Method of assuring enterprise security standards compliance
    2.
    发明授权
    Method of assuring enterprise security standards compliance 有权
    确保企业安全标准合规的方法

    公开(公告)号:US07657942B2

    公开(公告)日:2010-02-02

    申请号:US11033436

    申请日:2005-01-11

    IPC分类号: H04L29/14 G08B23/00

    摘要: A method, apparatus, and computer instructions for providing a current and complete security compliance view of an enterprise system. The present invention provides the ability to gain a real-time security posture and security compliance view of an enterprise and to assess the risk impact of known threats and attacks to continued business operations at various levels is provided. Responsive to a change to an enterprise environment, a request, or an external threat, an administrator loads or updates at least one of a Critical Application Operations database, a Historical database, an Access Control database, a Connectivity database, and a Threat database. Based on a comparison of information in the databases against similar security data elements from company or external policies, the administrator may generate a Security Compliance view of the enterprise. A Security Posture view may also be generated by comparing the Security Compliance view against data in the Threat database.

    摘要翻译: 一种用于提供企业系统的当前和完整的安全合规性视图的方法,装置和计算机指令。 本发明提供获得企业的实时安全状态和安全合规性视图的能力,并且评估已知威胁和攻击对于各个级别的持续业务操作的风险影响。 响应企业环境,请求或外部威胁的更改,管理员加载或更新关键应用程序操作数据库,历史数据库,访问控制数据库,连接数据库和威胁数据库中的至少一个。 基于数据库中的信息与公司或外部策略中类似的安全数据元素的比较,管理员可以生成企业的安全合规性视图。 通过将安全合规性视图与威胁数据库中的数据进行比较,也可以生成安全性状态视图。

    Encrypting data for access by multiple users
    5.
    发明授权
    Encrypting data for access by multiple users 失效
    加密数据以供多个用户访问

    公开(公告)号:US07596222B2

    公开(公告)日:2009-09-29

    申请号:US11766192

    申请日:2007-06-21

    IPC分类号: H04L9/32

    CPC分类号: H04L9/0822 H04L9/0863

    摘要: A method for protecting data for access by a plurality of users. A server encrypts data using a master key and a symmetric encryption algorithm. For each authorized user, a key encryption key (KEK) is derived from a passphrase, and the master key is encrypted using the KEK. The server posts the encrypted data and an ancillary file that includes, for each user, a user identifier and the master key encrypted according to the user's KEK. To access the data, a user enters the passphrase into a client, which re-derives the user's KEK, and finds, in the ancillary file, the master key encrypted using the user's KEK. The client decrypts the master key and then decrypts the data. A KEK may be derived from a natural language passphrase by hashing the passphrase, concatenating the result and a predetermined text, hashing the concatenation, and truncating.

    摘要翻译: 一种用于保护数据以供多个用户访问的方法。 服务器使用主密钥和对称加密算法对数据进行加密。 对于每个授权用户,密钥加密密钥(KEK)是从密码短语导出的,并且使用KEK对主密钥进行加密。 服务器发布加密数据以及辅助文件,其中包括针对每个用户的根据用户的KEK加密的用户标识符和主密钥。 为了访问数据,用户将密码短语输入客户端,重新导出用户的KEK,并在辅助文件中找到使用用户的KEK加密的主密钥。 客户端解密主密钥,然后解密数据。 KEK可以从自然语言密码短语中衍生,通过散列密码,连接结果和预定文本,散列连接和截断。

    DISTRIBUTION AND AUTHENTICATION OF PUBLIC KEYS USING RANDOM NUMBERS AND DIFFIE-HELLMAN PUBLIC KEYS
    6.
    发明申请
    DISTRIBUTION AND AUTHENTICATION OF PUBLIC KEYS USING RANDOM NUMBERS AND DIFFIE-HELLMAN PUBLIC KEYS 失效
    公开号码使用随机数和分布式公钥的分布和认证

    公开(公告)号:US20090169014A1

    公开(公告)日:2009-07-02

    申请号:US12352658

    申请日:2009-01-13

    IPC分类号: H04L9/00

    CPC分类号: H04L9/3013 H04L9/0844

    摘要: A system to exchange and authenticate public cryptographic keys between parties that share a common but secret password, using a pair of random numbers, a pair of Diffie-Hellman public keys computed from the random numbers and the password, a Diffie-Hellman symmetric secret key computed from the Diffie-Hellman public keys and the random numbers, and hashed values of arguments that depend upon these elements.

    摘要翻译: 使用一对随机数,根据随机数和密码计算的一对Diffie-Hellman公钥来交换和认证共享公共密码的各方之间的公共密钥的系统,Diffie-Hellman对称密钥 根据Diffie-Hellman公钥和随机数计算出的散列值,并根据这些元素的参数进行散列。

    Systems, methods and computer program products for distributing connection information between ATM nodes
    7.
    发明授权
    Systems, methods and computer program products for distributing connection information between ATM nodes 失效
    用于在ATM节点之间分配连接信息的系统,方法和计算机程序产品

    公开(公告)号:US06269079B1

    公开(公告)日:2001-07-31

    申请号:US09511624

    申请日:2000-02-23

    IPC分类号: G01R3108

    摘要: Methods, systems and computer program products for controlling scheduling in an ATM node in a network are provided which aggregate connection information for connections to the ATM node to provide a set of aggregate connection information for the ATM node. The set of aggregate connection information is distributed to other ATM nodes in the network and may be used in accepting connections to the ATM network based on the aggregate connection information. Scheduling may be provided by associating a timestamp value in each cell associated with an accepted connection as it is received by the ATM node. Received cells are grouped into a plurality of cell groups in timestamp order based upon characteristics of the cells and cells are selected from each group so as to transmit the cells in earliest deadline first order.

    摘要翻译: 提供了用于控制网络中的ATM节点中的调度的方法,系统和计算机程序产品,其聚合用于到ATM节点的连接的连接信息,以提供用于ATM节点的一组聚合连接信息。 聚合连接信息的集合被分配到网络中的其他ATM节点,并且可以用于基于聚合连接信息来接受与ATM网络的连接。 可以通过在由ATM节点接收到的与所接受的连接相关联的每个小区中关联时间戳值来提供调度。 基于小区的特性,接收到的小区按时间戳顺序被分组成多个小区组,并且从每个组中选择小区,以便在最早期限的第一阶段发送小区。

    Hiding sensitive information
    8.
    发明授权
    Hiding sensitive information 有权
    隐藏敏感信息

    公开(公告)号:US08204929B2

    公开(公告)日:2012-06-19

    申请号:US09999643

    申请日:2001-10-25

    IPC分类号: G06F15/16

    CPC分类号: G06F21/6245

    摘要: An improved methodology and implementing computer system are provided in which sensitive information is selectively masked in order to enable such information to be relatively securely and efficiently transmitted over networks without disclosure of such sensitive information at a transmitting or receiving terminal, or at points along the data transmission network.

    摘要翻译: 提供了一种改进的方法和实现的计算机系统,其中敏感信息被选择性地被屏蔽,以便使得这样的信息能够相对安全且有效地通过网络传输,而不会在发送或接收终端或沿着数据的点处泄露这样的敏感信息 传输网络。

    Encrypting data for access by multiple users
    9.
    发明授权
    Encrypting data for access by multiple users 失效
    加密数据以供多个用户访问

    公开(公告)号:US07272231B2

    公开(公告)日:2007-09-18

    申请号:US10351759

    申请日:2003-01-27

    IPC分类号: H04L9/00

    CPC分类号: H04L9/0822 H04L9/0863

    摘要: A method for protecting data for access by a plurality of users. A server encrypts data using a master key and a symmetric encryption algorithm. For each authorized user, a key encryption key (KEK) is derived from a passphrase, and the master key is encrypted using the KEK. The server posts the encrypted data and an ancillary file that includes, for each user, a user identifier and the master key encrypted according to the user's KEK. To access the data, a user enters the passphrase into a client, which re-derives the user's KEK, and finds, in the ancillary file, the master key encrypted using the user's KEK. The client decrypts the master key and then decrypts the data. A KEK may be derived from a natural language passphrase by hashing the passphrase, concatenating the result and a predetermined text, hashing the concatenation, and truncating.

    摘要翻译: 一种用于保护数据以供多个用户访问的方法。 服务器使用主密钥和对称加密算法对数据进行加密。 对于每个授权用户,密钥加密密钥(KEK)是从密码短语导出的,并且使用KEK对主密钥进行加密。 服务器发布加密数据以及辅助文件,其中包括针对每个用户的根据用户的KEK加密的用户标识符和主密钥。 为了访问数据,用户将密码短语输入客户端,重新导出用户的KEK,并在辅助文件中找到使用用户的KEK加密的主密钥。 客户端解密主密钥,然后解密数据。 KEK可以从自然语言密码短语中衍生,通过散列密码,连接结果和预定文本,散列连接和截断。

    Secure software distribution and installation
    10.
    发明授权
    Secure software distribution and installation 失效
    安全的软件分发和安装

    公开(公告)号:US07051211B1

    公开(公告)日:2006-05-23

    申请号:US09642685

    申请日:2000-08-21

    IPC分类号: G06F11/30 G06F12/14 H04L9/32

    摘要: Methods, systems and computer program products are provide for controlling access to software is provided by the software to be controlled being divided into a first encrypted portion and a second unencrypted portion. The second unencrypted portion has access to, and may even incorporate, a first secret value and a software identification associated with a copy of the software. The first encrypted portion is encrypted with a first key value which is based on the first secret value and a second secret value. The second secret value is obtained and the first key value generated from the obtained second secret value and the first secret value. The first encrypted portion of the software may then be decrypted with the first key value. The software may be installed on a data processing system utilizing the decrypted first encrypted portion of the software.

    摘要翻译: 提供方法,系统和计算机程序产品,用于控制对要被控制的软件提供的对软件的访问,被分为第一加密部分和第二未加密部分。 第二未加密部分可以访问并且甚至可以并入与软件的副本相关联的第一秘密值和软件标识。 第一加密部分用基于第一秘密值和第二秘密值的第一密钥值进行加密。 获得第二秘密值,并从获得的第二秘密值和第一秘密值生成第一密钥值。 然后可以利用第一密钥值来解密软件的第一加密部分。 软件可以使用软件的解密的第一加密部分来安装在数据处理系统上。