Abstract: Techniques for spawning workloads are provided. A single repository is read once to obtain an image for a workload or files and resources for the image. The read operation spawns multiple, and in some cases, concurrent write operations, to instantiate the workload over a network as multiple occurrences or instances of the workload in multiple processing environments.
Type:
Grant
Filed:
September 8, 2014
Date of Patent:
December 4, 2018
Assignee:
Micro Focus Software Inc.
Inventors:
Jeremy Ray Brown, Jason Allen Sabin, Lloyd Leon Burch, Michael John Jorgensen
Abstract: Techniques to provide mobile access to content are disclosed. A request from a mobile application running on a mobile device to access content is received at a connector node. A user credential associated with the request is used to identify at the connector node a policy associated with the request. A policy metadata associated with the policy is provided from the connector node to the mobile application running on the mobile device. The mobile application may include application code that is responsive to the policy metadata to perform, with respect to the request to access content, an action indicated by the policy.
Abstract: Binding a security token to a client token binder, such as a trusted platform module, is provided. A bound security token can only be used on the client on which it was obtained. A secret binding key (kbind) is established between the client and an STS. The client derives a key (kmac) from kbind, signs a security token request with kmac, and instructs the STS to bind the requested security token to kbind. The STS validates the request by deriving kmac using a client-provided nonce and kbind to MAC the message and compare the MAC values. If the request is validated, the STS generates a response comprising the requested security token, derives two keys from kbind: one to sign the response and one to encrypt the response, and sends the response to the client. Only a device comprising kbind is enabled to use the bound security token, providing increased security.
Type:
Grant
Filed:
December 31, 2015
Date of Patent:
November 27, 2018
Assignee:
MICROSOFT TECHNOLOGY LICENSING, LLC
Inventors:
Adrian Frei, Tarek B. Kamel, Guruprasad B. Aphale, Sankara Narayanan Venkataraman, Xiaohong Su, Yordan Rouskov, Vijay G. Bharadwaj
Abstract: A machine-assisted method for verifying a video presence that includes: receiving, at a computing device of an identity provider, an authentication request initially sent from a requester to access an account managed by a relying party, different from the identity provider; retrieving, from the authentication request, at least a portion of a video stream feed initially from the requester, to the computing device, the portion of video stream feed portraying a face of the requester; extracting the face of the requester from the portion of the video stream feed; providing a directive to the requester soliciting a corresponding gesture; and receiving a response gesture from the requester.
Abstract: A surveillance system for monitoring of Electronic Medical Record (EMR) application navigation through a plurality of navigation interfaces of an EMR application. The system includes an EMR system that includes the EMR application. The system includes a context-sensitive engine that includes an agent device to record EMR application navigation data in real time and contextual data comprising application sensitive, user sensitive and context sensitive data. The system includes an information management server to facilitate serving of information blocks to the EMR system from a plurality of distributed databases in real-time.
Abstract: The present disclosure generally relates to information security and, more particularly, to systems and methods of comparative evaluation for phishing mitigation. Evaluating the anti-phishing approaches includes: initiating, on a computing device, a phishing attack; initiating, on the computing device, an anti-phishing approach against the phishing attack; and evaluating, using the computing device, different criteria of the anti-phishing approach to determine an overall effectiveness of the anti-phishing approach by applying a comparative framework of evaluation metrics to the different criteria of the anti-phishing approach.
Type:
Grant
Filed:
May 13, 2016
Date of Patent:
September 4, 2018
Assignee:
KING ABDULAZIZ CITY FOR SCIENCE AND TECHNOLOGY