认证信息和网络位置加载到位置限制的物理令牌信道上。 位置限制物理令牌信道被传递给另一个参与者,他们将发起者的预认证信息和位置复制到该参与者的通信设备上。 然后,该参与者将该参与者自己的预认证信息和网络位置添加到位置有限的物理令牌信道上。 这是重复的,直到最后一个参与者将位置限制的物理令牌通道返回到组发起者。 因此,发起者具有所有其他参与者的预认证信息和网络位置。 发起人根据发起人和参与者的共享信息建立与每个参与者的安全通信。