会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 52. 发明申请
    • PHYSICAL SECURITY TRIGGERED DYNAMIC NETWORK AUTHENTICATION AND AUTHORIZATION
    • 物理安全触发动态网络认证和授权
    • US20080271109A1
    • 2008-10-30
    • US11739892
    • 2007-04-25
    • Amit SinghPrabandham Madan GopalManjunath S. BangaloreRaman Shankara Krishnan
    • Amit SinghPrabandham Madan GopalManjunath S. BangaloreRaman Shankara Krishnan
    • G06F17/00H04L9/32
    • H04L63/08H04L63/102
    • A unified access control component (UACC) can maintain information relating to network access information and physical location information associated with respective users who may access a network that can include network resources (e.g., applications, information). The UACC can cross reference the network access information (e.g., user network access events, credentials, and policy) and physical location information (e.g., user physical access events, credentials, and policy) and can generate and enforce a unified network access policy based on network access information and physical location information associated with a particular user. After network access privileges have been granted to a user, the UACC can continue to monitor the user. The UACC can include a dynamic authentication component that can request a user re-authenticate if a change in the physical location and/or network access associated with the user is detected, such that a re-computation of network access privileges is desired.
    • 统一的访问控制组件(UACC)可以维护与可能访问可以包括网络资源(例如,应用,信息)的网络的相应用户相关联的网络访问信息和物理位置信息的信息。 UACC可以交叉参考网络访问信息(例如,用户网络访问事件,凭据和策略)和物理位置信息(例如,用户物理访问事件,凭据和策略),并且可以生成并实施基于统一的网络访问策略 关于与特定用户相关联的网络访问信息和物理位置信息。 在向用户授予网络访问权限之后,UACC可以继续监视用户。 如果检测到与用户相关联的物理位置和/或网络访问的改变,则UACC可以包括动态认证组件,其可以请求用户重新认证,使得期望重新计算网络访问特权。
    • 54. 发明申请
    • Efficient discovery and verification of paths through a meshed overlay network
    • 通过网格覆盖网络高效发现和验证路径
    • US20070263553A1
    • 2007-11-15
    • US11805488
    • 2007-05-23
    • Anupam BharaliBalraj SinghManish SampatAmit SinghRajiv Batra
    • Anupam BharaliBalraj SinghManish SampatAmit SinghRajiv Batra
    • H04L12/28H04L12/56
    • H04L45/125H04L45/02H04L45/124H04L45/26H04L45/64
    • The present invention provides an efficient system and method for routing information through a dynamic network. The system includes at least one ingress point and one egress point. The ingress and egress point cooperate to form a virtual circuit for routing packets to destination subnets directly reachable by the egress point. The egress point automatically discovers which subnets are directly accessible via its local ports and summarizes this information for the ingress point. The ingress point receives this information, compiles it into a routing table, and verifies that those subnets are best accessed by the egress point. Verification is accomplished by sending probe packets to select addresses on the subnet. Additionally, the egress point may continue to monitor the local topology and incrementally update the information to the ingress to allow the ingress to adjust its compiled routing table.
    • 本发明提供了一种通过动态网络路由信息的有效系统和方法。 该系统包括至少一个入口点和一个出口点。 入口点和出口点协作形成一个虚拟电路,用于将数据包路由到出口点直接访问的目的地子网。 出口点自动发现哪些子网可以通过其本地端口直接访问,并总结入口点的此信息。 入口点接收该信息,将其编译成路由表,并验证这些子网是否最好被出口点访问。 验证是通过发送探测数据包来选择子网上的地址来实现的。 此外,出口点可以继续监视本地拓扑,并将信息递增地更新到入口,以允许入口调整其编译的路由表。
    • 55. 发明申请
    • Creating an assured execution environment for at least one computer program executable on a computer system
    • 为计算机系统上可执行的至少一个计算机程序创建一个有保证的执行环境
    • US20070150874A1
    • 2007-06-28
    • US11318192
    • 2005-12-24
    • Anurag SharmaAmit Singh
    • Anurag SharmaAmit Singh
    • G06F9/45
    • G06F21/53
    • The present invention provides a method and system of creating an assured execution environment (AxE) for at least one computer program executable on a computer system. In an exemplary embodiment, the method and system include (1) converting the executable into a computer program targeted for the computer system and (2) providing the environment in which the program can be accessed on the computer system. In an exemplary embodiment, the converting includes scrambling the executable. In an exemplary embodiment, the converting includes attaching filesystem metadata to the executable. In an exemplary embodiment, the providing includes executing the program on the computer system only if the program complies with a policy. In an exemplary embodiment, the providing includes preventing malicious code from executing on the computer system before the environment is loaded on the computer system.
    • 本发明提供了一种为在计算机系统上可执行的至少一个计算机程序创建可靠的执行环境(ax)的方法和系统。 在示例性实施例中,该方法和系统包括(1)将可执行文件转换成针对计算机系统的计算机程序,以及(2)提供可以在计算机系统上访问该程序的环境。 在示例性实施例中,转换包括对可执行文件进行加扰。 在示例性实施例中,转换包括将文件系统元数据附加到可执行文件。 在示例性实施例中,提供包括仅在程序符合策略时才在计算机系统上执行该程序。 在示例性实施例中,提供包括在将环境加载到计算机系统之前防止恶意代码在计算机系统上执行。
    • 59. 发明授权
    • Methods and systems for defining a form navigational structure
    • 用于定义表单导航结构的方法和系统
    • US08347203B1
    • 2013-01-01
    • US11252566
    • 2005-10-19
    • Edy SetiawanAmit SinghFariborz Ebrahimi
    • Edy SetiawanAmit SinghFariborz Ebrahimi
    • G06F17/00
    • G06F17/3048G06F8/20
    • Systems and methods for defining a form navigational structure associated with at least one node in a process flow may comprise selecting a node form for the at least one node in the process flow, the node form identifying a plurality of displayable forms. Furthermore, the systems and methods may include defining a plurality of node steps for the node, each node step corresponding to a displayable screen associated with a subset of the plurality of displayable forms. Moreover, the systems and methods may include establishing a hierarchical tree structure associating the plurality of node steps, branches in the hierarchical tree structure having associated validation rules.
    • 用于定义与过程流程中的至少一个节点相关联的表单导航结构的系统和方法可以包括为进程流中的至少一个节点选择节点表单,该节点表单标识多个可显示形式。 此外,系统和方法可以包括为节点定义多个节点步骤,每个节点步骤对应于与多个可显示形式的子集相关联的可显示屏幕。 此外,系统和方法可以包括建立将多个节点步骤相关联的分层树结构,具有相关联的验证规则的分层树结构中的分支。