Security for remote access VPN
    1.
    发明授权
    Security for remote access VPN 有权
    远程访问安全VPN

    公开(公告)号:US08806609B2

    公开(公告)日:2014-08-12

    申请号:US13043222

    申请日:2011-03-08

    Abstract: Techniques are disclosed for improving security in virtual private network. In one embodiment, key information is generated for a virtual private network (VPN) connection between a first device and a second device. A plurality of shares is then generated based on the key information. A first set of one or more shares is stored on a dongle that is paired to the first device. A second set of one or more shares is stored on the first device. In response to a request to resume the VPN connection, the first set of shares is retrieved from the dongle. The key information is reconstructed based on the first set of shares and the second set of shares. The reconstructed key information may then be used to resume the VPN connection.

    Abstract translation: 披露了提高虚拟专用网络安全性的技术。 在一个实施例中,为第一设备和第二设备之间的虚拟专用网(VPN)连接生成密钥信息。 然后基于密钥信息生成多个共享。 第一组一个或多个共享存储在与第一设备配对的加密狗上。 第一组一个或多个共享存储在第一设备上。 响应于恢复VPN连接的请求,从加密狗检索第一组共享。 关键信息是根据第一组股份和第二组股份重新构成的。 然后可以使用重建的密钥信息来恢复VPN连接。

    DYNAMIC CONTENT-BASED ROUTING
    2.
    发明申请
    DYNAMIC CONTENT-BASED ROUTING 有权
    基于动态内容的路由

    公开(公告)号:US20110154477A1

    公开(公告)日:2011-06-23

    申请号:US12644412

    申请日:2009-12-22

    CPC classification number: H04L63/0272 H04L63/0236 H04L63/102

    Abstract: Systems and methods for redirecting network traffic include a policy server configured to be in communication with a policy database and a client disposed on a remote device. The policy server is configured to receive an inquiry from the client regarding a universal resource locator (URL) request and, based on a policy obtained from the policy database, cause the client to control the remote device such that network traffic associated with the URL request is routed (tunneled) via a particular interface, e.g., a virtual private network (VPN) connection, when so required by the policy, and network traffic associated with the URL request is routed over a different VPN connection or a non-VPN connection when so required by the policy.

    Abstract translation: 用于重定向网络流量的系统和方法包括被配置为与策略数据库和设置在远程设备上的客户端通信的策略服务器。 策略服务器被配置为从客户端接收关于通用资源定位符(URL)请求的查询,并且基于从策略数据库获得的策略,使客户端控制远程设备,使得与URL请求相关联的网络流量 当策略需要时,通过特定接口(例如,虚拟专用网络(VPN))路由(隧道化),并且通过不同的VPN连接或非VPN连接路由与URL请求相关联的网络流量,当 所以政策要求。

    SECURITY FOR REMOTE ACCESS VPN
    3.
    发明申请
    SECURITY FOR REMOTE ACCESS VPN 有权
    远程访问VPN安全

    公开(公告)号:US20120233674A1

    公开(公告)日:2012-09-13

    申请号:US13043222

    申请日:2011-03-08

    Abstract: Techniques are disclosed for improving security in virtual private network. In one embodiment, key information is generated for a virtual private network (VPN) connection between a first device and a second device. A plurality of shares is then generated based on the key information. A first set of one or more shares is stored on a dongle that is paired to the first device. A second set of one or more shares is stored on the first device. In response to a request to resume the VPN connection, the first set of shares is retrieved from the dongle. The key information is reconstructed based on the first set of shares and the second set of shares. The reconstructed key information may then be used to resume the VPN connection.

    Abstract translation: 公开了提高虚拟专用网络安全性的技术。 在一个实施例中,为第一设备和第二设备之间的虚拟专用网(VPN)连接生成密钥信息。 然后基于密钥信息生成多个共享。 第一组一个或多个共享存储在与第一设备配对的加密狗上。 第一组一个或多个共享存储在第一设备上。 响应于恢复VPN连接的请求,从加密狗检索第一组共享。 关键信息是根据第一组股份和第二组股份重新构成的。 然后可以使用重建的密钥信息来恢复VPN连接。

    Living tissue implant with electrical transponder marker
    4.
    发明授权
    Living tissue implant with electrical transponder marker 失效
    使用电子应答器标记的活组织植入物

    公开(公告)号:US5977431A

    公开(公告)日:1999-11-02

    申请号:US915907

    申请日:1997-08-21

    Abstract: A passive transponder may be encoded with a number or code of up to 64 binary bits and then associated with or mounted to virtually any living tissue implant for implantation in a human. After implantation, the transponder's code may be conveniently read with a hand held electromagnetic reader which may merely be brought within proximity of the transponder. The encoded transponder may thus be read in a non-invasive procedure and without the use of any sophisticated or potentially harmful medical equipment or technology such as X-ray. The information encoded in the transponder may correspond to patient demographics and implant data to aid in tracking the implant's progress and use for medical as well as legal reasons.

    Abstract translation: 无源应答器可以用多达64个二进制位的数字或代码进行编码,然后与几乎任何用于植入人体的活体组织植入物相关联或安装在其上。 植入后,可以用手持式电磁读取器方便地读取应答器的代码,手持式电磁读取器可能只能被置于应答器的附近。 因此编码的应答器可以非侵入性的程序读取而不使用任何复杂的或潜在有害的医疗设备或技术,如X射线。 在应答器中编码的信息可以对应于患者人口统计学和植入物数据,以帮助跟踪植入物的进展并且用于医疗以及法律上的原因。

    Method of rendering identifiable a living tissue implant using an
electrical transponder marker
    5.
    发明授权
    Method of rendering identifiable a living tissue implant using an electrical transponder marker 失效
    使用电子应答器标记描绘活组织植入物的可识别方法

    公开(公告)号:US5716407A

    公开(公告)日:1998-02-10

    申请号:US375815

    申请日:1995-01-20

    Abstract: A passive transponder may be encoded with a number or code of up to 64 binary bits and then associated with or mounted to virtually any living tissue implant for implantation in a human. After implantation, the transponder's code may be conveniently read with a hand held electromagnetic reader which may merely be brought within proximity of the transponder. The encoded transponder may thus be read in a non-invasive procedure and without the use of any sophisticated or potentially harmful medical equipment or technology such as X-ray. The information encoded in the transponder may correspond to patient demographics and implant data to aid in tracking the implant's progress and use for medical as well as legal reasons.

    Abstract translation: 无源应答器可以用多达64个二进制位的数字或代码进行编码,然后与几乎任何用于植入人体的活体组织植入物相关联或安装在其上。 植入后,可以用手持式电磁读取器方便地读取应答器的代码,手持式电磁读取器可能只能被置于应答器的附近。 因此编码的应答器可以非侵入性的程序读取而不使用任何复杂的或潜在有害的医疗设备或技术,如X射线。 在应答器中编码的信息可以对应于患者人口统计学和植入物数据,以帮助跟踪植入物的进展并且用于医疗以及法律上的原因。

    Protecting digital data such as images on a device with image acquisition capabilities
    6.
    发明授权
    Protecting digital data such as images on a device with image acquisition capabilities 有权
    保护具有图像采集功能的设备上的数字数据(如图像)

    公开(公告)号:US08473757B2

    公开(公告)日:2013-06-25

    申请号:US12388387

    申请日:2009-02-18

    CPC classification number: H04L9/0891 H04L9/0894

    Abstract: Digital data, such as images on a digital camera, is typically protected (e.g., encrypted and/or authenticated) based on a master key stored off the device. The original master key can be acquired in a number of different ways, including being generated by the device or by another device. A one-way, progressive series of keys are derived from the master key such that only images or data of a same session can be authenticated or decrypted for viewing, export or manipulation of the decrypted image/data. In order to decrypt images or data of a previous session on the device, the master key must be imported to the device, such as by, but not limited to, taking a picture of a representation of the key and interpreting the image to reacquire the master key.

    Abstract translation: 数字数据,例如数字照相机上的图像,通常基于存储在设备上的主密钥进行保护(例如,加密和/或认证)。 原始主密钥可以以多种不同的方式获取,包括由设备或另一设备生成。 从主密钥导出单向,渐进的一系列密钥,使得仅能够认证或解密相同会话的图像或数据以查看,导出或操纵解密的图像/数据。 为了对设备上的先前会话的图像或数据进行解密,主密钥必须被导入到设备中,例如通过但不限于获取密钥的表示的图片并解释图像来重新获取 主密钥。

    Dynamic content-based routing
    7.
    发明授权
    Dynamic content-based routing 有权
    动态基于内容的路由

    公开(公告)号:US08533780B2

    公开(公告)日:2013-09-10

    申请号:US12644412

    申请日:2009-12-22

    CPC classification number: H04L63/0272 H04L63/0236 H04L63/102

    Abstract: Systems and methods for redirecting network traffic include a policy server configured to be in communication with a policy database and a client disposed on a remote device. The policy server is configured to receive an inquiry from the client regarding a universal resource locator (URL) request and, based on a policy obtained from the policy database, cause the client to control the remote device such that network traffic associated with the URL request is routed (tunneled) via a particular interface, e.g., a virtual private network (VPN) connection, when so required by the policy, and network traffic associated with the URL request is routed over a different VPN connection or a non-VPN connection when so required by the policy.

    Abstract translation: 用于重定向网络流量的系统和方法包括被配置为与策略数据库和设置在远程设备上的客户端通信的策略服务器。 策略服务器被配置为从客户端接收关于通用资源定位符(URL)请求的查询,并且基于从策略数据库获得的策略,使客户端控制远程设备,使得与URL请求相关联的网络流量 当策略需要时,通过特定接口(例如,虚拟专用网络(VPN))路由(隧道化),并且通过不同的VPN连接或非VPN连接路由与URL请求相关联的网络流量,当 所以政策要求。

    Restricting network access while connected to an untrusted network
    8.
    发明授权
    Restricting network access while connected to an untrusted network 有权
    连接到不可信网络时限制网络访问

    公开(公告)号:US09077730B2

    公开(公告)日:2015-07-07

    申请号:US13019702

    申请日:2011-02-02

    CPC classification number: H04L63/107 H04L63/0272

    Abstract: In an example embodiment, disclosed herein is an apparatus comprising an interface configured to communicate with at least one external device, and processing logic coupled with the interface. The processing logic determines whether the interface is connected directly to a predefined network. The processing logic restricts access to the interface responsive to determining the interface is connected to a network other than the predefined network. The processing logic does not restrict access to the interface while the interface is directly connected with the predefined network.

    Abstract translation: 在一个示例性实施例中,本文公开了一种包括被配置为与至少一个外部设备进行通信并且与该接口耦合的处理逻辑的接口的设备。 处理逻辑确定接口是否直接连接到预定义的网络。 响应于确定接口连接到除了预定义网络之外的网络,处理逻辑限制对接口的访问。 当接口与预定义网络直接连接时,处理逻辑不限制对接口的访问。

    Restricting Network Access While Connected to an Untrusted Network
    9.
    发明申请
    Restricting Network Access While Connected to an Untrusted Network 有权
    连接到不可信网络时限制网络访问

    公开(公告)号:US20120198519A1

    公开(公告)日:2012-08-02

    申请号:US13019702

    申请日:2011-02-02

    CPC classification number: H04L63/107 H04L63/0272

    Abstract: In an example embodiment, disclosed herein is an apparatus comprising an interface configured to communicate with at least one external device, and processing logic coupled with the interface. The processing logic determines whether the interface is connected directly to a predefined network. The processing logic restricts access to the interface responsive to determining the interface is connected to a network other than the predefined network. The processing logic does not restrict access to the interface while the interface is directly connected with the predefined network.

    Abstract translation: 在一个示例性实施例中,本文公开了一种包括被配置为与至少一个外部设备进行通信并且与该接口耦合的处理逻辑的接口的设备。 处理逻辑确定接口是否直接连接到预定义的网络。 响应于确定接口连接到除了预定义网络之外的网络,处理逻辑限制对接口的访问。 当接口与预定义网络直接连接时,处理逻辑不限制对接口的访问。

    Protecting Digital Data such as Images on a Device with Image Acquisition Capabilities
    10.
    发明申请
    Protecting Digital Data such as Images on a Device with Image Acquisition Capabilities 有权
    保护具有图像采集功能的设备上的数字数据(如图像)

    公开(公告)号:US20100211799A1

    公开(公告)日:2010-08-19

    申请号:US12388387

    申请日:2009-02-18

    CPC classification number: H04L9/0891 H04L9/0894

    Abstract: Digital data, such as images on a digital camera, is typically protected (e.g., encrypted and/or authenticated) based on a master key stored off the device. The original master key can be acquired in a number of different ways, including being generated by the device or by another device. A one-way, progressive series of keys are derived from the master key such that only images or data of a same session can be authenticated or decrypted for viewing, export or manipulation of the decrypted image/data. In order to decrypt images or data of a previous session on the device, the master key must be imported to the device, such as by, but not limited to, taking a picture of a representation of the key and interpreting the image to reacquire the master key.

    Abstract translation: 数字数据,例如数字照相机上的图像,通常基于存储在设备上的主密钥进行保护(例如,加密和/或认证)。 原始主密钥可以以多种不同的方式获取,包括由设备或另一设备生成。 从主密钥导出单向,渐进的一系列密钥,使得仅能够认证或解密相同会话的图像或数据以查看,导出或操纵解密的图像/数据。 为了对设备上的先前会话的图像或数据进行解密,主密钥必须被导入到设备中,例如通过但不限于获取密钥的表示的图片并解释图像来重新获取 主密钥。

Patent Agency Ranking