会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Secure IPsec tunnels with a background system accessible via a gateway implementing NAT
    • 可通过实施NAT的网关访问后台系统的安全IPsec隧道
    • US07159242B2
    • 2007-01-02
    • US10142608
    • 2002-05-09
    • Denise Marie GentyJames Stanley TesauroRamachandran Unnikrishnan
    • Denise Marie GentyJames Stanley TesauroRamachandran Unnikrishnan
    • H04L9/00
    • H04L63/029H04L29/12009H04L29/12367H04L29/125H04L61/2514H04L61/2564H04L63/0272H04L63/061H04L63/08H04L63/164
    • A method and system for enabling secure IPsec tunnels within NAT without compromising security. A local network is configured with a gateway machine connected to the Internet and having an IPsec ID for interfacing with the Internet and a local IP/interface address for interfacing with the local network. Client machines are connected to the gateway machine and communicate with the Internet via the gateway and network address translation (NAT) techniques. Each client machine is configured with a local IP/interface address. The client machines are also provided with an alias of the IPsec ID for the gateway machine. When an IPsec request is received by the gateway machine to establish a tunnel (secure communication) with one of the clients, the gateway machine forwards the packet to the particular client using NAT. The client machine receives the request and since it has an alias of the gateway's IPsec ID, the client machine will confirm that it has one of the IPsec IDs in the packet. The client machine sends the reply packet back to the gateway machine, which then forwards it to the requesting machine over the Internet. The requesting machine receives the packet and a confirmation that it has reached its intended recipient and opens the secure IKE tunnel with the particular client via the gateway machine. In this manner authentication of the IKE tunnel and establishment of a secure IPsec session is completed with a client machine that is accessible only via a gateway implementing NAT.
    • 一种在NAT内实现安全IPsec隧道的方法和系统,不会影响安全性。 本地网络配置有连接到因特网的网关机器,并且具有用于与因特网进行接口的IPsec ID和用于与本地网络接口的本地IP /接口地址。 客户端机器连接到网关机器,并通过网关和网络地址转换(NAT)技术与互联网进行通信。 每个客户机都配置了本地IP /接口地址。 客户端计算机还提供了网关机器的IPsec ID的别名。 当网关机器接收到与其中一个客户端建立隧道(安全通信)的IPsec请求时,网关机器将NAT使用NAT转发到特定客户端。 客户端机器接收到请求,并且由于它具有网关的IPsec ID的别名,所以客户机将确认它具有数据包中的一个IPsec ID。 客户端机器将回复包发送回网关机器,网关机器然后通过因特网将其转发给请求机器。 请求机器接收分组并确认其已经到达其预期接收者,并通过网关机器与特定客户端打开安全IKE隧道。 以这种方式,IKE隧道的认证和安全IPsec会话的建立由仅通过实现NAT的网关可访问的客户机完成。
    • 7. 发明授权
    • System and method for securing data on private networks
    • 保护私有网络数据的系统和方法
    • US07225331B1
    • 2007-05-29
    • US09594517
    • 2000-06-15
    • Gerald Francis McBreartyShawn Patrick MullenJohnny Meng-Han ShiehRamachandran Unnikrishnan
    • Gerald Francis McBreartyShawn Patrick MullenJohnny Meng-Han ShiehRamachandran Unnikrishnan
    • H04L9/00H04K1/00G06F17/30G06F15/16
    • H04L63/0428H04L63/045H04L63/067H04L63/0838
    • A system and method for protecting data transmitted across a private network is disclosed. A secure channel is established so that the client computer can securely transmit a password to the server computer. Once the password has been transmitted, future transmissions use the password to encrypt data by the sending computer and decipher the data at the receiving computer. In one embodiment, passwords expire after a certain amount of time and are thereafter renegotiated. In another embodiment, the password is successively modified by a counter value further preventing unauthorized persons from discovering the password used to encrypt the data. By using passwords rather than public-key encryption methods, less system resources are required to maintain data confidentiality. An information handling system securely transmitting data within a private network as well as a computer program product programmed to perform the encryption processing are further disclosed.
    • 公开了一种用于保护通过专用网络传输的数据的系统和方法。 建立安全通道,以便客户端计算机可以将密码安全地传送到服务器计算机。 一旦密码被传输,将来的传输使用密码来加密发送计算机的数据并解密接收计算机上的数据。 在一个实施例中,密码在一定量的时间之后过期,然后重新协商。 在另一个实施例中,通过计数器值连续修改密码,进一步防止未授权人员发现用于加密数据的密码。 通过使用密码而不是公钥加密方法,需要较少的系统资源来维护数据的机密性。 还公开了一种安全地传输专用网络内的数据的信息处理系统以及被编程为执行加密处理的计算机程序产品。