摘要:
Described is a technology in which a platform unifies various social network and alerting mechanisms to provide a relationship-based communication network. An affiliation service allows organizations and individuals to connect, grant permissions and share useful information about themselves in the form of relationship-based and other attributes. A publishing service routes that information to the correct recipients, including by matching desired attributes to attributes of clients recipients. A data exchange service facilitates reporting, routing, monitoring and responding to such information, as well as providing relevant external data feeds to clients. In this manner, users and organizations are able to more easily connect and work together to resolve societal problems via a single platform that facilitates user and organizational participation.
摘要:
A user, by way of a computing device, requests and receives content from a first server at the computing device. An authentication response is also received from the first server at the computing device of the user. The authentication response includes an address of the second server and an executable script. The computing device of the user executes the executable script by issuing a request to the second server for state information corresponding to the user, receiving the state information from the second server; and determining, based on the state information, whether the user is authenticated to the second server. If the user is not authenticated to the second server, the computer device of the user displays a login module that is visually associated with the first server. Such login module collects login information for authenticating the user to the second server. If the user is authenticated in the second server, the computing device of the user issues a request to the second server for vouching information for authenticating the user to the first server.
摘要:
A logout feature of a service that facilitates login to multiple domain websites maintains a list of the sites that a user logs on to during a session and completely logs the user out of all the sites they visited during the session. A data structure in the form of a cookie named “Visited Sites” is used by a login server to maintain a list of all sites that a user logs on to during a session. When the user selects a logout link anywhere on the network, they are directed to a logout page on the login server. The login server retires all login domain cookies first, and displays a page that explains to the user that they are about to be logged out of each domain. The logout page generates image tags for each of the sites listed in the visited-sites cookie. The image tag provides a URL hosted at each site that expires any Passport cookies that are present at the site.
摘要:
A user profile having consent information regarding a network server for a second party is created. Such consent information is received from a first party and stored in the user profile of the second party. The second party may access the network server if the consent information stored in the user profile of the second party shows that the first party has provided consent. The second party may not access the network server if the consent information stored in the user profile of the second party shows that the first party has denied consent.
摘要:
Methods and arrangements are provided which associate a first user with a second user in a first device, and selectively provide information about the association of the first and second user to a second device as directed by the first user, without requiring the second user to be logged in to either the first or second device. The information about the association of the first and second user is provided to the second device via a validation code or validation protocol that essentially identifies the first user and the second user, when the first user is logged in to the second device. Here, for example, the validation code may identify the second user by an identifier and a name, and possibly provide modifications to a consent parameter associated with the second user. In certain implementations, at least a portion of the validation code may be encrypted when sent from the first device to the second device. By way of example, in certain instances, the first user may be a parent/guardian to the second user. The first device may include a network server that is configured to act as an authentication server, and the second device may include a network server that is configured to act as an affiliated server associated with the authentication server.
摘要:
A version number is associated with an encrypted key executable to allow real time updating of keys for a system which facilitates users signing on to multiple websites on different domains using an encrypted ticket. Two keys may be used at each site during updating of keys, each having an associated one digit Hex version tag. When a key is to be updated with a new key, the existing or old key is provided an expiration time. A second key is provided from the system in a secure manner with a new version number and made the current key which provides decryption of the encrypted ticket. The system tracks both keys while they are concurrent. After the existing key expires, only the second, or updated key is used to provide login services for users. The system periodically flushes old keys.
摘要:
Embodiments provide a compression proxy service that dynamically selects resources or other content for compression and delivery to user devices. The resources are selected based on evaluation of compression characteristics relating to the resources. A manifest is defined to identify the selected resources, or to identify the resources not selected for processing by the compression proxy service. The user devices employ the manifest to determine whether to send requests for the resources to the compression proxy service or to another source (e.g., an origin web site). Some embodiments provide a reduction in network traffic while making efficient use of the compression proxy service.
摘要:
Embodiments provide a compression proxy service that dynamically selects resources or other content for compression and delivery to user devices. The resources are selected based on evaluation of compression characteristics relating to the resources. A manifest is defined to identify the selected resources, or to identify the resources not selected for processing by the compression proxy service. The user devices employ the manifest to determine whether to send requests for the resources to the compression proxy service or to another source (e.g., an origin web site). Some embodiments provide a reduction in network traffic while making efficient use of the compression proxy service.
摘要:
A version number is associated with an encrypted key executable to allow real time updating of keys for a system which facilitates users signing on to multiple websites on different domains using an encrypted ticket. Two keys may be used at each site during updating of keys, each having an associated one digit Hex version tag. When a key is to be updated with a new key, the existing or old key is provided an expiration time. A second key is provided from the system in a secure manner with a new version number and made the current key which provides decryption of the encrypted ticket. The system tracks both keys while they are concurrent. After the existing key expires, only the second, or updated key is used to provide login services for users. The system periodically flushes old keys.
摘要:
A version number is associated with an encrypted key executable to allow real time updating of keys for a system which facilitates users signing on to multiple websites on different domains using an encrypted ticket. Two keys may be used at each site during updating of keys, each having an associated one digit Hex version tag. When a key is to be updated with a new key, the existing or old key is provided an expiration time. A second key is provided from the system in a secure manner with a new version number and made the current key which provides decryption of the encrypted ticket. The system tracks both keys while they are concurrent. After the existing key expires, only the second, or updated key is used to provide login services for users. The system periodically flushes old keys.