摘要:
The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility.
摘要:
The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility.
摘要:
An asset is located in a facility via triangulation. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the base is monitored for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset determined by triangulation using the locators.
摘要:
The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility.
摘要:
The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility.
摘要:
A Centralized Authentication & Authorization (CAA) system that prevents unauthorized access to client data using a secure global hashtable residing in the application server in a web services environment. CAA comprises a Service Request Filter (SRF) and Security Program (SP). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. The client identifier is secured by the SP using a key unique to the client identifier. When the web services manager requests the client identifier, the web services manager must present the key to the SP in order to access the client identifier. Thus, the present invention prevents a malicious user from attempting to obtain sensitive data within the application server once the malicious user has gained access past the firewall.
摘要:
A Centralized Authentication & Authorization (CAA) system that prevents unauthorized access to client data using a secure global hashtable residing in the application server in a web services environment. CAA comprises a Service Request Filter (SRF) and Security Program (SP). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. The client identifier is secured by the SP using a key unique to the client identifier. When the web services manager requests the client identifier, the web services manager must present the key to the SP in order to access the client identifier. Thus, the present invention prevents a malicious user from attempting to obtain sensitive data within the application server once the malicious user has gained access past the firewall.
摘要:
A Centralized Authentication & Authorization (CAA) system that facilitates secure communication between service clients and service providers. CAA comprises a Service Request Filter (SRF), a Service Client Authentication Program (SCAP), a Service Authorization Program (SAP), and an Authorization Database (ADB). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. In the preferred embodiment, the SRF forwards the service request to a web service manager. The web service manager invokes SCAP. SCAP matches the identifier with a record stored in ADB. SAP queries ADB to determine if the service request is valid for the service client. If the service request is valid, SAP authorizes the service request and the appropriate service provider processes the service request.
摘要:
A Centralized Authentication & Authorization (CAA) system that facilitates secure communication between service clients and service providers. CAA comprises a Service Request Filter (SRF), a Service Client Authentication Program (SCAP), a Service Authorization Program (SAP), and an Authorization Database (ADB). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. In the preferred embodiment, the SRF forwards the service request to a web service manager. The web service manager invokes SCAP. SCAP matches the identifier with a record stored in ADB. SAP queries ADB to determine if the service request is valid for the service client. If the service request is valid, SAP authorizes the service request and the appropriate service provider processes the service request.
摘要:
A Centralized Authentication & Authorization (CAA) system that prevents unauthorized access to client data using a secure global hashtable residing in the application server in a web services environment. CAA comprises a Service Request Filter (SRF) and Security Program (SP). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. The client identifier is secured by the SP using a key unique to the client identifier. When the web services manager requests the client identifier, the web services manager must present the key to the SP in order to access the client identifier. Thus, the present invention prevents a malicious user from attempting to obtain sensitive data within the application server once the malicious user has gained access past the firewall.