会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Secure communication between processes in cloud
    • 在云中的进程之间进行安全的通信
    • US09503447B2
    • 2016-11-22
    • US14168026
    • 2014-01-30
    • Svetoslav ManolovDiyan YordanovPetio PetevBojidar Kadrev
    • Svetoslav ManolovDiyan YordanovPetio PetevBojidar Kadrev
    • G06F15/16H04L29/06H04L29/08G06F9/54
    • H04L63/0823G06F9/54H04L63/168H04L67/02H04L67/10H04L67/1031H04L67/1036H04L67/42
    • Secure communication between processes in cloud platform may be performed by receiving a request from a client application process hosted in an application virtual machine at a load balancer. A first secure communication channel is established between the client application process and the load balancer. The first secure communication channel is encrypted with the client certificate. The first secure communication channel is terminated at the load balancer. A service process in a service virtual machine is identified based on the request received from the client application process. A new request is sent to the service virtual machine to establish a second secure communication channel between the load balancer and the service virtual machine. The load balancer certificate signed by the internal certificate authority is validated at the service virtual machine. Upon successful validation of the load balancer certificate, the second secure communication channel is accepted at the service virtual machine.
    • 可以通过在负载平衡器处接收来自托管在应用虚拟机中的客户端应用进程的请求来执行云平台中的进程之间的安全通信。 在客户端应用进程和负载平衡器之间建立第一个安全通信通道。 第一个安全通信通道用客户端证书加密。 第一个安全通信通道在负载平衡器处终止。 基于从客户端应用进程接收到的请求,识别服务虚拟机中的服务进程。 向服务虚拟机发送新请求,以在负载均衡器和服务虚拟机之间建立第二安全通信信道。 由内部认证机构签名的负载平衡器证书在服务虚拟机上进行验证。 在成功验证负载平衡器证书后,服务虚拟机接受第二安全通信通道。
    • 2. 发明申请
    • SECURE COMMUNICATION BETWEEN PROCESSES IN CLOUD
    • 云中的安全通信
    • US20150215308A1
    • 2015-07-30
    • US14168026
    • 2014-01-30
    • Svetoslav ManolovDiyan YordanovPetio PetevBojidar Kadrev
    • Svetoslav ManolovDiyan YordanovPetio PetevBojidar Kadrev
    • H04L29/06G06F9/50H04L29/08
    • H04L63/0823G06F9/54H04L63/168H04L67/02H04L67/10H04L67/1031H04L67/1036H04L67/42
    • Secure communication between processes in cloud platform may be performed by receiving a request from a client application process hosted in an application virtual machine at a load balancer. A first secure communication channel is established between the client application process and the load balancer. The first secure communication channel is encrypted with the client certificate. The first secure communication channel is terminated at the load balancer. A service process in a service virtual machine is identified based on the request received from the client application process. A new request is sent to the service virtual machine to establish a second secure communication channel between the load balancer and the service virtual machine. The load balancer certificate signed by the internal certificate authority is validated at the service virtual machine. Upon successful validation of the load balancer certificate, the second secure communication channel is accepted at the service virtual machine.
    • 可以通过在负载平衡器处接收来自托管在应用虚拟机中的客户端应用进程的请求来执行云平台中的进程之间的安全通信。 在客户端应用进程和负载平衡器之间建立第一个安全通信通道。 第一个安全通信通道用客户端证书加密。 第一个安全通信通道在负载平衡器处终止。 基于从客户端应用进程接收到的请求,识别服务虚拟机中的服务进程。 向服务虚拟机发送新请求,以在负载均衡器和服务虚拟机之间建立第二安全通信信道。 由内部认证机构签名的负载平衡器证书在服务虚拟机上进行验证。 在成功验证负载平衡器证书后,服务虚拟机接受第二安全通信通道。
    • 9. 发明授权
    • Automatic management of secure connections
    • 自动管理安全连接
    • US09313189B2
    • 2016-04-12
    • US13939414
    • 2013-07-11
    • Nikolai D. TankovPetar D. PetrovPetio Petev
    • Nikolai D. TankovPetar D. PetrovPetio Petev
    • H04L29/06H04L29/08
    • H04L63/08H04L63/0281H04L67/1097H04L67/141
    • In an example embodiment, on-premise systems have access to a cloud connector located on-premise. When the on-premise cloud connector is started, it may establish a secure connection to a notification service residing in the cloud. Applications running on the cloud have access to a connectivity agent. Cloud applications wishing to communicate with the on-premise systems send the communications through the connectivity agent. If a secure connection between the connectivity agent and the cloud connector does not exist, the connectivity agent sends a request to open a secure connection to the notification service. The notification service forwards the request to the cloud connector over its secure connection. The cloud connector may check the requested connection, and if authorized, open a secure connection to the connectivity agent. The connectivity agent then forwards the communication to the cloud connector, which then forwards it to the on-premise system.
    • 在示例实施例中,内部部署系统可以访问位于内部的云连接器。 当内部部署云连接器启动时,它可以建立与驻留在云中的通知服务的安全连接。 在云上运行的应用程序可以访问连接代理。 希望与内部部署系统进行通信的云应用程序通过连接代理发送通信。 如果连接代理和云连接器之间的安全连接不存在,则连接代理发送打开到通知服务的安全连接的请求。 通知服务通过其安全连接将请求转发到云连接器。 云连接器可以检查所请求的连接,并且如果被授权,则打开到连接代理的安全连接。 然后,连接代理将通信转发到云连接器,然后将云端连接器转发到内部部署系统。