会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明授权
    • Distributed threat management
    • 分布式威胁管理
    • US07707637B2
    • 2010-04-27
    • US12058156
    • 2008-03-28
    • Christopher G. KalerGiovanni Moises Della-LiberaJohn P. Shewchuk
    • Christopher G. KalerGiovanni Moises Della-LiberaJohn P. Shewchuk
    • G06F7/04G06F11/30H04L9/00
    • G06F21/554
    • A method and system are provided for managing a security threat in a distributed system. A distributed element of the system detects and reports suspicious activity to a threat management agent. The threat management agent determines whether an attack is taking place and deploys a countermeasure to the attack when the attack is determined to be taking place. Another method and system are also provided for managing a security threat in a distributed system. A threat management agent reviews reported suspicious activity including suspicious activity reported from at least one distributed element of the system, determines, based on the reports, whether a pattern characteristic of an attack occurred, and predicts when a next attack is likely to occur. Deployment of a countermeasure to the predicted next attack is directed in a time window based on when the next attack is predicted to occur.
    • 提供了一种用于管理分布式系统中的安全威胁的方法和系统。 系统的分布式元素会将威胁管理代理的可疑活动检测并报告。 威胁管理代理确定攻击是否发生,并在攻击确定发生时部署对攻击的对策。 还提供另一种方法和系统来管理分布式系统中的安全威胁。 威胁管理代理审查报告了可疑活动,包括从系统的至少一个分布式元素报告的可疑活动,根据报告确定是否发生攻击的模式特征,并预测何时可能发生下一次攻击。 基于预测发生下一次攻击的时间窗口,针对预测的下一次攻击的对策部署。
    • 44. 发明授权
    • Secure electronic transfer without requiring knowledge of secret data
    • 安全的电子传输,而不需要了解秘密数据
    • US07657745B2
    • 2010-02-02
    • US10988875
    • 2004-11-15
    • Max G. MorrisChristopher G. Kaler
    • Max G. MorrisChristopher G. Kaler
    • H04L9/32H04L9/08G06F7/04G06Q20/00
    • H04L9/3271G06Q20/382H04L63/0428H04L63/0853H04L2209/56
    • A secure electronic transfer mechanism that does not require that the computing entities that are parties to the transaction be aware of the secret data used to secure the transfer. A transferring computing entity provides a request from a billing agent computing entity to transfer the electronically transferable item to a computing entity. The billing agent computing entity responds to the request by providing approval data to the second computing entity, the approval data being encrypted using secret data known to the billing agent computing entity and a supplemental computing entity associated with the transferee computing entity, but not to the transferring and transferee computing entity. The approval is provided to the supplemental computing entity, which then credits the transferee account.
    • 一种安全的电子传输机制,不要求交易方的计算实体知道用于确保传输的秘密数据。 转移计算实体提供来自计费代理计算实体的请求以将电子可转移项转移到计算实体。 计费代理计算实体通过向第二计算实体提供批准数据来响应该请求,所述批准数据使用计费代理计算实体已知的秘密数据和与受让人计算实体相关联的补充计算实体进行加密,但不对 转移和受让计算实体。 批准提供给补充计算实体,然后补充计算实体将受让人账户记入账户。
    • 48. 发明申请
    • GENERIC INTERACTIVE CHALLENGES IN A DISTRIBUTED SYSTEM
    • 分布式系统中的一般互动挑战
    • US20090113534A1
    • 2009-04-30
    • US11925734
    • 2007-10-26
    • Arun K. NandaChristopher G. KalerTariq Sharif
    • Arun K. NandaChristopher G. KalerTariq Sharif
    • H04L9/32G06F17/00
    • H04L63/08G06F21/31G06F2221/2103
    • A challenge mechanism in which a challenge is issued from one message processor to another. In generating the challenge, the message processor may select any one or more of a number of available interactive challenge types, where each type of challenge type might use different user-originated information. Upon receiving the challenge, the challengee message processor may identify the challenge type based on information provided in the challenge, and perform different actions depending on the challenge type. The challengee message processor then generates an appropriate challenge response, and issues that challenge response to the challenger message processor. The challenger message processor may then validate the challenge response.
    • 挑战机制,其中挑战是从一个消息处理器发出到另一个。 在产生挑战时,消息处理器可以选择多个可用的交互式挑战类型中的任何一个或多个,其中每种类型的挑战类型可以使用不同的用户发起的信息。 在接收到挑战时,挑战者消息处理器可以基于挑战中提供的信息识别挑战类型,并根据挑战类型执行不同的动作。 挑战者消息处理器然后生成适当的挑战响应,并且向挑战者消息处理器发出挑战响应。 挑战者消息处理器然后可以验证挑战响应。