会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Method and apparatus for network assessment and authentication
    • 用于网络评估和认证的方法和装置
    • US07162649B1
    • 2007-01-09
    • US09607375
    • 2000-06-30
    • Curtis E. IdePhilip C. BrassTheodore R. Doty
    • Curtis E. IdePhilip C. BrassTheodore R. Doty
    • G06F11/30G06F15/173G06F15/16H04L9/00H04K1/00
    • H04L63/08G06F21/31G06F21/577G06F2211/009G06F2221/2113H04L63/102H04L63/1433H04L63/20
    • Providing a user with assurance that a networked computer is secure, typically before completion of the log-in operation. This can be accomplished by extending the local log-in process to perform a host assessment of the workstation prior to requesting the user's credentials. If the assessment finds a vulnerability, the log-in process can inform the user that the machine is or may be compromised, or repair the vulnerability, prior to completion of the log-in operation. By performing vulnerability assessment at the level of the workstation, a network server is able to determine whether the workstation is a “trusted” platform from which to accept authentication requests. If the vulnerability assessment shows that the workstation is compromised, or if the possibility of remote compromise is high, the network server can elect to fail the authentication on the grounds that the workstation cannot be trusted. Optionally, a vulnerability assessment tool may be able to repair the vulnerability of the workstation, and then allow the authentication to proceed.
    • 为用户提供网络计算机的安全性,通常在登录操作完成之前。 这可以通过在请求用户的凭据之前扩展本地登录过程来执行工作站的主机评估来实现。 如果评估发现了一个漏洞,登录过程可以在登录操作完成之前通知用户该机器已被或可能受到威胁或修复该漏洞。 通过在工作站级进行漏洞评估,网络服务器能够确定工作站是否是从其接受认证请求的“受信任”平台。 如果漏洞评估显示工作站受到威胁,或者如果远程妥协的可能性较高,则网络服务器可能会因为不能信任工作站而导致身份验证失败。 可选地,漏洞评估工具可能能够修复工作站的漏洞,然后允许身份验证继续。
    • 3. 发明授权
    • Method and apparatus for network assessment and authentication
    • 用于网络评估和认证的方法和装置
    • US07634800B2
    • 2009-12-15
    • US11430297
    • 2006-05-08
    • Curtis E. IdePhilip C. BrassTheodore R. Doty
    • Curtis E. IdePhilip C. BrassTheodore R. Doty
    • G06F7/04G06F12/14H04L29/06
    • H04L63/08G06F21/31G06F21/577G06F2211/009G06F2221/2113H04L63/102H04L63/1433H04L63/20
    • Providing a user with assurance that a networked computer is secure, typically before completion of the log-in operation. This can be accomplished by extending the local log-in process to perform a host assessment of the workstation prior to requesting the user's credentials. If the assessment finds a vulnerability, the log-in process can inform the user that the machine is or may be compromised, or repair the vulnerability, prior to completion of the log-in operation. By performing vulnerability assessment at the level of the workstation, a network server is able to determine whether the workstation is a “trusted” platform from which to accept authentication requests. If the vulnerability assessment shows that the workstation is compromised, or if the possibility of remote compromise is high, the network server can elect to fail the authentication on the grounds that the workstation cannot be trusted. Optionally, a vulnerability assessment tool may be able to repair the vulnerability of the workstation, and then allow the authentication to proceed.
    • 为用户提供网络计算机的安全性,通常在登录操作完成之前。 这可以通过在请求用户的凭据之前扩展本地登录过程来执行工作站的主机评估来实现。 如果评估发现了一个漏洞,登录过程可以在登录操作完成之前通知用户该机器已被或可能受到威胁或修复该漏洞。 通过在工作站级进行漏洞评估,网络服务器能够确定工作站是否是从其接受认证请求的“受信任”平台。 如果漏洞评估显示工作站受到威胁,或者如果远程妥协的可能性较高,则网络服务器可能会因为不能信任工作站而导致身份验证失败。 可选地,漏洞评估工具可能能够修复工作站的漏洞,然后允许身份验证继续。