会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Secure shell used to open a user's encrypted file system keystore
    • 安全shell用于打开用户的加密文件系统密钥库
    • US08391495B2
    • 2013-03-05
    • US12117448
    • 2008-05-08
    • Tommy Lucas McLaneShawn Patrick MullenJyoti Basavaraj Tenginakai
    • Tommy Lucas McLaneShawn Patrick MullenJyoti Basavaraj Tenginakai
    • H04L9/00H04L9/08H04L29/06G06F17/30
    • H04L9/0825H04L9/0844
    • The present invention provides a computer implemented method, apparatus, and data processing system for associating a private part of a keystore of a user with a user authentication process in an encrypting file system. A secure shell daemon server establishes the user authentication process with a secure shell client such that the user authentication process is associated with a user and the user is authenticated. The secure shell daemon server obtains an acknowledgment from the secure shell client. The secure shell daemon server accesses a user public key of the user from the keystore of the user, responsive to receiving the acknowledgment. The secure shell daemon obtains a public secure shell cookie associated with the user from the keystore of the user. The public secure shell cookie is an access key in encrypted form. The access key is based on the user's public key to form the public secure shell cookie. The secure shell daemon server obtains the access key from the secure shell client. The private part of the keystore is associated with the user authentication process, wherein the private part is accessed based on the access key.
    • 本发明提供了一种用于将用户的密钥库的私有部分与加密文件系统中的用户认证过程相关联的计算机实现的方法,装置和数据处理系统。 安全的shell守护进程服务器使用安全的shell客户端建立用户认证过程,以便用户认证过程与用户相关联,用户被认证。 安全Shell守护程序服务器从安全shell客户端获取确认。 响应于接收到确认,安全壳守护程序服务器从用户的密钥库访问用户的用户公钥。 安全Shell守护程序从用户的密钥库获取与用户关联的公共安全shell cookie。 公共安全shell cookie是加密形式的访问密钥。 访问密钥基于用户的公钥来形成公共安全Shell cookie。 安全shell守护程序服务器从安全shell客户端获取访问密钥。 密钥库的私有部分与用户认证过程相关联,其中基于访问密钥访问私有部分。
    • 8. 发明授权
    • Rogue router hunter
    • 盗贼路由器猎人
    • US07991877B2
    • 2011-08-02
    • US11867726
    • 2007-10-05
    • Susann Marie KeohaneGerald Francis McBreartyShawn Patrick MullenJessica Carol MurilloJohnny Meng-Han Shieh
    • Susann Marie KeohaneGerald Francis McBreartyShawn Patrick MullenJessica Carol MurilloJohnny Meng-Han Shieh
    • G06F15/173
    • H04L41/12H04L45/00H04L45/20H04L63/1441
    • A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing.
    • 一种计算机实现的方法,数据处理系统和用于发现网络中的未经授权的路由器的计算机程序产品。 说明性实施例中的过程首先获得可疑路由器或目的地设备的物理地址。 创建包括至少目的地媒体访问控制字段,目的地互联网协议字段和生存时间字段的数据分组,其中目的地媒体访问控制字段包括目的地设备的物理地址,其中目的地 互联网协议字段包括虚假的因特网协议地址,并且其中所述生存时间字段包括指示所述数据分组已超过时间限制的值。 使用目标介质访问控制字段中的物理地址将数据包发送到目标设备。 如果从目的地设备接收到超时消息,则确定目的地设备被启用以进行路由。