会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Securing and authenticating multiple devices behind a NAT device
    • 在NAT设备后面保护和认证多个设备
    • US08752161B1
    • 2014-06-10
    • US12507315
    • 2009-07-22
    • Hien Thi ThaiAnupama AnandJianxin Wang
    • Hien Thi ThaiAnupama AnandJianxin Wang
    • H04L29/06G06F21/00
    • H04L65/105H04L61/2514H04L63/0823
    • Apparatus, methods, and other embodiments associated with securing and authenticating multiple devices behind a network address translation (NAT) device are described. One example method includes controlling a phone proxy to provide security credential information to an Internet Protocol (IP) phone located behind the NAT device. The credentials may be selectively provided in response to receiving a certificate request from the IP phone. The certificate request includes IP phone identifying addresses. The method may also include controlling the phone proxy to update an entry in a secure IP phone data store to relate together the IP phone identifying addresses, a source port associated with the IP phone, and the fact that credential information was provided to the IP phone. This entry can mark the IP phone as an authorized phone. The entry may be addressable as a function of a least a portion of the IP phone identifying addresses.
    • 描述了与网络地址转换(NAT)设备之后的多个设备的保护和认证相关联的装置,方法和其他实施例。 一个示例性方法包括控制电话代理以向位于NAT设备后面的因特网协议(IP)电话提供安全凭证信息。 响应于从IP电话接收证书请求,可以选择性地提供凭证。 证书请求包括IP电话识别地址。 该方法还可以包括控制电话代理来更新安全IP电话数据存储中的条目,以将IP电话识别地址,与IP电话相关联的源端口以及向IP电话提供凭证信息的事实 。 该条目可以将IP电话标记为授权电话。 该条目可以是可识别地址的IP电话的至少一部分的功能。
    • 5. 发明授权
    • System and method for coordinated document processing among devices having differing functionality
    • 用于在具有不同功能的设备之间进行协调文档处理的系统和方法
    • US08467081B2
    • 2013-06-18
    • US12504008
    • 2009-07-16
    • William SuGiri NatarajanJianxin WangHongfeng Wei
    • William SuGiri NatarajanJianxin WangHongfeng Wei
    • G06F3/12G06F15/00H04N1/00H04N1/46G06K15/00
    • H04N1/32502H04N1/0035H04N1/00474H04N1/3255
    • The subject application is directed to coordinating document processing operations among devices having differing functionality. A document is received into a first document processing device that has a first set of processing functions. A display is generated on the first device that includes indicia of an available document processing operation having a function of a first set and a secondary function of a second device, with any secondary function outside the first set. Selection data is received of an operation having functions from the first set and one or more secondary functions. Operation of the first device is controlled by a controller operable to control the functions of the first set by the first device on the document. The document is communicated to the second device following completion of any first set functions. The document processing operation is completed by the second device via completion of any secondary functions.
    • 主题应用涉及在具有不同功能的设备之间协调文档处理操作。 文档被接收到具有第一组处理功能的第一文档处理设备中。 在第一设备上生成包括具有第一设备的功能的可用文档处理操作的标记和第二设备的次要功能的显示,并且在第一设备之外具有任何辅助功能。 接收具有来自第一组和一个或多个次要功能的功能的操作的选择数据。 第一设备的操作由控制器控制,该控制器可操作以通过文档上的第一设备来控制第一组的功能。 在完成任何第一组功能之后,将文档传送给第二设备。 文件处理操作由第二装置通过任何次要功能完成。
    • 6. 发明申请
    • Card Connector
    • 卡连接器
    • US20130045637A1
    • 2013-02-21
    • US13588385
    • 2012-08-17
    • Lei YenYunhe WangJianxin WangYi Wei Chang
    • Lei YenYunhe WangJianxin WangYi Wei Chang
    • H01R24/60
    • H01R12/83H01R12/714H01R13/2442
    • A card connector includes a body, a first contact, and a second contact. The body includes an electrical card receiving groove with an upper sidewall and a lower sidewall. The upper sidewall includes a first contact slot, while the lower sidewall includes a second contact slot. The first contact is positioned in the first contact slot and includes a first securing portion secured to the body, a first elastic portion extending from the first securing portion, and a first contact portion positioned at an end of the first elastic portion. The second contact is positioned in the second contact slot and includes a second securing portion secured in the second contact slot, a second elastic portion extending from the second securing portion, and a second contact portion positioned at an end of the second elastic portion and extending away from the second securing portion and the second elastic portion.
    • 卡连接器包括主体,第一触点和第二触点。 主体包括具有上侧壁和下侧壁的电卡接收槽。 上侧壁包括第一接触槽,而下侧壁包括第二接触槽。 第一接触件位于第一接触槽中,并且包括固定到本体的第一固定部分,从第一固定部分延伸的第一弹性部分和位于第一弹性部分的端部的第一接触部分。 第二接触件定位在第二接触槽中,并且包括固定在第二接触槽中的第二固定部分,从第二固定部分延伸的第二弹性部分和位于第二弹性部分的端部延伸的第二接触部分 远离第二固定部分和第二弹性部分。
    • 7. 发明申请
    • TRANSPARENT PROXY OF ENCRYPTED SESSIONS
    • 加强会话的透明代码
    • US20120272058A1
    • 2012-10-25
    • US13541407
    • 2012-07-03
    • Jianxin WangAnupama SundaresanVijaya Bharathi KazaDario Calia
    • Jianxin WangAnupama SundaresanVijaya Bharathi KazaDario Calia
    • H04L29/06
    • H04L63/0464H04L9/3263H04L63/0281H04L63/0823H04L63/166H04L2209/76
    • In one embodiment, a proxy device located between a first device and a second device intercepts a security session request for a security session between the first device and the second device. The proxy device obtains security information from the first device that includes at least a subject name of the first device. The proxy device creates a dynamic certificate using the subject name of the first device and a trusted proxy certificate of the proxy device. The proxy device establishes a security session between the proxy device and the second device using the dynamic certificate. Further, the proxy device establishes a security session between the first device and the proxy device using the trusted proxy certificate of the proxy device. The two security sessions collectively operate as a security session between the first device and the second device.
    • 在一个实施例中,位于第一设备和第二设备之间的代理设备拦截用于第一设备和第二设备之间的安全会话的安全会话请求。 代理设备从第一设备获得至少包括第一设备的主题名称的安全信息。 代理设备使用代理设备的第一个设备的主题名称和可信代理证书创建动态证书。 代理设备使用动态证书在代理设备和第二设备之间建立安全会话。 此外,代理设备使用代理设备的可信代理证书在第一设备和代理设备之间建立安全会话。 两个安全会话共同作为第一设备和第二设备之间的安全会话。
    • 9. 发明申请
    • Graceful Conversion of a Security to a Non-security Transparent Proxy
    • 将安全性转换为非安全透明代理
    • US20110154019A1
    • 2011-06-23
    • US12641077
    • 2009-12-17
    • Jianxin Wang
    • Jianxin Wang
    • H04L29/06
    • H04L63/0281H04L63/029H04L63/0464H04L63/0471H04L63/166H04L63/30
    • A graceful conversion of a security to a non-security transparent proxy is performed. A security transparent proxy is an intermediary between two end devices, with an established secure connection with each end device using different security keys. In response to a policy decision or other stimulus, the security transparent proxy is gracefully converted to a non-security transparent proxy such that it can forward, without decrypting and encrypting, the information received from a first endpoint on the first connection therewith to the second endpoint on the second connection therewith. This conversion is “graceful” in that it does not drop either of the two original sessions. In one embodiment, this graceful conversion is accomplished by triggering a key renegotiation on both of the two sessions such that the two connections will use the same encryption key.
    • 执行安全性到非安全透明代理的优雅转换。 安全透明代理是两个终端设备之间的中介,与每个终端设备使用不同的安全密钥建立安全连接。 响应于策略决定或其他刺激,安全透明代理被适度地转换为非安全透明代理,使得它可以将从第一连接上的第一端点接收到的信息转发到第二端 与其第二连接的端点。 这种转换是“优雅的”,因为它不会丢弃两个原始会话。 在一个实施例中,通过在两个会话两者上触发密钥重新协商来实现这种优雅的转换,使得两个连接将使用相同的加密密钥。