摘要:
A method and system for supplanting a first name base with a second name base. The system consolidates name bases from different network operating systems into a single name base administrable from a single administration utility. Existing first name base applications continue to execute without modification, as communications are transparently translated and redirected to the second name base, and responses translated and communicated back into a format associated with the first name base. The method and system simplify administration of the network, and consolidate multiple name bases into a single name base.
摘要:
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one's own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
摘要:
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one's own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
摘要:
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one's own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
摘要:
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one's own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
摘要:
A system and method for enabling a user to transact an anonymous on-line transaction, wherein a form of on-line payment is requested at a transaction interface is disclosed. The method may include providing an anonymous user interface that enables a user to initiate an on-line payment, accessing a first profile comprising user data when the user activates the form of on-line payment, generating a second profile linked to the first profile wherein, the second profile comprises anonymous data, and communicating the anonymous data from the second profile to the transaction interface to enable completion of the transaction.
摘要:
A method and apparatus according to various aspects of the present invention provides a system for associating files with relevant application programs in a network. The applications are available on a network, suitably as application objects. Each application object also includes file type information associated with the application. When a user logs onto the network, the file type information is retrieved from each accessible application object. The application launcher stores the retrieved information in the local memory of the user workstation. When a file is selected at the user workstation, the user workstation checks its local memory for the file type information corresponding to the selected file. Because the information is periodically updated by the application launcher, the current information is available to associate a particular file type extension with an application stored remotely. As a result, the appropriate application may be initiated.
摘要:
A library operating system is employed in conjunction with an application in a virtual environment to facilitate dynamic application migration. An application executing in a virtual environment with a library operating system on a first machine can be suspended, and application state can be captured. Subsequently, the state can be restored and execution resumed on the first machine or a second machine.
摘要:
The mechanism provides tools and techniques for administering a directory tree of a directory service database by automatically placing user objects in containers and placing containers on servers, without direct instructions from a user. Methods of the mechanism use a hash function to hash a user ID to obtain a proposed directory tree location, and then place a user object for the user at the proposed location. The hash function results may be stored within an email address of the user for later reference. Some methods of the invention also automatically divide containers of the tree between servers, and some automatically move subtrees of user objects into a new partition when a server or server pair is added to a system that stores the directory tree. Similar systems and configured storage media are also provided by the invention to perform user object placement tasks.
摘要:
A library operating system is employed in conjunction with an application in a virtual environment to facilitate dynamic application migration. An application executing in a virtual environment with a library operating system on a first machine can be suspended, and application state can be captured. Subsequently, the state can be restored and execution resumed on the first machine or a second machine.