会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • User mapping information extension for protocols
    • 协议的用户映射信息扩展
    • US07434253B2
    • 2008-10-07
    • US11181525
    • 2005-07-14
    • Christopher J. CrallGennady MedvinskyJoshua BallKarthik JaganathanPaul J. LeachLiqiang ZhuDavid B. Cross
    • Christopher J. CrallGennady MedvinskyJoshua BallKarthik JaganathanPaul J. LeachLiqiang ZhuDavid B. Cross
    • H04L9/32H04L9/00
    • H04L9/3263H04L9/3273H04L63/0807H04L63/0823H04L63/0876H04L63/10H04L63/166
    • A hint containing user mapping information is provided in messages that may be exchanged during authentication handshakes. For example, a client may provide user mapping information to the server during authentication. The hint (e.g., in the form of a TLS extension mechanism) may be used to send the domain/user name information of a client to aid the server in mapping the user's certificate to an account. The extension mechanism provides integrity and authenticity of the mapping data sent by the client. The user provides a hint as to where to find the right account or domain controller (which points to, or otherwise maintains, the correct account). Based on the hint and other information in the certificate, the user is mapped to an account. The hint may be provided by the user when he logs in. Thus, a certificate is mapped to an identity to authenticate the user. A hint is sent along with the certificate information to perform the binding. Existing protocols may be extended to communicate the additional mapping information (the hint) to perform the binding. A vendor specific extension to Kerberos is defined to obtain the authorization data based on an X.509 certificate and the mapping user name hint.
    • 在认证握手期间可以交换的消息中提供了包含用户映射信息的提示。 例如,客户端可以在认证期间向服务器提供用户映射信息。 提示(例如,以TLS扩展机制的形式)可以用于发送客户端的域/用户名信息,以帮助服务器将用户的证书映射到帐户。 扩展机制提供客户端发送的映射数据的完整性和真实性。 用户提供关于在哪里找到正确的帐户或域控制器(指向或以其他方式维护正确的帐户)的提示。 根据证书中的提示和其他信息,用户被映射到一个帐户。 提示可以由用户在登录时提供。因此,证书被映射到身份以验证用户。 发送提示与证书信息一起执行绑定。 可以扩展现有协议以传达额外的映射信息(提示)来执行绑定。 定义了针对Kerberos的供应商特定扩展,以根据X.509证书和映射用户名提示获取授权数据。
    • 3. 发明申请
    • User mapping information extension for protocols
    • 协议的用户映射信息扩展
    • US20070016782A1
    • 2007-01-18
    • US11181525
    • 2005-07-14
    • Christopher CrallGennady MedvinskyJoshua BallKarthik JaganathanPaul LeachLiqiang ZhuDavid Cross
    • Christopher CrallGennady MedvinskyJoshua BallKarthik JaganathanPaul LeachLiqiang ZhuDavid Cross
    • H04L9/00
    • H04L9/3263H04L9/3273H04L63/0807H04L63/0823H04L63/0876H04L63/10H04L63/166
    • A hint containing user mapping information is provided in messages that may be exchanged during authentication handshakes. For example, a client may provide user mapping information to the server during authentication. The hint (e.g., in the form of a TLS extension mechanism) may be used to send the domain/user name information of a client to aid the server in mapping the user's certificate to an account. The extension mechanism provides integrity and authenticity of the mapping data sent by the client. The user provides a hint as to where to find the right account or domain controller (which points to, or otherwise maintains, the correct account). Based on the hint and other information in the certificate, the user is mapped to an account. The hint may be provided by the user when he logs in. Thus, a certificate is mapped to an identity to authenticate the user. A hint is sent along with the certificate information to perform the binding. Existing protocols may be extended to communicate the additional mapping information (the hint) to perform the binding. A vendor specific extension to Kerberos is defined to obtain the authorization data based on an X.509 certificate and the mapping user name hint.
    • 在认证握手期间可以交换的消息中提供了包含用户映射信息的提示。 例如,客户端可以在认证期间向服务器提供用户映射信息。 提示(例如,以TLS扩展机制的形式)可以用于发送客户端的域/用户名信息,以帮助服务器将用户的证书映射到帐户。 扩展机制提供客户端发送的映射数据的完整性和真实性。 用户提供关于在哪里找到正确的帐户或域控制器(指向或以其他方式维护正确的帐户)的提示。 根据证书中的提示和其他信息,用户被映射到一个帐户。 提示可以由用户在登录时提供。因此,证书被映射到身份以验证用户。 发送提示与证书信息一起执行绑定。 可以扩展现有协议以传达额外的映射信息(提示)来执行绑定。 定义了针对Kerberos的供应商特定扩展,以根据X.509证书和映射用户名提示获取授权数据。
    • 5. 发明授权
    • Dynamic negotiation of encryption protocols
    • 加密协议的动态协商
    • US07591012B2
    • 2009-09-15
    • US10791035
    • 2004-03-02
    • Karthik JaganathanLiqiang Zhu
    • Karthik JaganathanLiqiang Zhu
    • H04L9/18H04L29/00
    • H04L9/3213H04L9/06H04L63/0807H04L63/205
    • Systems and methods for negotiating an encryption algorithm may be implemented in the context of encryption-based authentication protocols. The invention has the added benefit of providing a system an method that need not interfere with the standard operation of authentication protocols. A first computer, or client computer, can send a negotiation request to a second computer, or server computer. The negotiation request can specify that the client computer supports a selected encryption algorithm. In response, the server computer can return a subsession key for encryption using the selected encryption algorithm. Both client and server may then switch to encryption in the selected encryption algorithm, using the subsession key to encrypt future communications.
    • 用于协商加密算法的系统和方法可以在基于加密的认证协议的上下文中实现。 本发明还提供了一种不需要干扰认证协议的标准操作的方法。 第一计算机或客户端计算机可以向第二计算机或服务器计算机发送协商请求。 协商请求可以指定客户端计算机支持选定的加密算法。 作为响应,服务器计算机可以使用所选择的加密算法返回用于加密的子会话密钥。 客户端和服务器都可以在所选择的加密算法中切换到加密,使用子会话密钥加密未来的通信。
    • 6. 发明申请
    • Dynamic negotiation of encryption protocols
    • 加密协议的动态协商
    • US20050198490A1
    • 2005-09-08
    • US10791035
    • 2004-03-02
    • Karthik JaganathanLiqiang Zhu
    • Karthik JaganathanLiqiang Zhu
    • H04L9/00
    • H04L9/3213H04L9/06H04L63/0807H04L63/205
    • Systems and methods for negotiating an encryption algorithm may be implemented in the context of encryption-based authentication protocols. The invention has the added benefit of providing a system an method that need not interfere with the standard operation of authentication protocols. A first computer, or client computer, can send a negotiation request to a second computer, or server computer. The negotiation request can specify that the client computer supports a selected encryption algorithm. In response, the server computer can return a subsession key for encryption using the selected encryption algorithm. Both client and server may then switch to encryption in the selected encryption algorithm, using the subsession key to encrypt future communications.
    • 用于协商加密算法的系统和方法可以在基于加密的认证协议的上下文中实现。 本发明还提供了一种不需要干扰认证协议的标准操作的方法。 第一计算机或客户端计算机可以向第二计算机或服务器计算机发送协商请求。 协商请求可以指定客户端计算机支持选定的加密算法。 作为响应,服务器计算机可以使用所选择的加密算法返回用于加密的子会话密钥。 客户端和服务器都可以在所选择的加密算法中切换到加密,使用子会话密钥加密未来的通信。
    • 7. 发明授权
    • Scheme for sub-realms within an authentication protocol
    • 认证协议内子域的方案
    • US07571311B2
    • 2009-08-04
    • US11096829
    • 2005-04-01
    • Cristian Marius IlacKarthik JaganathanMurli D. SatagopanTarek Bahna El-Din Mahmoud KamelTodd F. Stecher
    • Cristian Marius IlacKarthik JaganathanMurli D. SatagopanTarek Bahna El-Din Mahmoud KamelTodd F. Stecher
    • H04L9/32
    • H04L9/3213H04L9/0833
    • Branch domain controllers (DCs) contain read only replicas of the data in a normal domain DC. This includes information about the groups a user belongs to so it can be used to determine authorization information. Password information, however, is desirably replicated to the branch DCs only for users and services (including machines) designated for that particular branch. Moreover, all write operations are desirably handled by hub DCs, the primary domain controller (PDC), or other DCs trusted by the corporate office. Rapid authentication and authorization in branch offices is supported using Kerberos sub-realms in which each branch office operates as a virtual realm. The Kerberos protocol employs different key version numbers to distinguish between the virtual realms of the head and branch key distribution centers (KDCs). Accounts may be named krbtgt_ where is carried in the kvno field of the ticket granting ticket (TGT) to indicate to the hub KDC which krbtgt′ key was used to encrypt the TGT.
    • 分支域控制器(DC)包含正常域DC中数据的只读副本。 这包括有关用户所属组的信息,因此可用于确定授权信息。 然而,密码信息仅适用于指定用于该特定分支的用户和服务(包括机器)的分支DC。 而且,所有的写入操作都希望由集线器DC,主域控制器(PDC)或公司办公室信任的其他DC来处理。 使用Kerberos子域支持分支机构的快速身份验证和授权,每个分支机构都将其作为虚拟领域运行。 Kerberos协议使用不同的密钥版本号来区分头部和分支密钥分发中心(KDC)的虚拟领域。 账户可以被命名为krbtgt_ ,其中被携带在票据授予票据(TGT)的kvno字段中,以向集线器KDC指示哪个krbtgt'密钥用于加密TGT。