摘要:
Implementations of behavioral advertisement targeting and creation of ad-hoc microcommunities through user authentication are described. In one implementation, a user is allowed to submit authentication information on a webpage associated with a third party website. For example, a user can identify himself by entering a username and password to an email account unaffiliated with the third party website. The authentication information can then be used to access a personal account associated with the user. For example, behavioral data associated with the user can be gathered from the personal account and be used to present advertisements on the webpage targeting a specific behavioral profile of the user. Alternately, the user can be presented with options to interact with information in the personal account. For example, the user may be given the opportunity to invite members of a contacts list in the personal account to visit the webpage.
摘要:
Implementations of behavioral advertisement targeting and creation of ad-hoc microcommunities through user authentication are described. In one implementation, a user is allowed to submit authentication information on a webpage associated with a third party website. For example, a user can identify himself by entering a username and password to an email account unaffiliated with the third party website. The authentication information can then be used to access a personal account associated with the user. For example, behavioral data associated with the user can be gathered from the personal account and be used to present advertisements on the webpage targeting a specific behavioral profile of the user. Alternately, the user can be presented with options to interact with information in the personal account. For example, the user may be given the opportunity to invite members of a contacts list in the personal account to visit the webpage.
摘要:
In scenarios involving a data set accessible through a protocol, operations sets may be formulated for performing various operations on the data set, and may be expressed as resource scripts according to a scripting language. However, such resource scripts may be difficult to design due to the complicated aspects of the interaction, such as asynchrony, network transport, the syntax of the scripting language, and the details of the protocol. A design environment may be devised to facilitate designers in generating resource scripts, e.g., through the manipulation of visual elements. The design environment may abstract the lower-level working details of the resource scripts, and may allow designers to focus on the logical designing of the operations set. The design environment may then automatically generate the resource script from the operations set in accordance with the constraints of the script language and the protocol.
摘要:
Embodiments are directed to providing an identity risk score as part of an authentication assertion, applying operating heuristics to determine an operating application's validity and to providing identity risk scores to requesting third parties. In one scenario, an authentication server receives from a cloud service portal various user credentials from a user. The user credentials identify a user to the authentication server. The authentication server verifies the user's identity using the received credentials and generates an identity risk score based on one or more identity factors. The identity factors indicate a likelihood that the user is a valid user. The authentication server encapsulates the generated identity risk score in an authentication assertion and sends the authentication assertion that includes the generated identity risk score to the cloud service portal.
摘要:
Systems and methods for distributed, decentralized storage and retrieval of data in an extensible SOAP environment are disclosed. Such systems and methods decentralize not only the bandwidth required for data storage and retrieval, but also the computational requirements. Accordingly, such systems and methods alleviate the need for one node to do all the storage and retrieval processing, and no single node is required to send or receive all the data.
摘要:
An invention is described for securely deploying a provable identity for virtual machines (VMs) in a dynamic environment. In an embodiment, a fabric controller instructs a VM host to create a VM and sends that VM a secret. The fabric controller sends that same secret (or a second secret, such as the private key of a public/private key pair) to the security token service along with an instruction to make an account for the VM. The VM presents proof that it possesses the secret to the security token service and in return receives a full token. When a client connects to the deployment, it receives the public key from the security token service, which it trusts, and the full token from the VM. It validates the full token with the public key to determine that the VM has the identity that it purports to have.
摘要:
Methods and systems for providing unified analytics across a distributed computing services infrastructure are disclosed. Embodiments include providing an application identifier for an application created by a developer and, during an execution of the application, collecting and storing analytic data with an association with the application identifier and an authenticated developer identifier. Other embodiments may include collecting and storing analytic data with the association further including an authenticated user identifier and/or a device identifier for a device of a user-defined group or mesh. Access mechanisms, report generation, and billing based on the analytic data and associated application identifier are also disclosed. The disclosed methods and systems allow for unified reporting and correlation of analytic data across multiple services of a distributed computing services infrastructure.
摘要:
Multiple copies of web services reside on associated computing devices, each having an associated reputation. A client may desire to access the web service having the highest or best reputation to be ensured of a greater degree of accuracy and confidence. The client does a search, and attaches to whichever web service has the highest reputation. By running multiple copies of the web services, they may vote amongst themselves on the results in the event that one or more of the services starts giving incorrect or otherwise inconsistent results. Combining the voting with reputation data associated with each copy of the web service allows a service's reputation to be dynamically adjusted based upon how faithfully it computes the results of work items sent to it.
摘要:
Deployment and execution of a service in a multiple datacenter environment may be facilitated using datacenter execution templates. Developers, business managers, and other interested parties may select and/or modify a declarative execution template embodying multiple factors. The execution template may then be used to generate an execution plan, which is then executed by datacenters which run the service. The execution template may be optimized after deployment of the service, allowing for ongoing adjustment in response to changing business, regulatory, and operational factors.
摘要:
Embodiments are directed to providing an identity risk score as part of an authentication assertion, applying operating heuristics to determine an operating application's validity and to providing identity risk scores to requesting third parties. In one scenario, an authentication server receives from a cloud service portal various user credentials from a user. The user credentials identify a user to the authentication server. The authentication server verifies the user's identity using the received credentials and generates an identity risk score based on one or more identity factors. The identity factors indicate a likelihood that the user is a valid user. The authentication server encapsulates the generated identity risk score in an authentication assertion and sends the authentication assertion that includes the generated identity risk score to the cloud service portal.