会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • User self-authentication system and method for remote credit card verification
    • 用户自我认证系统和远程信用卡验证方法
    • US20050109835A1
    • 2005-05-26
    • US10997168
    • 2004-11-24
    • Brian JacobyRobert Reinke
    • Brian JacobyRobert Reinke
    • G06Q20/00G06F17/60
    • G06Q20/04G06Q20/4014G06Q20/425
    • The present invention involves an account transaction authentication system and method which provides user verification of transactions. The method for authenticating an account transaction includes associating an account with a device; creating a confirmation message on the device for a transaction; and authenticating the transaction if a confirmation message is received from the device. The method may use an authenticating device in the form of a personal computer connected to a communications network, a mobile telephone, a wireless personal digital assistant, and may also include a biometric device. Authenticating may involve encryption keys for validation. The computer associates an account with a user account device, and also communicates with the financial institution and to determine that the account transaction requires authentication. The computer activates the user account device to enable the account user to authenticate the account transaction.
    • 本发明涉及提供交易的用户验证的账户交易认证系统和方法。 用于验证帐户交易的方法包括将帐户与设备相关联; 在设备上为交易创建确认消息; 并且如果从设备接收到确认消息,则认证该事务。 该方法可以使用连接到通信网络,移动电话,无线个人数字助理的个人计算机形式的认证设备,并且还可以包括生物测定设备。 验证可能涉及加密密钥进行验证。 计算机将帐户与用户帐户设备相关联,并且还与金融机构进行通信并确定帐户交易需要认证。 计算机激活用户帐户设备以使帐户用户能够对帐户事务进行身份验证。
    • 3. 发明授权
    • Deep packet scan hacker identification
    • 深度包扫描黑客识别
    • US07725587B1
    • 2010-05-25
    • US09894918
    • 2001-06-29
    • Brian JacobyChristopher J. Wright
    • Brian JacobyChristopher J. Wright
    • G06F15/16
    • H04L63/1416G06F2221/2101G06F2221/2151
    • Securing an accessible computer system typically includes receiving a data packet that includes a payload portion and an attribute portion, where the data packet is communicated between at least one access requestor and at least one access provider. At least the payload portion of the received data packet typically is monitored, where monitoring includes scanning the payload portion for at least one predetermined pattern. When the payload portion is determined to include at least one predetermined pattern, access by the access requestor to the access provider may be controlled. Monitoring the data packet may include scanning the payload portion while handling the data packet with a switch. Controlling access may include denying access by the access requestor to the access provider.
    • 保护可访问计算机系统通常包括接收包括有效载荷部分和属性部分的数据分组,其中数据分组在至少一个接入请求者和至少一个接入提供商之间传送。 至少所接收的数据分组的有效载荷部分通常被监视,其中监视包括扫描有效载荷部分至少一个预定模式。 当有效载荷部分被确定为包括至少一个预定模式时,可以控制访问请求者对访问提供者的访问。 监视数据包可以包括扫描有效负载部分,同时用交换机处理数据包。 控制访问可以包括拒绝接入请求者访问接入提供商的访问。
    • 4. 发明授权
    • Deep packet scan hacker identification
    • 深度包扫描黑客识别
    • US08645537B2
    • 2014-02-04
    • US13193996
    • 2011-07-29
    • Brian JacobyChristopher J. Wright
    • Brian JacobyChristopher J. Wright
    • G06F15/173G06F15/16
    • H04L63/1416G06F2221/2101G06F2221/2151
    • Securing an accessible computer system typically includes receiving a data packet that includes a payload portion and an attribute portion, where the data packet is communicated between at least one access requestor and at least one access provider. At least the payload portion of the received data packet typically is monitored, where monitoring includes scanning the payload portion for at least one predetermined pattern. When the payload portion is determined to include at least one predetermined pattern, access by the access requestor to the access provider may be controlled. Monitoring the data packet may include scanning the payload portion while handling the data packet with a switch. Controlling access may include denying access by the access requestor to the access provider.
    • 保护可访问计算机系统通常包括接收包括有效载荷部分和属性部分的数据分组,其中数据分组在至少一个接入请求者和至少一个接入提供商之间传送。 至少所接收的数据分组的有效载荷部分通常被监视,其中监视包括扫描有效载荷部分至少一个预定模式。 当有效载荷部分被确定为包括至少一个预定模式时,可以控制访问请求者对访问提供者的访问。 监视数据包可以包括扫描有效负载部分,同时用交换机处理数据包。 控制访问可以包括拒绝接入请求者访问接入提供商的访问。
    • 5. 发明授权
    • Deep packet scan hacker identification
    • 深度包扫描黑客识别
    • US08001244B2
    • 2011-08-16
    • US12758456
    • 2010-04-12
    • Brian JacobyChristopher J. Wright
    • Brian JacobyChristopher J. Wright
    • G06F15/16
    • H04L63/1416G06F2221/2101G06F2221/2151
    • Securing an accessible computer system typically includes receiving a data packet that includes a payload portion and an attribute portion, where the data packet is communicated between at least one access requestor and at least one access provider. At least the payload portion of the received data packet typically is monitored, where monitoring includes scanning the payload portion for at least one predetermined pattern. When the payload portion is determined to include at least one predetermined pattern, access by the access requestor to the access provider may be controlled . Monitoring the data packet may include scanning the payload portion while handling the data packet with a switch. Controlling access may include denying access by the access requestor to the access provider.
    • 保护可访问计算机系统通常包括接收包括有效载荷部分和属性部分的数据分组,其中数据分组在至少一个接入请求者和至少一个接入提供商之间传送。 至少所接收的数据分组的有效载荷部分通常被监视,其中监视包括扫描有效载荷部分至少一个预定模式。 当有效载荷部分被确定为包括至少一个预定模式时,可以控制访问请求者对访问提供者的访问。 监视数据包可以包括扫描有效负载部分,同时用交换机处理数据包。 控制访问可以包括拒绝接入请求者访问接入提供商的访问。
    • 6. 发明申请
    • Deep Packet Scan Hacker Identification
    • 深度包扫描黑客识别
    • US20110289559A1
    • 2011-11-24
    • US13193996
    • 2011-07-29
    • Brian JacobyChristopher J. Wright
    • Brian JacobyChristopher J. Wright
    • G06F15/16
    • H04L63/1416G06F2221/2101G06F2221/2151
    • Securing an accessible computer system typically includes receiving a data packet that includes a payload portion and an attribute portion, where the data packet is communicated between at least one access requestor and at least one access provider. At least the payload portion of the received data packet typically is monitored, where monitoring includes scanning the payload portion for at least one predetermined pattern. When the payload portion is determined to include at least one predetermined pattern, access by the access requestor to the access provider may be controlled. Monitoring the data packet may include scanning the payload portion while handling the data packet with a switch. Controlling access may include denying access by the access requestor to the access provider.
    • 保护可访问计算机系统通常包括接收包括有效载荷部分和属性部分的数据分组,其中数据分组在至少一个接入请求者和至少一个接入提供商之间传送。 至少所接收的数据分组的有效载荷部分通常被监视,其中监视包括扫描有效载荷部分至少一个预定模式。 当有效载荷部分被确定为包括至少一个预定模式时,可以控制访问请求者对访问提供者的访问。 监视数据包可以包括扫描有效负载部分,同时用交换机处理数据包。 控制访问可以包括拒绝接入请求者访问接入提供商的访问。
    • 7. 发明申请
    • Deep Packet Scan Hacker Identification
    • 深度包扫描黑客识别
    • US20100198969A1
    • 2010-08-05
    • US12758456
    • 2010-04-12
    • Brian JacobyChristopher J. Wright
    • Brian JacobyChristopher J. Wright
    • G06F15/173
    • H04L63/1416G06F2221/2101G06F2221/2151
    • Securing an accessible computer system typically includes receiving a data packet that includes a payload portion and an attribute portion, where the data packet is communicated between at least one access requestor and at least one access provider. At least the payload portion of the received data packet typically is monitored, where monitoring includes scanning the payload portion for at least one predetermined pattern. When the payload portion is determined to include at least one predetermined pattern, access by the access requestor to the access provider may be controlled . Monitoring the data packet may include scanning the payload portion while handling the data packet with a switch. Controlling access may include denying access by the access requestor to the access provider.
    • 保护可访问计算机系统通常包括接收包括有效载荷部分和属性部分的数据分组,其中数据分组在至少一个接入请求者和至少一个接入提供商之间传送。 至少所接收的数据分组的有效载荷部分通常被监视,其中监视包括扫描有效载荷部分至少一个预定模式。 当有效载荷部分被确定为包括至少一个预定模式时,可以控制访问请求者对访问提供者的访问。 监视数据包可以包括扫描有效负载部分,同时用交换机处理数据包。 控制访问可以包括拒绝接入请求者访问接入提供商的访问。