会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 23. 发明申请
    • SOFTWARE LICENSING CONTROL VIA MOBILE DEVICES
    • 通过移动设备的软件许可控制
    • US20080262968A1
    • 2008-10-23
    • US12055290
    • 2008-03-25
    • Ashutosh SaxenaHarigopal K. B. Ponnapalli
    • Ashutosh SaxenaHarigopal K. B. Ponnapalli
    • G06Q99/00H04L9/32
    • G06F21/10
    • Methods and systems to control a license for a software application are disclosed. The methods and systems can include requesting a central licensing server for initial verification and authentication of at least one user of a software application and sending a identification application from the central licensing server to at least one of the first device or the second device. A license identifier can be generated in the first device or the second device and sent to the central licensing server. The central licensing server can respond by sending a license key generator program to generate a dynamic key. The dynamic key can be input in the second device to execute the software application.
    • 公开了用于控制软件应用的许可证的方法和系统。 方法和系统可以包括请求中央许可服务器进行软件应用程序的至少一个用户的初始验证和认证,并将识别应用从中央许可服务器发送到第一设备或第二设备中的至少一个。 可以在第一设备或第二设备中生成许可标识符,并发送到中央许可服务器。 中央许可服务器可以通过发送许可证密钥生成程序来生成动态密钥来进行响应。 可以在第二设备中输入动态密钥来执行软件应用。
    • 26. 发明授权
    • System and method for voice based digital signature service
    • 基于语音的数字签名服务的系统和方法
    • US08744858B2
    • 2014-06-03
    • US13246767
    • 2011-09-27
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • G10L21/00
    • G10L17/00
    • Methods and systems for providing a voice-based digital signature service are disclosed. The method includes a first user sending a document to a second user for signature, and the first user also sending a PIN to the second user and to a voice verification authority. The second user sending, to the voice verification authority, a voice recording comprising the PIN along with consent of the second user to the PIN. The voice verification authority comparing the voice recording with a predefined voice sample of the second user, and the PIN received from the first user with the PIN received from the second user. The voice verification authority then sending a notification to a signing entity based on the comparison. The signing entity signing the PIN of the document with a private key associated with the second user and sends an acknowledgement to the first user and the second user.
    • 公开了用于提供基于语音的数字签名服务的方法和系统。 该方法包括将文档发送给第二用户进行签名的第一用户,并且第一用户还向第二用户和语音验证机构发送PIN。 第二用户向语音验证机构发送包括PIN的语音记录以及第二用户同意PIN。 所述语音验证机构将所述语音记录与所述第二用户的预定义语音样本进行比较,以及从所述第一用户接收到的所述PIN与从所述第二用户接收的所述PIN。 语音验证机构随后根据比较向签署实体发送通知。 签名实体用与第二用户相关联的私钥对文档的PIN进行签名,并向第一用户和第二用户发送确认。
    • 28. 发明申请
    • METHODS FOR AUTHENTICATING A USER WITHOUT PERSONAL INFORMATION AND DEVICES THEREOF
    • 用于认证用户的个人信息及其设备的方法
    • US20130007861A1
    • 2013-01-03
    • US13218515
    • 2011-08-26
    • Ashutosh SAXENAHarigopal K.B. Ponnapalli
    • Ashutosh SAXENAHarigopal K.B. Ponnapalli
    • H04L9/32G06F21/20
    • G06F21/31H04L63/08
    • A method, non-transitory computer readable medium, and apparatus that authenticates a user without personal information includes obtaining at a secure authentication computing apparatus a context identifier, a registration identifier of one of a plurality of string generator modules assigned to a client computing device requesting access, and a client string generated by the client computing device requesting access from an agent computing device associated with the client computing device requesting access. An authentication string is generated with the secure authentication computing apparatus based on the obtained context identifier and a corresponding one of the plurality of string generator modules provided to the client computing device requesting access based on the registration identifier. The requested access by the client computing device is granted with the secure authentication computing apparatus when the client string matches the authentication string.
    • 在没有个人信息的情况下认证用户的方法,非暂时性计算机可读介质和装置包括在安全认证计算设备处获取上下文标识符,分配给客户端计算设备的多个字符串生成器模块之一的注册标识符 访问和由客户端计算设备生成的客户端字符串,请求从与请求访问的客户端计算设备相关联的代理计算设备进行访问。 基于所获得的上下文标识符和提供给客户计算设备的多个字符串生成器模块中的相应一个,基于注册标识符来请求访问,生成认证字符串。 当客户端字符串匹配认证字符串时,由客户端计算设备请求的访问被授予安全认证计算设备。
    • 29. 发明申请
    • METHOD AND SYSTEM FOR ADAPTIVE VULNERABILITY SCANNING OF AN APPLICATION
    • 适用于自适应扫描的方法和系统
    • US20110321164A1
    • 2011-12-29
    • US12858884
    • 2010-08-18
    • Ashutosh SAXENAManeesh PONNATHVishal Anjaiah GUJJARY
    • Ashutosh SAXENAManeesh PONNATHVishal Anjaiah GUJJARY
    • G06F21/00
    • G06F21/577
    • A method and system for adaptive vulnerability scanning (AVS) of an application is provided. The adaptive vulnerability scanning of an application assists in identifying new vulnerabilities dynamically. The endpoints of an application are scanned using a predefined set of rules. Subsequently, one or more possible vulnerabilities are presented. The vulnerabilities are analyzed and predefined rules are modified. The steps of scanning the application and modification of rules are iteratively repeated till the adaptive vulnerability scanning capability is achieved. A neural network is used for training the adaptive vulnerability scanner. This neural network is made to learn some rules based on predefined set of rules while undergoing the training phase. At least one weight in neural networks is altered while imparting the self learning capability.
    • 提供了一种应用的自适应漏洞扫描(AVS)的方法和系统。 应用程序的自适应漏洞扫描有助于动态识别新的漏洞。 使用预定义的一组规则扫描应用程序的端点。 随后,提出了一个或多个可能的漏洞。 分析漏洞并修改预定义规则。 迭代重复扫描应用程序和修改规则的步骤,直到实现自适应漏洞扫描功能。 神经网络用于训练自适应漏洞扫描器。 这个神经网络是在进行训练阶段的基础上,基于预定义的规则集来学习一些规则。 改变神经网络中的至少一个权重,同时赋予自学习能力。