摘要:
A system and method of authenticating the identity of a remote fax machine during a faxing operation is provided. An X.509-type Certificate received from the remote fax machine is validated to affirm it can be properly associated with the remote machine. The Certificate's public key is used to verify the remote fax machine has the corresponding private key. A Certificate's Common Name then compared to an Expected Name to authenticate the identity of the remote fax machine prior to sending a fax to prevent an unwanted misdirection of faxed information and to screen incoming faxes for unwanted spam.
摘要:
Security vulnerability information aggregation techniques are disclosed. Vulnerability information associated with one or more security vulnerabilities is obtained from multiple sources and aggregated into respective unified vulnerability definitions for the one or more security vulnerabilities. Aggregation may involve format conversion, content aggregation, or both in some embodiments. Unified vulnerability definitions may be distributed to vulnerability information consumers in accordance with consumer-specific policies. Storage of vulnerability information received from the sources may allow the aggregation process to be performed on existing vulnerability information “retro-actively”. Related data structures and Graphical User Interfaces (GUIs) are also disclosed.
摘要:
Information system service-level security risk analysis systems, methods, and Graphical User Interfaces are disclosed. Assets of an information system that have relationships with a service provided by the information system are identified, and at least one security risk to the service is determined by analyzing security vulnerabilities associated with the identified assets. A consolidated representation of the service is provided, and includes an indication of the determined security risk(s) and an indication of a relationship between the service and at least one of the identified assets. The security risk indication may include indications of multiple security parameters. Security risks may be represented differently depending on whether they arise from a security vulnerability of an asset that has a relationship with the service or a security vulnerability of an asset that has a relationship with the service only through a relationship with an asset that has a relationship with the service.
摘要:
A method includes receiving an authentication certificate of a voice mail account holder and/or an authentication certificate of a caller wanting to leave a voice mail message the holders' voice mail account. A voice mail apparatus that provides voice mail service for the voice mail account holder performs such receiving. The account holder and/or the caller are authenticated after receiving the authentication certificate of the party being authenticated. Authenticating the account holder and/or the caller is performed using authentication information contained within the respective certificate. After such authentication is successfully performed, a voice mail message record can be created in the account of the account holder. Such creating includes allowing the caller to store the message in the account of the account holder in addition to associating authenticated identification information of the caller with the message and/or providing authenticated identification of the account holder to the caller.
摘要:
A method for authenticating an operator of an AP includes: registering the operator's identity with a CA, by providing the operator's identification information and public key; creating a certificate including the foregoing; signing the certificate with the CA's private key; provisioning the AP with the signed certificate; provisioning a client with the CA's public key; sending a request from the client to the AP; generating a signature with the operator's private key; returning a reply to the client, including the AP provisioned certificate signed with the generated signature; using the client provisioned CA's public key to obtain the operator's public key from the certificate received in the reply; and, using the operator's public key obtained from the certificate received in the reply to verify the signature generated with the operator's private key and used by the AP to sign the certificate received in the reply.
摘要:
A method of completing a telephone call based on an authenticated caller name proxy, and related proxy, including one or more of the following: a caller dialing the authenticated caller name proxy on behalf of a RealName entity; verifying that the RealName entity is a registered RealName entity; retrieving a list of combinations of user identifications and passwords associated with an appropriate certificate corresponding to the RealName entity; the caller providing a combination of user identification and password to the authenticated caller name proxy; determining that the combination of user identification and password provided to the authenticated caller name proxy by the caller matches an entry in the list of combinations of user identifications and passwords associated with the appropriate certificate corresponding to the RealName entity; the caller providing a called party phone number to the authenticated caller name proxy; the authenticated caller name proxy establishing an authenticated telephone call with the called party on behalf of the RealName entity using the appropriate certificate for the RealName; and means for accomplishing the same.
摘要:
The present invention relates generally to multimedia, and more specifically, to a system and method of improved television viewing using automatic parallel recording of television channels. The invention continuously captures and records multimedia content for a set of “channels” in a central location, buffering all available channels for a number of days or weeks on a continuous basis. The buffered programming may then be streamed over a network such as the Internet on request, to the viewer's premises where it can be viewed on request via an appropriate display device such as a television equipped with an IP-enabled set top box or on a personal computer.
摘要:
Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address.
摘要:
Various exemplary embodiments relate to a method and related network element including one or more of the following: receiving a plurality of advertisement messages via the communications network, each advertisement message of the plurality of advertisement messages including a set of meta-information which describes the content of an advertisement associated with the advertisement message; determining whether each advertisement message is relevant to the user by comparing the set of meta-information to a set of user preferences associated with the user, the set of user preferences stored locally on the user node; when an advertisement message is determined to not be relevant to the user, discarding the advertisement message; and when an advertisement message is determined to be relevant to the user, providing the user with access to the advertisement associated with the advertisement message.
摘要:
Malware detection systems are presented in which a list is constructed of enterprise hosts to or from which each given enterprise network host sends or receives packets within a current measurement period and statistics are accumulated based on two or more measurement period lists, with a count value being derived from the statistics to indicate the number of other hosts to or from which each monitored host sent or received packets, and one or more monitored hosts may be identified as suspected of being infected with slow and/or distributed scanning malware for which the count value exceeds a threshold value.