会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Intelligent trust management method and system
    • 智能信任管理方法与系统
    • US08355970B2
    • 2013-01-15
    • US12979162
    • 2010-12-27
    • Barbara L. FoxBrian A. LaMacchia
    • Barbara L. FoxBrian A. LaMacchia
    • G06Q40/00
    • G06F21/50G06F21/52G06F21/604G06Q40/00
    • Intelligent Trust Management provides a centralized security facility that gives system components a flexible mechanism for implementing security policies. System components such as applications create a request describing an action that needs to be checked against an appropriate security policy. The request is given to a trust system that determines which policy object applies to the request, and may pass request arguments to the policy. The policy objects include executable code that uses any arguments along with dynamically obtained variable information to make a decision. The decision is returned to the system component, which then operates accordingly. Policy objects may maintain state and interface with the user independent of the system component in order to obtain information to make their decisions. Policy objects may call other policy objects and/or mathematically combine the results of other policy objects to make a decision.
    • 智能信任管理提供了一个集中的安全设施,为系统组件提供了实施安全策略的灵活机制。 系统组件(如应用程序)创建一个描述需要根据适当的安全策略进行检查的操作的请求。 该请求被提供给确定哪个策略对象适用于请求的信任系统,并且可以将请求参数传递给该策略。 策略对象包括使用任何参数以及动态获取的变量信息进行决策的可执行代码。 该决定返回到系统组件,然后系统组件相应地进行操作。 策略对象可以保持状态并且与用户无关的系统组件的接口,以便获取信息以作出决定。 策略对象可以调用其他策略对象和/或以数学方式组合其他策略对象的结果作出决定。
    • 2. 发明申请
    • INTELLIGENT TRUST MANAGEMENT METHOD AND SYSTEM
    • 智能信任管理方法与系统
    • US20110093423A1
    • 2011-04-21
    • US12979162
    • 2010-12-27
    • Barbara L. FoxBrian A. LaMacchia
    • Barbara L. FoxBrian A. LaMacchia
    • G06N5/02
    • G06F21/50G06F21/52G06F21/604G06Q40/00
    • Intelligent Trust Management provides a centralized security facility that gives system components a flexible mechanism for implementing security policies. System components such as applications create a request describing an action that needs to be checked against an appropriate security policy. The request is given to a trust system that determines which policy object applies to the request, and may pass request arguments to the policy. The policy objects include executable code that uses any arguments along with dynamically obtained variable information to make a decision. The decision is returned to the system component, which then operates accordingly. Policy objects may maintain state and interface with the user independent of the system component in order to obtain information to make their decisions. Policy objects may call other policy objects and/or mathematically combine the results of other policy objects to make a decision.
    • 智能信任管理提供了一个集中的安全设施,为系统组件提供了实施安全策略的灵活机制。 系统组件(如应用程序)创建一个描述需要根据适当的安全策略进行检查的操作的请求。 该请求被提供给确定哪个策略对象适用于请求的信任系统,并且可以将请求参数传递给该策略。 策略对象包括使用任何参数以及动态获取的变量信息进行决策的可执行代码。 该决定返回到系统组件,然后系统组件相应地进行操作。 策略对象可以保持状态并且与用户无关的系统组件的接口,以便获取信息以作出决定。 策略对象可以调用其他策略对象和/或以数学方式组合其他策略对象的结果作出决定。
    • 3. 发明授权
    • GUMP: grand unified meta-protocol for simple standards-based electronic commerce transactions
    • GUMP:宏观统一元协议,用于简单的基于标准的电子商务交易
    • US07003480B2
    • 2006-02-21
    • US09032407
    • 1998-02-27
    • Barbara L. FoxBrian A. LaMacchiaBrian C. Beckman
    • Barbara L. FoxBrian A. LaMacchiaBrian C. Beckman
    • G06F17/60
    • H04L63/0869G06Q20/3821G06Q30/06G06Q30/0617H04L63/0823H04L63/12H04L2463/102
    • A method for facilitating two-party electronic commerce transactions between trading partners on an unsecure network, such as the Internet. In one example, a client makes application for registration by a financial institution in which the client has one or more accounts. The client submits satisfactory proof of identity and a public key portion for a digital signature to the financial institution. The financial institution may provide the client a one time secret by a secure route, such as conventional mail, which can then be used by the client to show proof of its identity. The financial institution authenticates the one time secret and combines it with the client's public key in a GUMP Relationship Certificate (GRC), which it issues to the client over the network. Once issued, the GRC can be used by the client to authenticate its right to access its account(s) or other products or services at the financial institution and when conducting other electronic transactions over the network. The client digitally signs any such transaction to authenticate its right to conduct the transaction. A delegate may be enlisted by the client to negotiate the purchase of goods from a seller or for other purposes, using a GUMP Delegate Certificate. The concept can be extended to other three party transactions, such as issuing an electronic Letter of Credit (LOC).
    • 一种促进贸易伙伴之间在不安全网络(如因特网)上的双方电子商务交易的方法。 在一个示例中,客户端由客户端具有一个或多个帐户的金融机构申请注册。 客户向金融机构提交令人满意的身份证明和数字签名的公钥部分。 金融机构可以通过诸如常规邮件的安全路线向客户提供一次性秘密,然后可以由客户使用它来证明其身份。 金融机构认证一次性秘密,并将其与GUMP关系证书(GRC)中的客户端公钥相结合,并通过网络向客户端发送。 一旦发放,客户可以使用GRC来验证其在金融机构访问其帐户或其他产品或服务的权利,以及在网络上进行其他电子交易时的权利。 客户数字签署任何此类交易以验证其进行交易的权利。 代理人可以由客户参与,以使用GUMP代表证书协商从卖方购买商品或为了其他目的。 该概念可以扩展到其他三方交易,例如发行电子信用证(LOC)。
    • 6. 发明授权
    • Intelligent trust management method and system
    • 智能信任管理方法与系统
    • US07877264B2
    • 2011-01-25
    • US11273143
    • 2005-11-14
    • Barbara L. FoxBrian A. LaMacchia
    • Barbara L. FoxBrian A. LaMacchia
    • G06Q40/00
    • G06F21/50G06F21/52G06F21/604G06Q40/00
    • Intelligent Trust Management provides a centralized security facility that gives system components a flexible mechanism for implementing security policies. System components such as applications create a request describing an action that needs to be checked against an appropriate security policy. The request is given to a trust system that determines which policy object applies to the request, and may pass request arguments to the policy. The policy objects include executable code that uses any arguments along with dynamically obtained variable information to make a decision. The decision is returned to the system component, which then operates accordingly. Policy objects may maintain state and interface with the user independent of the system component in order to obtain information to make their decisions. Policy objects may call other policy objects and/or mathematically combine the results of other policy objects to make a decision.
    • 智能信任管理提供了一个集中的安全设施,为系统组件提供了实施安全策略的灵活机制。 系统组件(如应用程序)创建一个描述需要根据适当的安全策略进行检查的操作的请求。 该请求被提供给确定哪个策略对象适用于请求的信任系统,并且可以将请求参数传递给该策略。 策略对象包括使用任何参数以及动态获取的变量信息进行决策的可执行代码。 该决定返回到系统组件,然后系统组件相应地进行操作。 策略对象可以保持状态并且与用户无关的系统组件的接口,以便获取信息以作出决定。 策略对象可以调用其他策略对象和/或以数学方式组合其他策略对象的结果作出决定。
    • 7. 发明授权
    • Intelligent trust management method and system
    • 智能信任管理方法与系统
    • US06965999B2
    • 2005-11-15
    • US09071594
    • 1998-05-01
    • Barbara L. FoxBrian A. LaMacchia
    • Barbara L. FoxBrian A. LaMacchia
    • G06F21/22G06F1/00G06F21/00G06F21/20G06Q40/00G06F15/63
    • G06F21/50G06F21/52G06F21/604G06Q40/00
    • Intelligent Trust Management provides a centralized security facility that gives system components a flexible mechanism for implementing security policies. System components such as applications create a request describing an action that needs to be checked against an appropriate security policy. The request is given to a trust system that determines which policy object applies to the request, and may pass request arguments to the policy. The policy objects include executable code that uses any arguments along with dynamically obtained variable information to make a decision. The decision is returned to the system component, which then operates accordingly. Policy objects may maintain state and interface with the user independent of the system component in order to obtain information to make their decisions. Policy objects may call other policy objects and/or mathematically combine the results of other policy objects to make a decision.
    • 智能信任管理提供了一个集中的安全设施,为系统组件提供了实施安全策略的灵活机制。 系统组件(如应用程序)创建一个描述需要根据适当的安全策略进行检查的操作的请求。 该请求被提供给确定哪个策略对象适用于请求的信任系统,并且可以将请求参数传递给该策略。 策略对象包括使用任何参数以及动态获取的变量信息进行决策的可执行代码。 该决定返回到系统组件,然后系统组件相应地进行操作。 策略对象可以保持状态并且与用户无关的系统组件的接口,以便获取信息以作出决定。 策略对象可以调用其他策略对象和/或以数学方式组合其他策略对象的结果作出决定。
    • 8. 发明授权
    • Certificate reissuance for checking the status of a certificate in financial transactions
    • 用于检查金融交易中证书状态的证书重新发行
    • US07506158B2
    • 2009-03-17
    • US11032833
    • 2005-01-10
    • Barbara L. FoxBrian A. LaMacchia
    • Barbara L. FoxBrian A. LaMacchia
    • H04L9/32
    • H04L9/3263H04L2209/56
    • A system for using a certificate authority to first provide a customer with a digital certificate, and then having a relying party that receives that digital certificate access a status authority (the certificate authority or its designated agent) to receive a reissued certificate on that certificate. The reissued certificate has a much shorter validity period, which ensures that the information is timely. Moreover, the certificate may serve as a receipt, including an accumulated record of the signatures (digital certificates) and policy applied throughout the financial transaction. As a result, each transfer of the transaction forms a digitally-signed chain of evidence recording each step of the transaction and policy applied thereto, whereby risk may be assumed and charged for appropriately and in accordance with the risk purchaser's policy.
    • 一种使用证书颁发机构首先向客户提供数字证书,然后使具有接收该数字证书的依赖方访问状态授权机构(认证机构或其指定代理人)以在该证书上接收重发证书的系统。 重发证书的有效期短得多,确保信息及时。 此外,证书可以作为收据,包括在整个金融交易中应用的签名(数字证书)和政策的累积记录。 因此,交易的每次转让形成数字签名的证据链,记录交易的每个步骤和适用的政策,从而适当地并根据风险购买者的政策来承担风险并收取风险。