会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 再颁专利
    • Image or pictographic based computer login systems and methods
    • 基于图像或图像的计算机登录系统和方法
    • USRE44725E1
    • 2014-01-21
    • US13409877
    • 2012-03-01
    • Erik L. HoltMatthew E. KowalczykRussell Humphries
    • Erik L. HoltMatthew E. KowalczykRussell Humphries
    • G06F21/00
    • G06F21/36
    • Image based login procedures for computer systems include: (a) displaying a first image on a computer screen; (b) receiving user input indicating a portion of the first image; (c) determining if the user input corresponds to a first acceptable user input for user authentication; and (d) proceeding with the authentication procedure when this user input corresponds to the first acceptable user input for user authentication. Additionally or optionally, when proceeding with this authentication procedure, the systems and methods further may include: displaying a second image on the screen; receiving new user input indicating a portion of the second image; and determining if this new input corresponds to a second acceptable user input for user authentication.
    • 用于计算机系统的基于图像的登录过程包括:(a)在计算机屏幕上显示第一图像; (b)接收指示所述第一图像的一部分的用户输入; (c)确定用户输入是否对应于用于用户认证的第一可接受用户输入; 和(d)当该用户输入对应于用于用户认证的第一可接受的用户输入时,进行认证过程。 另外或可选地,当进行该认证过程时,系统和方法还可以包括:在屏幕上显示第二图像; 接收指示所述第二图像的一部分的新用户输入; 以及确定该新输入是否对应于用于用户认证的第二可接受用户输入。
    • 4. 发明授权
    • Image or pictographic based computer login systems and methods
    • 基于图像或图像的计算机登录系统和方法
    • US07953983B2
    • 2011-05-31
    • US11073742
    • 2005-03-08
    • Erik L HoltMatthew E KowalczykRussell Humphries
    • Erik L HoltMatthew E KowalczykRussell Humphries
    • G06F21/00
    • G06F21/36
    • Image based login procedures for computer systems include: (a) displaying a first image on a computer screen; (b) receiving user input indicating a portion of the first image; (c) determining if the user input corresponds to a first acceptable user input for user authentication; and (d) proceeding with the authentication procedure when this user input corresponds to the first acceptable user input for user authentication. Additionally or optionally, when proceeding with this authentication procedure, the systems and methods further may include: displaying a second image on the screen; receiving new user input indicating a portion of the second image; and determining if this new input corresponds to a second acceptable user input for user authentication.
    • 用于计算机系统的基于图像的登录过程包括:(a)在计算机屏幕上显示第一图像; (b)接收指示所述第一图像的一部分的用户输入; (c)确定用户输入是否对应于用于用户认证的第一可接受用户输入; 和(d)当该用户输入对应于用于用户认证的第一可接受的用户输入时,进行认证过程。 另外或可选地,当进行该认证过程时,系统和方法还可以包括:在屏幕上显示第二图像; 接收指示所述第二图像的一部分的新用户输入; 以及确定该新输入是否对应于用于用户认证的第二可接受用户输入。
    • 5. 发明授权
    • Key certification in one round trip
    • 重要认证一次往返
    • US08700893B2
    • 2014-04-15
    • US12607937
    • 2009-10-28
    • Stefan ThomScott D. AndersonErik L. Holt
    • Stefan ThomScott D. AndersonErik L. Holt
    • H04L9/00H04L9/32
    • H04L9/3247G06F21/72H04L9/0825H04L9/0877H04L9/3234H04L9/3263H04L2209/127
    • Certification of a key, which a Trusted Platform Module (TPM) has attested as being non-migratable, can be performed in a single round trip between the certificate authority (CA) and the client that requests the certificate. The client creates a certificate request, and then has the TPM create an attestation identity key (AIK) that is bound to the certificate request. The client then asks the TPM to sign the new key as an attestation of non-migratability. The client then sends the certificate request, along with the attestation of non-migratability to the CA. The CA examines the certificate request and attestation of non-migratability. However, since the CA does not know whether the attestation has been made by a trusted TPM, it certifies the key but includes, in the certificate, an encrypted signature that can only be decrypted using the endorsement key of the trusted TPM.
    • 可信平台模块(TPM)已经证明为不可迁移的密钥的认证可以在认证机构(CA)和请求证书的客户端之间的单次往返中执行。 客户端创建证书请求,然后TPM创建绑定到证书请求的认证身份密钥(AIK)。 然后,客户要求TPM签署新的密钥,作为不可迁移性的证明。 然后,客户端将证书请求以及不可迁移性的证明发送到CA。 CA检查证书请求并证明非迁移性。 然而,由于CA不知道认证是否由受信任的TPM进行,所以它证明密钥,但是在证书中包括只能使用可信TPM的认可密钥进行解密的加密签名。
    • 6. 发明申请
    • KEY CERTIFICATION IN ONE ROUND TRIP
    • 一次性重要认证
    • US20110099367A1
    • 2011-04-28
    • US12607937
    • 2009-10-28
    • Stefan ThomScott D. AndersonErik L. Holt
    • Stefan ThomScott D. AndersonErik L. Holt
    • H04L9/00H04L9/32
    • H04L9/3247G06F21/72H04L9/0825H04L9/0877H04L9/3234H04L9/3263H04L2209/127
    • Certification of a key, which a Trusted Platform Module (TPM) has attested as being non-migratable, can be performed in a single round trip between the certificate authority (CA) and the client that requests the certificate. The client creates a certificate request, and then has the TPM create an attestation identity key (AIK) that is bound to the certificate request. The client then asks the TPM to sign the new key as an attestation of non-migratability. The client then sends the certificate request, along with the attestation of non-migratability to the CA. The CA examines the certificate request and attestation of non-migratability. However, since the CA does not know whether the attestation has been made by a trusted TPM, it certifies the key but includes, in the certificate, an encrypted signature that can only be decrypted using the endorsement key of the trusted TPM.
    • 可信平台模块(TPM)已经证明为不可迁移的密钥的认证可以在认证机构(CA)和请求证书的客户端之间的单次往返中执行。 客户端创建证书请求,然后TPM创建绑定到证书请求的认证身份密钥(AIK)。 然后,客户要求TPM签署新的密钥,作为不可迁移性的证明。 然后,客户端将证书请求以及不可迁移性的证明发送到CA。 CA检查证书请求并证明非迁移性。 然而,由于CA不知道认证是否由受信任的TPM进行,所以它证明密钥,但是在证书中包括只能使用可信TPM的认可密钥进行解密的加密签名。