会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明授权
    • Scalable session management using an encrypted session key
    • 使用加密会话密钥进行可扩展会话管理
    • US08626929B2
    • 2014-01-07
    • US13026793
    • 2011-02-14
    • Wei JiangIsmail Cem PayaJohn D. WhitedWei-Quiang Michael GuoYordan RouskovAdam Back
    • Wei JiangIsmail Cem PayaJohn D. WhitedWei-Quiang Michael GuoYordan RouskovAdam Back
    • G06F15/16
    • H04L9/3247G06F21/6218H04L9/0825H04L9/3242H04L63/045
    • Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.
    • 可扩展会话管理通过生成包含加密的会话密钥和加密的cookie数据的cookie来实现。 Cookie数据使用会话密钥进行加密。 会话密钥然后使用一个或多个公钥/私钥对进行签名和加密。 加密的会话密钥可以使用相同的私钥/公钥对进行解密和验证。 一旦被验证,则解密的会话密钥然后可以用于解密和验证加密的cookie数据。 具有私钥/公钥对的第一服务器可以使用随机生成的会话密钥来生成cookie。 具有相同私钥/公钥对的第二服务器可以解密和验证cookie,即使会话密钥最初没有安装在第二服务器上。 可以使用会话密钥缓存来提供会话密钥查找以在服务器上保存公钥/私钥操作。
    • 8. 发明申请
    • Scalable Session Management
    • 可扩展会话管理
    • US20110138179A1
    • 2011-06-09
    • US13026793
    • 2011-02-14
    • Wei JiangIsmail Cem PayaJohn D. WhitedWei-Quiang Michael GuoYordan RouskovAdam Back
    • Wei JiangIsmail Cem PayaJohn D. WhitedWei-Quiang Michael GuoYordan RouskovAdam Back
    • H04L9/32
    • H04L9/3247G06F21/6218H04L9/0825H04L9/3242H04L63/045
    • Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.
    • 可扩展会话管理通过生成包含加密的会话密钥和加密的cookie数据的cookie来实现。 Cookie数据使用会话密钥进行加密。 会话密钥然后使用一个或多个公钥/私钥对进行签名和加密。 加密的会话密钥可以使用相同的私钥/公钥对进行解密和验证。 一旦被验证,则解密的会话密钥然后可以用于解密和验证加密的cookie数据。 具有私钥/公钥对的第一服务器可以使用随机生成的会话密钥来生成cookie。 具有相同私钥/公钥对的第二服务器可以解密和验证cookie,即使会话密钥最初没有被安装在第二服务器上。 可以使用会话密钥缓存来提供会话密钥查找以在服务器上保存公钥/私钥操作。
    • 9. 发明授权
    • Scalable session management
    • 可扩展会话管理
    • US07890634B2
    • 2011-02-15
    • US11084051
    • 2005-03-18
    • Wei JiangIsmail Cem PayaJohn D WhitedWei-Quiang Michael GuoYordan RouskovAdam Back
    • Wei JiangIsmail Cem PayaJohn D WhitedWei-Quiang Michael GuoYordan RouskovAdam Back
    • G06F15/16
    • H04L9/3247G06F21/6218H04L9/0825H04L9/3242H04L63/045
    • Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.
    • 可扩展会话管理通过生成包含加密的会话密钥和加密的cookie数据的cookie来实现。 Cookie数据使用会话密钥进行加密。 会话密钥然后使用一个或多个公钥/私钥对进行签名和加密。 加密的会话密钥可以使用相同的私钥/公钥对进行解密和验证。 一旦被验证,则解密的会话密钥然后可以用于解密和验证加密的cookie数据。 具有私钥/公钥对的第一服务器可以使用随机生成的会话密钥来生成cookie。 具有相同私钥/公钥对的第二服务器可以解密和验证cookie,即使会话密钥最初没有安装在第二服务器上。 可以使用会话密钥缓存来提供会话密钥查找以在服务器上保存公钥/私钥操作。
    • 10. 发明授权
    • Public key infrastructure scalability certificate revocation status validation
    • 公钥基础架构可扩展性证书吊销状态验证
    • US07437551B2
    • 2008-10-14
    • US10817246
    • 2004-04-02
    • Kok Wai ChanWei JiangWei-Quiang Michael Guo
    • Kok Wai ChanWei JiangWei-Quiang Michael Guo
    • H04L9/00
    • H04L9/3268
    • A system and method for retrieving certificate of trust information for a certificate validation process. Fetching servers periodically retrieve certificate revocation lists (CRLs) from servers maintained by various certificate issuers. The revoked certificate data included in the retrieved CRLs are stored in a central database. An authentication server receives a request from a client for access to a secure service and initiates a validation process. The authentication server retrieves revoked certificate data from the central database and compares the retrieved revoked certificate data to certificate of trust information received from the client along with the request. The authentication server denies access to the secure information if the certificate of trust information matches revoked certificate data from the central database, allows access if the certificate of trust information does not match revoked certificate data from the central database.
    • 用于检索证书验证过程的信任证书信息的系统和方法。 获取服务器会定期从由各种证书颁发者维护的服务器中检索证书撤销列表(CRL)。 包含在检索的CRL中的撤销的证书数据被存储在中央数据库中。 认证服务器从客户端接收对安全服务的访问请求,并启动验证过程。 认证服务器从中央数据库检索撤销的证书数据,并将检索到的撤销证书数据与客户端接收的信任证书信息一起与请求进行比较。 如果信任证书信息与中央数据库中的撤销证书数据匹配,则认证服务器拒绝对安全信息的访问,如果信任证书信息与中央数据库的撤销证书数据不匹配,则认证服务器允许访问。