Securely calling Web services from macros
    5.
    发明申请
    Securely calling Web services from macros 有权
    从宏安全地调用Web服务

    公开(公告)号:US20070150741A1

    公开(公告)日:2007-06-28

    申请号:US11299463

    申请日:2005-12-12

    IPC分类号: H04L9/00

    CPC分类号: H04L63/123 G06F21/445

    摘要: A method of securing communications between an application that includes a macro and a Web Service. The method includes an act of, at the macro, generating a request for data. The request for data comprises generating commands for retrieving data, generating security information, and embedding the commands for retrieving data and the security information in a request. The request for data is sent to the Web Service. The requested data is received from the Web Service if the security information provides appropriate authorization to receive the requested data.

    摘要翻译: 一种确保包含宏和Web服务的应用程序之间通信的方法。 该方法包括在宏处产生数据请求的动作。 数据请求包括生成用于检索数据的命令,生成安全信息,以及在请求中嵌入用于检索数据和安全信息的命令。 数据请求被发送到Web服务。 如果安全信息提供适当的授权以接收所请求的数据,则从Web服务接收所请求的数据。

    Bi-directionally verifying measurable aspects associated with modules, pre-computing solutions to configuration challenges, and using configuration challenges along with other authentication mechanisms
    7.
    发明申请
    Bi-directionally verifying measurable aspects associated with modules, pre-computing solutions to configuration challenges, and using configuration challenges along with other authentication mechanisms 审中-公开
    双向验证与模块相关的可测量方面,预配置挑战的计算解决方案,以及使用配置挑战以及其他身份验证机制

    公开(公告)号:US20050235150A1

    公开(公告)日:2005-10-20

    申请号:US10827082

    申请日:2004-04-19

    IPC分类号: G06F21/00 H04L9/00 H04L29/06

    摘要: The present invention extends to validating measurable aspects of computing system. A provider causes a challenge to be issued to the requester, the challenge requesting proof that the requester is appropriately configured to access the resource. The requester accesses information that indicates how the requester is to prove an appropriate configuration for accessing the resource. The requester formulates and sends proof that one or more measurable aspects of the requester's configuration are appropriate. The provider receives proof that one or more measurable aspects of the requester's configuration are appropriate and authorizes the requester to access the resource. Proof of one more measurable aspects of a requester can be used along with other types of authentication to authorize a requester to access a resource of a provider. Solutions to challenges can be pre-computed and stored in a location accessible to a provider.

    摘要翻译: 本发明扩展到验证计算系统的可测量方面。 提供者会向请求者发出一个挑战,质询请求证明请求者被正确地配置为访问资源。 请求者访问指示请求者如何证明访问资源的适当配置的信息。 请求者制定并发送证据,证明请求者配置的一个或多个可衡量的方面是适当的。 提供者收到证据,证明请求者配置的一个或多个可衡量的方面是适当的,并授权请求者访问该资源。 请求者的一个可衡量方面的证明可以与其他类型的认证一起使用,以授权请求者访问提供商的资源。 挑战的解决方案可以预先计算并存储在供应商可访问的位置。

    Remote access of digital identities
    8.
    发明授权
    Remote access of digital identities 有权
    远程访问数字身份

    公开(公告)号:US08689296B2

    公开(公告)日:2014-04-01

    申请号:US11952890

    申请日:2007-12-07

    IPC分类号: G06F7/04

    摘要: A system and method for controlling distribution and use of digital identity representations (“DIRs”) increases security, usability, and oversight of DIR use. A DIR stored on a first device may be obtained by a second device for use in satisfying the security policy of a relying party. Release of the DIR to the second device requires permission from a device or entity that may be different from the device or entity attempting to access the relying party. Further, the use of the DIR to obtain an identity token may separately require permission of even a different person or entity and may be conditioned upon receiving satisfactory information relating to the intended use of the DIR (e.g., the name of the relying party, type of operation being attempted, etc.). By controlling the distribution and use of DIRs, security of the principal's identity and supervisory control over a principal's activities are enhanced.

    摘要翻译: 用于控制数字身份表示(“DIR”)分发和使用的系统和方法提高了DIR使用的安全性,可用性和监督性。 可以通过第二设备获得存储在第一设备上的DIR,以用于满足依赖方的安全策略。 将DIR发布到第二设备需要来自可能与尝试访问依赖方的设备或实体不同的设备或实体的许可。 此外,使用DIR获得身份令牌可以单独要求甚至不同的人或实体的许可,并且可以在接收到与DIR的预期用途有关的令人满意的信息的条件下(例如,依赖方的名称,类型 正在尝试操作等)。 通过控制DIR的分配和使用,主体的身份安全性和对委托人活动的监督控制得到加强。