Abstract:
A hint containing user mapping information is provided in messages that may be exchanged during authentication handshakes. For example, a client may provide user mapping information to the server during authentication. The hint (e.g., in the form of a TLS extension mechanism) may be used to send the domain/user name information of a client to aid the server in mapping the user's certificate to an account. The extension mechanism provides integrity and authenticity of the mapping data sent by the client. The user provides a hint as to where to find the right account or domain controller (which points to, or otherwise maintains, the correct account). Based on the hint and other information in the certificate, the user is mapped to an account. The hint may be provided by the user when he logs in. Thus, a certificate is mapped to an identity to authenticate the user. A hint is sent along with the certificate information to perform the binding. Existing protocols may be extended to communicate the additional mapping information (the hint) to perform the binding. A vendor specific extension to Kerberos is defined to obtain the authorization data based on an X.509 certificate and the mapping user name hint.
Abstract:
An efficient protocol for retrieving cryptographic evidence may be selected by evaluating a local policy and a number of relevant factors. Furthermore, updated cryptographic evidence may be prefetched during a time period in which there is a low volume of requests for cryptographic evidence. This low volume time period may be defined, approximately, as an overlapping window in which both a first cryptographic evidence publication and a second cryptographic evidence publication are valid.
Abstract:
Systems and methods for managing multiple keys for file encryption and decryption may provide an encrypted list of previously used keys. The list itself may be encrypted using a current key. To decrypt files that are encrypted in one or more of the previous keys, the list can be decrypted, and the appropriate previous key can be retrieved. To re-key files, an automated process can decrypt any files using previous keys and encrypt them using the current key. If a new current key is introduced, the prior current key can be used to decrypt the list of keys, the prior current key can be added to the list, and the list can be re-encrypted using the new current key.
Abstract:
Implementations are described and claimed herein to enable credential roaming among a plurality of different computing devices. An exemplary system may include an event handler to receive event notifications such as, e.g., a client logon. The event handler may invoke a management service in response to receiving an event notification. The management service may include a synchronizing module to synchronize a user's credentials with a remote directory service, such as, e.g., Active Directory, so that the user's credentials are available from any of a number of different computing devices.
Abstract:
An information display apparatus, such as a lectern (6), is disclosed which is usable when giving a presentation or speech. The lectern includes a screen (2) for the display of text and a memory for the storage of text to be displayed. Also included is a controller (9) for controlling the text displayed on the screen in response to the operation of a keypad. The lectern includes a transmitter such as an infrared diode for the actuation of a further piece of apparatus such as a projector (54) or an audio system.
Abstract:
A fluid collection vessel for drainage of body fluids includes a molded body with internal dividers constituting ports, baffles and subchambers, and a face plate that closes the body to form a suction-regulated multi-chamber vessel. The vessel has overpressure and underpressure protection, and cannot lose its fluid when tipped. The molded body incorporates novel valves and ports, and a wall structure enhances its utility for blood collection and monitoring. Dynamic fluid level is stabilized by diversion of fluid energy into a side chamber in the downstream region of the manometer column.
Abstract:
This document describes tools capable of receiving reputation metadata effective to enable better decision making about whether or not to authorize operations. The tools may build a reputation value from this reputation metadata and, based on this value and an authorization rule, better decide whether or not to authorize an operation requested by some program, application, or other actor.
Abstract:
This document describes tools capable of receiving reputation metadata effective to enable better decision making about whether or not to authorize operations. The tools may build a reputation value from this reputation metadata and, based on this value and an authorization rule, better decide whether or not to authorize an operation requested by some program, application, or other actor.
Abstract:
A corrugated decking is provided that has a plurality of top horizontal surfaces, a plurality of bottom surfaces, and a plurality of transition surfaces, each transition surface connecting one of the top horizontal surfaces to one of the bottom surfaces. One of the top horizontal surfaces has a plurality of apertures, the apertures having downwardly sloping flanges surrounding each aperture.
Abstract:
An electrochemical cell having co-axial inner and outer electrodes separated by an ion-permeable tube that defines inner and outer passageways for liquid flow lengthwise of the electrodes. The ion-permeable tube has elastomeric caps attached at each end. The elastomeric caps have rims that engage the inner walls of the electrochemical cell to separate the inner and outer passageways and the electrochemical products derived at the inner and outer electrodes.