会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Method and system for transparent encryption and authentication of file data protocols over internet protocol
    • 通过互联网协议透明加密和文件数据协议认证的方法和系统
    • US20050033988A1
    • 2005-02-10
    • US10688204
    • 2003-10-17
    • Ganesan ChandrashekharSanjay SawhneyHemant PuriAseem VaidDharmesh Shah
    • Ganesan ChandrashekharSanjay SawhneyHemant PuriAseem VaidDharmesh Shah
    • H04L9/00H04L29/06
    • H04L63/0435H04L63/08H04L63/123
    • A method processing one or more files using a security application. The method includes a method processing one or more files using a security application. The method includes connecting the client to a proxy server, which is coupled to one or more NAS servers. The method includes requesting for a file from a client to the proxy server and authenticating a requesting user of the client. The method also includes authorizing the requesting user for the file requested; requesting for the file from the one or more NAS servers after authenticating and authorizing; and requesting for the file from the one or more storage elements. The file is transferred from the one or more storage elements through the NAS server to the proxy server. The method determines header information on the file at the proxy server and identifies a policy based upon the header information at the proxy server. The method also includes processing (e.g., decompressing the file, decrypting the file, and verifying the file) the file according to the policy. The method includes transferring the processed file to the user of the client.
    • 使用安全应用处理一个或多个文件的方法。 该方法包括使用安全应用处理一个或多个文件的方法。 该方法包括将客户端连接到代理服务器,代理服务器耦合到一个或多个NAS服务器。 该方法包括从客户端向代理服务器请求文件,并验证客户端的请求用户。 该方法还包括授权请求用户所请求的文件; 在认证和授权之后,从一个或多个NAS服务器请求文件; 以及从所述一个或多个存储元件请求所述文件。 该文件通过NAS服务器从一个或多个存储元件传输到代理服务器。 该方法确定代理服务器上的文件的头信息,并根据代理服务器上的头信息识别策略。 该方法还包括根据策略处理(例如,解压缩文件,解密文件并验证文件)文件。 该方法包括将处理的文件传送到客户端的用户。
    • 2. 发明申请
    • Method and system for transparent encryption and authentication of file data protocols over internet protocol
    • 通过互联网协议透明加密和文件数据协议认证的方法和系统
    • US20090119752A1
    • 2009-05-07
    • US11947623
    • 2007-11-29
    • Ganesan ChandrashekharSanjay SawhneyHemant PuriAseem VaidDharmesh Shah
    • Ganesan ChandrashekharSanjay SawhneyHemant PuriAseem VaidDharmesh Shah
    • H04L9/00
    • H04L63/0435H04L63/08H04L63/123
    • A method processing one or more files using a security application. The method includes a method processing one or more files using a security application. The method includes connecting the client to a proxy server, which is coupled to one or more NAS servers. The method includes requesting for a file from a client to the proxy server and authenticating a requesting user of the client. The method also includes authorizing the requesting user for the file requested; requesting for the file from the one or more NAS servers after authenticating and authorizing; and requesting for the file from the one or more storage elements. The file is transferred from the one or more storage elements through the NAS server to the proxy server. The method determines header information on the file at the proxy server and identifies a policy based upon the header information at the proxy server. The method also includes processing (e.g., decompressing the file, decrypting the file, and verifying the file) the file according to the policy. The method includes transferring the processed file to the user of the client.
    • 使用安全应用处理一个或多个文件的方法。 该方法包括使用安全应用处理一个或多个文件的方法。 该方法包括将客户端连接到代理服务器,代理服务器耦合到一个或多个NAS服务器。 该方法包括从客户端向代理服务器请求文件,并验证客户端的请求用户。 该方法还包括授权请求用户所请求的文件; 在认证和授权之后,从一个或多个NAS服务器请求文件; 以及从所述一个或多个存储元件请求所述文件。 该文件通过NAS服务器从一个或多个存储元件传输到代理服务器。 该方法确定代理服务器上的文件的头信息,并根据代理服务器上的头信息识别策略。 该方法还包括根据策略处理(例如,解压缩文件,解密文件并验证文件)文件。 该方法包括将处理的文件传送到客户端的用户。
    • 6. 发明授权
    • Systems and methods for monitoring a mobile-computing device using geo-location information
    • 使用地理位置信息监控移动计算设备的系统和方法
    • US08111154B1
    • 2012-02-07
    • US12559456
    • 2009-09-14
    • Hemant PuriAnand KashyapSanjay Sawhney
    • Hemant PuriAnand KashyapSanjay Sawhney
    • G08B1/08
    • G08B21/0202
    • A computer-implemented method for monitoring a mobile-computing device using geo-location information is disclosed. The method may include a learning phase. During the learning phase, a user may be located within a first range of physical locations during a recurring time period. The method may include generating a location profile for a mobile-computing device of the user and receiving a device-monitoring policy for the mobile-computing device from an administrator. The location profile may correlate the first range of physical locations with the recurring time period. The method may further include detecting, after the learning phase, that the mobile-computing device is outside the first range of physical locations during a first instance of the recurring time period. The method may also include implementing the device-monitoring policy after detecting that the mobile-computing device is outside the first range of physical locations during the first instance of the recurring time period.
    • 公开了一种使用地理位置信息监视移动计算设备的计算机实现的方法。 该方法可以包括学习阶段。 在学习阶段期间,在循环时间期间,用户可以位于物理位置的第一范围内。 该方法可以包括为用户的移动计算设备生成位置简档,并从管理员接收移动计算设备的设备监视策略。 位置简档可以将物理位置的第一范围与循环时间段相关联。 该方法还可以包括在学习阶段之后在循环时间段的第一个实例期间检测出移动计算设备在物理位置的第一范围之外。 该方法还可以包括在检测到在循环时间段的第一个实例期间移动计算设备在物理位置的第一范围之外的情况下实现设备监视策略。