摘要:
We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used to quickly establish a secure credential infrastructure that can be used to secure ad-hoc and/or dynamic command and control operations such are needed for Incident Command Systems or other emergency response systems that require simplicity and rapid deployment among disparate responder teams.
摘要:
Techniques are provided for creating and sharing information about arbitrary documents. A primary document is selected and a document content identifier generated based on the content of the primary document. Additional information such as comments, additional documents, reviews and the like are created and/or selected from an information repository. The additional information is associated with the primary document based on the document content identifier of the primary document. A search for information associated with the primary document compares the document content identifier of the primary document to document content identifiers associated with the additional information. Additional information associated with the document content identifiers matching the primary document content identifier is retrieved and displayed to the user.
摘要:
Authentication information is generated for a group where members within a group are able to communicate with each other, but a non-members is not able to participate in that communication. The authentication information provides the determination of whether the member belongs to the group.
摘要:
A method of accessing a data resource identifies the data resource, the data resource accessible through a first device and associated with a resource locator, the first device configured to provide access to the data resource responsive to possession of a whitelisted credential. The method includes receiving a second-device credential from a second device by a personal domain controller, the personal domain controller and the first device within a first trusted relationship and provides, by the personal domain controller, the second-device credential to the first device for whitelisting subject to the first trusted relationship. The method uses, by the second device, the second-device credential to access the data resource responsive to the resource locator.
摘要:
One embodiment of the present invention provides a system for establishing temporary and permanent credentials for secure remote data access. The system includes a temporary smart card configured to provide a temporary credential for a first device, thereby providing the first device with temporary secure access to a remote data source when the temporary smart card is used with the first device. Additionally, the system includes an enrollment smart card configured to provide a permanent credential for a second device, thereby providing the second device with permanent secure access to the remote data source without presence of the enrollment smart card or the temporary smart card.
摘要:
A method for establishing a secondary communication channel between at least two computing devices over a network medium through use of a primary channel connects a first computing device with a first telephonic unit and a second computing device with a second telephonic unit. If the two telephonic units are in communication with each other over a primary channel, and communication channels are established between the computing devices and their respective telephonic units, then the first computing device transmits its location information to the second computing device over the primary channel. A connection is then established between the second computing device and the first computing device over a secondary communication channel.
摘要:
Pre-authentication information of devices is used to securely authenticate arbitrary peer-to-peer ad-hoc interactions. In one embodiment, public key cryptography is used in the main wireless link with location-limited channels being initially used to pre-authenticate devices. Use of public keys in the pre-authentication data allows for the broadening of types of media suitable for use as location-limited channels to include, for example, audio and infrared. Also, it allows a range of key exchange protocols which can be authenticated in this manner to include most public-key-based protocols. As a result, a large range of devices, protocols can be used in various applications. Further, an eavesdropper is forced to mount an active attack on the location-limited channel itself in order to access an ad-hoc exchange. However, this results in the discovery of the eavesdropper.
摘要:
Systems and methods for establishing an authenticated and encrypted network connection in a boot protocol, and specifying the boot image to be loaded by a client, are disclosed. A hardware token or other portable medium, such as a USB drive or device, CD, mini-CD, or floppy diskette, is used to store authentication and/or identification information for a server. A client uses the information on the token to authenticate the network server upon initial connection to the network and request a boot image. Furthermore, the client and server may use the authentication information from the token to establish secure communications and mutually authenticate each other.
摘要:
A method of receiving mobile code includes receiving, from a source node, a dependency descriptor describing at least one permitted configuration, each configuration comprising necessary conditions on a destination node to execute mobile code, executing, on the destination node, checker code associated with the conditions described in the dependency descriptor, and, if at least one configuration is compatible, receiving the mobile code at the destination node.
摘要:
Techniques are provided for the lightweight authentication of a user to an application, a computer or other device. An interaction element such as a stylus, a pen or marker is uniquely identified. The interactive element is associated with a user. The interaction element provides a means for interacting with the application. The proximity of the identification element within the interaction element during data entry operations to the authentication sensor signals the controlled application that the user has been authenticated.