会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Generating modular security delegates for applications
    • 为应用程序生成模块化安全委托
    • US08949951B2
    • 2015-02-03
    • US13040774
    • 2011-03-04
    • Thomas Alexander WoodJohn J. Eckersberg, IIDaniel P Radez
    • Thomas Alexander WoodJohn J. Eckersberg, IIDaniel P Radez
    • H04L29/06H04W12/06
    • H04W12/06H04L63/08
    • Embodiments of the present teachings relate to systems and methods for generating modular security delegates for applications. According to embodiments, in a multiple network environment, multiple machines (or clients) can be configured. Each machine can include a plurality of application instances and an authentication delegate. In addition, each network environment can include a communication interface to security services. The applications can include logic that indicates what security delegate to use for a given set of user authentication credentials. The logic can be configured to determine the appropriate authentication delegate using various methods. The authentication delegates can receive a set of user authentication credentials from application instances and determine whether the set of user authentication credentials are valid. Each authentication delegate corresponds to one and only one type of authentication mechanism.
    • 本教导的实施例涉及用于生成用于应用的模块化安全代理的系统和方法。 根据实施例,在多网络环境中,可以配置多个机器(或客户机)。 每个机器可以包括多个应用实例和认证委托。 此外,每个网络环境可以包括到安全服务的通信接口。 这些应用程序可以包括逻辑,它们指示用于给定一组用户身份验证凭据的安全委托。 逻辑可以配置为使用各种方法确定适当的身份验证代理。 身份验证代理可以从应用程序实例接收一组用户身份验证凭证,并确定该用户身份验证凭证是否有效。 每个认证委托对应于唯一一种认证机制。
    • 4. 发明申请
    • SYSTEMS AND METHODS FOR GENERATING MODULAR SECURITY DELEGATES FOR APPLICATIONS
    • 用于生成应用的模块化安全代理的系统和方法
    • US20120240212A1
    • 2012-09-20
    • US13048142
    • 2011-03-15
    • Thomas Alexander WoodJohn J. Eckersberg, IIDaniel P. Radez
    • Thomas Alexander WoodJohn J. Eckersberg, IIDaniel P. Radez
    • H04L9/32G06F21/00
    • H04L9/088G06F21/33H04L9/3213H04L63/0884
    • Embodiments of the present teachings relate to systems and methods for generating modular security delegates for application instances, including, for example, applications usable on physical machines, virtualized environments, in the cloud, etc. According to embodiments, in a multiple network environment, multiple machines (or clients) can be configured, each having a defined security level. Each machine can include a plurality of application instances and corresponding security delegates for various defined security levels. For example, the defined security levels can be based on various authentication mechanisms, including, Kerberos, NT Lan Manager (NTLM) authentication protocol, secure sockets layer/transport security layer (SSL/TSL), token authentication, virtual private network (VPN), remote access security (RAS), digest authentication, etc.
    • 本教导的实施例涉及用于生成用于应用实例的模块化安全代理的系统和方法,包括例如可在物理机器上使用的应用程序,云中的虚拟化环境等。根据实施例,在多网络环境中,多个 可以配置机器(或客户机),每个机器具有定义的安全级别。 每个机器可以包括多个应用实例和用于各种定义的安全级别的对应的安全委托。 例如,定义的安全级别可以基于各种认证机制,包括Kerberos,NTLAN管理器(NTLM)认证协议,安全套接层/传输安全层(SSL / TSL),令牌认证,虚拟专用网(VPN) ,远程访问安全(RAS),摘要验证等
    • 5. 发明申请
    • SYSTEMS AND METHODS FOR GENERATING MODULAR SECURITY DELEGATES FOR APPLICATIONS
    • 用于生成应用的模块化安全代理的系统和方法
    • US20120227095A1
    • 2012-09-06
    • US13040774
    • 2011-03-04
    • Thomas Alexander WoodJohn J. Eckersberg, IIDaniel Radez
    • Thomas Alexander WoodJohn J. Eckersberg, IIDaniel Radez
    • G06F7/04
    • H04W12/06H04L63/08
    • Embodiments of the present teachings relate to systems and methods for generating modular security delegates for applications. According to embodiments, in a multiple network environment, multiple machines (or clients) can be configured. Each machine can include a plurality of application instances and an authentication delegate. In addition, each network environment can include a communication interface to security services. The applications can include logic that indicates what security delegate to use for a given set of user authentication credentials. The logic can be configured to determine the appropriate authentication delegate using various methods. The authentication delegates can receive a set of user authentication credentials from application instances and determine whether the set of user authentication credentials are valid. Each authentication delegate corresponds to one and only one type of authentication mechanism.
    • 本教导的实施例涉及用于生成用于应用的模块化安全代理的系统和方法。 根据实施例,在多网络环境中,可以配置多个机器(或客户机)。 每个机器可以包括多个应用实例和认证委托。 此外,每个网络环境可以包括到安全服务的通信接口。 这些应用程序可以包括逻辑,它们指示用于给定一组用户身份验证凭据的安全委托。 逻辑可以配置为使用各种方法确定适当的身份验证代理。 身份验证代理可以从应用程序实例接收一组用户身份验证凭证,并确定该用户身份验证凭证是否有效。 每个认证委托对应于唯一一种认证机制。
    • 6. 发明授权
    • Generating modular security delegates for applications
    • 为应用程序生成模块化安全委托
    • US09112682B2
    • 2015-08-18
    • US13048142
    • 2011-03-15
    • Thomas Alexander WoodJohn J. Eckersberg, IIDaniel P. Radez
    • Thomas Alexander WoodJohn J. Eckersberg, IIDaniel P. Radez
    • G06F21/00H04L9/32H04L9/08G06F21/33H04L29/06
    • H04L9/088G06F21/33H04L9/3213H04L63/0884
    • Embodiments of the present teachings relate to systems and methods for generating modular security delegates for application instances, including, for example, applications usable on physical machines, virtualized environments, in the cloud, etc. According to embodiments, in a multiple network environment, multiple machines (or clients) can be configured, each having a defined security level. Each machine can include a plurality of application instances and corresponding security delegates for various defined security levels. For example, the defined security levels can be based on various authentication mechanisms, including, Kerberos, NT Lan Manager (NTLM) authentication protocol, secure sockets layer/transport security layer (SSL/TSL), token authentication, virtual private network (VPN), remote access security (RAS), digest authentication, etc.
    • 本教导的实施例涉及用于生成用于应用实例的模块化安全代理的系统和方法,包括例如可在物理机器上使用的应用程序,云中的虚拟化环境等。根据实施例,在多网络环境中,多个 可以配置机器(或客户机),每个机器具有定义的安全级别。 每个机器可以包括多个应用实例和用于各种定义的安全级别的对应的安全委托。 例如,定义的安全级别可以基于各种认证机制,包括Kerberos,NTLAN管理器(NTLM)认证协议,安全套接层/传输安全层(SSL / TSL),令牌认证,虚拟专用网(VPN) ,远程访问安全(RAS),摘要验证等