会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Delegation metasystem for composite services
    • 组合服务委托系统
    • US08601482B2
    • 2013-12-03
    • US11934443
    • 2007-11-02
    • Laurent BussardAnna Wojtas
    • Laurent BussardAnna Wojtas
    • G06F9/46G06F9/44
    • G06F21/335G06F9/468G06F2221/2111G06F2221/2141H04L63/101H04L67/16H04L67/327
    • A delegation metasystem for composite services is described, where a composite service is a service which calls other services during its operation. In an embodiment, the composite service is defined using generic descriptions for any services (and their access control models) which may be called by the composite service during operation. At run time, these generic descriptions and potentially other factors, such as the user of the composite service, are used to select actual available services which may be called by the composite service and access rights for the selected services are delegated to the composite service. These access rights may subsequently be revoked when the composite service terminates.
    • 描述了复合服务的委托元系统,其中组合服务是在其操作期间调用其他服务的服务。 在一个实施例中,使用在操作期间可由组合服务调用的任何服务(及其访问控制模型)的通用描述定义组合服务。 在运行时,这些通用描述和潜在的其他因素(例如组合服务的用户)被用于选择可由组合服务调用的实际可用服务,并且所选服务的访问权限被委派给组合服务。 当复合服务终止时,这些访问权限随后可能被撤销。
    • 7. 发明授权
    • Ad-hoc creation of group based on contextual information
    • 基于上下文信息的组创建
    • US07673330B2
    • 2010-03-02
    • US11326278
    • 2006-01-05
    • Laurent BussardAlain Gefflaut
    • Laurent BussardAlain Gefflaut
    • G06F7/04
    • H04L12/185H04L12/1818H04L12/189
    • Provided is ad-hoc creation of groups based on contextual information comprising. Two mechanisms are used to restrict valid members of a group. First, to make sure that devices are somehow related, devices provide contextual information that is compared to the contextual information provided by other devices willing to join the group. Only devices providing “similar” contextual information are accepted as possible candidates in the group. Second, to scope the group, a time window is used to limit the duration of the group creation. In other words, access to the group is reserved to the devices that can provide similar context information to existing member of the group in a defined time window. Security properties are ensured by enabling a visual check of the list of group participants. For instance, a member can verify that the displayed pictures indeed represent the attendees of an ongoing meeting.
    • 提供基于上下文信息的特设创建组。 两个机制用于限制组的有效成员。 首先,为了确保设备有某种相关性,设备提供与愿意加入该组的其他设备提供的上下文信息进行比较的上下文信息。 只有提供“相似”上下文信息的设备才被接受为组中可能的候选者。 第二,为了对组进行分组,使用时间窗口来限制组创建的持续时间。 换句话说,对于可以在定义的时间窗口中为组中的现有成员提供类似上下文信息的设备保留对组的访问。 通过对组参与者列表的目视检查来确保安全属性。 例如,成员可以验证所显示的图片确实代表正在进行的会议的与会者。
    • 8. 发明申请
    • Ad-Hoc Trust Establishment Using Visual Verification
    • 使用视觉验证的Ad-Hoc信任机构
    • US20100017602A1
    • 2010-01-21
    • US12146774
    • 2008-06-26
    • Laurent BussardUlrich MullerAlain Gefflaut
    • Laurent BussardUlrich MullerAlain Gefflaut
    • H04L9/32H04L9/30H04L9/08
    • H04L9/0844H04L9/3236H04L9/3271
    • Methods for ad-hoc trust establishment using visual verification are described. In a first embodiment, a visual representation of a shared data is generated on two or more devices and the visual representations generated can be visually compared by a user. This method can be used to verify that the correct devices are involved in a negotiation, when pre-existing trust relationships do not exist between the devices. The visual representation may, for example, comprise a picture with a number of different elements, each representing a part of the shared data. In another embodiment, a method of secure key exchange is described in which, before sharing the keys, the parties exchange information which encapsulates the key. This information can be used subsequently to check that a party has not changed the key that they are using and prevents a man in the middle attack.
    • 描述了使用视觉验证的即席信任建立方法。 在第一实施例中,在两个或多个设备上生成共享数据的视觉表示,并且可以由用户视觉地比较生成的视觉表示。 当设备之间不存在预先存在的信任关系时,此方法可用于验证正确的设备是否参与协商。 视觉表示可以例如包括具有多个不同元素的图像,每个图像表示共享数据的一部分。 在另一个实施例中,描述了一种安全密钥交换方法,其中在共享密钥之前,双方交换封装密钥的信息。 随后可以使用此信息来检查一方是否没有改变他们正在使用的密钥,并防止中间人员发生攻击。
    • 9. 发明申请
    • Ad-hoc creation of group based on contextual information
    • 基于上下文信息的组创建
    • US20070168332A1
    • 2007-07-19
    • US11326278
    • 2006-01-05
    • Laurent BussardAlain Gefflaut
    • Laurent BussardAlain Gefflaut
    • G06F17/30
    • H04L12/185H04L12/1818H04L12/189
    • Provided is ad-hoc creation of groups based on contextual information comprising. Two mechanisms are used to restrict valid members of a group. First, to make sure that devices are somehow related, devices provide contextual information that is compared to the contextual information provided by other devices willing to join the group. Only devices providing “similar” contextual information are accepted as possible candidates in the group. Second, to scope the group, a time window is used to limit the duration of the group creation. In other words, access to the group is reserved to the devices that can provide similar context information to existing member of the group in a defined time window. Security properties are ensured by enabling a visual check of the list of group participants. For instance, a member can verify that the displayed pictures indeed represent the attendees of an ongoing meeting.
    • 提供基于上下文信息的特设创建组,包括。 两个机制用于限制组的有效成员。 首先,为了确保设备有某种相关性,设备提供与愿意加入该组的其他设备提供的上下文信息进行比较的上下文信息。 只有提供“相似”上下文信息的设备才被接受为组中可能的候选者。 第二,为了对组进行分组,使用时间窗口来限制组创建的持续时间。 换句话说,对于可以在定义的时间窗口中为组中的现有成员提供类似上下文信息的设备保留对组的访问。 通过对组参与者列表的目视检查来确保安全属性。 例如,成员可以验证所显示的图片确实代表正在进行的会议的与会者。
    • 10. 发明授权
    • Ad-hoc trust establishment using visual verification
    • 使用视觉验证的特设信任机构
    • US08621210B2
    • 2013-12-31
    • US12146774
    • 2008-06-26
    • Laurent BussardUlrich MüllerAlain Gefflaut
    • Laurent BussardUlrich MüllerAlain Gefflaut
    • H04L9/00H04L9/08G06F17/30G06F7/04G06F15/16
    • H04L9/0844H04L9/3236H04L9/3271
    • Methods for ad-hoc trust establishment using visual verification are described. In a first embodiment, a visual representation of a shared data is generated on two or more devices and the visual representations generated can be visually compared by a user. This method can be used to verify that the correct devices are involved in a negotiation, when pre-existing trust relationships do not exist between the devices. The visual representation may, for example, comprise a picture with a number of different elements, each representing a part of the shared data. In another embodiment, a method of secure key exchange is described in which, before sharing the keys, the parties exchange information which encapsulates the key. This information can be used subsequently to check that a party has not changed the key that they are using and prevents a man in the middle attack.
    • 描述了使用视觉验证的即席信任建立方法。 在第一实施例中,在两个或多个设备上生成共享数据的视觉表示,并且可以由用户视觉地比较生成的视觉表示。 当设备之间不存在预先存在的信任关系时,此方法可用于验证正确的设备是否参与协商。 视觉表示可以例如包括具有多个不同元素的图像,每个图像表示共享数据的一部分。 在另一个实施例中,描述了一种安全密钥交换方法,其中在共享密钥之前,双方交换封装密钥的信息。 随后可以使用此信息来检查一方是否没有改变他们正在使用的密钥,并防止中间人员发生攻击。