Methods for managing user information and devices thereof
    1.
    发明授权
    Methods for managing user information and devices thereof 有权
    用于管理用户信息的方法及其装置

    公开(公告)号:US09036822B1

    公开(公告)日:2015-05-19

    申请号:US13397290

    申请日:2012-02-15

    CPC分类号: H04L9/14 H04L9/321 H04L9/3228

    摘要: A method, non-transitory computer readable medium and application manager computing device comprises obtaining at least one cryptographic key from a request by a client computing device for a user session. User information corresponding to a user is encrypted or decrypted using the cryptographic key. The request is authenticated based on encryption or decryption of the user information. The cryptographic key is deleted after the completion or termination of the user session.

    摘要翻译: 一种方法,非暂时性计算机可读介质和应用管理器计算设备包括从客户端计算设备针对用户会话的请求获得至少一个密码密钥。 使用密码密钥对与用户对应的用户信息进行加密或解密。 该请求基于用户信息的加密或解密进行认证。 密码密钥在用户会话完成或终止后被删除。

    Rule based extensible authentication

    公开(公告)号:US08418233B1

    公开(公告)日:2013-04-09

    申请号:US11258551

    申请日:2005-10-24

    摘要: A system, apparatus, and method are directed to managing access to a resource using rule-based deep packet extractions of a credential. A network device, such as a traffic management device, is situated between a client device and a server device. When the client device sends a request for a resource, the request is intercepted by the network device. The network device may employ a multi-layer deep packet extraction of the credential from the request. The network device may then use the credential to determine whether the request enabled to access the resource. Based, in part, on a variety of rules, the network device may deny access, enable access, route the request to a different server, or the like. In one embodiment, the network device may receive a rule from another device that directs the network device to request a different credential.