会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明申请
    • METHOD AND SYSTEM FOR AN INTERCEPT CHAIN OF CUSTODY PROTOCOL
    • 方法和系统的CUSTODY协议的间接链
    • US20110138451A1
    • 2011-06-09
    • US12965298
    • 2010-12-10
    • Norman Richard SolisDante J. PacellaHarold Jason Schiller
    • Norman Richard SolisDante J. PacellaHarold Jason Schiller
    • H04L9/32
    • H04L67/2804H04L63/306
    • Techniques for establishing a chain of custody for intercepted electronic information are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method, comprising securely negotiating a data collection interval time and protocol support for electronic data collection between network equipment associated with a data collecting party and network equipment associated with a data receiving party, receiving a nonce at a network equipment associated with the data collecting party from network equipment associated with the data receiving party, utilizing the nonce to compute, at least in part, a hash value at network equipment associated with the data collecting party, collecting electronic data at an intercept access device at network equipment associated with the data collecting party, utilizing the nonce and the hash value to transmit the collected electronic data to network equipment associated with the data receiving party, and utilizing the hash value to establish a chain of custody between the data collecting party and the data receiving party.
    • 披露了为拦截电子信息建立监管链的技术。 在一个特定的示例性实施例中,这些技术可以被实现为一种方法,包括安全地协商数据收集间隔时间和与数据收集方相关联的网络设备与与数据接收方相关联的网络设备之间的电子数据收集的协议支持, 在与数据接收方相关联的网络设备与数据收集方相关联的网络设备处的随机数,利用该随机数至少部分地在与数据收集方相关联的网络设备处计算哈希值,收集电子数据 在与数据收集方相关联的网络设备处的拦截接入设备,利用随机数和散列值将收集的电子数据发送到与数据接收方相关联的网络设备,并利用散列值建立链路监控链 数据收集方和数据接收方。
    • 9. 发明授权
    • Method and system for an intercept chain of custody protocol
    • 截取监护链协议的方法和系统
    • US07877503B2
    • 2011-01-25
    • US12166679
    • 2008-07-02
    • Norman Richard SolisDante J. PacellaHarold Jason Schiller
    • Norman Richard SolisDante J. PacellaHarold Jason Schiller
    • G01R31/08
    • H04L67/2804H04L63/306
    • Techniques for establishing a chain of custody for intercepted electronic information are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method, comprising securely negotiating a data collection interval time and protocol support for electronic data collection between network equipment associated with a data collecting party and network equipment associated with a data receiving party, receiving a nonce at a network equipment associated with the data collecting party from network equipment associated with the data receiving party, utilizing the nonce to compute, at least in part, a hash value at network equipment associated with the data collecting party, collecting electronic data at an intercept access device at network equipment associated with the data collecting party, utilizing the nonce and the hash value to transmit the collected electronic data to network equipment associated with the data receiving party, and utilizing the hash value to establish a chain of custody between the data collecting party and the data receiving party.
    • 披露了为拦截电子信息建立监管链的技术。 在一个特定的示例性实施例中,这些技术可以被实现为一种方法,包括安全地协商数据收集间隔时间和与数据收集方相关联的网络设备与与数据接收方相关联的网络设备之间的电子数据收集的协议支持, 在与数据接收方相关联的网络设备与数据收集方相关联的网络设备处的随机数,利用该随机数至少部分地在与数据收集方相关联的网络设备处计算哈希值,收集电子数据 在与数据收集方相关联的网络设备处的拦截接入设备,利用随机数和散列值将收集的电子数据发送到与数据接收方相关联的网络设备,并利用散列值建立链路监控链 数据收集方和数据接收方。