ESTABLISHING A SECURE CHANNEL WITH A HUMAN USER
    41.
    发明申请
    ESTABLISHING A SECURE CHANNEL WITH A HUMAN USER 审中-公开
    与人类用户建立安全通道

    公开(公告)号:US20120204246A1

    公开(公告)日:2012-08-09

    申请号:US13451369

    申请日:2012-04-19

    IPC分类号: G06F21/00

    摘要: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.

    摘要翻译: 描述了在人类用户和计算机应用之间建立安全信道的方法。 秘密唯一标识符(“PIN”)在用户和应用程序之间共享。 当用户进行涉及利用PIN进行认证的请求时,应用程序呈现随机选择的标识符。 随机选择的标识符是人可识别的格式,但是不能被自动代理人容易地识别。 然后将随机选择的标识符呈现给人类用户。 用户识别随机选择的标识符和PIN之间的关系。 如果用户的输入反映了用户知道PIN的事实,则用户被认证。

    Trusted storage systems and methods
    42.
    发明授权
    Trusted storage systems and methods 有权
    可信存储系统和方法

    公开(公告)号:US08209544B2

    公开(公告)日:2012-06-26

    申请号:US12785343

    申请日:2010-05-21

    IPC分类号: H04L9/32

    摘要: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.

    摘要翻译: 公开了用于提供可靠的数据库系统的系统和方法,该数据库系统利用少量的可信存储来保护更大量的不可信存储。 数据被加密和验证,以防止未经授权的修改或访问。 加密和散列与低级数据模型集成在一起,其中数据和元数据被均匀地保护。 利用数据验证和日志结构存储之间的协同作用。

    Secure Authentication Systems and Methods
    43.
    发明申请
    Secure Authentication Systems and Methods 有权
    安全认证系统和方法

    公开(公告)号:US20110214169A1

    公开(公告)日:2011-09-01

    申请号:US13081711

    申请日:2011-04-07

    IPC分类号: G06F21/00

    摘要: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.

    摘要翻译: 通过组合反向图灵测试(RTT)和基于密码的用户认证协议来提供系统和方法,以提供改进的暴力攻击抵抗能力。 根据本发明的一个实施例,提供了一种用于用户认证的方法,所述方法包括接收与用户相关联的用户名/密码对; 请求对第一次反向图灵测试(RTT)的一个或多个响应; 并且如果接收到对第一RTT的有效响应并且用户名/密码对有效,则授予对用户的访问。

    SYSTEMS AND METHODS FOR SECURE TRANSACTION MANAGEMENT AND ELECTRONIC RIGHTS PROTECTION
    44.
    发明申请
    SYSTEMS AND METHODS FOR SECURE TRANSACTION MANAGEMENT AND ELECTRONIC RIGHTS PROTECTION 失效
    用于安全交易管理和电子保护的系统和方法

    公开(公告)号:US20110145602A1

    公开(公告)日:2011-06-16

    申请号:US13028647

    申请日:2011-02-16

    IPC分类号: G06F12/14

    摘要: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”

    摘要翻译: 本发明提供了用于安全交易管理和电子权利保护的系统和方法。 根据本发明装备的电子设备如电脑有助于确保仅以授权的方式访问和使用信息,并保持信息的完整性,可用性和/或机密性。 这种电子设备提供分布式虚拟分配环境(VDE),其可以执行安全的处理和控制链,例如控制和/或计量或以其他方式监视电子存储或传播信息的使用。 这样的虚拟分发环境可以用于保护电子商务和其他电子或电子促进交易中的各种参与者的权利。 分布式和其他操作系统,环境和架构,例如使用防篡改的基于硬件的处理器的那些,可以在每个节点建立安全性。 这些技术可以用于支持全电子信息分发,例如利用“电子公路”。

    Systems and Methods Using Cryptography to Protect Secure Computing Environments
    45.
    发明申请
    Systems and Methods Using Cryptography to Protect Secure Computing Environments 审中-公开
    使用密码术来保护安全计算环境的系统和方法

    公开(公告)号:US20110131422A1

    公开(公告)日:2011-06-02

    申请号:US13021476

    申请日:2011-02-04

    IPC分类号: G06F21/00

    摘要: Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm compromise, and subsets of multiple digital signatures may be used to reduce the scope of any specific compromise.

    摘要翻译: 通过使用验证机构颁发的数字签名,封条和证书,可以保护安全的计算环境免受假冒或流氓加载模块,可执行文件和其他数据元素的影响。 验证机构可以是可靠的独立第三方 - 测试加载模块或其他可执行文件,以验证其相应的规范是否准确和完整,然后基于篡改工作因素分类对加载模块或其他可执行文件进行数字签名。 使用不同防篡改工作因子的安全计算环境使用不同的验证数字签名认证技术(例如,不同的签名算法和/或签名验证密钥) - 允许一个防篡改工作因子环境来保护自身免受另一个不同的篡改电阻工作的负载模块 因素环境。 可以使用几种不相似的数字签名算法来减少算法折中的脆弱性,并且可以使用多个数字签名的子集来减少任何特定折中的范围。

    INTEROPERABLE SYSTEMS AND METHODS FOR PEER-TO-PEER SERVICE ORCHESTRATION
    49.
    发明申请
    INTEROPERABLE SYSTEMS AND METHODS FOR PEER-TO-PEER SERVICE ORCHESTRATION 审中-公开
    用于同侪服务配对的互操作系统和方法

    公开(公告)号:US20100250927A1

    公开(公告)日:2010-09-30

    申请号:US12792965

    申请日:2010-06-03

    IPC分类号: G06F21/00

    摘要: Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich media experiences. In one embodiment, services are distributed across peer-to-peer communicating nodes, and each node provides message routing and orchestration using a message pump and workflow collator. Distributed policy management of service interfaces helps to provide trust and security, supporting commercial exchange of value. Peer-to-peer messaging and workflow collation allow services to be dynamically created from a heterogeneous set of primitive services. The shared resources are services of many different types, using different service interface bindings beyond those typically supported in a web service deployments built on UDDI, SOAP, and WSDL. In a preferred embodiment, a media services framework is provided that enables nodes to find one another, interact, exchange value, and cooperate across tiers of networks from WANs to PANs.

    摘要翻译: 描述了以支持形成启用富媒体体验的自组织服务网络的方式执行策略管理的点对点服务编排的系统和方法。 在一个实施例中,服务分布在对等通信节点之间,并且每个节点使用消息泵和工作流整理器来提供消息路由和编排。 服务接口的分布式策略管理有助于提供信任和安全性,支持商业价值交换。 对等消息传递和工作流排序允许从异构服务集合动态创建服务。 共享资源是许多不同类型的服务,使用不同于在UDDI,SOAP和WSDL构建的Web服务部署中通常支持的服务接口绑定。 在优选实施例中,提供了一种媒体服务框架,其使得节点能够彼此查找,交互,交换价值,并且跨越WAN到PAN的网络层进行协作。