会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Method and system for dynamic client authentication in support of JAAS programming model
    • 支持JAAS编程模型的动态客户端认证的方法和系统
    • US20050005090A1
    • 2005-01-06
    • US10611022
    • 2003-07-01
    • Vishwanath VenkataramappaShyamala Vishwanath
    • Vishwanath VenkataramappaShyamala Vishwanath
    • H04L9/00
    • G06F21/31G06F9/468G06F21/335G06F2221/2149
    • Authentication operations are performed within a CORBA-compliant environment with client applications using the JAAS programming model. A client application obtains an interoperable object reference (IOR) for a target object on a remote server that is protected within a security domain. After the client application invokes the target object, an object request is generated, and a request-level interceptor obtains the IOR for the target object and extracts an identifier for the security domain from the IOR. If a credential for the security domain is not in the current execution context of the client application, i.e., the current JAAS subject in the JAAS programming model, then the request-level interceptor performs an authentication operation with the security domain on behalf of the client application, receives an authentication credential, and places the authentication credential into the execution context of the client application. The object request is further processed in association with the obtained credential.
    • 使用JAAS编程模型的客户端应用程序在符合CORBA的环境中执行身份验证操作。 客户端应用程序获取在安全域内受保护的远程服务器上的目标对象的可互操作对象引用(IOR)。 客户端应用程序调用目标对象后,生成对象请求,请求级拦截器获取目标对象的IOR,并从IOR中提取安全域的标识符。 如果安全域的凭证不在客户端应用程序的当前执行上下文中,即JAAS编程模型中的当前JAAS主题,则请求级拦截器代表客户机与安全域执行身份验证操作 应用程序,接收认证凭证,并将认证凭证放入客户端应用程序的执行上下文中。 与所获得的证书相关联地进一步处理对象请求。
    • 2. 发明授权
    • Method and system for dynamic client authentication in support of JAAS programming model
    • 支持JAAS编程模型的动态客户端认证的方法和系统
    • US07363487B2
    • 2008-04-22
    • US10611022
    • 2003-07-01
    • Vishwanath VenkataramappaShyamala Vishwanath
    • Vishwanath VenkataramappaShyamala Vishwanath
    • H04L9/00
    • G06F21/31G06F9/468G06F21/335G06F2221/2149
    • Authentication operations are performed within a CORBA-compliant environment with client applications using the JAAS programming model. A client application obtains an interoperable object reference (IOR) for a target object on a remote server that is protected within a security domain. After the client application invokes the target object, an object request is generated, and a request-level interceptor obtains the IOR for the target object and extracts an identifier for the security domain from the IOR. If a credential for the security domain is not in the current execution context of the client application, i.e., the current JAAS subject in the JAAS programming model, then the request-level interceptor performs an authentication operation with the security domain on behalf of the client application, receives an authentication credential, and places the authentication credential into the execution context of the client application. The object request is further processed in association with the obtained credential.
    • 使用JAAS编程模型的客户端应用程序在符合CORBA的环境中执行身份验证操作。 客户端应用程序获取在安全域内受保护的远程服务器上的目标对象的可互操作对象引用(IOR)。 客户端应用程序调用目标对象后,生成对象请求,请求级拦截器获取目标对象的IOR,并从IOR中提取安全域的标识符。 如果安全域的凭证不在客户端应用程序的当前执行上下文中,即JAAS编程模型中的当前JAAS主题,则请求级拦截器代表客户机与安全域执行身份验证操作 应用程序,接收认证凭证,并将认证凭证放入客户端应用程序的执行上下文中。 与所获得的证书相关联地进一步处理对象请求。
    • 3. 发明授权
    • Automatic wireless network password update
    • 自动无线网络密码更新
    • US08290163B2
    • 2012-10-16
    • US12049294
    • 2008-03-15
    • David Yu ChangJohn Yow-Chun ChangVishwanath Venkataramappa
    • David Yu ChangJohn Yow-Chun ChangVishwanath Venkataramappa
    • H04L29/06
    • H04L63/0846H04L63/0428H04W12/02H04W12/06
    • An approach is provided that allows an administrator to set a new password at a wireless access point, such as a traditional WAP or a wireless router. The wireless access point creates a message that includes the new password. The message is encrypted using the old password that was previously set for the wireless network. The encrypted message is wirelessly transmitted from the wireless access point to the active client devices (those clients currently accessing the wireless network). The clients decrypt the message using the old password that was previously provided to the clients. The clients retrieve the new password from the message. The clients construct a new message that is encrypted using the new password. The new message is wirelessly transmitted from the clients to the wireless access device and serves as an acknowledgement.
    • 提供了一种允许管理员在无线接入点(例如传统WAP或无线路由器)设置新密码的方法。 无线接入点创建一个包含新密码的消息。 该消息是使用之前为无线网络设置的旧密码加密的。 加密的消息从无线接入点无线地发送到活动客户端设备(当前正在接入无线网络的那些客户端)。 客户端使用之前提供给客户端的旧密码解密邮件。 客户端从邮件中检索新密码。 客户端构造使用新密码加密的新消息。 新消息从客户端无线传输到无线接入设备,并作为确认。
    • 4. 发明申请
    • Automated deployment of an application
    • 自动部署应用程序
    • US20050289536A1
    • 2005-12-29
    • US10874495
    • 2004-06-23
    • Ranjit NayakSridhar SudarsanVishwanath VenkataramappaQinhua WangLeigh Williamson
    • Ranjit NayakSridhar SudarsanVishwanath VenkataramappaQinhua WangLeigh Williamson
    • G06F9/44G06F9/445
    • G06F8/61
    • Methods, systems, and media to automatically deploy an, e.g., a JS2EE file between environments are disclosed. Embodiments include hardware and/or software for selecting one or more applications in an original system for export. The applications along with their corresponding application data, configuration data, and descriptor files, are compressed into one or more archive files such as Enterprise Archives (EARs). Variable configuration data associated with the target environment is identified so the values of the variable configuration data can be adapted for the target environment. Then, the target environment is adapted for installation of the application and the application is installed in the target environment. Advantageously, this deployment of the application may reduce the chance of user error, require less J2EE knowledge and script maintenance, and complete faster than deployments effected manually.
    • 公开了在环境之间自动部署例如JS2EE文件的方法,系统和媒体。 实施例包括用于选择用于输出的原始系统中的一个或多个应用的​​硬件和/或软件。 应用程序及其相应的应用程序数据,配置数据和描述符文件被压缩成一个或多个存档文件,例如企业档案(EAR)。 识别与目标环境相关联的可变配置数据,从而可以针对目标环境调整可变配置数据的值。 然后,目标环境适用于安装应用程序,应用程序安装在目标环境中。 有利地,应用程序的这种部署可能减少用户错误的机会,需要较少的J2EE知识和脚本维护,并且比手动实现的部署更快地完成。
    • 5. 发明申请
    • Authentication and authorization methods for cloud computing security platform
    • 云计算安全平台的认证和授权方法
    • US20130007845A1
    • 2013-01-03
    • US13173563
    • 2011-06-30
    • David Yu ChangMessaoud BenantarJohn Yow-Chun ChangVishwanath Venkataramappa
    • David Yu ChangMessaoud BenantarJohn Yow-Chun ChangVishwanath Venkataramappa
    • G06F17/30
    • H04L63/104G06F21/62G06F21/6218G06F21/78G06F2221/2115H04L63/08H04L63/0815H04L67/10H04L67/34H04L67/42
    • An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.
    • 云计算环境的认证和授权插件模型使云客户在将应用程序部署在云中时能够保留对其企业信息的控制。 云服务提供商为客户安全模块提供可插拔的界面。 当客户部署应用程序时,云环境管理员为客户的应用程序和数据分配资源组(例如,处理器,存储和内存)。 客户将其自己的认证和授权安全模块注册到云安全服务,然后该安全模块用于控制哪些人员或实体可以访问与部署的应用程序相关的信息。 然而,云环境管理员通常没有在客户的安全模块中注册(作为允许的用户); 因此,云环境管理员无法访问(或向其他人或云的一般资源池)访问分配给云客户的资源(即使管理员自己分配了这些资源)或相关联的业务信息。 为了进一步平衡各方的权利,第三方公证服务在将应用程序和信息部署在云中时保护客户的隐私和访问权限。