会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • METHOD AND APPARATUS FOR SECURELY REGISTERING HARDWARE AND/OR SOFTWARE COMPONENTS IN A COMPUTER SYSTEM
    • 在计算机系统中安全地注册硬件和/或软件组件的方法和装置
    • US20090122988A1
    • 2009-05-14
    • US11939416
    • 2007-11-13
    • Christoph L. SchubaJames P. HughesDaniel F. Smith
    • Christoph L. SchubaJames P. HughesDaniel F. Smith
    • H04L9/14
    • H04L9/0825
    • A system that securely registers components in a first system is presented. During operation, the first system receives a request from an intermediary system to obtain configuration information related to the components in the first system. In response to the request, the first system: (1) encrypts configuration information for the first system using a first encryption key; (2) encrypts the first encryption key using a second encryption key; and (3) sends the encrypted configuration information and the encrypted first encryption key to the intermediary system so that the intermediary system can forward the encrypted configuration information and the encrypted first encryption key to the second system, whereby the encrypted configuration information is cryptographically opaque to the intermediary system. Next, the second system uses the configuration information to register the components in the first system.
    • 介绍了在第一个系统中安全地注册组件的系统。 在操作期间,第一系统接收来自中间系统的请求以获得与第一系统中的组件相关的配置信息。 响应于该请求,第一系统:(1)使用第一加密密钥加密第一系统的配置信息; (2)使用第二加密密钥加密第一加密密钥; 和(3)将加密的配置信息和加密的第一加密密钥发送到中间系统,使得中间系统可以将加密的配置信息和加密的第一加密密钥转发到第二系统,由此加密的配置信息对于 中介制度。 接下来,第二系统使用配置信息来注册第一系统中的组件。
    • 2. 发明授权
    • Method and apparatus for securely registering hardware and/or software components in a computer system
    • 用于在计算机系统中安全地注册硬件和/或软件组件的方法和装置
    • US08064606B2
    • 2011-11-22
    • US11939416
    • 2007-11-13
    • Christoph L. SchubaJames P. HughesDaniel E. Smith
    • Christoph L. SchubaJames P. HughesDaniel E. Smith
    • H04L9/00G06Q30/00G06F21/00H04L9/14H04L29/06H04M1/68
    • H04L9/0825
    • A system that securely registers components in a first system is presented. During operation, the first system receives a request from an intermediary system to obtain configuration information related to the components in the first system. In response to the request, the first system: (1) encrypts configuration information for the first system using a first encryption key; (2) encrypts the first encryption key using a second encryption key; and (3) sends the encrypted configuration information and the encrypted first encryption key to the intermediary system so that the intermediary system can forward the encrypted configuration information and the encrypted first encryption key to the second system, whereby the encrypted configuration information is cryptographically opaque to the intermediary system. Next, the second system uses the configuration information to register the components in the first system.
    • 介绍了在第一个系统中安全地注册组件的系统。 在操作期间,第一系统接收来自中间系统的请求以获得与第一系统中的组件相关的配置信息。 响应于该请求,第一系统:(1)使用第一加密密钥加密第一系统的配置信息; (2)使用第二加密密钥加密第一加密密钥; 和(3)将加密的配置信息和加密的第一加密密钥发送到中间系统,使得中间系统可以将加密的配置信息和加密的第一加密密钥转发到第二系统,由此加密的配置信息对于 中介制度。 接下来,第二系统使用配置信息来注册第一系统中的组件。
    • 3. 发明授权
    • Method and apparatus for remotely authenticating a command
    • 用于远程认证命令的方法和装置
    • US08225086B2
    • 2012-07-17
    • US11939412
    • 2007-11-13
    • Christoph L. SchubaJames P. Hughes
    • Christoph L. SchubaJames P. Hughes
    • H04L29/06
    • H04L9/3271G06F21/305G06F2221/2115H04L63/0823H04L63/126H04L2209/56
    • A system that remotely authenticates a command is presented. During operation, an authentication system receives the command from an intermediary system, wherein the command is to be executed on a target system. Next, the authentication system authenticates the intermediary system. If the intermediary system is successfully authenticated, the authentication system authenticates the command using a private key for the authentication system to produce an authenticated command. Next, the authentication system sends the authenticated command to the intermediary system, thereby enabling the intermediary system to send the authenticated command to the target system so that the target system can use a public key for the authentication system to verify and execute the command.
    • 呈现远程验证命令的系统。 在操作期间,认证系统从中间系统接收命令,其中命令将在目标系统上执行。 接下来,认证系统认证中间系统。 如果中间系统被成功认证,则认证系统使用认证系统的私钥对命令进行认证,以产生认证命令。 接下来,认证系统将认证命令发送给中间系统,由此使得中间系统能够将认证命令发送到目标系统,使得目标系统能够使用认证系统的公钥来验证和执行命令。