会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明授权
    • Wormhole devices for usable secure access to remote resource
    • 蠕虫孔设备可用于远程资源的安全访问
    • US08387124B2
    • 2013-02-26
    • US11744451
    • 2007-05-04
    • Diana K. SmettersTrevor F. SmithKyung-Hee Lee
    • Diana K. SmettersTrevor F. SmithKyung-Hee Lee
    • H04L29/06
    • H04L63/0853
    • A token has a memory, an interface allow connection to a host, and a processor. The processor, in response to user input for configuring a remote access connection, executes a first set of processing instructions to establish a trusted connection with the server host, exchanges credentials over the trusted connection to establish a secure connection with the server host over an untrusted connection, and defines configuration information for accessing user selected data or services. The processor, in response to user input received in a legacy environment, executes a second set of processing instructions that includes establishing, over an untrusted connection, a secure connection with the server host using the security credentials, configuring the secure connection for access to the data or services, making the data or services available in the legacy environment, and defends against attempted access to data or services available at the token other than the data or services made available in the legacy environment.
    • 令牌具有内存,接口允许连接到主机和处理器。 响应于用于配置远程访问连接的用户输入,处理器执行第一组处理指令以建立与服务器主机的可信连接,通过可信连接交换凭证,以通过不可信的方式与服务器主机建立安全连接 连接,并定义用于访问用户选择的数据或服务的配置信息。 响应于在传统环境中接收的用户输入,处理器执行第二组处理指令,其包括通过不可信连接在使用安全凭证的情况下建立与服务器主机的安全连接,配置安全连接以访问 数据或服务,使数据或服务在遗留环境中可用,并防止尝试访问在令牌上可用的数据或服务,而不是在传统环境中提供的数据或服务。
    • 32. 发明授权
    • Session migration over content-centric networks
    • 会话迁移以内容为中心的网络
    • US08375436B2
    • 2013-02-12
    • US12765645
    • 2010-04-22
    • James D. ThorntonVan L. JacobsonDiana K. Smetters
    • James D. ThorntonVan L. JacobsonDiana K. Smetters
    • H04L29/06
    • H04L67/327H04L67/14
    • One embodiment of the present invention provides a system for facilitating session migration. During operation, the system receives a communication packet from a client destined to a remote server. The system determines whether the communication packet belongs to a pre-existing communication session, and whether session state information associated with the session is available locally. In response to the communication packet belonging to a pre-existing communication session and the session state information being unavailable locally, the system constructs an interest requesting the session state information, disseminates the interest over a network, and receives the session state information.
    • 本发明的一个实施例提供了一种便于会话迁移的系统。 在操作期间,系统从发往远程服务器的客户端接收通信包。 系统确定通信分组是否属于预先存在的通信会话,以及与该会话相关联的会话状态信息是否可在本地获得。 响应于属于预先存在的通信会话的通信分组,并且会话状态信息在本地不可用,系统构造了请求会话状态信息的兴趣,通过网络传播兴趣,并且接收会话状态信息。
    • 37. 发明授权
    • Using a portable security token to facilitate public key certification for devices in a network
    • 使用便携式安全令牌来促进网络中设备的公钥认证
    • US07552322B2
    • 2009-06-23
    • US10877477
    • 2004-06-24
    • Dirk BalfanzGlenn E. DurfeeDiana K. Smetters
    • Dirk BalfanzGlenn E. DurfeeDiana K. Smetters
    • H04L9/00
    • G06F21/33G06F21/35G06F2221/2111G06F2221/2115G06F2221/2129
    • One embodiment of the present invention provides a system that uses a portable security token to facilitate public key certification for a target device in a network. During system operation, the portable security token is located in close physical proximity to the target device to allow the portable security token to communicate with the target device through a location-limited communication channel. During this communication, the portable security token receives an authenticator for the target device, and forms a ticket by digitally signing the authenticator with a key previously agreed upon by the portable security token and a certification authority (CA). Next, the portable security token sends the ticket to the target device, whereby the target device can subsequently present the ticket to the CA to prove that the target device is authorized to receive a credential from the CA.
    • 本发明的一个实施例提供了一种使用便携式安全令牌来促进网络中的目标设备的公钥认证的系统。 在系统操作期间,便携式安全令牌位于与目标设备紧密物理接近处,以允许便携式安全令牌通过位置限制通信信道与目标设备进行通信。 在该通信期间,便携式安全令牌接收用于目标设备的认证器,并通过使用便携式安全令牌和认证机构(CA)先前约定的密钥对认证器进行数字签名来形成机票。 接下来,便携式安全令牌将票据发送到目标设备,由此目标设备可以随后向CA呈现票据,以证明目标设备被授权从CA接收证书。
    • 39. 发明申请
    • WORMHOLE DEVICES FOR USABLE SECURE ACCESS TO REMOTE RESOURCE
    • 用于可靠安全访问远程资源的WORMHOLE设备
    • US20080229402A1
    • 2008-09-18
    • US11744451
    • 2007-05-04
    • Diana K. SmettersTrevor F. SmithKyung-Hee Lee
    • Diana K. SmettersTrevor F. SmithKyung-Hee Lee
    • H04L9/32
    • H04L63/0853
    • A token has a memory, an interface allow connection to a host, and a processor. The processor, in response to user input for configuring a remote access connection, executes a first set of processing instructions to establish a trusted connection with the server host, exchanges credentials over the trusted connection to establish a secure connection with the server host over an untrusted connection, and defines configuration information for accessing user selected data or services. The processor, in response to user input received in a legacy environment, executes a second set of processing instructions that includes establishing, over an untrusted connection, a secure connection with the server host using the security credentials, configuring the secure connection for access to the data or services, making the data or services available in the legacy environment, and defends against attempted access to data or services available at the token other than the data or services made available in the legacy environment.
    • 令牌具有内存,接口允许连接到主机和处理器。 响应于用于配置远程访问连接的用户输入,处理器执行第一组处理指令以建立与服务器主机的可信连接,通过可信连接交换凭证,以通过不可信的方式与服务器主机建立安全连接 连接,并定义用于访问用户选择的数据或服务的配置信息。 响应于在传统环境中接收的用户输入,处理器执行第二组处理指令,其包括通过不可信连接在使用安全凭证的情况下建立与服务器主机的安全连接,配置安全连接以访问 数据或服务,使数据或服务在遗留环境中可用,并防止尝试访问在令牌上可用的数据或服务,而不是在传统环境中提供的数据或服务。