摘要:
A system and method for securely roaming private data from a first client computer to a second client computer linked via a communication network. A user of the first client computer executes a home client application and designates private data for roaming. The home client application generates a first key in response to a password, and encrypts the designated private data as a function of the first key. The server receives and stores the encrypted private data. A user of the second computer executes a roaming client application and requests transfer of the encrypted private data from the server. The roaming client application generates the first key in response to the password, and decrypts encrypted private data transferred from the server to obtain the private data. The invention further provides users the ability to retrieve encrypted private from the server even when the user cannot remember the password associated with the first key. Also, the server has no knowledge of the private data nor the keys.
摘要:
Securely roaming private data from one client computer to another in a network. A home client application generates a first key in response to a password, and encrypts designated private data as a function of the first key. A server receives and stores the encrypted private data. A roaming client application generates the first key in response to the password, and decrypts encrypted private data transferred from the server to obtain the private data. The invention further provides users the ability to retrieve encrypted private from the server even when the user cannot remember the password associated with the first key. Also, the server has no knowledge of the private data or the keys.
摘要:
Using various embodiments, methods and systems for securing user data are described. In one embodiment, a system receives a user authentication token, an application identification, and a cryptographically random number from a software application. It then generates an identification hash value using the received information and determines whether the generated identification hash value corresponds to another identification hash value known to the system. If the hash values correspond, it authorizes the software application to perform actions on behalf of a user.
摘要:
Providing integrated multi-session instant messaging in a single instant messaging window. A user interface has an instant messaging window for displaying a plurality of conversation panes representative of concurrent instant messaging sessions between a local user and a plurality of remote users. Each conversation pane represents one of the messaging sessions. A plurality of message components correspond to the conversations panes so that each message component corresponds to one conversation pane. Each message component is arranged in the corresponding conversation pane and displays text from an instant message. The conversation display area displays at least two of the conversation panes linearly along the height of the window so that the message components arranged in the at least two conversation panes are simultaneously viewable.
摘要:
A method to complete partially entered geographical address information. The method receives the partial geographical address information, parses the information to determine the missing portions of the address by locating in a compact data structure offsets to address information corresponding to the missing portions and populates the set of fields for geographic locations, wherein the partial geographical address information is received at the graphical user interface in response to a copy-and paste or drag-and-drop command.
摘要:
Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node receiving an encrypted seed having at least a location of the user data at a network service that stores the user data, and a cryptographic key to access the user data. The seed is received in response to a user login attempt to the network service. The user data is requested from the location using at least the received cryptographic key. The method further includes receiving and storing the user data at the network node, where the network node is physically closer to a location of the user than is the location of the network service. If the user is successfully authenticated, user access is provided to the stored user data at the network node rather than from the network service.
摘要:
A permission level associated with a user's access to a Web server is identified. A relationship ticket is obtained from an authentication server and a request is generated to set or modify the identified permission level. The request and the relationship ticket are sent to the Web server and a success code is received from the Web server if the requested permission level is established.
摘要:
A method to allocate memory, in response to application requests, for a compact data structure having location data and a trailer section is provided. The trailer section of the compact data structure is checked to determine an offset for listings and indices representing the location data. Upon determining the offset, the listings and indices are loaded into memory and responses to the application requests are generated by utilizing the listings and indices stored in the memory.
摘要:
System and method for managing a plurality of clients. A request to implement a change in configuration data is received from a user. The configuration data relates to an operation of a client. The received request is stored in a memory area. Computer-executable instructions request topology data from the memory area based on the configuration data to identify the client. The requested topology data is received from the memory area. Computer-executable instructions identify a notification service associated with the client and notify the identified notification service of the change in the configuration data.
摘要:
Presenting both hyperlinks and thumbnail versions of search engine results is described herein. More specifically, a graphical user interface (GUI) having multiple display areas is described. One display area is configured for displaying the hyperlinks returned from a search-engine query. Another display area is configured to display thumbnail versions of the one or more web pages related to the search-engine query. The thumbnail versions are retrieved after a search-engine query is submitted and after hyperlinks to relevant web pages are received. Each relevant web page is retrieved on one or more background threads. The retrieved web pages are then stored, and their thumbnail versions are presented along with the hyperlinks.