摘要:
A system and method for authenticating a client having a privilege server, a head end server, and a web adapter performs the steps of negotiating an authentication scheme between the server proxy and the privilege server. User information is presented to the web adapter. The user information is provided to the head end server and in turn presents the information to the web adapter. The user is validated in accordance with the authentication scheme. When the user is validated a ticket is generated for the user. The ticket is presented to the client privilege server proxy that decrypts the ticket. A token is formed from the ticket and the client user identification. The token from the client is provided to the privilege server. A packet is formed having a sequence number and session key encrypted with the ticket. The packet is provided to the head end server which in turn authenticates the user. The packet is provided to the client privilege proxy which decrypts the packet and sends the ticket and the sequence number encrypted with the session key to the data server through the web adapter. User is validated at the data server and privileges are granted thereto.
摘要:
A system and method for tracking conversions. Specifically, the method includes collecting user information about a user and generating a user profile based on the user information. The user profile is stored such that the user profile is used to achieve delivery of data that is targeted to the user based on the user profile without requiring a release of user information in the user profile. The method determines that the user has performed an action. A unique payment option is associated with the action, wherein the unique payment option is generated in response to the action. Notification is received that the user has made a payment to an online merchant using the unique payment option. The payment is associated with a conversion of the action without cooperation of the online merchant.
摘要:
A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of computing resources access to which is controlled by the first computing device and a minimum security capability that a second computing device must possess to access the respective resources, assigning the second computing device a security capability, providing the second computing device with data indicative of the security capability, configuring the first computing device to respond to data indicative of the security capability and data indicative of a desired access from the second computing device by ascertaining the minimum required security capability corresponding to the desired access and by comparing the minimum required security capability with the security capability of the second computing device, and providing the desired access if the security capability of the second computing device meets the minimum security capability for the desired access.
摘要翻译:一种控制对计算资源的访问的方法,包括向第一计算设备提供对包含指示由第一计算设备控制的计算资源访问的数据的数据库的访问以及第二计算设备必须拥有的最小安全能力以访问 相应的资源,为第二计算设备分配安全能力,向第二计算设备提供指示安全能力的数据,配置第一计算设备以响应指示安全能力的数据和指示来自第二计算设备的期望访问的数据 计算设备,通过确定对应于期望接入的最小所需安全能力,并通过将所需的最小安全能力与第二计算设备的安全能力进行比较,以及如果第二计算设备的安全能力满足最小安全性 ca 适合所需的访问。
摘要:
A technique to link an audio enabled device with a speech driven application without specifying the specific ones of the audio enabled device-independent, speech driven application-independent, and speech application platform independent parameters. In one example embodiment, this is accomplished by using voice framework that receives and transmits digitized speech audio without specifying the specific ones of the audio enabled device-independent and speech application platform-independent parameters. The voice framework then converts the received digital speech audio to computer readable text. Further, the voice framework receives and transmits the computer readable text to the speech driven application without specifying the specific ones of the speech driven application-independent and speech application platform-independent parameters. The voice framework then converts the computer readable text to the digital speech audio.
摘要:
An RFID system includes a pair of guide tracks located on opposite boundaries of at least one zone. A channel is movably attached to the guide tracks and is configured to move along the guide tracks through the at least one zone. A mobile RFID reader is movably attached to the channel and the mobile RFID reader is paused at a plurality of read points to scan for RFID tags located. The read points are determined by an arrangement of a plurality of hexagonal areas which are grouped together to create a combined area, where the combined area is aligned with the predefined area to define locations of the plurality of hexagonal areas, and where substantially central locations of each hexagonal area represent the plurality of read points.
摘要:
A system and method for tracking conversions. Specifically, the method includes collecting user information about a user and generating a user profile based on the user information. The user profile is stored such that the user profile is used to achieve delivery of data that is targeted to the user based on the user profile without requiring a release of user information in the user profile. The method determines that the user has performed an action. A unique payment option is associated with the action, wherein the unique payment option is generated in response to the action. Notification is received that the user has made a payment to an online merchant using the unique payment option. The payment is associated with a conversion of the action without cooperation of the online merchant.
摘要:
A technique that decrypts data stored on removable media, if the device on which the encryption was performed is lost, unavailable, or the user credentials are lost. In example embodiment, this is achieved by using the administrator UID, the administrator UDID, the removable media, the names of one or more data files to be decrypted, the administrator Pswd, and a KeyID to decrypt data stored on the removable media associated with a lost or unavailable mobile device on which encryption was performed.
摘要:
A technique that binds encryption and decryption keys using a UID, a UDID, and a Pswd to a client mobile device in an enterprise. In one example embodiment, this is achieved by creating a new user account using the UID and the DPswd in an inactive state and communicating the UID and the DPswd to an intended user using a secure communication medium by an administrator. The intended user then logs into a cryptography key management system using the UID and the DPswd via a client mobile device. The UDID associated with the client mobile device is then hashed to create a H(UDID). The H(UDID) is then sent to the cryptography key management system by a local key management application module. The H(UDID) is then authenticated by the cryptography key management system. An encryption/decryption key is then assigned for the client mobile device.
摘要:
A technique that decrypts data stored on removable media, if the device on which the encryption was performed is lost, unavailable, or the user credentials are lost. In example embodiment, this is achieved by using the administrator UID, the administrator UDID, the removable media, the names of one or more data files to be decrypted, the administrator Pswd, and a KeyID to decrypt data stored on the removable media associated with a lost or unavailable mobile device on which encryption was performed.
摘要:
To provide collaborative business intelligence in an enterprise, an analytics platform is provided to receive an event associated with the enterprise and to perform analysis in response to the event. A virtual collaboration platform is provided to enable plural users to interact with each other and to use resources of the analytics platform.