会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 102. 发明授权
    • System and method for generalized authentication
    • 广泛认证的系统和方法
    • US07747024B2
    • 2010-06-29
    • US11673308
    • 2007-02-09
    • David Carroll Challener
    • David Carroll Challener
    • H04L9/00H04L9/32G06F7/04
    • G06F21/34G06F21/32H04L9/0822H04L9/0897H04L9/14H04L9/3231H04L9/3271
    • A system, method, and program product is provided that uses environments to control access to encryption keys. A request for an encryption key and an environment identifier is received. If the encryption key is not associated with the environment identifier, the request is denied. If they are associated, the system receives user-supplied environment authentication data items from a user. Examples of environment authentication data include passwords, user identifiers, user biometric data (e.g., fingerprint scan, etc.), smart cards, and the like. The system retrieves stored environment authentication data items from a secure (e.g., encrypted) storage location. The retrieved stored environment authentication data items correspond to the environment identifier that was received. The received environment authentication data items are authenticated using the retrieved stored environment authentication data items. If the authentication is successful, the user is allowed use of the requested encryption key, otherwise, the request is denied.
    • 提供了一种使用环境来控制对加密密钥的访问的系统,方法和程序产品。 接收到加密密钥和环境标识符的请求。 如果加密密钥与环境标识符不相关联,则请求被拒绝。 如果它们相关联,则系统从用户接收用户提供的环境认证数据项。 环境认证数据的示例包括密码,用户标识符,用户生物特征数据(例如,指纹扫描等),智能卡等。 系统从安全(例如,加密的)存储位置检索存储的环境认证数据项。 检索到的存储环境认证数据项对应于接收到的环境标识符。 接收到的环境认证数据项使用检索到的存储环境认证数据项进行认证。 如果认证成功,则允许用户使用所请求的加密密钥,否则请求被拒绝。
    • 103. 发明申请
    • System and Method for Generalized Authentication
    • 广义认证系统与方法
    • US20100158253A1
    • 2010-06-24
    • US12717401
    • 2010-03-04
    • David Carroll Challener
    • David Carroll Challener
    • H04L9/00
    • G06F21/34G06F21/32H04L9/0822H04L9/0897H04L9/14H04L9/3231H04L9/3271
    • A system, method, and program product is provided that uses environments to control access to encryption keys. A request for an encryption key and an environment identifier is received. If the encryption key is not associated with the environment identifier, the request is denied. If they are associated, the system receives user-supplied environment authentication data items from a user. Examples of environment authentication data include passwords, user identifiers, user biometric data (e.g., fingerprint scan, etc.), smart cards, and the like. The system retrieves stored environment authentication data items from a secure (e.g., encrypted) storage location. The retrieved stored environment authentication data items correspond to the environment identifier that was received. The received environment authentication data items are authenticated using the retrieved stored environment authentication data items. If the authentication is successful, the user is allowed use of the requested encryption key, otherwise, the request is denied.
    • 提供了一种使用环境来控制对加密密钥的访问的系统,方法和程序产品。 接收到加密密钥和环境标识符的请求。 如果加密密钥与环境标识符不相关联,则请求被拒绝。 如果它们相关联,则系统从用户接收用户提供的环境认证数据项。 环境认证数据的示例包括密码,用户标识符,用户生物特征数据(例如,指纹扫描等),智能卡等。 系统从安全(例如,加密的)存储位置检索存储的环境认证数据项。 检索到的存储环境认证数据项对应于接收到的环境标识符。 接收到的环境认证数据项使用检索到的存储环境认证数据项进行认证。 如果认证成功,则允许用户使用所请求的加密密钥,否则请求被拒绝。
    • 105. 发明授权
    • Backup restore in a corporate infrastructure
    • 企业基础架构中的备份还原
    • US07673134B2
    • 2010-03-02
    • US11101290
    • 2005-04-07
    • Ryan Charles CathermanDavid Carroll ChallenerScott Thomas ElliottJames Patrick Hoff
    • Ryan Charles CathermanDavid Carroll ChallenerScott Thomas ElliottJames Patrick Hoff
    • H04L29/06G06F9/00
    • H04L63/0428G06F11/1446G06F21/6209H04L9/0822H04L2209/60H04L2463/062
    • A method and system for remotely storing a user's admin key to gain access to an intranet is presented. The user's admin key and intranet user identification (ID) are encrypted using an enterprise's public key, and together they are concatenated into a single backup admin file, which is stored in the user's client computer. If the user needs his admin file and is unable to access it in a backup client computer, he sends the encrypted backup admin file to a backup server and his unencrypted intranet user ID to an intranet authentication server. The backup server decrypts the user's single backup admin file to obtain the user's admin key and intranet user ID. If the unencrypted intranet user ID in the authentication server matches the decrypted intranet user ID in the backup server, then the backup server sends the backup client computer the decrypted admin key.
    • 介绍一种用于远程存储用户管理密钥以访问内联网的方法和系统。 用户的管理密钥和内部网用户标识(ID)使用企业的公钥进行加密,并将它们并入一个备份管理文件,该文件存储在用户的客户端计算机中。 如果用户需要他的管理员文件,并且无法在备份客户端计算机中访问它,则他将加密的备份管理文件发送到备份服务器,并将其未加密的内部网用户ID发送到内部网认证服务器。 备份服务器解密用户的单备份管理文件,获取用户的管理密钥和内部网用户ID。 如果身份验证服务器中未加密的Intranet用户ID与备份服务器中的解密内网用户ID匹配,则备份服务器将备份客户端计算机发送解密的管理密钥。
    • 109. 发明申请
    • Method for Securely Creating an Endorsement Certificate in an Insecure Environment
    • 在不安全的环境中安全地创建认可证书的方法
    • US20090083539A1
    • 2009-03-26
    • US11858971
    • 2007-09-21
    • Ryan Charles CathermanDavid Carroll ChallenerJames Patrick Hoff
    • Ryan Charles CathermanDavid Carroll ChallenerJames Patrick Hoff
    • H04L9/00
    • G06F21/57
    • A method and system for ensuring security-compliant creation and signing of endorsement keys of manufactured TPMs. The endorsement keys are generated for the TPM. The TPM vendor selects an N-byte secret and stores the N-byte secret in the TPM along with the endorsement keys. The secret number cannot be read outside of the TPM. The secret number is also provided to the OEM's credential server. During the endorsement key (EK) credential process, the TPM generates an endorsement key, which comprises both the public key and a hash of the secret and the public key. The credential server matches the hash within the endorsement key with a second hash of the received public key (from the endorsement key) and the vendor provided secret. The EK certificate is generated and inserted into the TPM only when a match is confirmed.
    • 一种用于确保制造TPM的签注密钥的安全兼容创建和签名的方法和系统。 为TPM生成认可密钥。 TPM供应商选择一个N字节的秘密,并将N字节的秘密与支持密钥一起存储在TPM中。 无法在TPM之外读取密码。 秘密编号也提供给OEM的凭据服务器。 在认可密钥(EK)凭证处理过程中,TPM产生一个签名密钥,其包括公开密钥和密钥的散列以及公开密钥。 凭证服务器将签名密钥内的散列与接收到的公钥(来自认可密钥)和供应商提供的秘密的第二散列进行匹配。 仅当匹配确认时,EK证书才会生成并插入到TPM中。