会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Methods and apparatus for delegated authentication
    • 委托认证的方法和设备
    • US08413221B2
    • 2013-04-02
    • US11930738
    • 2007-10-31
    • Burton S. Kaliski, Jr.Magnus Nyström
    • Burton S. Kaliski, Jr.Magnus Nyström
    • H04L9/32
    • H04L63/0815H04L63/0838
    • An authentication-delegating service implemented in an authentication server or other processing device is configured to receive a request from a relying party for delegated authentication information associated with a particular user, to determine a level of trust associated with the relying party, and to provide the delegated authentication information to the relying party if the relying party has a sufficient level of trust, so as to permit the relying party to authenticate the user based on the delegated authentication information. The delegated authentication information has the property that the user can be presently authenticated based on such information. The delegated authentication information may comprise, for example, at least one value derived from a one-time password or other authentication credential of the particular user. The authentication-delegating service may be graded to provide different types of delegated authentication information based on respective levels of trust that may be associated with relying parties.
    • 在认证服务器或其他处理设备中实现的认证委托服务被配置为从依赖方接收与特定用户相关联的委托认证信息的请求,以确定与依赖方相关联的信任级别,并且提供 如果依赖方具有足够的信任级别,则委托认证信息到依赖方,以便允许依赖方根据委托认证信息认证用户。 委托的认证信息具有基于这样的信息可以当前认证用户的属性。 委派的认证信息可以包括例如从特定用户的一次性密码或其他认证凭证导出的至少一个值。 认证委托服务可以被分级以根据可能与依赖方相关联的相应信任级别来提供不同类型的委托认证信息。
    • 3. 发明授权
    • Password presentation for multimedia devices
    • 多媒体设备密码显示
    • US07849323B2
    • 2010-12-07
    • US11556506
    • 2006-11-03
    • John FieldBurton S. Kaliski, Jr.Magnus NyströmJames Townsend
    • John FieldBurton S. Kaliski, Jr.Magnus NyströmJames Townsend
    • G06F21/00
    • H04L63/083
    • A multimedia device or other type of processing device comprises a memory, a processor coupled to the memory, and playback circuitry coupled to the processor. In one aspect, the processor is operative to control the storage in the memory of at least one multimedia file containing a one-time password or other type of password, where the password is generated externally to the processing device, and to control the playback of the multimedia file via the playback circuitry to make the password apparent to or otherwise accessible to an associated user or other entity. The multimedia file may comprise, for example, an audio file, with the password being presented to the user in an audible form upon playback of the audio file. As another example, the multimedia file may comprise a video file, with the password being presented to the user in a visible form upon playback of the video file.
    • 多媒体设备或其他类型的处理设备包括存储器,耦合到存储器的处理器以及耦合到处理器的重放电路。 在一个方面,处理器可操作以控制存储器中的至少一个多媒体文件的存储,所述至少一个多媒体文件包含一次性密码或其他类型的密码,其中密码在处理设备外部产生,并且控制播放 所述多媒体文件经由所述重放电路使得所述密码对相关联的用户或其他实体显而易见或以其他方式可访问。 多媒体文件可以包括例如音频文件,其中在回放音频文件时以可听形式向用户呈现密码。 作为另一示例,多媒体文件可以包括视频文件,其中在回放视频文件时以可见形式向用户呈现密码。
    • 4. 发明授权
    • System and method for authentication seed distribution
    • 种子分配认证系统和方法
    • US07502467B2
    • 2009-03-10
    • US11265510
    • 2005-11-02
    • John G. BrainardBurton S. Kaliski, Jr.Magnus NyströmRonald L. Rivest
    • John G. BrainardBurton S. Kaliski, Jr.Magnus NyströmRonald L. Rivest
    • H04L9/00H04L9/32
    • H04L63/08G06F21/31G06F21/33H04L9/0844H04L9/0869H04L9/3234H04L63/0428
    • In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation function. The server shares a verifier seed with one or more verifiers. The device, or an entity using the device, can authenticate with one of the verifiers using the appropriate verifier seed. In this way, the device and the verifier can share a secret, the verifier seed for that verifier, without that verifier knowing the master seed, or any other verifier seeds. Thus, the device need only store the one master seed, have access to the information necessary to correctly derive the appropriate seed, and have seed derivation capability. A verifier cannot compromise the master seed, because the verifier does not have access to the master seed.
    • 在根据本发明的用户认证系统和方法的一个实施例中,设备与服务器共享被称为主种子的秘密。 设备和服务器都使用密钥导出函数从主种子中导出一个或多个称为验证者种子的秘密。 服务器与一个或多个验证者共享一个验证者种子。 设备或使用该设备的实体可以使用适当的验证者种子与验证者之一进行身份验证。 以这种方式,设备和验证者可以共享秘密,该验证者的验证者种子,而没有知道主种子的验证者或任何其他验证者种子。 因此,设备只需要存储一个主播种子,可以访问正确导出适当种子所需的信息,并具有种子推导能力。 验证者不能损害主粒子,因为验证者无法访问主粒子。
    • 5. 发明授权
    • Trusted execution environment virtual machine cloning
    • 可信执行环境虚拟机克隆
    • US08954965B2
    • 2015-02-10
    • US13566250
    • 2012-08-03
    • Mark F. NovakAndrew John LaymanMagnus NyströmStefan Thom
    • Mark F. NovakAndrew John LaymanMagnus NyströmStefan Thom
    • G06F9/455
    • G06F21/53
    • Cloning of a virtual machine having a trusted executed environment such as a software-based trusted platform module. In order to clone the virtual machine, the virtual machine state of the source virtual machine is copied to formulate a target virtual machine state that is to be associated with a target virtual machine. The target virtual machine is a clone of the source virtual machine state, and thus the storage hierarchy of the trusted execution environment may be the same for the trusted execution environment in the source and target virtual machine states. However, because the identity of the target virtual machine is different than that of the source virtual machine, the endorsement hierarchy of the target virtual machine state is altered such that it is based on the identity of the target virtual machine, rather than the source virtual machine.
    • 克隆具有可信执行环境的虚拟机,例如基于软件的可信平台模块。 为了克隆虚拟机,将复制源虚拟机的虚拟机状态以制定与目标虚拟机相关联的目标虚拟机状态。 目标虚拟机是源虚拟机状态的克隆,因此受信任执行环境的存储层次结构对于源虚拟机状态和目标虚拟机状态中的受信任执行环境可能相同。 然而,由于目标虚拟机的身份与源虚拟机的身份不同,所以目标虚拟机状态的认可层级被改变,使得其基于目标虚拟机的身份而不是源虚拟机 机。
    • 7. 发明申请
    • TRUSTED EXECUTION ENVIRONMENT VIRTUAL MACHINE CLONING
    • 实施执行环境虚拟机克隆
    • US20140040890A1
    • 2014-02-06
    • US13566250
    • 2012-08-03
    • Mark F. NovakAndrew John LaymanMagnus NyströmStefan Thom
    • Mark F. NovakAndrew John LaymanMagnus NyströmStefan Thom
    • G06F9/455
    • G06F21/53
    • Cloning of a virtual machine having a trusted executed environment such as a software-based trusted platform module. In order to clone the virtual machine, the virtual machine state of the source virtual machine is copied to formulate a target virtual machine state that is to be associated with a target virtual machine. The target virtual machine is a clone of the source virtual machine state, and thus the storage hierarchy of the trusted execution environment may be the same for the trusted execution environment in the source and target virtual machine states. However, because the identity of the target virtual machine is different than that of the source virtual machine, the endorsement hierarchy of the target virtual machine state is altered such that it is based on the identity of the target virtual machine, rather than the source virtual machine.
    • 克隆具有可信执行环境的虚拟机,例如基于软件的可信平台模块。 为了克隆虚拟机,将复制源虚拟机的虚拟机状态以制定与目标虚拟机相关联的目标虚拟机状态。 目标虚拟机是源虚拟机状态的克隆,因此受信任执行环境的存储层次结构对于源虚拟机状态和目标虚拟机状态中的受信任执行环境可能相同。 然而,由于目标虚拟机的身份与源虚拟机的身份不同,所以目标虚拟机状态的认可层级被改变,使得其基于目标虚拟机的身份而不是源虚拟机 机。
    • 9. 发明授权
    • Authentication method and apparatus utilizing proof-of-authentication module
    • 使用认证证明模块的认证方法和设备
    • US07562221B2
    • 2009-07-14
    • US11530998
    • 2006-09-12
    • Magnus NyströmAnders RundgrenWilliam M. Duane
    • Magnus NyströmAnders RundgrenWilliam M. Duane
    • H04L9/32
    • G06Q20/3674G06F21/41H04L9/3213H04L9/3228H04L63/0807H04L63/0815H04L63/0838
    • A single sign-on technique allows multiple accesses to one or more applications or other resources using a proof-of-authentication module operating in conjunction with a standard authentication component. The application or other resource issues an authentication information request to the standard authentication component responsive to an access request from the user. The application or other resource receives, responsive to the authentication information request, a proof-of-authentication value from the standard authentication component, and authenticates the user based on the proof-of-authentication value. The standard authentication component interacts with the proof-of-authentication module to obtain the proof-of-authentication value. The proof-of-authentication module is configured to generate multiple proof-of-authentication values for authentication of respective access requests of the user.
    • 单一登录技术允许使用与标准认证组件一起运行的认证证明模块对一个或多个应用程序或其他资源进行多次访问。 响应于来自用户的访问请求,应用或其他资源向标准认证组件发出认证信息请求。 应用程序或其他资源响应于认证信息请求接收来自标准认证组件的认证证明值,并且基于认证证明​​值对用户进行认证。 标准认证组件与认证证明模块交互以获得认证证明值。 身份验证模块被配置为生成用于认证用户的各个访问请求的多个认证证明值。