CONFIGURING SECURITY MECHANISMS UTILIZING A TRUST SYSTEM
    1.
    发明申请
    CONFIGURING SECURITY MECHANISMS UTILIZING A TRUST SYSTEM 审中-公开
    配置使用信任系统的安全机制

    公开(公告)号:WO2008150711A1

    公开(公告)日:2008-12-11

    申请号:PCT/US2008/064407

    申请日:2008-05-21

    CPC classification number: H04L63/101 H04L63/104 H04L63/20

    Abstract: Implementations of configuring security mechanisms utilizing a trust system are described. In one implementation, a request to communicate is received at a protected device. Before permission to communicate can be granted, a list of trusted devices is accessed. If information, such as an identity or a secret, associated with the device sending the request to communicate correlates to information found on the list of trusted devices, then communication can be allowed. Otherwise, communication between the device and the protected device can be denied.

    Abstract translation: 描述使用信任系统配置安全机制的实现。 在一个实现中,在受保护的设备处接收到通信请求。 在授权通信之前,可以访问受信任的设备列表。 如果与发送通信请求的设备相关联的信息(例如身份或秘密)与可信设备列表上发现的信息相关联,则可以允许通信。 否则,可以拒绝设备和受保护设备之间的通信。

    THROTTLING OF ROGUE ENTITIES TO PUSH NOTIFICATION SERVERS
    2.
    发明申请
    THROTTLING OF ROGUE ENTITIES TO PUSH NOTIFICATION SERVERS 审中-公开
    用于推送通知服务器的ROGUE实体的折衷

    公开(公告)号:WO2013085740A1

    公开(公告)日:2013-06-13

    申请号:PCT/US2012/066565

    申请日:2012-11-27

    CPC classification number: H04L12/1859 H04L63/1408 H04L63/1441

    Abstract: Techniques for throttling of rogue entities to push notification servers are described. An apparatus may comprise a processor and a memory communicatively coupled to the processor. The memory may store an application, the application maintaining a monitored domain table, the application maintaining an offending domain table, the application operative to receive an incoming request from a client in a domain, to detect harmful activity based on the request, and to respond to the harmful activity based on one or both of the monitored domain table and the offending domain table. Other embodiments are described and claimed.

    Abstract translation: 描述了用于限制流氓实体来推送通知服务器的技术。 设备可以包括处理器和通信地耦合到处理器的存储器。 存储器可以存储应用程序,应用程序维护受监视域表,应用程序维护违规域表,该应用程序可操作以从域中的客户端接收传入请求,以根据请求检测有害活动,并响应 基于受监控域表和违规域表中的一个或两个的有害活动。 描述和要求保护其他实施例。

    CONFIGURING SECURITY MECHANISMS UTILIZING A TRUST SYSTEM
    3.
    发明公开
    CONFIGURING SECURITY MECHANISMS UTILIZING A TRUST SYSTEM 审中-公开
    配置安全机制使用信任系统

    公开(公告)号:EP2158724A1

    公开(公告)日:2010-03-03

    申请号:EP08756076.9

    申请日:2008-05-21

    CPC classification number: H04L63/101 H04L63/104 H04L63/20

    Abstract: Implementations of configuring security mechanisms utilizing a trust system are described. In one implementation, a request to communicate is received at a protected device. Before permission to communicate can be granted, a list of trusted devices is accessed. If information, such as an identity or a secret, associated with the device sending the request to communicate correlates to information found on the list of trusted devices, then communication can be allowed. Otherwise, communication between the device and the protected device can be denied.

    THROTTLING OF ROGUE ENTITIES TO PUSH NOTIFICATION SERVERS
    4.
    发明公开
    THROTTLING OF ROGUE ENTITIES TO PUSH NOTIFICATION SERVERS 审中-公开
    ディック

    公开(公告)号:EP2771805A1

    公开(公告)日:2014-09-03

    申请号:EP12855459.9

    申请日:2012-11-27

    CPC classification number: H04L12/1859 H04L63/1408 H04L63/1441

    Abstract: Techniques for throttling of rogue entities to push notification servers are described. An apparatus may comprise a processor and a memory communicatively coupled to the processor. The memory may store an application, the application maintaining a monitored domain table, the application maintaining an offending domain table, the application operative to receive an incoming request from a client in a domain, to detect harmful activity based on the request, and to respond to the harmful activity based on one or both of the monitored domain table and the offending domain table. Other embodiments are described and claimed.

    Abstract translation: 描述了用于限制流氓实体推送通知服务器的技术。 设备可以包括处理器和通信地耦合到处理器的存储器。 存储器可以存储应用程序,应用程序维护受监视域表,应用程序维护违规域表,该应用程序可操作以从域中的客户端接收传入请求,以根据请求检测有害活动,并响应 基于受监控域表和违规域表中的一个或两个的有害活动。 描述和要求保护其他实施例。

Patent Agency Ranking