会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • SYSTEMS, DEVICES, AND METHODS FOR SECURELY TRANSMITTING A SECURITY PARAMETER TO A COMPUTING DEVICE
    • 用于将安全参数安全传输到计算设备的系统,设备和方法
    • US20120198236A1
    • 2012-08-02
    • US13434265
    • 2012-03-29
    • Michael S. BROWNHerbert A. LITTLE
    • Michael S. BROWNHerbert A. LITTLE
    • H04L9/32
    • H04L9/08H04L9/0844H04L9/3226H04L63/061H04L63/18H04L63/20H04L2209/80
    • Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at least one embodiment, a representation of first data comprising a password is generated at the first computing device as an audio signal. The audio signal is transmitted from the first computing device to the second computing device. The password is determined from the audio signal at the second computing device. A key exchange is performed between the first computing device and the second computing device wherein a key is derived at each of the first and second computing devices. In at least one embodiment, one or more security parameters (e.g. one or more public keys) are exchanged between the first and second computing devices, and techniques for securing the exchange of security parameters or authenticating exchanged security parameters are generally disclosed herein.
    • 本文描述的系统,设备和方法的实施例通常有助于安全传输安全参数。 根据至少一个实施例,在第一计算设备处生成包括密码的第一数据的表示作为音频信号。 音频信号从第一计算设备发送到第二计算设备。 从第二计算设备的音频信号确定密码。 在第一计算设备和第二计算设备之间执行密钥交换,其中在第一和第二计算设备的每一个处导出密钥。 在至少一个实施例中,在第一和第二计算设备之间交换一个或多个安全参数(例如一个或多个公共密钥),并且本文公开了用于确保安全参数交换或认证交换的安全参数的技术。
    • 4. 发明申请
    • SYSTEM AND METHOD TO PROVISION A MOBILE DEVICE
    • 提供移动设备的系统和方法
    • US20100159876A1
    • 2010-06-24
    • US12721701
    • 2010-03-11
    • Michael K. BROWNMichael KIRKUPMichael S. BROWN
    • Michael K. BROWNMichael KIRKUPMichael S. BROWN
    • H04M3/16H04B7/00
    • H04M1/7253H04W84/18
    • A system and method for enabling functions on a primary mobile device from a secondary mobile device are described. The primary mobile device is configured to enable at least selected functions of the mobile communications device if authorization information is received at the primary mobile device at periodic intervals of time. The method comprises: storing at the secondary mobile device the authorization information; establishing a short range direct wireless communications link between the secondary mobile device and the primary mobile device; and periodically transmitting the authorization information to the primary mobile device to enable the at least selected functions of the mobile communications device.
    • 描述了用于在来自辅助移动设备的主移动设备上启用功能的系统和方法。 主移动设备被配置为如果在周期性的时间间隔在主移动设备处接收到授权信息,则能够至少选择移动通信设备的功能。 该方法包括:在二级移动设备处存储授权信息; 在次要移动设备和主移动设备之间建立短距离直接无线通信链路; 以及周期性地将所述授权信息发送到所述主移动设备以启用所述移动通信设备的所述至少选择的功能。
    • 6. 发明申请
    • GENERATING STATE-DRIVEN ROLE-BASED LANDING PAGES
    • 基于状态驱动的基于角色的登陆页面
    • US20130086479A1
    • 2013-04-04
    • US13459953
    • 2012-04-30
    • Michael S. BROWNChakriya D. LIPPSGurbinder S. BALI
    • Michael S. BROWNChakriya D. LIPPSGurbinder S. BALI
    • G06F3/01G06F15/16G06F21/24
    • G06F17/30893G06F21/6218
    • A method, computer system, and computer program product for generating state-driven role-based landing pages. An enterprise application user in a secure enterprise application environment provides user-specified content relevant to the user's role in the enterprise, and when the user invokes an enterprise application, initial screens displayed by the enterprise application are displayed as landing pages using the user-specified content. The method commences by validating an enterprise application user using a user profile and a security model where the security model serves to distinguish permitted or allowed enterprise application user activities from denied enterprise application activities. Once validated, then the method identifies a user's role or roles, and further, identifies the user's selection of subscriptions (e.g., subscriptions pertaining to content related to the user's role). Given the user role and the user's selection of subscriptions, systems keep track of user states to use when populating landing pages with subscription content.
    • 一种用于生成国家驱动的基于角色的着陆页的方法,计算机系统和计算机程序产品。 安全企业应用程序环境中的企业应用程序用户提供与用户在企业中的角色相关的用户指定内容,当用户调用企业应用程序时,企业应用程序显示的初始屏幕将使用用户指定 内容。 该方法通过使用用户简档和安全模型用于将允许或允许的企业应用程序用户活动与被拒绝的企业应用程序活动区分开的安全模型进行验证来开始。 一旦验证,则该方法识别用户的角色或角色,并进一步识别用户对订阅的选择(例如,与用户角色相关的内容的订阅)。 考虑到用户角色和用户对订阅的选择,系统会跟踪用户在填写具有订阅内容的着陆页时使用的状态。
    • 10. 发明申请
    • CHALLENGE RESPONSE-BASED DEVICE AUTHENTICATION SYSTEM AND METHOD
    • 基于挑战响应的设备认证系统和方法
    • US20120045057A1
    • 2012-02-23
    • US13281789
    • 2011-10-26
    • Michael K. BROWNMichael S. BROWNMichael G. KIRKUPHerbert A. LITTLE
    • Michael K. BROWNMichael S. BROWNMichael G. KIRKUPHerbert A. LITTLE
    • H04L9/00
    • H04L9/3271H04L9/3226H04L9/3236H04L63/083H04L2209/80
    • A challenge response scheme authenticates a requesting device by an authenticating device. The authenticating device generates and issues a challenge to the requesting device. The requesting device combines the challenge with a hash of a password provided by a user, and the combination is further hashed in order to generate a requesting encryption key used to encrypt the user supplied password. The encrypted user supplied password is sent to the authenticating device as a response to the issued challenge. The authenticating device generates an authenticating encryption key by generating the hash of a combination of the challenge and a stored hash of an authenticating device password. The authenticating encryption key is used to decrypt the response in order to retrieve the user-supplied password. If the user-supplied password hash matches the stored authenticating device password hash, the requesting device is authenticated and the authenticating device is in possession of the password.
    • 挑战响应方案通过认证设备认证请求设备。 认证设备生成并向请求设备发出质询。 请求设备将挑战与由用户提供的密码的散列相结合,并且组合进一步进行散列,以便生成用于加密用户提供的密码的请求加密密钥。 加密的用户提供的密码作为对发布的挑战的响应被发送到认证设备。 认证设备通过生成质询的组合和存储的认证设备密码的哈希的散列来生成认证加密密钥。 认证加密密钥用于解密响应,以便检索用户提供的密码。 如果用户提供的密码哈希与存储的认证设备密码散列匹配,则请求设备被认证,认证设备拥有密码。