会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • METHOD AND APPARATUS TO REDUCE DATA LOST ON PERSONAL MOBILE DEVICES
    • 减少个人移动设备数据丢失的方法和装置
    • US20100225451A1
    • 2010-09-09
    • US12399022
    • 2009-03-06
    • Philip J. S. Gladstone
    • Philip J. S. Gladstone
    • H04Q5/22
    • G06Q10/087G06Q10/08
    • Methods and apparatus for providing security for mobile devices are disclosed. In one embodiment, a method includes maintaining responsibility for a first item when the first item is in a first range of a first container. Maintaining responsibility for the first item includes monitoring a locator tag associated with the first item when the locator tag is within the first range. The method also includes determining when the first item is in the first range, determining if the first item is in a second range associated with a second container when the first item is not in the first range, and determining if the second container is trusted with respect to the first container if the first item is in the second range. Additionally, the method includes transferring responsibility for the first item to the second container if the second container is trusted with respect to the first container.
    • 公开了用于为移动设备提供安全性的方法和装置。 在一个实施例中,一种方法包括当第一项目处于第一容器的第一范围时维护第一项目的责任。 维护对第一项目的责任包括当定位器标签在第一范围内时监视与第一项目相关联的定位器标签。 该方法还包括确定第一项目何时处于第一范围内,当第一项目不在第一范围内时,确定第一项目是否处于与第二容器关联的第二范围内,以及确定第二容器是否被信任 如果第一个项目处于第二个范围,则相对于第一个容器。 另外,如果第二容器相对于第一容器被信任,该方法包括将第一项目的责任转移到第二容器。
    • 3. 发明授权
    • Method and apparatus to reduce data lost on personal mobile devices
    • 减少个人移动设备丢失数据的方法和装置
    • US08325018B2
    • 2012-12-04
    • US12399022
    • 2009-03-06
    • Philip J. S. Gladstone
    • Philip J. S. Gladstone
    • H04Q5/22
    • G06Q10/087G06Q10/08
    • Methods and apparatus for providing security for mobile devices are disclosed. In one embodiment, a method includes maintaining responsibility for a first item when the first item is in a first range of a first container. Maintaining responsibility for the first item includes monitoring a locator tag associated with the first item when the locator tag is within the first range. The method also includes determining when the first item is in the first range, determining if the first item is in a second range associated with a second container when the first item is not in the first range, and determining if the second container is trusted with respect to the first container if the first item is in the second range. Additionally, the method includes transferring responsibility for the first item to the second container if the second container is trusted with respect to the first container.
    • 公开了用于为移动设备提供安全性的方法和装置。 在一个实施例中,一种方法包括当第一项目处于第一容器的第一范围时维护第一项目的责任。 维护对第一项目的责任包括当定位器标签在第一范围内时监视与第一项目相关联的定位器标签。 该方法还包括确定第一项目何时处于第一范围内,当第一项目不在第一范围内时,确定第一项目是否处于与第二容器关联的第二范围内,以及确定第二容器是否被信任 如果第一个项目处于第二个范围,则相对于第一个容器。 另外,如果第二容器相对于第一容器被信任,该方法包括将第一项目的责任转移到第二容器。
    • 8. 发明授权
    • Methods and apparatus for trusted application centric QoS provisioning
    • 以信任应用为中心的QoS配置的方法和设备
    • US07774498B1
    • 2010-08-10
    • US11593289
    • 2006-11-06
    • Jeffrey A. KraemerDavid James McCowanKerry E. LynnPhilip J. S. Gladstone
    • Jeffrey A. KraemerDavid James McCowanKerry E. LynnPhilip J. S. Gladstone
    • G06F15/16G06F15/173
    • H04L63/20
    • A security agent extends the trust barrier, or trust point, from network gateway nodes to end user devices. A security agent operable to scrutinize network traffic executes on the user device and compares QoS marking attempts with the established QoS marking policy in effect. The security agent examines network traffic attributes deterministic of connection attempts by user processes. Attempts to apply inappropriate or disallowed QoS markings, as dictated by the QoS marking policy, are detected and disallowed. Therefore, only user connections consistent with the QoS marking policy are permitted into the network. Network admission control (NAC) mechanisms ensure that the security agent is the only access point from the user device to the secure network, and the security agent communicates the establishment of the trusted access point to the network gateway, thus ensuring that the network gateway may trust service level designations emanating from the user device executing the security agent.
    • 安全代理将信任障碍或信任点从网络网关节点扩展到最终用户设备。 可以在用户设备上执行检查网络流量的安全代理,并将QoS标记尝试与已建立的QoS标记策略进行比较。 安全代理检查用户进程确定连接尝试的网络流量属性。 检测并禁止尝试根据QoS标记策略规定应用不当或不允许的QoS标记。 因此,仅允许与QoS标记策略一致的用户连接进入网络。 网络准入控制(NAC)机制确保安全代理是从用户设备到安全网络的唯一接入点,安全代理将信任接入点的建立通信给网络网关,从而确保网络网关 从执行安全代理的用户设备发出的信任服务级别指定。