会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • ACCESS CONTROL TO SECURED APPLICATION FEATURES USING CLIENT TRUST LEVELS
    • 使用客户信任级别访问对安全应用程序的功能
    • US20100319063A1
    • 2010-12-16
    • US12483239
    • 2009-06-12
    • Lokesh Srinivas KoppoluAmritansh RaghavAnton W. Krantz
    • Lokesh Srinivas KoppoluAmritansh RaghavAnton W. Krantz
    • H04L29/06G06F7/04G06F15/16
    • H04L63/08G06F21/33G06F21/50H04L63/105H04L65/1006H04L65/1073
    • Architecture that facilitates the conveyance of a trust level when the caller makes a call, the trust level in dependence on the state of the caller system. The callee (call recipient) receives notification of the trust level and can use this information in the communication such as to request verification from the caller and/or initiate other modes of communication. A caller can authenticate the caller identity in different ways to a communication server. Based on that, the server can assign an appropriate server-verified trust level to the caller. Further, an unsecured phone controller can indicate a lower client-side defined trust level. The server verified and client-side trust levels are then sent to the callee, where the callee determines whether to allow caller access to one or more secured features based on the feature values and the trust level imposed by the callee to access those features.
    • 当调用者进行呼叫时,有助于传递信任级别的体系结构,信任级别取决于呼叫者系统的状态。 被叫方(呼叫接收方)接收到信任级别的通知,并且可以在通信中使用该信息,以便从呼叫者请求验证和/或启动其他通信模式。 呼叫者可以以不同的方式向通信服务器认证呼叫者身份。 基于此,服务器可以为呼叫者分配适当的服务器验证的信任级别。 此外,不安全的电话控制器可以指示较低的客户端定义的信任级别。 服务器验证和客户端信任级别然后被发送到被叫方,被叫方根据特征值和被叫方强制访问这些特征的信任级别确定是否允许主叫方访问一个或多个安全特征。
    • 6. 发明授权
    • Access control to secured application features using client trust levels
    • 使用客户端信任级别对安全应用程序功能进行访问控制
    • US09531695B2
    • 2016-12-27
    • US12483239
    • 2009-06-12
    • Lokesh Srinivas KoppoluAmritansh RaghavAnton W. Krantz
    • Lokesh Srinivas KoppoluAmritansh RaghavAnton W. Krantz
    • G06F15/16H04L29/06G06F21/33G06F21/50
    • H04L63/08G06F21/33G06F21/50H04L63/105H04L65/1006H04L65/1073
    • Architecture that facilitates the conveyance of a trust level when the caller makes a call, the trust level in dependence on the state of the caller system. The callee (call recipient) receives notification of the trust level and can use this information in the communication such as to request verification from the caller and/or initiate other modes of communication. A caller can authenticate the caller identity in different ways to a communication server. Based on that, the server can assign an appropriate server-verified trust level to the caller. Further, an unsecured phone controller can indicate a lower client-side defined trust level. The server verified and client-side trust levels are then sent to the callee, where the callee determines whether to allow caller access to one or more secured features based on the feature values and the trust level imposed by the callee to access those features.
    • 当调用者进行呼叫时,有助于传递信任级别的体系结构,信任级别取决于呼叫者系统的状态。 被叫方(呼叫接收方)接收到信任级别的通知,并且可以在通信中使用该信息,以便从呼叫者请求验证和/或启动其他通信模式。 呼叫者可以以不同的方式向通信服务器认证呼叫者身份。 基于此,服务器可以为呼叫者分配适当的服务器验证的信任级别。 此外,不安全的电话控制器可以指示较低的客户端定义的信任级别。 服务器验证和客户端信任级别然后被发送到被叫方,被叫方根据特征值和被叫方强制访问这些特征的信任级别确定是否允许主叫方访问一个或多个安全特征。
    • 7. 发明授权
    • Multi-profile interface specific network security policies
    • 多配置界面特定的网络安全策略
    • US08201234B2
    • 2012-06-12
    • US11746478
    • 2007-05-09
    • Gerardo Diaz-CuellarDavid AbzarianLokesh Srinivas KoppoluEran Yariv
    • Gerardo Diaz-CuellarDavid AbzarianLokesh Srinivas KoppoluEran Yariv
    • H04L29/06
    • H04L63/20H04L63/0428H04L63/08
    • Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a first data field including data defining a parameter to be applied based on the network security policy. The network security policy defines at least one of the following: a firewall rule and a connection security rule. The data structure also includes a second data field having data specifying restrictions of the parameter included in the first data field. The parameter in the first data field and the restrictions in the second data field form the schema for expressing the network security policy to be processed. The network security policy manages communications between a computing device and at least one other computing device.
    • 计算机可读介质,其上存储有用于定义表示网络安全策略的模式的数据结构。 数据结构包括第一数据字段,包括基于网络安全策略定义要应用的参数的数据。 网络安全策略定义以下至少一个:防火墙规则和连接安全规则。 数据结构还包括具有指定包含在第一数据字段中的参数的限制的数据的第二数据字段。 第一数据字段中的参数和第二数据字段中的限制形成用于表示要处理的网络安全策略的模式。 网络安全策略管理计算设备与至少一个其他计算设备之间的通信。