会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Methods and apparatus to validate configuration of computerized devices
    • 验证计算机化设备配置的方法和设备
    • US08024488B2
    • 2011-09-20
    • US11070567
    • 2005-03-02
    • Joseph A. SaloweyHao Zhou
    • Joseph A. SaloweyHao Zhou
    • G06F7/04G06F15/16G06F17/30H04L29/06
    • H04L63/126H04L9/32
    • A system verifies configuration of a device within a network via an exchange of verification credentials, which are requested, received and authenticated. The verification credentials indicate that a configuration of the device was acceptable at the time of creation of the verification credentials for that device. The verification credentials of the device are obtained through a certifying process. During the certifying process, the credential certifier receives a current device configuration of the device in the network, and evaluates the current device configuration of a device with respect to its role within a network. The verification credentials are issued to the requesting device and stored within a database. The device submits its verification credentials if being requested by the other peer it's communicating with when it enters the network. It also monitors the current device configuration and if there are changes, it invalidates the existing certification credentials and requests new one.
    • 系统通过交换请求,接收和认证的验证凭证来验证网络内的设备的配置。 验证凭证表明在创建该设备的验证凭据时,该设备的配置是可以接受的。 设备的验证凭证通过认证过程获得。 在验证过程中,凭证验证者接收网络中设备的当前设备配置,并根据网络中的角色来评估设备的当前设备配置。 验证凭证被发送到请求设备并存储在数据库中。 当设备进入网络时与其进行通信的其他对等体请求时,设备将提交其验证凭据。 它还监视当前设备配置,如果有更改,则会使现有的认证凭据无效,并请求新的认证凭据。
    • 8. 发明授权
    • Method and apparatus for distributing, interpreting, and storing heterogeneous certificates in a homogenous public key infrastructure
    • 用于在均匀的公共密钥基础设施中分发,解释和存储异构证书的方法和装置
    • US06895501B1
    • 2005-05-17
    • US09524272
    • 2000-03-13
    • Joseph A. Salowey
    • Joseph A. Salowey
    • H04L9/00H04L29/06
    • H04L63/126
    • A connection is established between a server and a web browser having access to a first, trusted public key. The server downloads a digitally signed archive to the browser, the archive including a second public key. The browser verifies the digitally signed archive using the first public key, and stores the second public key in response to the verification. The browser then uses the stored second public key to authenticate the server and establish a secure connection with the server. The second public key and its chain of trust need not be known by the browser beforehand, and the archive may include program fragments that store the key in an area where the browser (or an applet running under the browser) can access and use it. The archive may also include a program fragment that performs certificate validation for the client—enabling the client to handle certificate types it does not know about. Advantages include allowing the archive to be transmitted over any insecure connection since it is integrity protected and authenticated; and allowing the client to make a direct connection to the server without having to access certificate stores on the platform.
    • 在服务器和具有访问第一可信公钥的web浏览器之间建立连接。 服务器将数字签名的存档下载到浏览器,归档包括第二个公钥。 浏览器使用第一公钥验证数字签名的归档,并且响应于验证存储第二公钥。 然后,浏览器使用存储的第二个公钥来验证服务器,并建立与服务器的安全连接。 第二个公共密钥及其信任链不需要由浏览器预先知道,并且归档可以包括将密钥存储在浏览器(或浏览器下运行的小程序)可以访问和使用的区域中的程序片段。 存档还可以包括为客户机执行证书验证的程序片段,使得客户端能够处理它不知道的证书类型。 优点包括允许通过任何不安全的连接传输存档,因为它是完整性保护和认证的; 并允许客户端直接连接到服务器,而无需访问平台上的证书存储。