Integrating user specified extensions into an information access system
    12.
    发明授权
    Integrating user specified extensions into an information access system 有权
    将用户指定的扩展集成到信息访问系统中

    公开(公告)号:US07155737B1

    公开(公告)日:2006-12-26

    申请号:US09309360

    申请日:1999-05-11

    摘要: A method and apparatus is provided for securely executing access control functions that may be customized by or on behalf of administrators of information access systems. Examples of such functions include changing a password of a user, determining whether or not data specifying a user and a password identifies an authentic user, and displaying a message indicating whether a login attempt was successful. An access control function is mapped to a digital signature. The digital signature is used to verify that an executable element retrieved for executing the access control function is the proper executable element. The access control functions may be invoked upon the occurrence of access control events, such as a user successfully logging onto an information access system or the modification of a user's password. A mapping contains data used to determine what events are tied to what access control functions, and whether the access control function should be executed. Upon the occurrence of an extension event that is tied to an extension, an executable element for the extension is retrieved. After executing an extension, data is returned to the caller of the extension. The returned data may be a hash table that includes other objects, such as strings or even other hash tables. The access control functions are developed in manner that exploits the power and simplicity of the inheritance feature of object oriented programming.

    摘要翻译: 提供了一种方法和装置,用于安全执行可由信息访问系统的管理员或代表其定制的访问控制功能。 这种功能的实例包括改变用户的密码,确定用户指定的数据和密码是否识别真实用户,以及显示指示登录尝试是否成功的消息。 访问控制功能映射到数字签名。 数字签名用于验证检索用于执行访问控制功能的可执行元素是否是正确的可执行元素。 访问控制功能可以在诸如用户成功登录到信息访问系统或修改用户密码的访问控制事件时被调用。 映射包含用于确定哪些事件与什么访问控制功能相关联的数据以及是否应执行访问控制功能。 发生与扩展关联的扩展事件时,检索扩展的可执行元素。 执行扩展后,数据将返回给扩展的主叫方。 返回的数据可以是包括其他对象(例如字符串或甚至其他哈希表)的哈希表。 访问控制功能以利用面向对象编程的继承特征的功能和简单性的方式开发。

    Method and apparatus for protecting communication of information through a graphical user interface
    13.
    发明授权
    Method and apparatus for protecting communication of information through a graphical user interface 有权
    用于通过图形用户界面保护信息通信的方法和装置

    公开(公告)号:US08769433B2

    公开(公告)日:2014-07-01

    申请号:US10908494

    申请日:2005-05-13

    IPC分类号: G06F3/048

    摘要: A method and apparatus for protecting communication of information through a graphical user interface displays a graphical user interface that includes a trusted interaction window. In one example, the method includes continuously determining whether information has been overlayed on top of at least a portion of the displayed trusted interaction window and then disabling an operation being requested when an overlay condition has been determined. In one example, the trusted interaction window is maintained to be the top most window when it is called by an application, for example, during an online transaction, or any other suitable action. The trusted interaction window may be generated via a browser, or operating system, or any other suitable application. As such, the trusted interaction window detects when another window is overlayed on top of it, such as a chromeless window, thereby preventing an unscrupulous party from tricking the user or obtaining sensitive information.

    摘要翻译: 通过图形用户界面保护信息通信的方法和装置显示包括可信交互窗口的图形用户界面。 在一个示例中,该方法包括连续地确定信息是否已覆盖在所显示的信任交互窗口的至少一部分之上,然后当已经确定了重叠条件时禁用所请求的操作。 在一个示例中,可信交互窗口被保持为当被应用程序调用时最顶层的窗口,例如在线交易期间,或任何其他合适的动作。 可信任的交互窗口可以经由浏览器,操作系统或任何其他合适的应用来生成。 因此,可信任的交互窗口检测何时其他窗口重叠在其上,例如无色窗口,从而防止不道德的一方欺骗用户或获取敏感信息。

    Apparatus and method for electronic transaction evidence archival and retrieval
    14.
    发明授权
    Apparatus and method for electronic transaction evidence archival and retrieval 有权
    电子交易证据归档和检索的装置和方法

    公开(公告)号:US08538893B1

    公开(公告)日:2013-09-17

    申请号:US09411782

    申请日:1999-10-01

    申请人: Timothy E. Moses

    发明人: Timothy E. Moses

    IPC分类号: G06Q20/00

    CPC分类号: G06Q20/02

    摘要: An electronic transaction evidence archive apparatus and method archives electronic transaction evidence, such as public key based electronic transaction evidence on behalf of a first party. The apparatus and method determines redundant electronic transaction evidence and removes the redundant electronic transaction evidence prior to archival. In one embodiment, the electronic transaction evidence archive apparatus and method indexes received electronic transaction evidence and archives the indexed data elements thereof. When a subsequent archival request is made, the apparatus and method evaluates the index data to determine redundant electronic transaction evidence and discards redundant information to save memory resources. The first party provides the electronic transaction evidence in, for example, an archive evidence bundle, which includes data elements related to a single transaction.

    摘要翻译: 电子交易证据存档装置和方法存档电子交易证据,如基于公钥的电子交易证据代表第一方。 该设备和方法确定冗余电子交易证据,并在归档之前删除冗余电子交易证据。 在一个实施例中,电子交易证据存档装置和方法索引接收电子交易证据并归档其索引的数据元素。 当进行后续归档请求时,设备和方法评估索引数据以确定冗余的电子交易证据并丢弃冗余信息以节省存储资源。 第一方提供电子交易证据,例如,存档证据包,其中包括与单个交易相关的数据元素。

    Key release systems, components and methods
    15.
    发明授权
    Key release systems, components and methods 有权
    主要发布系统,组件和方法

    公开(公告)号:US08161565B1

    公开(公告)日:2012-04-17

    申请号:US09746015

    申请日:2000-12-26

    申请人: Glenn Langford

    发明人: Glenn Langford

    IPC分类号: H04L9/08 G06F7/04

    摘要: Systems, methods, components are provided all for the purpose of controlling access to decryption keys needed to decrypt ciphertext. A key release agent is provided which controls decryption key distribution. The key release method starts with receiving an encrypted key, key related information and decryptor information from a decryptor and determining a whether a private key corresponding to the key ciphertext is available. Upon determining the private key corresponding to the key ciphertext is available, a decision is made based on decryptor information of the decryptor and the key related information whether decryption of the key ciphertext is to be permitted. Decryptors adapted to participate with the KRA in the above described key distribution methods are also provided.

    摘要翻译: 系统,方法,组件全部用于控制对解密密文所需的解密密钥的访问。 提供一种控制解密密钥分发的密钥释放代理。 密钥释放方法从从解密器接收加密密钥,密钥相关信息和解密器信息开始,并确定与密钥密文相对应的私钥是否可用。 在确定与密钥密文相对应的私钥可用时,基于解密器的解密器信息和密钥相关信息确定是否允许密钥密文的解密。 还提供了适应于KRA参与上述密钥分配方法的解密器。

    Defining and detecting network application business activities
    17.
    发明授权
    Defining and detecting network application business activities 有权
    定义和检测网络应用业务活动

    公开(公告)号:US07653742B1

    公开(公告)日:2010-01-26

    申请号:US10952599

    申请日:2004-09-28

    IPC分类号: G06F15/173

    摘要: Network applications are monitored by defining and detecting activities associated with the applications. Such activities are referred to as “business activities” in the sense that the activities are performed in the process of conducting business using applications. Each business activity of interest is associated with a unique “business signature” which can be used to identify the activity from streams or collections of information. In one embodiment, each business signature of interest to a business is defined as a set of one or more parameter name-value pairs. Once defined, network traffic to and from an application is monitored to detect business signatures, to detect that a corresponding business activity was started. Detecting an activity is based on real-time matching of business signature character patterns within a stream of characters with a repository of character patterns that each represents a business signature defined for the application.

    摘要翻译: 通过定义和检测与应用程序相关的活动来监视网络应用程序。 这些活动被称为“商业活动”,因为活动是在使用申请进行业务的过程中进行的。 感兴趣的每个业务活动都与唯一的“业务签名”相关联,可以用于从流或信息集合中识别活动。 在一个实施例中,业务感兴趣的每个业务签名被定义为一个或多个参数名称 - 值对的集合。 一旦定义,进入和从应用程序的网络流量被监视以检测业务签名,以检测相应的业务活动是否已经启动。 检测活动是基于字符流内的商业签名字符模式与每个表示为应用定义的业务签名的字符模式的存储库的实时匹配。

    Controlling use of a network resource
    18.
    发明授权
    Controlling use of a network resource 有权
    控制网络资源的使用

    公开(公告)号:US06947979B1

    公开(公告)日:2005-09-20

    申请号:US09640960

    申请日:2000-08-16

    申请人: Michael Pon

    发明人: Michael Pon

    IPC分类号: G06F15/173 H04L29/08

    CPC分类号: H04L67/22 H04L67/02 H04L67/18

    摘要: A method and apparatus for controlling use of a network resource. A network administrator accesses and navigates one or more network resources. A navigation capture server captures each request that is generated by the administrator's browser and each response that is received, and stores information about the requests and responses. The navigation capture server analyzes the captured information and generates an access/navigation script that represents the navigation actions taken by the administrator in the session. The script is edited and generalized in a manner such that upon playback of the script, the user may input actual useful information and the system may capture specific response data. When the client accesses and navigates the Web applications, context-specific information, relating to the client's then-current request, is passed from the User View Server to the navigation capture server. The navigation capture server merges the context-specific information into a corresponding request of the access/navigation script, and communicates a modified, context-specific request to the network resource. When the network resource generates a response, the message and any associated data are returned to the client through the navigation capture server and User View Server in a reciprocal manner. Thus, each user experiences a Web site with a uniform user interface or in a controlled way.

    摘要翻译: 一种用于控制网络资源的使用的方法和装置。 网络管理员访问和导航一个或多个网络资源。 导航捕获服务器捕获由管理员浏览器生成的每个请求以及收到的每个响应,并存储有关请求和响应的信息。 导航捕获服务器分析捕获的信息,并生成一个访问/导航脚本,代表管理员在会话中执行的导航操作。 脚本被编辑和广义化,使得在播放脚本时,用户可以输入实际的有用信息,并且系统可以捕获特定的响应数据。 当客户端访问和浏览Web应用程序时,与客户端的当前请求相关的上下文相关信息从用户视图服务器传递到导航捕获服务器。 导航捕获服务器将上下文特定信息合并到访问/导航脚本的相应请求中,并将经修改的上下文特定请求传送到网络资源。 当网络资源生成响应时,消息和任何关联的数据将以相互的方式通过导航捕获服务器和用户视图服务器返回给客户端。 因此,每个用户经历具有统一的用户界面的网站或受控的方式。

    BINDING OF MULTIPLE HETEROGENEOUS ROOT CERTIFICATE AUTHORITIES

    公开(公告)号:US20220060341A1

    公开(公告)日:2022-02-24

    申请号:US17404572

    申请日:2021-08-17

    申请人: Entrust, Inc.

    IPC分类号: H04L9/32 H04L9/08

    摘要: Root certificates generated by root certificate authorities may be bound at the time of generation. In an example, a first root certificate can include an identity of a first root certificate authority, a first key identifier associated with a first key of the first root certificate authority and an identity of a first digital signature algorithm used by the first root certificate authority. The first root certificate can also include at least one extension including a second key identifier of a second key associated with the second root certificate authority and an identity of a second digital signature algorithm used by the second root certificate authority, the second digital signature algorithm being different from the first digital signature algorithm.