会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • System, method and program product for reporting status of contract performance or a process
    • 用于报告合同履约情况或流程的系统,方法和程序产品
    • US20070016456A1
    • 2007-01-18
    • US11179429
    • 2005-07-12
    • Kevin HimbergerClark JeffriesAllen RoginskyCharles LingafeltPhillip Singleton
    • Kevin HimbergerClark JeffriesAllen RoginskyCharles LingafeltPhillip Singleton
    • G06F9/44
    • G06Q10/06G06Q10/103
    • System, method and program product for reporting status of a process. A flow chart illustrates steps of the process and an order for performance of the steps. Then, a determination is made whether any of the steps has been performed. In response to a determination that any of the steps has been performed, graphically representing on the flow chart that the step has been performed. The graphical representation can be color-coding of the step. The determination that a step has been performed can be made based on user input that the step has been performed, or automatically by a program checking a record indicating that the step has been performed. Also, a program can automatically determine that a deadline for performing one of the steps has passed without performance of the one step. In response, the program initiates a graphical representation on the one step in the flowchart that the deadline has passed without performance of the one step. A program can also automatically determine that a problem has occurred in performing one of the steps, and in response, graphically represent on the one step in the flowchart that a problem has occurred with the one step.
    • 用于报告进程状态的系统,方法和程序产品。 流程图说明了该过程的步骤和步骤的执行顺序。 然后,确定是否执行了任何步骤。 响应于已经执行了任何步骤的确定,在流程图上以图形方式表示步骤已被执行。 图形表示可以是步骤的颜色编码。 已经执行步骤的确定可以基于已经执行步骤的用户输入,或者通过程序自动检查指示已经执行了步骤的记录。 此外,程序可以自动确定执行其中一个步骤的最后期限已经过去,而不执行一个步骤。 作为响应,程序在流程图的一个步骤中启动图形表示,即截止日期已经过去,而不执行一个步骤。 程序还可以自动确定在执行其中一个步骤中出现问题,并且作为响应,在流程图的一个步骤中以图形方式表示在该步骤中出现问题。
    • 3. 发明申请
    • Fail-safe network authentication
    • 故障安全网络认证
    • US20070157308A1
    • 2007-07-05
    • US11324868
    • 2006-01-03
    • Jeffrey BardsleyNathaniel KimCharles LingafeltAllen Roginsky
    • Jeffrey BardsleyNathaniel KimCharles LingafeltAllen Roginsky
    • G06F15/16
    • H04W12/06H04L63/08
    • An authenticator is configured with intelligence for the purpose of providing a “failsafe” mode for port-based authentication (802.1x). This failsafe mode enables end users to access a network when communication between the authenticator and the authentication server has temporarily failed, but keeps security measures in place so that unauthorized users cannot gain network access. An 802.1x access control point (e.g., a switch) is enabled to continue to authenticate certain users onto the network during periods of temporary communication failure with the authentication server, by locally storing alternative authentication information limited to historical authentication information of clients that have previously accessed the network via the authentication server. Subsequent revalidation of specific users using the primary authentication information follows restoration of communication with the authentication server.
    • 认证器配置有智能,目的是为基于端口的认证(802.1x)提供“故障安全”模式。 这种故障安全模式使最终用户能够在认证器和认证服务器之间的通信暂时失败时访问网络,但保持安全措施,使得未经授权的用户无法获得网络访问。 802.1x访问控制点(例如,交换机)能够通过本地存储限于先前已经存在的客户端的历史认证信息的替代认证信息,在认证服务器发生临时通信故障期间,继续将特定用户认证到网络上 通过认证服务器访问网络。 使用主认证信息对特定用户的后续重新验证与恢复与认证服务器的通信恢复。
    • 5. 发明授权
    • Time stamping method employing a separate ticket and stub
    • 时间戳方法采用单独的机票和存根
    • US07487359B2
    • 2009-02-03
    • US11846562
    • 2007-08-29
    • Mohammad PeyravianAllen RoginskyNevenko ZunicStephen M. Matyas, Jr.
    • Mohammad PeyravianAllen RoginskyNevenko ZunicStephen M. Matyas, Jr.
    • H04L9/00G06F7/04H04K1/00
    • H04L9/3297H04L9/3242
    • A time stamping protocol has two stages referred to as the ticketing stage and the certification stage. During the ticketing stage, the document or other identifying data is sent to the TSA. The TSA generates a “ticket” based on the document or other identifying data and a time indication derived from a trusted clock. The ticket, which serves as an unsigned time stamp receipt, is transmitted back to the document originator. During the certification stage, the holder of the ticket requests a certified time stamp receipt by presenting the ticket to the TSA. The TSA verifies the ticket and generates a signed time stamp receipt, called the ticket stub, which is then transmitted back to the document originator. The ticket stub serves as a “universal time-stamp” that the holder of the ticket stub can use to prove the date of the document.
    • 时间戳协议有两个阶段,称为票务阶段和认证阶段。 在票务阶段,文件或其他识别数据被发送到TSA。 TSA根据文档或其他标识数据和从可信时钟导出的时间指示生成“票证”。 作为未签名的时间戳收据的票据被传回给文件发起者。 在认证阶段,机票持有人通过向TSA提供机票来申请经过认证的时间戳收据。 TSA验证票据并生成一个称为票据存根的签名时间戳收据,然后将其传回给文档发起者。 票据桩作为票据存根的持有者可以用来证明文件的日期的“通用时间戳”。
    • 9. 发明申请
    • ENCRYPTING DATA FOR ACCESS BY MULTIPLE USERS
    • 加密数据以供多个用户访问
    • US20070297608A1
    • 2007-12-27
    • US11766192
    • 2007-06-21
    • Per JonasAllen RoginskyNevenko Zunic
    • Per JonasAllen RoginskyNevenko Zunic
    • H04L9/32
    • H04L9/0822H04L9/0863
    • A method for protecting data for access by a plurality of users. A server encrypts data using a master key and a symmetric encryption algorithm. For each authorized user, a key encryption key (KEK) is derived from a passphrase, and the master key is encrypted using the KEK. The server posts the encrypted data and an ancillary file that includes, for each user, a user identifier and the master key encrypted according to the user's KEK. To access the data, a user enters the passphrase into a client, which re-derives the user's KEK, and finds, in the ancillary file, the master key encrypted using the user's KEK. The client decrypts the master key and then decrypts the data. A KEK may be derived from a natural language passphrase by hashing the passphrase, concatenating the result and a predetermined text, hashing the concatenation, and truncating.
    • 一种用于保护数据以供多个用户访问的方法。 服务器使用主密钥和对称加密算法对数据进行加密。 对于每个授权用户,密钥加密密钥(KEK)是从密码短语导出的,并且使用KEK对主密钥进行加密。 服务器发布加密数据以及辅助文件,其中包括针对每个用户的根据用户的KEK加密的用户标识符和主密钥。 为了访问数据,用户将密码短语输入客户端,重新导出用户的KEK,并在辅助文件中发现使用用户的KEK加密的主密钥。 客户端解密主密钥,然后解密数据。 KEK可以从自然语言密码短语中衍生,通过散列密码,连接结果和预定文本,散列连接和截断。