摘要:
The invention relates generally secure mail operations. More particularly, the invention provides a method for managing a user security credential, the method comprising: storing, in a file contained in a data store communicatively coupled to a mail server, a security credential associated with a user; authorizing a client to access the data store according to an access permission associated with the user; retrieving the security credential from the file; and initiating a security-related mail operation from the client using the security credential without the security credential leaving the server.
摘要:
Under the present invention, a (computer) user logs into a distributed application provided on a server. After authentication, a security value (e.g., a pseudo-random number) is generated for the user. The security value is stored at the server, and then sent to the user along with session information. Thereafter, the security value is associated with a set (e.g., one or more) of commands of the distributed application. When one of the set of commands is received from the user, the URL corresponding thereto is checked for the security value. If the value is present, the command is permitted. However, if the security value is not present, the command is not permitted and an error message is returned to the user.
摘要:
A method of handling electronic documents can include determining at least one safety parameter of an electronic document and classifying the electronic document based upon the at least one safety parameter. A restriction policy can be selected based upon the classifying step. The selected restriction policy can be implemented for handling the electronic document.
摘要:
A method for executing trusted commands, in which a trusted command is first received from a user at a user terminal and parsed by untrusted code; then passed to a trusted computing base for execution. The trusted computing base displays some indication of what is to be done back to the user for confirmation. Confirmation of the commands prevents unauthorized modification of the commands and increases system confidence. A randomly (or pseudo-randomly) generated process identifier is employed to verify the existence of a trusted path.
摘要:
Described are a system and method for protecting a computing device from potentially harmful code in a document. One or more definitions of potentially harmful active content are provided in an editable text file. The document is compared with each definition of potentially harmful active content in the editable text file to identify potentially harmful active content within the document. The document is modified to render harmless any identified potentially harmful active content before presenting the document to the computing device.
摘要:
A method and system for providing real time collaboration sessions among computer users. When a scheduling user selects a group of people for a real-time collaboration session, and some of the desired participants are not currently available, interface options are simultaneously provided that enable the user to either start the collaboration session with the currently available participants, or to invite all participants to join a session at future time determined to be the next time at which all desired users are available. The option of sending the electronic invitation may be provided to and accessed simultaneously with the display of the collaboration session interface, while the real-time collaboration session is underway. An invitation to immediately join a current real time collaboration session may further simultaneously provide the receiver with the options of either joining the session, or of responding by generating an electronic invitation to a future session. Such options may be provided through- any specific type of selectable user interface display objects.
摘要:
A method, system, and program product stored on a computer-readable medium, for conveying reliable identity in electronic collaboration that includes evaluating information element(s) of an electronic interaction (e.g., message) so as to obtain a “confidence value” of the identity of the sender of the electronic interaction, based on the evaluation of the information element(s) and then mapping, on a spectrum, either in a visual, aural, haptic olfactory, or a combination of modes, the “confidence value” to the electronic interaction sender. May be employed in e-mail, VoIP, instant messaging, and the like.
摘要:
A method, system and apparatus for the policy based control of multiple message forwards. A method for policy based control of multiple message forwards can include reviewing a policy associated with a message to identify a set of recipients for a message. Responsive to a request to forward a substantially unmodified form of the message, the method also can include detecting based upon the reviewed policy an attempt to forward the substantially unmodified form of the message to a recipient who already has received the message.