会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 34. 发明申请
    • SUPPORT OF TAMPER DETECTION FOR A LOG OF RECORDS
    • 支持记录记录的篡改检测
    • US20100115284A1
    • 2010-05-06
    • US12263427
    • 2008-10-31
    • Timothy J. HahnHeather M. Hinton
    • Timothy J. HahnHeather M. Hinton
    • H04L9/32H04L9/06
    • G06F21/64G06F2221/2101
    • Tamper detection of audit records comprises configuring a proxy for adding tamper evidence information to audit information by obtaining audit records from at least one audit record generating source, grouping obtained audit records into subsets of audit records and providing tamper evidence processing to the subsets utilizing a cryptographic mechanism to calculate a signature over each subset of audit records. The proxy groups the subsets such that each subset contains at least one designated carryover audit record that overlaps into a next subset so that each carryover audit record is associated with at least two signatures. As such, the proxy creates an overlapping chain of digitally signed audit records subsets. The proxy further forwards the tamper evident audit records from the tamper evidence adding proxy to a corresponding audit log storage subsystem for storage, storing the calculated signatures.
    • 审计记录的篡改检测包括配置代理,通过从至少一个审计记录产生源获得审计记录,将获取的审计记录分组到审计记录的子集中,并通过加密方式向子集提供篡改证据处理,从而将审计信息添加到审计信息中 计算每个审计记录子集签名的机制。 代理对子集进行分组,使得每个子集包含至少一个与下一个子集重叠的指定的结转审核记录,使得每个结转审核记录与至少两个签名相关联。 因此,代理创建一个数字签名的审计记录子集的重叠链。 代理进一步将篡改明显的审计记录从篡改证据添加代理转发到相应的审计日志存储子系统进行存储,存储计算的签名。
    • 35. 发明授权
    • Method and system for identity provider migration using federated single-sign-on operation
    • 使用联合单点登录操作的身份提供者迁移的方法和系统
    • US07657639B2
    • 2010-02-02
    • US11459118
    • 2006-07-21
    • Heather M. Hinton
    • Heather M. Hinton
    • G06F15/16
    • H04L63/0815H04L63/104
    • A method is presented for performing an identity provider migration operation with respect to a user within a federated computational environment, wherein the user has a first user account at a first identity provider, a second user account at a second identity provider, and a third user account at a service provider. A request to access a resource is received by the service provider, after which a federated single-sign-on operation for the user is performed between the service provider and the first identity provider. Prior to sending a response to the request to access the protected resource, information in the third user account is modified to indicate that the service provider relies upon the second identity provider to authenticate the user on behalf of the service provider rather than the first identity provider. A response for the request to access the resource is then returned by the service provider.
    • 提出了一种用于对联合计算环境内的用户执行身份提供者迁移操作的方法,其中用户在第一身份提供者处具有第一用户帐户,在第二身份提供商处具有第二用户帐户,以及第三用户 帐户在服务提供商。 服务提供商接收访问资源的请求,之后在服务提供商和第一身份提供商之间执行用户的联合单点登录操作。 在发送对访问受保护资源的请求的响应之前,第三用户帐户中的信息被修改以指示服务提供者依赖于第二身份提供者来代表服务提供商而不是第一身份提供者认证用户 。 然后由服务提供商返回对访问资源的请求的响应。
    • 36. 发明申请
    • PATTERN SCANNER AND EDITOR FOR SECURITY AUDIT SYSTEMS
    • 图案扫描仪和编辑安全审计系统
    • US20090297043A1
    • 2009-12-03
    • US12127925
    • 2008-05-28
    • Heather M. HintonPing WangHang XiaoJean X. Yu
    • Heather M. HintonPing WangHang XiaoJean X. Yu
    • G06K9/68
    • H04L63/1433G06F21/552H04L63/1425
    • A pattern scanner is provided for identifying which portions of a security log entry is unrecognizable by currently defined data patterns. Furthermore, an editor is provided for identifying portions of the security log entry that are recognizable by sub-patterns of the currently defined data patterns and portions of the security log entry that are not recognizable. The editor further provides a user interface through which a user may associated sub-patterns with portions of the security log entry that are not recognized. Moreover, a user interface may be provided for defining new sub-patterns that may be applied to recognizing portions of security log entries. A data pattern based on a combination of sub-patterns for the recognized and unrecognized portions of the security log entry may then be automatically generated.
    • 提供了一种模式扫描器,用于识别安全日志条目的哪些部分不能被当前定义的数据模式识别。 此外,提供了一种编辑器,用于识别安全日志条目的可识别的当前定义的数据模式的子模式和不可识别的安全日志条目的部分的部分。 编辑器进一步提供用户界面,通过该用户界面,用户可以将子模式与安全日志条目的不被识别的部分相关联。 此外,可以提供用于定义可以应用于识别安全日志条目的部分的新子模式的用户界面。 然后可以自动生成基于用于安全日志条目的识别和未识别部分的子模式的组合的数据模式。
    • 38. 发明申请
    • Method and system for extending authentication methods
    • 用于扩展认证方法的方法和系统
    • US20080134305A1
    • 2008-06-05
    • US11305646
    • 2005-12-16
    • Heather M. HintonBenjamin HarmonAnthony Moran
    • Heather M. HintonBenjamin HarmonAnthony Moran
    • H04L9/32
    • H04L63/08H04L63/0815
    • A method is presented for managing authentication credentials for a user. A session management server performs session management with respect to the user for a domain that includes a protected resource. The session management server receives a request to access the protected resource, which requires authentication credentials that have been generated for a first type of authentication context. In response to determining that authentication credentials for the user have been generated for a second type of authentication context, the session management server sends to an authentication proxy server a first message that contains the authentication credentials for the user and an indicator for the first type of authentication context. The session management server subsequently receives a second message that contains updated authentication credentials for the user that indicate that the updated authentication credentials have been generated for the first type of authentication context.
    • 呈现用于管理用户的认证凭证的方法。 会话管理服务器针对包含受保护资源的域对用户执行会话管理。 会话管理服务器接收访问受保护资源的请求,该请求需要为第一类型的认证上下文生成的认证凭证。 为了响应于确定用于第二类型的认证上下文的用户的认证凭证,会话管理服务器向认证代理服务器发送包含用户的认证凭证的第一消息和用于第一类型的认证凭证的指示符 认证上下文。 会话管理服务器随后接收第二消息,该第二消息包含用于指示为第一类型的认证上下文生成了更新的认证凭证的用户的更新认证证书。
    • 39. 发明申请
    • METHOD AND SYSTEM FOR SYNCHRONIZED ACCESS CONTROL IN A WEB SERVICES ENVIRONMENT
    • WEB服务环境中同步访问控制的方法与系统
    • US20080022362A1
    • 2008-01-24
    • US11456190
    • 2006-07-08
    • Heather M. HintonIvan M. Milman
    • Heather M. HintonIvan M. Milman
    • H04L9/32
    • H04L63/101G06F17/30876G06F21/604G06F21/6218G06F21/6236
    • Access controls for a Web service (which controls are based on abstract WSDL definitions) are defined for a WSDL defined protected object space and, as such, are loosely coupled with the concrete WSDL binding derived from those definitions, preferably on a per binding level. This WSDL-defined POS is in turn loosely bound to a resource-specific protected object space definition. This loose coupling is leveraged to allow changes (e.g., updates) to the abstract WSDL binding's protected object space to be transitively applied to the application-specific protected object space. If appropriate, changes to the resource-specific protected object space may be applied to the WSDL's protected object space. Thus, according to the invention, the coupling may be one-way (typically, from the WSDL POS to the resource level POS) or two-way (from the WSDL POS to the resource level POS and vice versa). This technique ensures that different security policies are not applied unintentionally to the same resource (for example, one at the Web services entry level, and the other at the resource level). By synchronizing the protected object spaces in the manner described, neither the entity that deploys the application nor the security administrator need to be aware of the differences between the Web service request and the resource request.
    • 针对WSDL定义的受保护对象空间定义了一个Web服务(基于抽象WSDL定义的控件)的访问控制,因此与从这些定义派生的具体WSDL绑定松散耦合,优选地在每个绑定级别上。 这个WSDL定义的POS又松动地绑定到特定于资源的受保护对象空间定义。 利用这种松散耦合来允许将抽象WSDL绑定的受保护对象空间的更改(例如,更新)传递性地应用于应用程序特定的受保护对象空间。 如果适用,对资源特定的受保护对象空间的更改可能会应用于WSDL的受保护对象空间。 因此,根据本发明,耦合可以是单向的(通常从WSDL POS到资源级POS)或双向(从WSDL POS到资源级POS,反之亦然)。 这种技术可以确保不同意的资源(例如,一个在Web服务条目级别,另一个在资源级)不同的安全策略。 通过以所描述的方式同步受保护的对象空间,部署应用程序的实体和安全管理员都不需要了解Web服务请求与资源请求之间的差异。