摘要:
A certificate management system provides automated management of certificate lifecycles and certificate distribution. Rather than depend upon an administrator to manually distribute and manage certificates, the system self-generates certificates, distributes the certificates to appropriate servers or other parties, and transitions from old certificates to new certificates in a well-defined manner that avoids breaking functionality. After generating one or more certificates, the system securely shares certificates in a way that parties that use them can find the new certificates without an administrator manually distributing the certificates. When it is time to update certificates, the system generates new certificates and shares the new certificates in a similar way. During a transition period, the system provides a protocol by which both old and new certificates can be used to perform authenticated access to resources, so that the transition from an old to a new certificate does not break services.
摘要:
An integrated program lookup browser provides an integrated system with an online program lookup web service that assists the user in finding these unrecognized files, protocols and web page objects by allowing the user to perform a program lookup on a web service that can search one or more databases and return the URL to download the appropriate application or protocol or return the actual program or protocol.
摘要:
An integrated program lookup browser provides an integrated system with an online program lookup web service that assists the user in finding these unrecognized files, protocols and web page objects by allowing the user to perform a program lookup on a web service that can search one or more databases and return the URL to download the appropriate application or protocol or return the actual program or protocol.
摘要:
Various embodiments provide protection against web resources associated with one or more undesirable activities. In at least some embodiments, a method detects and responds to a user-initiated activity on a computing device. Responding can include, by way of example and not limitation, checking locally, on the computing device, whether a web resource that is associated with the user-initiated activity has been identified as being associated with a safe site. Furthermore, in at least some embodiments, the method checks remotely, away from the computing device, whether the web resource is identified as being at least possibly associated with one or more undesirable activities.
摘要:
In one implementation, form field(s) of a form of a website or application are populated with data obtained using a digital identity, and the populated form field(s) are submitted to the website or application. A form field specification specifying information about the form fields of the form is obtained. A user selects or creates a digital identity. Data is obtained using the digital identity, and the data is used to provide values to the form. The data is submitted to the website or application. In another implementation, a username and password are automatically generated. The username and password that are generated meet parameters that may be specified by the website or application. The username and password are submitted to the website or application for a purpose such as registration or authentication, and stored away for future authentication.
摘要:
A Web browser includes a quick pick search provider menu that provides a user interface which provides a user with the ability to quickly select a new search provider which appears when the user places focus in the Web browser's search box. In one or more embodiments, the Web browser's search box comprises a native part of the Web browser and is not a search box associated with an installed tool bar. In other embodiments, search box functionality is provided as an extension to the Web browser. Further, various embodiments enable the user to switch between search providers in an easy and intuitive way. Yet other embodiments provide an opportunity for users to switch between search providers using keywords in the search box. Further embodiments enable users to define collections of search providers to which individual searches can be sent.
摘要:
Creating a token for use by an entity when digitally signing documents. In a computing environment, a digital identity representation for an entity is accessed. The digital identity representation includes information identifying identity attributes about the entity and capabilities of an identity provider that provides tokens for use by the entity. Context information is accessed. The context information includes information about one or more of which, how or where the attributes for the entity identified in the digital identity representation will be used. A security token is created from the information in the digital identity representation and the context information. The security token makes assertions by the identity provider. The assertions are based on the information in the digital identity representation. The token further includes information related to at least a portion of the context information.
摘要:
A computer implemented method for ensuring the quality of processed corporate entity data, the method comprising: sequentially processing the corporate entity data through a series of serially connected drivers, the serially connected drivers comprise a data collection driver, an entity matching driver, an identification number driver, a corporate linkage driver, and a predictive indicator driver; and conducting a quality assurance of the corporate entity data as it is processed in each of the driver, wherein the quality assurance comprises: (i) sampling the corporate entity data from each the driver periodically, thereby generating sample data; (ii) evaluating the sample data; and (iii) adjusting the processing based upon the evaluation, thereby producing high quality data.
摘要:
One or more techniques and/or systems are disclosed for providing recommendations for an add-on to a base program operating on a computing device, thus allowing a user to make a more informed decision as to whether to allow the add-on to be installed or not. To make the recommendation, collection software is queried for information about an add-on when installation or instantiation of the add-on is detected on the computing device. Information about the add-on is collected by the collection software, which comprises one or more add-on detection programs. A recommendation for applying the add-on (or not) is generated using the collected information, where the recommendation comprises a ranking based on detection program prioritization.
摘要:
Various embodiments enable information, in addition to textual information, to be presented to a user when the user enters a search query in a search box forming part of a user interface of an application. In one or more embodiments, a Web browser provides a search box in which a user can enter a search query. While the user is entering a search query, the Web browser can communicate with a third-party search provider to receive information, such as non-textual information, which can be presented to the user to assist in formulating their search query. The non-textual information can include images and other visual information of a non-textual nature.