会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 32. 发明授权
    • Method of assisting an application to traverse a firewall
    • 协助应用程序穿越防火墙的方法
    • US07559082B2
    • 2009-07-07
    • US10603648
    • 2003-06-25
    • Dennis MorganAlexandru GavrilescuJonathan L. BursteinArt ShelestDavid LeBlanc
    • Dennis MorganAlexandru GavrilescuJonathan L. BursteinArt ShelestDavid LeBlanc
    • H04L29/06
    • H04L63/0227H04L63/0218H04L63/029
    • A method for a firewall-aware application to communicate its expectations to a firewall without requiring the firewall to change its policy or compromise network security. An application API is provided for applications to inform a firewall or firewalls of the application's needs, and a firewall API is provided that informs the firewall or firewalls of the application's needs. An interception module watches for connect and listen attempts by applications and services to the network stack on the local computer. The interception module traps these attempts and determines what user is making the attempt, what application or service is making the attempt, and conducts a firewall policy look-up to determine whether the user and/or application or service are allowed to connect to the network. If so, the interception module may instruct the host and/or edge firewall to configure itself for the connection being requested.
    • 防火墙感知应用程序将其期望传达到防火墙的方法,而不需要防火墙更改其策略或损害网络安全性。 为应用程序提供应用程序API以通知防火墙或防火墙应用程序的需求,并提供防火墙API,通知防火墙或防火墙应用程序的需求。 拦截模块监视应用程序和服务对本地计算机上的网络堆栈的连接和监听尝试。 拦截模块捕获这些尝试,并确定用户正在进行的尝试,什么应用程序或服务正在进行尝试,并进行防火墙策略查找,以确定是否允许用户和/或应用程序或服务连接到网络 。 如果是这样,则拦截模块可以指示主机和/或边缘防火墙为正在请求的连接配置自身。
    • 33. 发明授权
    • Authenticated domain name resolution
    • 经过身份验证的域名解析
    • US07299491B2
    • 2007-11-20
    • US10427458
    • 2003-04-30
    • Art ShelestJames M. Gilroy
    • Art ShelestJames M. Gilroy
    • H04L9/32G06F17/30
    • H04L63/08
    • Methods, systems, and computer program products for resolving domain name system records based on client authentication. Basing domain name resolution on client authentication provides remote clients with the convenience of domain names, without sacrificing the security of keeping potentially sensitive domain names private. An authoritative name server receives requests for domain name resolution from clients. For requests without client authentication, the authoritative name server responds that the domain name cannot be found. This response identifies the authoritative name server to the client so that the client can submit subsequent requests with client authentication. For requests with client authentication, the authoritative name server responds with the corresponding domain name addresses. Client may communicate domain name resolution requests directly to the authoritative name server or indirection, through one or more intermediate domain name servers. Client authentication may occur over a secure connection with the authoritative name server.
    • 方法,系统和计算机程序产品,用于根据客户端认证来解析域名系统记录。 基于客户端身份验证的域名解析为远程客户端提供了方便的域名,而不会牺牲将潜在敏感域名保密的安全性。 权威的名称服务器从客户端接收域名解析请求。 对于没有客户端认证的请求,权威名称服务器会响应找不到域名。 此响应标识客户端的权威名称服务器,以便客户端可以使用客户端身份验证提交后续请求。 对于具有客户端身份验证的请求,权威名称服务器将使用相应的域名地址进行响应。 客户端可以通过一个或多个中间域名服务器将域名解析请求直接传递给权威名称服务器或间接。 通过与权威名称服务器的安全连接可能会发生客户端身份验证。
    • 34. 发明申请
    • Methods and Systems for Unilateral Authentication of Messages
    • 消息单向认证的方法和系统
    • US20070061574A1
    • 2007-03-15
    • US11555573
    • 2006-11-01
    • Art ShelestDavid ThalerGregory O'SheaMichael RoeBrian Zill
    • Art ShelestDavid ThalerGregory O'SheaMichael RoeBrian Zill
    • H04L9/00
    • H04L9/3247H04L2209/60H04L2209/805
    • Disclosed is an authentication mechanism that enables an information recipient to ascertain that the information comes from the sender it purports to be from. This mechanism integrates a private/public key pair with selection by the sender of a portion of its address. The sender derives its address from its public key, for example, by using a hash of the key. The recipient verifies the association between the address and the sender's private key. The recipient may retrieve the key from an insecure resource and know that it has the correct key because only that key can produce the sender's address in the message. The hash may be made larger than the sender-selectable portion of the address. The recipient may cache public key/address pairs and use the cache to detect brute force attacks and to survive denial of service attacks. The mechanism may be used to optimize security negotiation algorithms.
    • 公开了一种认证机制,其使得信息接收者能够确定信息来自其看来是来自的发送者。 该机制将私钥/公钥对与发送方的地址的一部分进行选择进行集成。 发件人从其公钥中导出其地址,例如通过使用密钥的散列。 收件人验证地址和发件人私钥之间的关联。 收件人可以从不安全的资源中检索密钥,并且知道它具有正确的密钥,因为只有该密钥可以在消息中产生发送者的地址。 可以使该散列大于地址的发送者可选部分。 收件人可以缓存公共密钥/地址对,并使用缓存来检测暴力攻击并生存拒绝服务攻击。 该机制可用于优化安全协商算法。