Wireless access system, method, signal, and computer program product
    1.
    发明授权
    Wireless access system, method, signal, and computer program product 失效
    无线接入系统,方法,信号和计算机程序产品

    公开(公告)号:US07712128B2

    公开(公告)日:2010-05-04

    申请号:US10483984

    申请日:2002-07-24

    IPC分类号: H04K1/00

    摘要: A system, method, signal, and computer program product for providing secure wireless access to private databases and applications without requiring a separate wireless client-server internetworking security protocol infrastructure. The wireless device (201) communicates with the wireless access service provider (205) via hypertext transfer protocol (HTTP) messages, and the wireless access service provider (205) and the secure network (204) perform a RADIUS authentification for the wireless device (201).

    摘要翻译: 一种系统,方法,信号和计算机程序产品,用于提供对私有数据库和应用程序的安全无线访问,而无需单独的无线客户端 - 服务器互联网安全协议基础设施。 无线设备(201)经由超文本传输​​协议(HTTP)消息与无线接入服务提供商(205)通信,无线接入服务提供商(205)和安全网络(204)对无线设备进行RADIUS认证( 201)。

    System, Method, Apparatus, and Computer Program Product for Facilitating Digital Communications
    4.
    发明申请
    System, Method, Apparatus, and Computer Program Product for Facilitating Digital Communications 有权
    系统,方法,设备和计算机程序产品促进数字通信

    公开(公告)号:US20080222696A1

    公开(公告)日:2008-09-11

    申请号:US12105674

    申请日:2008-04-18

    IPC分类号: G06F21/00

    摘要: A computer-implemented method and apparatus prevents unsecured access to a computer over a network by a client running on a remote computer. In one aspect of the present invention, a client policy is stored on the remote computer. The client policy includes a configuration of the remote computer that reduces the likelihood of a security breach of the computer as a result of the remote computer accessing the computer. A request is received from a user for access to the computer. It is verified that the remote computer conforms with the client policy, and the client is connected to said computer.

    摘要翻译: 计算机实现的方法和装置防止在远程计算机上运行的客户端通过网络对计算机的非安全访问。 在本发明的一个方面,客户端策略被存储在远程计算机上。 客户端策略包括远程计算机的配置,从而降低由于远程计算机访问计算机而导致计算机安全漏洞的可能性。 从用户接收到访问计算机的请求。 验证远程计算机是否符合客户端策略,并且客户端连接到所述计算机。