Permission-based scanning of a web site
    1.
    发明授权
    Permission-based scanning of a web site 失效
    网站的基于权限的扫描

    公开(公告)号:US06530022B1

    公开(公告)日:2003-03-04

    申请号:US09213908

    申请日:1998-12-17

    IPC分类号: H04L932

    摘要: A scanning tool executing on a host computer may be used to scan a server only if the server (or a proxy) first exposes to the host a certificate that, upon processing by the host, indicates that the server may be scanned. The certificate preferably encrypts a scan permission and is made available from a given port on the server (or the proxy). Whenever the host desires to perform a scan of the server, the host searches the port for the certificate. The certificate is then decrypted to determine whether the scan permission exists. If so, the scan then proceeds, in accordance with any conditions set forth in the decrypted scan permission.

    摘要翻译: 只有当服务器(或代理)首先向主机暴露主机处理指示服务器可能被扫描的证书时,才可以在主计算机上执行的扫描工具扫描服务器。 证书优选地加密扫描许可,并从服务器(或代理)上的给定端口获得。 无论何时主机都要对服务器执行扫描,主机会在端口上搜索证书。 然后解密证书以确定扫描权限是否存在。 如果是这样,则扫描然后根据解密的扫描许可中规定的任何条件进行。

    Lightweight authentication system and method for validating a server access request
    2.
    发明授权
    Lightweight authentication system and method for validating a server access request 失效
    用于验证服务器访问请求的轻量级认证系统和方法

    公开(公告)号:US06182227B2

    公开(公告)日:2001-01-30

    申请号:US09102422

    申请日:1998-06-22

    IPC分类号: G06F1300

    摘要: A method of validating a request to access a target server in a computer network having an open, trusted database. The method begins when a request to access the target server is received at a host from which the scheme is supported. In response, a query is initiated to the trusted database to identify a technical, administrative or other contact person that may authorize the access request. In the Internet, the trusted database may be the WHOIS database that includes second level domain name information. A second query (e.g., an e-mail) is then launched to the identified contact. The e-mail preferably includes a URL and a key. The URL identifies a response Web page interface that is accessible upon entry of the key. If the identified contact accesses the Web page interface, he or she may then authorize the access request, deny the access request, or indicate under what conditions the request may occur. The invention takes advantage of existing Internet infrastructure and methods to provide a robust lightweight authentication mechanism.

    摘要翻译: 一种验证在具有开放的可信数据库的计算机网络中访问目标服务器的请求的方法。 当在支持该方案的主机上接收到访问目标服务器的请求时,该方法开始。 作为响应,启动对可信数据库的查询以识别可授权访问请求的技术,管理或其他联系人。 在Internet中,受信任的数据库可能是包含二级域名信息的WHOIS数据库。 然后将第二个查询(例如,电子邮件)发送到所识别的联系人。 电子邮件最好包括URL和密钥。 该URL标识了在输入密钥时可访问的响应网页界面。 如果所识别的联系人访问网页界面,则他或她然后可以授权访问请求,拒绝访问请求,或在什么情况下指示请求可能发生。 本发明利用现有的互联网基础设施和方法来提供鲁棒的轻量级认证机制。