Scoped metadata
    2.
    发明申请
    Scoped metadata 有权
    范围元数据

    公开(公告)号:US20050177602A1

    公开(公告)日:2005-08-11

    申请号:US11097355

    申请日:2005-04-04

    摘要: Methods, systems, and data structures for communicating object metadata are provided. A generic metadata container is presented that allows object metadata to be described in an extensible manner using protocol-neutral and platform-independent methodologies. A metadata scope refers to a dynamic universe of targets to which the included metadata statements correspond. Metadata properties provide a mechanism to describe the metadata itself, and metadata security can be used to ensure authentic metadata is sent and received. Mechanisms are also provided to allow refinement and replacement of metadata statements. Communication of metadata is expedited using hash digests to confirm metadata versions, and by piggybacking policy metadata requests and responses on other substantive data communication messages, thereby dynamically altering future communications.

    摘要翻译: 提供了传达对象元数据的方法,系统和数据结构。 提出了一个通用的元数据容器,允许使用协议中立和平台无关的方法以可扩展的方式描述对象元数据。 元数据范围是指所包含的元数据语句对应的目标的动态范围。 元数据属性提供了一种描述元数据本身的机制,并且可以使用元数据安全性来确保发送和接收真实的元数据。 还提供了机制来允许细化和替换元数据语句。 通过使用散列摘要来确认元数据版本,并通过捎带政策元数据请求和对其他实质性数据通信消息的响应来加速元数据的通信,从而动态地改变将来的通信。

    Securely calling Web services from macros
    6.
    发明申请
    Securely calling Web services from macros 有权
    从宏安全地调用Web服务

    公开(公告)号:US20070150741A1

    公开(公告)日:2007-06-28

    申请号:US11299463

    申请日:2005-12-12

    IPC分类号: H04L9/00

    CPC分类号: H04L63/123 G06F21/445

    摘要: A method of securing communications between an application that includes a macro and a Web Service. The method includes an act of, at the macro, generating a request for data. The request for data comprises generating commands for retrieving data, generating security information, and embedding the commands for retrieving data and the security information in a request. The request for data is sent to the Web Service. The requested data is received from the Web Service if the security information provides appropriate authorization to receive the requested data.

    摘要翻译: 一种确保包含宏和Web服务的应用程序之间通信的方法。 该方法包括在宏处产生数据请求的动作。 数据请求包括生成用于检索数据的命令,生成安全信息,以及在请求中嵌入用于检索数据和安全信息的命令。 数据请求被发送到Web服务。 如果安全信息提供适当的授权以接收所请求的数据,则从Web服务接收所请求的数据。

    Bi-directionally verifying measurable aspects associated with modules, pre-computing solutions to configuration challenges, and using configuration challenges along with other authentication mechanisms
    7.
    发明申请
    Bi-directionally verifying measurable aspects associated with modules, pre-computing solutions to configuration challenges, and using configuration challenges along with other authentication mechanisms 审中-公开
    双向验证与模块相关的可测量方面,预配置挑战的计算解决方案,以及使用配置挑战以及其他身份验证机制

    公开(公告)号:US20050235150A1

    公开(公告)日:2005-10-20

    申请号:US10827082

    申请日:2004-04-19

    IPC分类号: G06F21/00 H04L9/00 H04L29/06

    摘要: The present invention extends to validating measurable aspects of computing system. A provider causes a challenge to be issued to the requester, the challenge requesting proof that the requester is appropriately configured to access the resource. The requester accesses information that indicates how the requester is to prove an appropriate configuration for accessing the resource. The requester formulates and sends proof that one or more measurable aspects of the requester's configuration are appropriate. The provider receives proof that one or more measurable aspects of the requester's configuration are appropriate and authorizes the requester to access the resource. Proof of one more measurable aspects of a requester can be used along with other types of authentication to authorize a requester to access a resource of a provider. Solutions to challenges can be pre-computed and stored in a location accessible to a provider.

    摘要翻译: 本发明扩展到验证计算系统的可测量方面。 提供者会向请求者发出一个挑战,质询请求证明请求者被正确地配置为访问资源。 请求者访问指示请求者如何证明访问资源的适当配置的信息。 请求者制定并发送证据,证明请求者配置的一个或多个可衡量的方面是适当的。 提供者收到证据,证明请求者配置的一个或多个可衡量的方面是适当的,并授权请求者访问该资源。 请求者的一个可衡量方面的证明可以与其他类型的认证一起使用,以授权请求者访问提供商的资源。 挑战的解决方案可以预先计算并存储在供应商可访问的位置。