Invocation of a third party's service
    21.
    发明授权
    Invocation of a third party's service 有权
    调用第三方的服务

    公开(公告)号:US08028325B2

    公开(公告)日:2011-09-27

    申请号:US11347573

    申请日:2006-02-06

    申请人: Conor P. Cahill

    发明人: Conor P. Cahill

    IPC分类号: G06F7/04 G06Q20/00

    CPC分类号: G06Q10/10 G06Q20/367

    摘要: Invoking a computer implemented service includes receiving a request from a first user to access a service associated with a second user. The request is associated with a security token for the first user and an identity token for the second user. The acceptability of the security token is determined to authenticate the first user, and the acceptability of the identity token is determined to securely identify the second user. The first user is able to access the service associated with the second user conditioned on the security token being determined to be acceptable and the identity token being determined to be acceptable.

    摘要翻译: 调用计算机实现的服务包括从第一用户接收访问与第二用户相关联的服务的请求。 该请求与第一用户的安全令牌和第二用户的身份令牌相关联。 确定安全令牌的可接受性以认证第一用户,并且确定身份令牌的可接受性以安全地识别第二用户。 第一用户能够访问与被确定为可接受的安全令牌相关的第二用户的服务,并且该身份令牌被确定为可接受的。

    Transforming and manipulating program object code
    23.
    发明授权
    Transforming and manipulating program object code 失效
    转换和操纵程序对象代码

    公开(公告)号:US6021272A

    公开(公告)日:2000-02-01

    申请号:US538961

    申请日:1995-10-04

    IPC分类号: G06F9/45

    CPC分类号: G06F8/52

    摘要: A method and system for transforming and manipulating program object code. A set of program object code is transformed into a form in which it may be readily manipulated, preferably a form which is independent of both the processor and the operating system with which the object code will execute. The transformed object code is manipulated, preferably to add error-checking instructions, but possibly to add other functions or to alter the functions of the object code. The manipulated code is then reverse-transformed to program object code of the same type as the original object code.

    摘要翻译: 一种用于转换和操纵程序对象代码的方法和系统。 一组程序对象代码被转换成可以容易地被操纵的形式,优选地是与目标代码将执行的处理器和操作系统无关的形式。 被转换的对象代码被操纵,优选地添加错误检查指令,但是可能添加其他功能或改变目标代码的功能。 然后将操纵的代码反向转换为与原始目标代码相同类型的程序对象代码。

    Authentication of data streaming service
    25.
    发明授权
    Authentication of data streaming service 有权
    数据流服务认证

    公开(公告)号:US08874901B2

    公开(公告)日:2014-10-28

    申请号:US13620605

    申请日:2012-09-14

    申请人: Conor P. Cahill

    发明人: Conor P. Cahill

    IPC分类号: H04L29/06 G06F21/00

    摘要: A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and determining whether the security token is valid. Providing the service may also involve determining a session security token if the security token is valid and generating a service response including the session security token. Providing the service may further involve receiving a service request including the session security token, determining whether the session security token is valid, and, if the session security token is valid, generating a second service response.

    摘要翻译: 服务提供商可以向客户端和/或客户端提供一个或多个服务。 提供服务可以涉及在服务提供商处接收包括安全令牌的服务请求并确定安全令牌是否有效。 提供服务还可以涉及如果安全令牌是有效的并且生成包括会话安全令牌的服务响应,则确定会话安全令牌。 提供服务还可以包括接收包括会话安全令牌的服务请求,确定会话安全令牌是否有效,以及如果会话安全令牌有效,则生成第二服务响应。

    Privacy Enhanced Key Management For A Web Service Provider Using A Converged Security Engine
    26.
    发明申请
    Privacy Enhanced Key Management For A Web Service Provider Using A Converged Security Engine 有权
    使用融合安全引擎的Web服务提供商的隐私增强密钥管理

    公开(公告)号:US20140181925A1

    公开(公告)日:2014-06-26

    申请号:US13721760

    申请日:2012-12-20

    IPC分类号: G06F21/45 G06F21/31

    摘要: In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication. Other embodiments are described and claimed.

    摘要翻译: 在一个实施例中,处理器的安全引擎包括身份提供者逻辑,以生成密钥配对关联系统用户的第一密钥对和提供Web服务并具有通过网络耦合到系统的第二系统的服务提供者, 以执行与所述第二系统的安全通信,以使所述第二系统能够验证所述身份提供者逻辑在可信执行环境中正在执行,并且响应于所述验证​​,将所述第一密钥对的第一密钥发送到所述第二系统。 该密钥可以使得第二系统可以根据多因素认证来验证由身份提供者逻辑传达的断言,用户已被认证给系统。 描述和要求保护其他实施例。

    IDENTIFYING URL TARGET HOSTNAMES
    27.
    发明申请

    公开(公告)号:US20130073936A1

    公开(公告)日:2013-03-21

    申请号:US13618578

    申请日:2012-09-14

    申请人: Conor P. Cahill

    发明人: Conor P. Cahill

    IPC分类号: G06F17/00

    摘要: Techniques are provided for displaying a uniform resource locator (URL) to assist a user in determining whether a URL destination is what the user expects. A link is presented for selection to a user, and a URL corresponding to the link is accessed. A portion of the URL that corresponds to a hostname component of the URL may be identified, and the URL may be displayed. The hostname component of the URL is visually distinguished from other components of the URL. In addition to or as an alternative to displaying the URL and visually distinguishing the hostname component, a warning message relating to the hostname portion of the URL may be displayed. The techniques may be implemented as a software plug-in or in any type of software application that is capable of recognizing URLs.

    SERVICE PROVIDER INVOCATION
    28.
    发明申请
    SERVICE PROVIDER INVOCATION 有权
    服务提供者协调

    公开(公告)号:US20120060025A1

    公开(公告)日:2012-03-08

    申请号:US13219938

    申请日:2011-08-29

    申请人: Conor P. Cahill

    发明人: Conor P. Cahill

    IPC分类号: H04L29/06

    摘要: A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and determining whether the security token is valid. Providing the service may also involve determining a session security token if the security token is valid and generating a service response including the session security token. Providing the service may further involve receiving a service request including the session security token, determining whether the session security token is valid, and, if the session security token is valid, generating a second service response.

    摘要翻译: 服务提供商可以向客户端和/或客户端提供一个或多个服务。 提供服务可以涉及在服务提供商处接收包括安全令牌的服务请求并确定安全令牌是否有效。 提供服务还可以涉及如果安全令牌是有效的并且生成包括会话安全令牌的服务响应,则确定会话安全令牌。 提供服务还可以包括接收包括会话安全令牌的服务请求,确定会话安全令牌是否有效,以及如果会话安全令牌有效,则生成第二服务响应。

    System and method for using a streaming protocol
    29.
    发明授权
    System and method for using a streaming protocol 有权
    使用流协议的系统和方法

    公开(公告)号:US07734042B2

    公开(公告)日:2010-06-08

    申请号:US11019110

    申请日:2004-12-22

    IPC分类号: H04K1/00 H04L9/00 H04N7/167

    摘要: An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e.g., using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.

    摘要翻译: 使用初始化向量(IV)来解密已经使用Cypher块链接(CBC)加密加密的流的块,而不需要解析流内的先前块。 例如,访问分发点以检索加密内容的监听者向调配对分发点上的加密内容的访问的应用服务器认证自身,并且响应地接收密钥。 然后,收听者在其开始之后的某处(例如,使用预览剪辑)请求访问加密内容流中的参考点。 分配点将参考点与加密流的相应块相关联,并且识别先前用于该块的加密的IV。 分发点向收听者提供相关的加密内容块和IV,以允许加密内容的中间流呈现,而不需要收听者解密加密流中的先前块。