-
公开(公告)号:JP2005348402A
公开(公告)日:2005-12-15
申请号:JP2005155900
申请日:2005-05-27
Applicant: Microsoft Corp , マイクロソフト コーポレーション
Inventor: BUCH JEREMY , KIMCHI GUR , SHOROFF SRIKANTH
CPC classification number: H04L63/0823 , H04L63/10
Abstract: PROBLEM TO BE SOLVED: To provide techniques for secure federation of data communication networks. SOLUTION: The techniques employ an edge proxy server to route messages depending on a federation mode. In Direct federation mode, an edge proxy server of a network is configured to exchange messages with a specified set of entities, such as other networks, servers, other devices, or users. In Automatic federation mode, an edge proxy server may accept all incoming messages from entities that have a valid certificate. In Clearinghouse federation mode, the edge proxy server forwards all outgoing messages to a specified, trusted clearinghouse server. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract translation: 要解决的问题:提供数据通信网络的安全联合技术。
解决方案:技术采用边缘代理服务器根据联合模式路由消息。 在直接联合模式中,网络的边缘代理服务器被配置为与指定的一组实体(例如其他网络,服务器,其他设备或用户)交换消息。 在自动联合模式下,边缘代理服务器可以接受来自具有有效证书的实体的所有传入消息。 在交换所联盟模式下,边缘代理服务器将所有传出的消息转发到指定的,可信的结算所服务器。 版权所有(C)2006,JPO&NCIPI
-
公开(公告)号:JP2009219129A
公开(公告)日:2009-09-24
申请号:JP2009101150
申请日:2009-04-17
Applicant: Microsoft Corp , マイクロソフト コーポレーション
Inventor: BUCH JEREMY , KIMCHI GUR , SHOROFF SRIKANTH
CPC classification number: H04L63/0823 , H04L63/10
Abstract: PROBLEM TO BE SOLVED: To provide a technique for secure federation of data communication networks. SOLUTION: The technique employs an edge proxy server to route messages depending on a federation mode. In direct federation mode, an edge proxy server of a network is configured to exchange messages with a specified set of entities, such as (a plurality of) other networks, (a plurality of) servers, (a plurality of) other devices, or (a plurality of) users. In automatic federation mode, an edge proxy server may accept all incoming messages from entities that have a valid certificate. In clearinghouse federation mode, an edge proxy server forwards all outgoing messages to a specified, trusted clearinghouse server. COPYRIGHT: (C)2009,JPO&INPIT
Abstract translation: 要解决的问题:提供数据通信网络的安全联合技术。
解决方案:该技术采用边缘代理服务器根据联合模式路由消息。 在直接联合模式中,网络的边缘代理服务器被配置为与诸如(多个)其他网络(多个)服务器,(多个)其他设备的指定的一组实体交换消息,或者 (多个)用户。 在自动联合模式下,边缘代理服务器可以接受来自具有有效证书的实体的所有传入消息。 在清算所联合模式下,边缘代理服务器将所有外发邮件转发到指定的,可信的结算所服务器。 版权所有(C)2009,JPO&INPIT
-
公开(公告)号:JP2004355619A
公开(公告)日:2004-12-16
申请号:JP2004153812
申请日:2004-05-24
Applicant: Microsoft Corp , マイクロソフト コーポレーション
Inventor: BUCH JEREMY , ROBERT BROWN , KUMBALIMUTT VISHWAJITH , OLSON SEAN , SHOROFF SRIKANTH
CPC classification number: H04L63/0823 , H04L63/166
Abstract: PROBLEM TO BE SOLVED: To provide a distributed authentication model operated in a trust range of a protocol base. SOLUTION: A quantity of authentication is reduced by making an outside computing system first communicate with a particular edge inside computing system instead of enabling it to communicate with an arbitrary one set within computing systems in the trust range. Next, not necessarily all but many of internal computing systems delegate an authentication task to an edge computing system, and rely on any authentication executed by the edge computing system. Thereby, the authentication task can be scheduled with respect to a large-scale protocol-based trust range . COPYRIGHT: (C)2005,JPO&NCIPI
-
公开(公告)号:DE602004016074D1
公开(公告)日:2008-10-09
申请号:DE602004016074
申请日:2004-05-07
Applicant: MICROSOFT CORP
Inventor: BUCH JEREMY , BROWN ROBERT , KUMBALIMUTT VISHWAJITH , OLSON SEAN , SHOROFF SRIKANTH
Abstract: The method involves accessing a list of internal computing systems that one internal computing system trusts to authenticate external computing systems. An identity of an originating external computing system is validated by determining that another internal computing system or one of the internal computing systems in a trusted chain, is on the list, without the internal system separately authenticating the external systems. An independent claim is also included for a computer program product for implementing a method for an internal computing system validating the identity of an originating external computing system.
-
公开(公告)号:DE602005015511D1
公开(公告)日:2009-09-03
申请号:DE602005015511
申请日:2005-05-11
Applicant: MICROSOFT CORP
Inventor: BUCH JEREMY , KIMCHI GUR , SHOROFF SRIKANTH
Abstract: Techniques for secure federation of data communications networks are provided. The techniques employ an edge proxy server to route messages depending on a federation mode. In Direct federation mode, an edge proxy server of a network is configured to exchange messages with a specified set of entities, such as other networks, servers, other devices, or users. In Automatic federation mode, an edge proxy server may accept all incoming messages from entities that have a valid certificate. In Clearinghouse federation mode, the edge proxy server forwards all outgoing messages to a specified, trusted clearinghouse server.
-
公开(公告)号:AT437515T
公开(公告)日:2009-08-15
申请号:AT05103906
申请日:2005-05-11
Applicant: MICROSOFT CORP
Inventor: BUCH JEREMY , KIMCHI GUR , SHOROFF SRIKANTH
Abstract: Techniques for secure federation of data communications networks are provided. The techniques employ an edge proxy server to route messages depending on a federation mode. In Direct federation mode, an edge proxy server of a network is configured to exchange messages with a specified set of entities, such as other networks, servers, other devices, or users. In Automatic federation mode, an edge proxy server may accept all incoming messages from entities that have a valid certificate. In Clearinghouse federation mode, the edge proxy server forwards all outgoing messages to a specified, trusted clearinghouse server.
-
公开(公告)号:AT406749T
公开(公告)日:2008-09-15
申请号:AT04010952
申请日:2004-05-07
Applicant: MICROSOFT CORP
Inventor: BUCH JEREMY , BROWN ROBERT , KUMBALIMUTT VISHWAJITH , OLSON SEAN , SHOROFF SRIKANTH
Abstract: The method involves accessing a list of internal computing systems that one internal computing system trusts to authenticate external computing systems. An identity of an originating external computing system is validated by determining that another internal computing system or one of the internal computing systems in a trusted chain, is on the list, without the internal system separately authenticating the external systems. An independent claim is also included for a computer program product for implementing a method for an internal computing system validating the identity of an originating external computing system.
-
-
-
-
-
-