CARDSPACE HISTORY VALIDATOR
    1.
    发明申请
    CARDSPACE HISTORY VALIDATOR 有权
    相关历史检验员

    公开(公告)号:US20090241178A1

    公开(公告)日:2009-09-24

    申请号:US12054137

    申请日:2008-03-24

    CPC classification number: G06F21/6218

    Abstract: Before a relying party grants a client access to a resource, the last use of the security token by the client to access the resource of the relying party can be verified. Verification can be accomplished by comparing the last time the client sent the security token to the relying party with the last time the relying party received the security token from the client. If the last use of the security token is not verified, the possibility exists that the security token has been fraudulently used by a third party.

    Abstract translation: 在依赖方授予客户端访问资源之前,可以验证客户端最后使用安全令牌来访问依赖方的资源。 验证可以通过比较客户端最后一次发送安全令牌到依赖方的时间来完成,最后一次依赖方从客户端接收到安全令牌。 如果安全令牌的最后使用未被验证,则可能存在安全令牌被第三方欺诈性地使用。

    Cardspace history validator
    2.
    发明授权
    Cardspace history validator 有权
    卡片历史验证器

    公开(公告)号:US08079069B2

    公开(公告)日:2011-12-13

    申请号:US12054137

    申请日:2008-03-24

    CPC classification number: G06F21/6218

    Abstract: Before a relying party grants a client access to a resource, the last use of the security token by the client to access the resource of the relying party can be verified. Verification can be accomplished by comparing the last time the client sent the security token to the relying party with the last time the relying party received the security token from the client. If the last use of the security token is not verified, the possibility exists that the security token has been fraudulently used by a third party.

    Abstract translation: 在依赖方授予客户端访问资源之前,可以验证客户端最后使用安全令牌来访问依赖方的资源。 验证可以通过比较客户端最后一次发送安全令牌到依赖方的时间来完成,最后一次依赖方从客户端接收到安全令牌。 如果安全令牌的最后使用未被验证,则可能存在安全令牌被第三方欺诈性地使用。

    Techniques for recognizing multiple patterns within a string
    3.
    发明授权
    Techniques for recognizing multiple patterns within a string 有权
    用于识别字符串中的多个模式的技术

    公开(公告)号:US08131758B2

    公开(公告)日:2012-03-06

    申请号:US11964163

    申请日:2007-12-26

    CPC classification number: G06F17/2735 G06F17/277 G06F21/46

    Abstract: Techniques for recognizing multiple patterns within a string of characters are presented. A dictionary is hierarchically organized, such that leaf nodes within the dictionary represents words defined in the dictionary. A string of characters are received. Each character within the string is traversed by attempting to match it with a character defined in the dictionary. As long as a match continues with the dictionary the characters within the string are traversed. Once a longest possible match to a word within the dictionary is found, the next character following the last matched character for the string is processed.

    Abstract translation: 提出了识别字符串中多个模式的技术。 字典被分层组织,使得字典中的叶节点表示字典中定义的单词。 收到一串字符。 尝试将字符串中的每个字符与字典中定义的字符进行匹配。 只要匹配继续使用字典,字符串中的字符将被遍历。 一旦找到与字典中的单词最长可能的匹配,则处理字符串最后匹配字符后的下一个字符。

    TECHNIQUES FOR RECOGNIZING MULTIPLE PATTERNS WITHIN A STRING
    4.
    发明申请
    TECHNIQUES FOR RECOGNIZING MULTIPLE PATTERNS WITHIN A STRING 有权
    用于识别一个字符串中的多个模式的技术

    公开(公告)号:US20090171953A1

    公开(公告)日:2009-07-02

    申请号:US11964163

    申请日:2007-12-26

    CPC classification number: G06F17/2735 G06F17/277 G06F21/46

    Abstract: Techniques for recognizing multiple patterns within a string of characters are presented. A dictionary is hierarchically organized, such that leaf nodes within the dictionary represents words defined in the dictionary. A string of characters are received. Each character within the string is traversed by attempting to match it with a character defined in the dictionary. As long as a match continues with the dictionary the characters within the string are traversed. Once a longest possible match to a word within the dictionary is found, the next character following the last matched character for the string is processed.

    Abstract translation: 提出了识别字符串中多个模式的技术。 字典被分层组织,使得字典中的叶节点表示字典中定义的单词。 收到一串字符。 尝试将字符串中的每个字符与字典中定义的字符进行匹配。 只要匹配继续使用字典,字符串中的字符将被遍历。 一旦找到与字典中的单词最长可能的匹配,则处理字符串最后匹配字符后的下一个字符。

    Multiple access authentication
    5.
    发明授权
    Multiple access authentication 有权
    多路访问认证

    公开(公告)号:US09391978B2

    公开(公告)日:2016-07-12

    申请号:US12786540

    申请日:2010-05-25

    CPC classification number: H04L63/0815

    Abstract: Apparatus, systems, and methods may operate to receive, at a generating identity provider (IDP), original user credentials sufficient to authenticate a user directly from a user machine, or indirectly from an initial identity provider. Additional activities may include generating, by the generating IDP, generated user credentials having the lifetime of a login session associated with the user, the lifetime initiated approximately when the original user credentials or a token associated with the user are/is validated at the generating IDP. Still further activities may include receiving a request associated with the user during the login session to access an application protected by an agent, and transmitting at least part of the generated user credentials from the generating IDP to the application to authenticate the user to the generating IDP while the login session is not terminated or expired. Additional apparatus, systems, and methods are disclosed.

    Abstract translation: 设备,系统和方法可以操作以在生成身份提供者(IDP)处接收足以直接从用户机器或直接从初始身份提供者认证用户的原始用户凭证。 附加活动可以包括通过生成IDP生成具有与用户相关联的登录会话的生命周期的生成的用户凭证,大约在原始用户凭证或与该用户相关联的令牌在生成的IDP被验证时生效的生命周期 。 进一步的活动可以包括在登录会话期间接收与用户相关联的请求以访问由代理保护的应用,以及将生成的用户凭证的至少一部分从生成的IDP发送到应用以将用户认证为生成IDP 而登录会话未终止或过期。 公开了附加装置,系统和方法。

    Techniques for secure message offloading
    6.
    发明授权
    Techniques for secure message offloading 有权
    安全消息卸载技术

    公开(公告)号:US08938613B2

    公开(公告)日:2015-01-20

    申请号:US13485567

    申请日:2012-05-31

    Abstract: Techniques for secure message offloading are presented. An intermediary is transparently situated between a user's local messaging client and an external and remote messaging client. The user authenticates to the local client for access and the intermediary authenticates the user for access to the remote client using different credentials unknown to the user. Messages sent from the local client are transparently encrypted by the intermediary before being passed to the remote client and messages received from the remote client are transparently decrypted before being delivered to the local client.

    Abstract translation: 介绍了安全消息卸载技术。 中间人透明地位于用户的本地消息传递客户端和外部和远程消息传递客户端之间。 用户对本地客户端进行身份验证以进行访问,并且中间人使用用户未知的不同凭证来验证用户对远程客户端的访问。 在传送到远程客户端之前,由本地客户端发送的消息被中间人透明地加密,并且在传送到本地客户端之前,从远程客户端收到的消息被透明地解密。

    ANALYTIC INJECTION
    7.
    发明申请
    ANALYTIC INJECTION 有权
    分析注射

    公开(公告)号:US20140280867A1

    公开(公告)日:2014-09-18

    申请号:US13803365

    申请日:2013-03-14

    CPC classification number: H04L43/08 G06F17/3089

    Abstract: Techniques for inserting analytic logic into network requests are presented. In an embodiment, instructions are dynamically inserted into web pages as the pages are requested. The instructions enable analytics to be captured and/or tracked when the web pages are processed. In another embodiment, web requests are intercepted and processed to include analytic instructions.

    Abstract translation: 介绍了将分析逻辑插入到网络请求中的技术。 在一个实施例中,当请求页面时,指令被动态地插入到网页中。 这些指令可以在处理网页时捕获和/或跟踪分析。 在另一个实施例中,web请求被拦截并被处理以包括分析指令。

    Representing extensible markup language (XML) as an executable having conditional authentication or policy logic
    10.
    发明授权
    Representing extensible markup language (XML) as an executable having conditional authentication or policy logic 有权
    将可扩展标记语言(XML)表示为具有条件认证或策略逻辑的可执行文件

    公开(公告)号:US08799770B2

    公开(公告)日:2014-08-05

    申请号:US13278899

    申请日:2011-10-21

    CPC classification number: G06F17/2247 G06F9/445 G06F17/2205

    Abstract: Techniques for representing extensible markup language (XML) in an executable format are presented. An XML document is parsed into its components and content. The components and content are packaged as an executable. Some portions of the executable include authentication logic or policy logic that is subsequently enforced when the executable is processed. The executable is subsequently distributed to recipient machines. The machines process the executable and produce memory loaded versions of the components and content representing the XML document on the machines. The memory loaded versions of the components and content include conditionally added authentication logic of policy logic.

    Abstract translation: 介绍了以可执行格式表示可扩展标记语言(XML)的技术。 将XML文档解析成其组件和内容。 组件和内容打包为可执行文件。 可执行文件的一些部分包括当处理可执行文件时随后强制执行的认证逻辑或策略逻辑。 该可执行文件随后分发给接收机。 机器处理可执行文件,并在机器上生成表示XML文档的组件和内容的加载版本。 内存加载的组件和内容版本包括有条件地添加的策略逻辑的认证逻辑。

Patent Agency Ranking