-
公开(公告)号:US07716722B2
公开(公告)日:2010-05-11
申请号:US11424517
申请日:2006-06-15
申请人: Michael M. Swift , Neta Amit , Richard B. Ward
发明人: Michael M. Swift , Neta Amit , Richard B. Ward
IPC分类号: G06F15/16
CPC分类号: G06F21/33 , Y10S707/99939
摘要: A method of controlling access to network services enables an authorized proxy client to access a service on behalf of a user. To permit the client to function as a proxy, the user registers proxy authorization information with a trusted security server. The proxy authorization information identifies the proxy client and specifies the extent of proxy authority granted to the proxy client. When the proxy client wants to access a target service on behalf of the user, it sends a proxy request to the trusted security server. The trusted security server checks the proxy authorization information of the user to verify whether the request is within the proxy authority granted to the proxy client. If so, the trusted security server returns to the proxy client a data structure containing information recognizable by the target service to authenticate the proxy client for accessing the target service on behalf of the user.
摘要翻译: 控制对网络服务的访问的方法使得授权代理客户端能够代表用户访问服务。 为了允许客户端作为代理,用户使用可信赖的安全服务器注册代理授权信息。 代理授权信息标识代理客户端,并指定授予代理客户端的代理授权的范围。 当代理客户端想要代表用户访问目标服务时,它向可信安全服务器发送代理请求。 受信任的安全服务器检查用户的代理授权信息,以验证请求是否在授予代理客户端的代理授权内。 如果是这样,则可信赖安全服务器向代理客户端返回包含目标服务可识别的信息的数据结构,以便代表用户验证代理客户端来访问目标服务。
-
公开(公告)号:US07113994B1
公开(公告)日:2006-09-26
申请号:US09490199
申请日:2000-01-24
申请人: Michael M. Swift , Neta Amit , Richard B. Ward
发明人: Michael M. Swift , Neta Amit , Richard B. Ward
IPC分类号: G06F15/16
CPC分类号: G06F21/33 , Y10S707/99939
摘要: A method of controlling access to network services enables an authorized proxy client to access a service on behalf of a user. To permit the client to function as a proxy, the user registers proxy authorization information with a trusted security server. The proxy authorization information identifies the proxy client and specifies the extent of proxy authority granted to the proxy client. When the proxy client wants to access a target service on behalf of the user, it sends a proxy request to the trusted security server. The trusted security server checks the proxy authorization information of the user to verify whether the request is within the proxy authority granted to the proxy client. If so, the trusted security server returns to the proxy client a data structure containing information recognizable by the target service to authenticate the proxy client for accessing the target service on behalf of the user.
摘要翻译: 控制对网络服务的访问的方法使得授权代理客户端能够代表用户访问服务。 为了允许客户端作为代理,用户使用可信赖的安全服务器注册代理授权信息。 代理授权信息标识代理客户端,并指定授予代理客户端的代理授权的范围。 当代理客户端想要代表用户访问目标服务时,它向可信安全服务器发送代理请求。 受信任的安全服务器检查用户的代理授权信息,以验证请求是否在授予代理客户端的代理授权内。 如果是这样,则可信赖安全服务器向代理客户端返回包含目标服务可识别的信息的数据结构,以便代表用户验证代理客户端来访问目标服务。
-
公开(公告)号:US06925572B1
公开(公告)日:2005-08-02
申请号:US09514461
申请日:2000-02-28
申请人: Neta Amit , Eran Harel , Abraham Nathan , Nevet Basker
发明人: Neta Amit , Eran Harel , Abraham Nathan , Nevet Basker
IPC分类号: B60C1/00 , C08K5/1515 , C08K5/45 , C08L21/00 , G06F15/16 , G06F15/177 , G06F11/30 , G06F12/14 , H04L9/00 , H04L9/32
CPC分类号: H04L63/0245 , H04L45/74 , H04L63/0263 , H04L63/105 , Y02T10/862
摘要: Two-phase filtering for a firewall is disclosed. In the first, general phase, a request is filtered to verify one or more of: that the request is pursuant to a supported protocol, that a command of the request is allowed, that the length of the request does not exceed the allowed maximum for the command, and that characters of the request are of an allowable type. Upon first-phase verification, a second phase is invoked that is particular to the protocol of the request. In the second, specialized phase, the request is filtered to verify one or more of the source, the destination, and the content of the request. Upon second-phase verification, the request is allowed to pass. If either first-or second-phase verification fails, then the request is denied.
摘要翻译: 公开了防火墙的两相过滤。 在第一个通用阶段,请求被过滤以验证以下一个或多个请求:请求是否依赖于支持的协议,允许请求的命令,请求的长度不超过允许的最大值 该命令,并且该请求的字符是允许的类型。 在进行第一阶段验证时,会调用第二阶段,该阶段特定于请求的协议。 在第二个专业阶段,请求被过滤以验证请求的源,目的地和内容中的一个或多个。 经第二阶段验证后,允许该请求通过。 如果第一阶段或第二阶段验证失败,则请求被拒绝。
-
公开(公告)号:US07162512B1
公开(公告)日:2007-01-09
申请号:US09514460
申请日:2000-02-28
申请人: Neta Amit , Alexander Frank , Yifat Peled
发明人: Neta Amit , Alexander Frank , Yifat Peled
IPC分类号: G06F13/00
CPC分类号: G06F9/546 , Y10S707/99931
摘要: Guaranteed, exactly once delivery of messages is disclosed. In one embodiment, there is a sender and a receiver. In a sender transaction, the sender does the following: receives a message from a sender queue; generates a substantially unique identifier and an expiration time for the message; and, saves the identifier, the expiration time, and the message in a sender database. The sender then sends the identifier, the expiration time, and the message to the receiver. In a receiver transaction, the receiver then does the following: receives the identifier, the expiration time, and the message from a receiver queue; determines whether the message has expired based on the expiration time and determines whether the message is present in a receiver database by its identifier; and, upon determining that the message has not expired and is not present in the receiver database, stores the message in the receiver database, and performs actions associated with the message.
摘要翻译: 保证,一旦传递消息就被公开。 在一个实施例中,存在发送器和接收器。 在发件人事务中,发件人执行以下操作:从发送方队列接收消息; 生成消息的基本上唯一的标识符和到期时间; 并在发件人数据库中保存标识符,到期时间和消息。 然后发送方将标识符,到期时间和消息发送给接收方。 在接收机事务中,接收者然后执行以下操作:从接收器队列接收标识符,到期时间和消息; 基于到期时间确定消息是否已经过期,并通过其标识确定消息是否存在于接收者数据库中; 并且在确定消息尚未到期并且不存在于接收器数据库中时,将消息存储在接收器数据库中,并且执行与该消息相关联的动作。
-
公开(公告)号:US07703131B1
公开(公告)日:2010-04-20
申请号:US09516402
申请日:2000-03-01
申请人: Neta Amit , Alexander Frank
发明人: Neta Amit , Alexander Frank
CPC分类号: H04L63/08 , G06F21/00 , G06F21/335
摘要: The invention relates to secured distributed impersonation, for use within systems such as batch system and batch message transaction systems. In one embodiment, a method includes sending a request for credentials of a network account from an originating account associated with an unpublished object to a dispatch associated with a published object. In one embodiment, both the unpublished and the published objects can each be a message queue. The dispatch authenticates the originating account. Upon successful authentication, the network account access emblem is sent to the originating account—that is, the originating account receives the requested credentials, which facilitate the ability to impersonate into the network account.
摘要翻译: 本发明涉及安全的分布式模拟,用于诸如批量系统和批量消息交易系统的系统内。 在一个实施例中,一种方法包括从与未发布的对象相关联的始发帐户向发布的对象相关联的发送发送网络帐户的凭证的请求。 在一个实施例中,未发布的和已发布的对象都可以是消息队列。 发货认证原始账户。 成功认证后,网络帐户访问标志被发送到始发帐户 - 即,始发帐户接收所请求的凭证,这有助于模拟网络帐户的能力。
-
公开(公告)号:US09319383B2
公开(公告)日:2016-04-19
申请号:US11124833
申请日:2005-05-09
申请人: Neta Amit , Eran Harel , Abraham Nathan , Nevet Basker
发明人: Neta Amit , Eran Harel , Abraham Nathan , Nevet Basker
CPC分类号: H04L63/0245 , H04L45/74 , H04L63/0263 , H04L63/105 , Y02T10/862
摘要: Two-phase filtering for a firewall is disclosed. In the first, general phase, a request is filtered to verify one or more of: that the request is pursuant to a supported protocol, that a command of the request is allowed, that the length of the request does not exceed the allowed maximum for the command, and that characters of the request are of an allowable type. Upon first-phase verification, a second phase is invoked that is particular to the protocol of the request. In the second, specialized phase, the request is filtered to verify one or more of the source, the destination, and the content of the request. Upon second-phase verification, the request is allowed to pass. If either first- or second-phase verification fails, then the request is denied.
摘要翻译: 公开了防火墙的两相过滤。 在第一个通用阶段,请求被过滤以验证以下一个或多个请求:请求是否依赖于支持的协议,允许请求的命令,请求的长度不超过允许的最大值 该命令,并且该请求的字符是允许的类型。 在进行第一阶段验证时,会调用第二阶段,该阶段特定于请求的协议。 在第二个专业阶段,请求被过滤以验证请求的源,目的地和内容中的一个或多个。 经第二阶段验证后,允许该请求通过。 如果第一阶段或第二阶段验证失败,则请求被拒绝。
-
公开(公告)号:US20060225132A1
公开(公告)日:2006-10-05
申请号:US11424517
申请日:2006-06-15
申请人: Michael Swift , Neta Amit , Richard Ward
发明人: Michael Swift , Neta Amit , Richard Ward
IPC分类号: G06F15/16
CPC分类号: G06F21/33 , Y10S707/99939
摘要: A method of controlling access to network services enables an authorized proxy client to access a service on behalf of a user. To permit the client to function as a proxy, the user registers proxy authorization information with a trusted security server. The proxy authorization information identifies the proxy client and specifies the extent of proxy authority granted to the proxy client. When the proxy client wants to access a target service on behalf of the user, it sends a proxy request to the trusted security server. The trusted security server checks the proxy authorization information of the user to verify whether the request is within the proxy authority granted to the proxy client. If so, the trusted security server returns to the proxy client a data structure containing information recognizable by the target service to authenticate the proxy client for accessing the target service on behalf of the user.
摘要翻译: 控制对网络服务的访问的方法使得授权代理客户端能够代表用户访问服务。 为了允许客户端作为代理,用户使用可信赖的安全服务器注册代理授权信息。 代理授权信息标识代理客户端,并指定授予代理客户端的代理授权的范围。 当代理客户端想要代表用户访问目标服务时,它向可信安全服务器发送代理请求。 受信任的安全服务器检查用户的代理授权信息,以验证请求是否在授予代理客户端的代理授权内。 如果是这样,则可信赖安全服务器向代理客户端返回包含目标服务可识别的信息的数据结构,以便代表用户验证代理客户端来访问目标服务。
-
公开(公告)号:US20050210294A1
公开(公告)日:2005-09-22
申请号:US11124833
申请日:2005-05-09
申请人: Neta Amit , Eran Harel , Abraham Nathan , Nevet Basker
发明人: Neta Amit , Eran Harel , Abraham Nathan , Nevet Basker
CPC分类号: H04L63/0245 , H04L45/74 , H04L63/0263 , H04L63/105 , Y02T10/862
摘要: Two-phase filtering for a firewall is disclosed. In the first, general phase, a request is filtered to verify one or more of: that the request is pursuant to a supported protocol, that a command of the request is allowed, that the length of the request does not exceed the allowed maximum for the command, and that characters of the request are of an allowable type. Upon first-phase verification, a second phase is invoked that is particular to the protocol of the request. In the second, specialized phase, the request is filtered to verify one or more of the source, the destination, and the content of the request. Upon second-phase verification, the request is allowed to pass. If either first- or second-phase verification fails, then the request is denied.
摘要翻译: 公开了防火墙的两相过滤。 在第一个通用阶段,请求被过滤以验证以下一个或多个请求:请求是否依赖于支持的协议,允许请求的命令,请求的长度不超过允许的最大值 该命令,并且该请求的字符是允许的类型。 在进行第一阶段验证时,会调用第二阶段,该阶段特定于请求的协议。 在第二个专业阶段,请求被过滤以验证请求的源,目的地和内容中的一个或多个。 经第二阶段验证后,允许该请求通过。 如果第一阶段或第二阶段验证失败,则请求被拒绝。
-
-
-
-
-
-
-