Trust grant and revocation from a master key to secondary keys
    21.
    发明授权
    Trust grant and revocation from a master key to secondary keys 有权
    从主密钥到辅助密钥的信任授权和撤销

    公开(公告)号:US07328337B2

    公开(公告)日:2008-02-05

    申请号:US10478767

    申请日:2001-05-25

    申请人: James A. Roskind

    发明人: James A. Roskind

    IPC分类号: H04L9/00

    摘要: A method and apparatus is provided that allows code signed by a master key to grant trust to an arbitrary second key, and also allows code, referred to as an antidote and also signed by the master key to revoke permanently the trust given to the second key.

    摘要翻译: 提供了一种方法和装置,其允许由主密钥签名的代码授予对任意第二密钥的信任,并且还允许被称为解毒剂并且还被主密钥签名的代码永久地撤销给予第二密钥的信任 。

    Time based wireless access provisioning
    22.
    发明授权
    Time based wireless access provisioning 有权
    基于时间的无线访问配置

    公开(公告)号:US07177285B2

    公开(公告)日:2007-02-13

    申请号:US10961959

    申请日:2004-10-08

    IPC分类号: H04L12/26 H04Q7/34

    摘要: A method and apparatus is provided for the time-based provisioning of wireless devices. A network access point monitors operation of wireless devices within a service region. When provisioning logic is activated at the network access point, the access point determines if the tracked parameter (such as power on or the onset of signal transmission) of the wireless device occurs within a designated time interval from the time of the provisioning activation. If the tracked device qualifies, the network access point proceeds with provisioning the device. In one system embodiment, the network access point tracks the power on time of wireless devices. When a wireless device to be authorized is powered on, the provisioning logic at the network access point notes the power on time. The user then activates the provisioning access at the network access point, and the network access point provisions the wireless device if it is recently powered on.

    摘要翻译: 提供了一种用于无线设备的基于时间的供应的方法和装置。 网络接入点监视服务区域内的无线设备的操作。 当在网络接入点激活供应逻辑时,接入点确定无线设备的跟踪参数(例如电源开启或信号传输的开始)是否在从供应激活的时间起指定的时间间隔内发生。 如果跟踪的设备有资格,则网络接入点继续提供设备。 在一个系统实施例中,网络接入点跟踪无线设备的通电时间。 当要授权的无线设备通电时,网络接入点的供应逻辑会注意上电时间。 然后用户激活网络接入点处的供应接入,并且如果最近上电,则网络接入点规定无线设备。

    SELF-FORMING NETWORK
    25.
    发明申请
    SELF-FORMING NETWORK 审中-公开
    自我形成网络

    公开(公告)号:US20160036681A1

    公开(公告)日:2016-02-04

    申请号:US14830643

    申请日:2015-08-19

    申请人: James A. Roskind

    发明人: James A. Roskind

    IPC分类号: H04L12/26 H04L12/751

    摘要: A connected computer may be operated as node by inspecting communications from other nodes that pass through that node. From the communications, two or more pointers may be determined for the given node. These pointers may include a first pointer identified by a default designation that links the given node to a first node in the network, and a second pointer to another node. The second pointer may be identified by a determination that a designated criteria has been satisfied after the given node is placed on the network.

    摘要翻译: 连接的计算机可以通过检查通过该节点的其他节点的通信来操作为节点。 从通信中,可以为给定节点确定两个或更多个指针。 这些指针可以包括通过将给定节点链接到网络中的第一节点的默认指定标识的第一指针,以及指向另一节点的第二指针。 可以通过在将给定节点放置在网络上之后已经满足指定标准的确定来识别第二指针。

    Efficient data sharing
    26.
    发明授权
    Efficient data sharing 有权
    有效的数据共享

    公开(公告)号:US09201941B1

    公开(公告)日:2015-12-01

    申请号:US12488605

    申请日:2009-06-22

    IPC分类号: G06F17/30

    摘要: In some embodiments, a method for detecting a shared data element comprises providing a first feature of a first data element associated with a first storage device, detecting a second feature of a second data element associated with a second storage device, wherein the second feature is the same as the first feature, providing a challenge to a remote device associated with the second storage device, receiving a response to the challenge, providing the challenge to a second remote device via a digital network, receiving a correct response via the digital network, wherein the correct response includes a hash that has been calculated, determining whether the response is acceptable, wherein determining whether the response is acceptable includes determining whether the response is compatible with the correct response, and generating a reference to the first data element, if it is determined that the response is acceptable.

    摘要翻译: 在一些实施例中,用于检测共享数据元素的方法包括提供与第一存储设备相关联的第一数据元素的第一特征,检测与第二存储设备相关联的第二数据元素的第二特征,其中第二特征是 与第一特征相同,向与第二存储设备相关联的远程设备提出挑战,接收对挑战的响应,经由数字网络向第二远程设备提供挑战,经由数字网络接收正确的响应, 其中所述正确的响应包括已经计算的散列,确定所述响应是否可接受,其中确定所述响应是否可接受包括确定所述响应是否与所述正确响应兼容,并且生成对所述第一数据元素的引用,如果 确定响应是可接受的。

    Anti-phishing
    29.
    发明授权
    Anti-phishing 有权
    反网络钓鱼

    公开(公告)号:US08984640B1

    公开(公告)日:2015-03-17

    申请号:US11011870

    申请日:2004-12-13

    IPC分类号: H04L29/06 G06F21/56

    摘要: In some embodiments, techniques for computer security comprise receiving a message, receiving a user-originated request for an action, wherein the action is associated with the message, determining whether the message is trustworthy, and impairing performance of the action, if it is determined that the message is not trustworthy. In some embodiments, techniques for computer security comprise receiving a message, determining whether the message is trustworthy, rendering the message, if it is determined that the message is trustworthy, and rendering a restricted version of the message, if it is determined that the message is not trustworthy.

    摘要翻译: 在一些实施例中,用于计算机安全性的技术包括接收消息,接收用于动作的用户发起的请求,其中所述动作与所述消息相关联,确定所述消息是否可信任,以及如果确定 该消息不可信。 在一些实施例中,用于计算机安全的技术包括接收消息,确定消息是否可信赖,如果确定消息是可信赖的,则呈现消息,并且如果确定消息 不守信用

    DATA PRIVACY
    30.
    发明申请
    DATA PRIVACY 审中-公开
    数据隐私

    公开(公告)号:US20130243188A1

    公开(公告)日:2013-09-19

    申请号:US13783011

    申请日:2013-03-01

    申请人: James A. Roskind

    IPC分类号: H04L9/30

    摘要: In some embodiments, techniques for data security may include encoding and decoding unreadably encoded data, such as data encrypted with a public key or tokenized. In some embodiments, techniques for data security may include distributing an encrypted private key. In some embodiments, unreadable data may be encrypted and/or decrypted using time-varying keys.In some embodiments, techniques for data security may include combining information and a policy, and encoding the combined information and policy, wherein encrypting the combined information and policy is performed using a public key, or via tokenization.In some embodiments, techniques for data security may include receiving data, wherein the data has been encoded, decoding the data, determining a first datum and a second datum, wherein the first datum and the second datum are associated with the decoded data, and determining a policy, wherein the policy is associated with the first datum.

    摘要翻译: 在一些实施例中,用于数据安全性的技术可以包括编码和解码不可读编码的数据,例如用公钥加密的数据或标记化的数据。 在一些实施例中,用于数据安全性的技术可以包括分发加密的私钥。 在一些实施例中,不可读数据可以使用时变键加密和/或解密。 在一些实施例中,用于数据安全性的技术可以包括组合信息和策略,以及对组合的信息和策略进行编码,其中使用公共密钥或通过标记化来执行组合的信息和策略的加密。 在一些实施例中,用于数据安全的技术可以包括接收数据,其中数据已经被编码,对数据进行解码,确定第一数据和第二数据,其中第一数据和第二数据与解码的数据相关联, 策略,其中策略与第一基准相关联。