会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Advanced authentication techniques
    • 高级认证技术
    • US09258301B2
    • 2016-02-09
    • US14094331
    • 2013-12-02
    • Sky Socket, LLC
    • Alan Dabbiere
    • G06F7/04H04L29/06G06F21/31G06F21/32
    • H04L63/0861G06F21/316G06F21/32H04L63/10
    • A method, system, apparatus, and computer program product are provided for facilitating advanced authentication techniques. For example, a method is provided that includes receiving at least one request to access at least one resource and receiving at least one composite authentication credential, the composite authentication credential comprising a first credential component and a second credential component. The method further includes determining whether the first credential component is valid, determining whether the second credential component is valid and, in an instance in which it is determined that the first and second credential components are valid, causing access to the at least one resource to be permitted.
    • 提供了一种方法,系统,装置和计算机程序产品,用于促进高级认证技术。 例如,提供了一种方法,其包括接收至少一个访问至少一个资源的请求并且接收至少一个复合认证凭证,所述合成认证凭证包括第一凭证组件和第二凭证组件。 该方法还包括确定第一凭证组件是否有效,确定第二凭证组件是否有效,并且在确定第一和第二凭证组件有效的情况下,导致对至少一个资源的访问 被允许。
    • 4. 发明授权
    • Peripheral device management
    • 外围设备管理
    • US08924608B2
    • 2014-12-30
    • US13925943
    • 2013-06-25
    • Sky Socket, LLC
    • David Dabbiere
    • G06F3/00G06F5/00G06F13/38
    • G06F13/385G06F13/14
    • A method, system, apparatus, and computer program product are provided for providing peripheral device management. For example, a method is provided that includes receiving, from a user device, a request to access at least one peripheral device, the request comprising information regarding the user device. The method may further include determining, based at least in part on at least one compliance rule and the information regarding the user device, whether to grant the request, and, in an instance in which it is determined to grant the request, causing access to the at least one peripheral device by the user device to be facilitated.
    • 提供了一种用于提供外围设备管理的方法,系统,装置和计算机程序产品。 例如,提供了一种方法,其包括从用户设备接收访问至少一个外围设备的请求,该请求包括关于用户设备的信息。 该方法还可以包括至少部分地基于至少一个遵从规则和关于用户设备的信息来确定是否授予该请求,并且在确定其被授权该请求的情况下,确定访问 用户设备的至少一个外围设备将被简化。
    • 8. 发明申请
    • APPLICATION PROGRAM AS KEY FOR AUTHORIZING ACCESS TO RESOURCES
    • 应用程序作为授权访问资源的关键
    • US20140282897A1
    • 2014-09-18
    • US13842623
    • 2013-03-15
    • SKY SOCKET, LLC
    • Erich Stuntebeck
    • H04L29/06
    • H04L63/08G06F21/10G06F21/335G06F21/6218H04L63/105H04L67/303
    • In a networked environment, a client side application executed on a client device may transmit a request to an authorization service for access to a resource. The authorization service may authenticate the user of client device and/or the client device based on user credentials and/or a device identifier. In response to authenticating the user and/or the client device, the authorization service may send to the client side application a request for confirmation that the client device complies with a distribution rule associated with the resource, where the distribution rule requires a specific application or specific type of application to be installed, enabled and/or executing on the client device as a prerequisite to accessing the resource. If the client device complies with the distribution rule, the client side application accesses the resource. Accessing the resource may include receiving an authorization credential required for access to the resource.
    • 在网络环境中,在客户机设备上执行的客户端应用可以向授权服务发送请求以访问资源。 授权服务可以基于用户凭证和/或设备标识符认证客户端设备和/或客户端设备的用户。 响应于验证用户和/或客户端设备,授权服务可以向客户端应用发送确认客户端设备符合与资源相关联的分发规则的请求,其中分发规则需要特定应用或 要在客户端设备上安装,启用和/或执行的特定类型的应用程序作为访问资源的先决条件。 如果客户端设备符合分发规则,则客户端应用程序访问该资源。 访问资源可以包括接收访问资源所需的授权凭证。
    • 9. 发明申请
    • CERTIFICATE BASED PROFILE CONFIRMATION
    • 基于证书的配置文件确认
    • US20140282869A1
    • 2014-09-18
    • US13835542
    • 2013-03-15
    • SKY SOCKET, LLC
    • Alan DABBIERE
    • H04L29/06
    • H04L63/10G06F21/30G06F21/33G06F21/335G06F21/44G06F21/50G06F21/51G06F21/54H04W12/08
    • Disclosed are various embodiments for controlling access to resources in a network environment. Methods may include installing a profile on the device and installing a certificate included in or otherwise associated with the profile on the device. A request to execute an application, and/or access a resource using a particular application, is received and determination is made as to whether the certificate is installed on the device based on an identification of the certificate by the application. If the certificate is installed on the device, then execution of the application and/or access to the resource is allowed. If the certificate is not installed on the device, then the request for execution and/or access is refused.
    • 公开了用于控制对网络环境中的资源的访问的各种实施例。 方法可以包括在设备上安装简档并且在该设备上安装包括在该配置文件中或以其他方式与该配置文件相关联的证书。 接收执行应用程序和/或使用特定应用程序访问资源的请求,并且基于应用程序的证书的标识确定证书是否安装在设备上。 如果设备上安装了证书,则允许执行应用程序和/或访问资源。 如果设备上未安装证书,则拒绝执行和/或访问请求。