会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明申请
    • SYSTEMS AND METHODS TO ROTATE SECURITY ASSETS USED FOR SECURE COMMUNICATIONS
    • 旋转用于安全通信的安全资产的系统和方法
    • US20100169963A1
    • 2010-07-01
    • US12346711
    • 2008-12-30
    • Michael Dean KleinpeterRaju Venkata Kolluru
    • Michael Dean KleinpeterRaju Venkata Kolluru
    • G06F21/00G06F17/30H04L9/32
    • H04L63/20G06F21/445H04L9/3263H04L9/3271H04L63/062H04L63/0823H04L2209/56
    • Systems and methods to rotate security assets used to for secure communications are disclosed. The system includes receiving a first certificate that includes a first subject name for the remote servers. The first certificate further includes a first public key. Next, the system receives a second certificate that includes the first subject name for the remote servers. The second certificate further includes a second public key that is different from the first public key. Next, the system stores the first and second certificates in a trust module. Next, the system receive a third certificate from a first server included in the plurality of remote servers. Next, the system identifies the first server is trusted. The identifying is based on the third certificate matching any one of the first certificate and the second certificate. Finally, the system establishes a secure communication session with the first server based on the identifying the first server is trusted.
    • 公开了用于旋转用于安全通信的安全资产的系统和方法。 该系统包括接收包括远程服务器的第一主题名称的第一证书。 第一个证书还包括第一个公钥。 接下来,系统接收包括远程服务器的第一主题名称的第二证书。 第二证书还包括与第一公钥不同的第二公钥。 接下来,系统将第一和第二证书存储在信任模块中。 接下来,系统从包括在多个远程服务器中的第一服务器接收第三证书。 接下来,系统识别第一个服务器是可信的。 识别基于与第一证书和第二证书中的任何一个匹配的第三证书。 最后,系统基于识别第一服务器是可信的,与第一服务器建立安全通信会话。
    • 9. 发明申请
    • SECURITY ASSET MANAGEMENT SYSTEM
    • 安全资产管理系统
    • US20100054478A1
    • 2010-03-04
    • US12202799
    • 2008-09-02
    • Raju Venkata Kolluru
    • Raju Venkata Kolluru
    • H04L9/08H04L9/32
    • G06Q10/06G06Q30/06G06Q40/02H04L9/0838
    • Some example embodiments described herein relate a security asset management system and a computerized method. The security asset management system includes a first server that is need of a security asset and a second server that provides the needed security asset to the first server. The second server is adapted to manage security assets. In some embodiments, the second server classifies the security assets as public and private security assets. In some embodiments, the second server may automatically rotate the security assets that it manages. In some embodiments, the computerized method includes connecting a first server to a second server that is adapted to manage security assets. The computerized method further includes detecting that the first server is in need of a security assets and using the second server to provide the needed security asset to the first server.
    • 这里描述的一些示例实施例涉及安全资产管理系统和计算机化方法。 安全资产管理系统包括需要安全资产的第一服务器和向第一服务器提供所需安全资产的第二服务器。 第二台服务器适用于管理安全资产。 在一些实施例中,第二服务器将安全资产分类为公共和私人安全资产。 在一些实施例中,第二服务器可以自动旋转其管理的安全资产。 在一些实施例中,计算机化方法包括将第一服务器连接到适于管理安全资产的第二服务器。 计算机化方法还包括检测第一服务器是否需要安全资产,并且使用第二服务器向第一服务器提供所需的安全资产。