Management Patents (Class 726/6)
-
Publication number: 20110185404Abstract: A method, system, and computer program product for staged user identifier deletion are provided. The method includes checking a status of a user identifier in response to a triggering event. In response to determining that the status of the user identifier indicates a marked for deletion status, a notification action is performed. The method also includes monitoring a time value to determine whether a time for deletion associated with the user identifier with the marked for deletion status has been reached, and automatically deleting the user identifier with the marked for deletion status in response to determining that the time for deletion has been reached.Type: ApplicationFiled: January 27, 2010Publication date: July 28, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Casimer M. DeCusatis, Rajaram B. Krishnamurthy, Brian J. Neugebauer, Michael Onghena, Anuradha Rao, Naseer S. Siddique
-
Publication number: 20110185408Abstract: A method comprises assessing a network environment in which an electronic device is present and implementing a security feature based on the assessment of the network environment. Assessing the network environment comprises identifying other network entities on a network to which the electronic device is coupled.Type: ApplicationFiled: April 5, 2011Publication date: July 28, 2011Applicant: Hewlett-Packard Development Company, L.P.Inventor: Steven L. Travis
-
Publication number: 20110185403Abstract: According to one aspect, there is provided a method of controlling access to a network resource. The method comprises receiving a request to grant a user access to the network resource, the request including a user identifier, determining whether the received user identifier is stored in a local user data store associated with the resource, and where it is not so determined determining, from user details stored in a master user data store, whether the user is authorized to access the resource, and where it is so determined obtaining a password, and storing the obtained password and user details in the local data store associated with the network resource.Type: ApplicationFiled: January 27, 2010Publication date: July 28, 2011Inventors: Gerald DOLAN, John COUCHOT, Robert ASTLE
-
Publication number: 20110185405Abstract: To provide a user signature on a network transaction, a security server receives transaction information representing a transaction between a network user and a network site, such as a website. The security server calculates a one-time-password based on the received transaction information and a secret shared by the security server and the network site, but not by the user. The security server transmits the calculated one-time-password for application as the user's signature on the transaction. The one-time-password is independently calculable by the network site based on the shared secret.Type: ApplicationFiled: January 21, 2011Publication date: July 28, 2011Inventor: Ravi Ganesan
-
Publication number: 20110185406Abstract: Systems and methods are provided to facilitate online transactions via mobile communications. In one aspect, a system includes a data storage facility to store account information with a phone number of the user and an interchange coupled with the data storage facility. The interchange includes a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the controllers in different formats; and the converters are configured to communicate with the common format processor in a common format to facilitate authentication of the user to sign in the account.Type: ApplicationFiled: January 24, 2011Publication date: July 28, 2011Applicant: BOKU, INC.Inventors: Ron Hirson, David Yoo
-
Publication number: 20110185407Abstract: The invention relates to an authentication system for a user possessing a means (3) for authentication at an authentication entity (1), said authentication means including a means (11) for storing at least one status variable and a single-use access-code generator (2) actuated upon a request of the user, said access code including at least one unpredictable portion and being transmitted to the authentication entity for validation, said validation authenticating the user at the authentication entity, characterised in that the status variable is updated in a random manner by and upon the initiative of the authentication means systematically and before any generation of a new access code, in that the generator is suitable for computing the access code using the status variable once it is updated, and in that the authentication entity is adapted for modifying the value of at least one internal status variable during the at least partial validation of the access code by using information previously known by the auType: ApplicationFiled: October 6, 2009Publication date: July 28, 2011Applicant: IN-WEBO Technologies S.A.S.Inventor: Didier Perrot
-
Patent number: 7987357Abstract: A method and apparatus for disabling password-less remote logins. In one embodiment, the method comprises receiving a remote login request at a first computing system from a user of a second computing system. Both of the first computing system and the second computing system mount home directories from a file sever. The request includes a public key associated with the user. An authorized key file associated with the user is located in the home directories. The authorized key file has zero length and owned by a root user of the file server. The method further comprises prompting the user of the second computing system for a password in response to the request.Type: GrantFiled: November 28, 2007Date of Patent: July 26, 2011Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Publication number: 20110179475Abstract: A system is described comprising a service provider and an identity provider. A user requests access to the service provider and the service provider seeks user credentials from the identity provider. In use, the service provider issues an authentication request, which request specifies details of a plurality of acceptable authentication formats. The identity provider responds to the request either by providing authentication details for said user in one of the formats specified in the request, or by returning an error message indicating that it cannot support any of the specified authentication formats.Type: ApplicationFiled: October 8, 2008Publication date: July 21, 2011Applicant: NOKIA SIEMENS NETWORKS OYInventors: Uwe Foell, Jin Liu
-
Publication number: 20110179476Abstract: Embodiments of the disclosure describe systems and methods for authenticating services running on a partition. In this regard, one embodiment of a system for authenticating a service includes a partition including a list of authorized services, and a service running on the partition; and a management processor in communication with the partition, wherein the management processor is configured to generate credentials for the service running on the partition if the service is listed in the list of authorized services.Type: ApplicationFiled: September 30, 2008Publication date: July 21, 2011Inventors: Keith S. Euler, Russell O. Craig
-
Publication number: 20110179472Abstract: The present invention provides a new method of site and user authentication. This is achieved by creating a pop-up window on the user's PC that is in communication with a security server, and where this communication channel is separate from the communication between the user's browser and whichever web site they are at. A legitimate web site embeds code in the web page which communicates to the security server from the user's desktop. The security server checks the legitimacy of the web site and then signals both the web page on the user's browser, as well as the pop-up window to which it has a separate channel. The security server also sends a random image to both the pop-up window and the browser. If user authentication is requested by the web site the user is first authenticated by the security server for instance by out of band authentication. Then the security server computes a one time password based on a secret it shares with the web site and sends it to the pop up window.Type: ApplicationFiled: January 14, 2011Publication date: July 21, 2011Inventor: Ravi GANESAN
-
Publication number: 20110179474Abstract: A method for creating a unique and secure mobile internet protocol version 4 connection for a packet data network is provided. The method includes generating an extended master session key to create a mobile internet protocol root key. The method also includes creating a mobile internet protocol security parameter index based on the mobile internet protocol root key and an access point name. The method further includes deriving a mobile node home agent key based on the access point name. Furthermore the method includes associating the derived mobile node home agent key to the created security parameter index. Moreover the method includes providing the unique and secure mobile internet protocol version 4 connection to transfer data for the packet data network connectivity.Type: ApplicationFiled: September 15, 2009Publication date: July 21, 2011Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Alper Yegin, Ji Cheol Lee, Ra-javelsamy Ra-Jadurai, Sung Ho Choi
-
Publication number: 20110179473Abstract: Methods and apparatuses for secure communication are provided. The secure communication method includes receiving a first credential of a remote device; receiving first authentication information of the remote device; storing a user record including the first credential and the first authentication information; and evaluating a security level of the received first authentication information.Type: ApplicationFiled: January 14, 2011Publication date: July 21, 2011Applicant: Samsung Electronics Co., Ltd.Inventors: Kyung-hee LEE, Korkishko TYMUR
-
Patent number: 7984499Abstract: A configuration for preventing authentication processing due to continuous use of an old authorized device certificate, and illegal use of contents is provided. An arrangement is made wherein with playback or recording processing of contents accompanying data transfer between two different devices such as a drive and a host or the like, when performing mutual authentication between devices for executing data transfer, the number of times of authentication is counted, and in the event of this reaching a predetermined upper limit value of the number of times of authentication, authentication processing is cancelled, and it is necessary to update a certificate to be applied to authentication. The present configuration eliminates contents use due to continuity of authentication processing to which an old certificate is applied, and enables prompting a user to obtain the newest certificate.Type: GrantFiled: April 25, 2005Date of Patent: July 19, 2011Assignee: Sony CorporationInventor: Satoshi Kitani
-
Patent number: 7984498Abstract: In one embodiment, the methods and apparatuses select a primary group name; identify a first device associated with the primary group name wherein the first device is a member of the primary group name; specify a privilege associated with the member of the primary group name; and store the primary group name, the first device, and the privilege within a profile.Type: GrantFiled: July 18, 2006Date of Patent: July 19, 2011Inventors: Jeff Roberts, Linda Wu, Henry Nothhaft, Jr.
-
Patent number: 7984488Abstract: An exemplary system enabling credential roaming among a plurality of different computing devices may include an event handler to receive event notifications such as, e.g., a client logon. The event handler may invoke a management service in response to receiving an event notification. The management service may include a synchronizing module to synchronize a user's credentials with a remote directory service, such as, e.g., Active Directory, so that the user's credentials are available from any of a number of different computing devices.Type: GrantFiled: April 9, 2004Date of Patent: July 19, 2011Assignee: Microsoft CorporationInventors: David B. Cross, Xiaohong Su, Hao Zhuang, Philip J. Hallin
-
Patent number: 7984154Abstract: Application program network service requests are translated into specific actions that are then performed through the management plane and/or control plane. The translations and resulting actions are responsive to previously defined policies for the communication network, and may further reflect processing of previous service requests by the same or another application program. The amount of resources available for use by a given application program may be predefined based on a globally defined network policy. Each service request obtained from an application program may be translated into multiple actions performed using various specific protocols and/or interfaces provided by either the management plane, the control plane, or both the management and control planes. Reports of network activity, status and/or faults for a requesting application program may be tailored to the requesting program's view of the network, and passed directly and exclusively to the requesting program.Type: GrantFiled: December 21, 2009Date of Patent: July 19, 2011Assignee: Nortel Networks LimitedInventors: Indermohan Monga, Bruce Schofield, Franco Travostino
-
Patent number: 7984489Abstract: When a PC transmits a content request to a device registration apparatus in which a permitted number of devices have already been registered, an expiration time management unit judges whether any registration information registered in a registration list management unit has an exceeded registration expiration time. If registration information with an exceeded registration expiration time is registered in the registration list management unit, the registration list management unit deletes this registration information, and newly registers registration information of the PC.Type: GrantFiled: July 14, 2005Date of Patent: July 19, 2011Assignee: Panasonic CorporationInventors: Natsume Matsuzaki, Masaya Miyazaki, Yuichi Futa, Toshihisa Nakano, Hiroki Yamauchi, Soichiro Fujioka, Yuko Tsusaka
-
Patent number: 7984490Abstract: A method and apparatus for issuing an attribute certificate for attributes of a Light Weight Directory Access Protocol (LDAP) entry stored in an LDAP repository. In one embodiment, the method includes receiving a request for an attribute of an LDAP entry. The method further includes, in response to the request, sending a reply that includes an attribute value of the requested attribute and a digital signature to authenticate the attribute value.Type: GrantFiled: May 31, 2007Date of Patent: July 19, 2011Assignee: Red Hat, Inc.Inventor: Steven W. Parkinson
-
Patent number: 7984491Abstract: Disclosed is an off-line user authentication system, which is designed to present a presentation pattern to a user subject to authentication, and apply a one-time-password derivation rule serving as a password to certain pattern elements included in the presentation pattern at specific positions so as to create a one-time password. An off-line authentication client pre-stores a plurality of pattern element sequences each adapted to form a presentation pattern, and a plurality of verification codes created by applying a one-time-password derivation rule to the respective presentation patterns and subjecting the obtained results to a one-way function algorithm. A presentation pattern is created using one selected from the stored pattern element sequences, and presented to a user. A one-time password entered from the user is verified based on a corresponding verification code to perform user authentication. The present invention provides an off-line matrix authentication scheme with enhanced security.Type: GrantFiled: October 16, 2009Date of Patent: July 19, 2011Assignee: Computer Systems Engineering Co., Ltd.Inventors: Yukiya Ueda, Tsugune Saito, Shigetomo Tamai
-
Patent number: 7984497Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.Type: GrantFiled: April 4, 2007Date of Patent: July 19, 2011Assignee: Microsoft CorporationInventors: Todd Carpenter, Shon Schmidt, David J. Sebesta, William J. Westerinen
-
Publication number: 20110173685Abstract: A method for terminal configuration and management includes: acquiring a configuration file, where the configuration file includes server account information; configuring the server account information in the acquired configuration file onto a Device Management Tree (DMT) of a terminal; based on the server account information, establishing a management session between the terminal and the server, and performing management and subsequent configuration on the terminal during the session. A corresponding terminal device and a corresponding system are also provided. Through the method, the terminal can determine, according to protocol version information supported by or corresponding to the corresponding server and carried in a configuration packet, a protocol that should be used for communication with a server, and perform configuration according to the correct protocol version, thus improving the operation efficiency.Type: ApplicationFiled: March 28, 2011Publication date: July 14, 2011Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: XIAOQIAN CHAI, LINYI TIAN
-
Publication number: 20110170129Abstract: A password setting device for an image forming apparatus includes: an image reading unit which reads image information on a document; an image forming unit which forms an image on a sheet based on image data read by the image reading unit; an acceptance unit which accepts setting of a password used for user authentication; a determination unit which determines whether the password accepted via the acceptance unit violates prohibition information of the password or not; and a notification unit which notifies a user of information to prompt the user to change the password when it is determined by the determination unit that the password violates the prohibition information.Type: ApplicationFiled: January 10, 2011Publication date: July 14, 2011Applicants: KABUSHIKI KAISHA TOSHIBA, TOSHIBA TEC KABUSHIKI KAISHAInventors: Hiroshi Yamaguchi, Toshiyuki Sato
-
Publication number: 20110173686Abstract: An image forming apparatus communicates with an authenticating server which stores user information for identifying a user and authentication information included in a storing medium. An authentication requesting unit transmits the user information input to the image forming apparatus to the authenticating server to authenticate the user. An authentication result obtaining unit obtains the user authentication result from the authenticating server. A display unit displays a registering mode for registering the authentication information corresponding to the input user information and a deleting mode for deleting the authentication information corresponding to the input user information so that the modes can be selected according to the obtained authentication result.Type: ApplicationFiled: September 29, 2009Publication date: July 14, 2011Applicant: CANON KABUSHIKI KAISHAInventors: Kazuhiro Ueno, Atsushi Daigo
-
Publication number: 20110173446Abstract: A system and method for securing wireless transmissions is provided. A method for transmitting secure messages includes selecting a bin of codewords from a plurality of bins. The bin of codewords containing a plurality of sub-bins of codewords, and the selecting is based on a first message. The method also includes selecting a sub-bin of codewords from the plurality of sub-bins of codewords based on a second message, selecting a codeword from the sub-bin of codewords, and transmitting the selected codeword to a legitimate receiver.Type: ApplicationFiled: January 13, 2010Publication date: July 14, 2011Applicant: FutureWei Technologies, Inc.Inventors: Tie Liu, Yufei Blankenship
-
Publication number: 20110170696Abstract: The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote user. The keys are provided to the secure access controller by an authentication server. Once the transceiver establishes a communication link with the user, the access controller uses these keys to authenticate packets issued by the user to the computer equipment. If the packet is authenticated, the access controller passes the packet to the computer equipment. Otherwise, the packet is discarded.Type: ApplicationFiled: March 21, 2011Publication date: July 14, 2011Inventors: Tet Hin YEAP, Dafu LOU, William G. O'BRIEN
-
Publication number: 20110173684Abstract: Systems and method for producing, validating, and registering authentic verification tokens are disclosed. Such systems and methods include generating verification token specific key pairs. The key pairs can be signed by a verification token manufacturer master key or public key certificate for an additional level of authenticity. Related methods and systems for authenticating and registering authorized verification token manufacturers are also disclosed. Once a verification token manufacturer is authenticated, it can be assigned a manufacturer-specific key pair or certificate and in some cases, a predetermined set of serial numbers to assign to the verification tokens it produces. Each serial number can be used to generate a verification token specific key pair specific to the associated verification token. One component of the verification token key pair can be stored to the verification token.Type: ApplicationFiled: January 12, 2011Publication date: July 14, 2011Inventors: Simon Hurry, Ayman Hammad
-
Patent number: 7979893Abstract: Processes and techniques for tailoring operations management in a system are described. The processes and techniques allow a user to customize operations management based on the user's function within a system and the particular tasks that the user wishes to accomplish. Simplified user interfaces can be created by scoping the interfaces based on user profiles, preferences and system components.Type: GrantFiled: May 31, 2007Date of Patent: July 12, 2011Assignee: Microsoft CorporationInventors: Marisol Ontaneda, Thomas W. Keane, Baelson B. Duque, Chandika Bhandari, Travis Wright, Vitaly Voloshin, Casey McKinnon
-
Patent number: 7979699Abstract: Embodiments of the present invention relate to a system and method for providing processing capacity on demand. According to the embodiments, a processor package has a plurality of processing elements. One or more of the processing elements may be made active in response to increased demand for processing capacity based on modifiable authorization information.Type: GrantFiled: May 19, 2004Date of Patent: July 12, 2011Assignee: Intel CorporationInventors: Deep K. Buch, Shivnandan Kaushik
-
Cross mapping graphical interface to show encryption relationships between hosts and storage devices
Patent number: 7979701Abstract: The invention operates in connection with a secure storage compartment feature of a storage security appliance to allow users to see the encryption and permission relationships between hosts and storage in one view. The invention also provides a user tool that enables users to manage secure storage compartments (encryption/key relationship) easily and access permissions between them. The invention also provides a user tool that helps users find missing relationships/permissions easily when troubleshooting a host's missing storage after a storage security appliance is installed. The invention further provides a user tool that overlays cross mapping/relationship information on top of a topology view, thereby making it easy for a user to see missing or extraneous relationships between hosts and storage.Type: GrantFiled: September 15, 2006Date of Patent: July 12, 2011Assignee: NetApp, Inc.Inventor: Rajamohan Gandhasri -
Publication number: 20110167484Abstract: An apparatus and method for integrating authentication protocols in the establishment of connections between a controlled-access first computing device and at least one second computing device. In one embodiment, network access user authentication data needed to access the at least one second computing device is transmitted to an authentication server automatically if the user has access to use the first computing device, thereby not requiring the user to manually enter the authentication data needed for such access at the first computing device. The network access user authentication data may be, for example, retrieved from a memory store of the first computing device and/or generated in accordance with an authentication data generating algorithm.Type: ApplicationFiled: March 14, 2011Publication date: July 7, 2011Applicant: RESEARCH IN MOTION LIMITEDInventors: Jonathan F. Hammell, Ian M. Robertson, Michael K. Brown, Michael G. Kirkup, Herbert A. Little
-
Publication number: 20110167485Abstract: Provided are a method and computer system that provide a virtual world. A server of the computer system includes a storage subsystem that stores two or more items of different personalized information about multiple different users, including different user identifications and passwords associated with the user identifications respectively representing the users. The server computer system is programmed to accept login credentials including a user identification and password and validate the login credentials. The server computer system is also programmed to control formation of a first user account and storage of the first user identification and first password. The storage subsystem stores information about registration codes that have not yet been entered.Type: ApplicationFiled: March 17, 2011Publication date: July 7, 2011Applicant: GANZInventor: Howard Ganz
-
Publication number: 20110167480Abstract: Techniques for secure transparent switching between modes of a virtual private network (VPN) are provided. A principal, via a client, establishes a VPN session in a first mode of operation with a server. The principal subsequently requests a second mode of operation during the same VPN session. The VPN session is transparently transitioned to the second mode of operation without any interaction being required on the part of the principal and without terminating the original VPN session.Type: ApplicationFiled: March 14, 2011Publication date: July 7, 2011Inventors: Chendil Kumar, Gautham Chambrakana Ananda
-
Publication number: 20110167483Abstract: A method and system for managing role-based access control of token data using token profiles having predefined roles is described.Type: ApplicationFiled: January 5, 2010Publication date: July 7, 2011Inventors: Ade Lee, Christina Fu
-
Patent number: 7975289Abstract: The client requests authentication by transmitting the authentication information entered by the user, the MAC address of the network adapter, and the address change information as to whether or not the MAC address has been changed. When the authentication information and the MAC address are in agreement with the details of registration, and if a change in the MAC address is recognized from the address change information, the server regards the authentication as being a failure and issues an access refusal, thus completing the processing. If a change in the MAC address is recognized, the fact may be notified to the manager to issue an access permit or an access refusal in accordance with the manager's instruction.Type: GrantFiled: June 13, 2005Date of Patent: July 5, 2011Assignee: Fujitsu LimitedInventor: Koji Hashimoto
-
Patent number: 7975291Abstract: In the global information sharing and distributing service system, the public use of idle resources can be propelled and sufficient security can be guaranteed on the resources for private use. A node machine configuring an information network includes resources located in a private zone available to private use, resources located in a public zone for public service use, and a private resource security management unit for management of the security of the resources located in the private zone.Type: GrantFiled: December 3, 2007Date of Patent: July 5, 2011Assignee: Fujitsu LimitedInventors: Makoto Amamiya, Satoshi Amamiya, Tadashige Iwao, Makoto Okada
-
Patent number: 7975292Abstract: A method of controlling access to an interaction context of an application, including receiving login requests pertaining to an access account, each login request including a login password to be matched against an access password associated with the access account. A database includes at least one account record including a password state field indicating whether the access password is a temporary password or a permanent password and a security hold field indicating whether a security hold has been placed on the access account by an administrator. Access is denied upon receipt of a login request when the login password fails to match the access password. Access is denied upon receipt of a login request when the login password matches the access password, the password state field indicates that the access password is a permanent password, and the security hold field indicates that there is a security hold on the access account.Type: GrantFiled: June 12, 2008Date of Patent: July 5, 2011Inventor: Francisco Corella
-
Patent number: 7974734Abstract: Control system of an electronic instrument for metrological measurements, comprising an electronic local processing unit including a handling application of said instrument. The system includes a control application for said handling application, which can be associated with said local processing unit, said control application being suitable for generating a univocal certification code for the application.Type: GrantFiled: November 13, 2003Date of Patent: July 5, 2011Assignee: Dresser, Inc.Inventors: Raffaele Pera, Mirko Spagnolatti, Giorgio Della Fonte
-
Publication number: 20110162054Abstract: The invention describes a method, firmware, and computer program product for generating one or more One Time Passwords (OTPs) for one or more applications. The firmware embedded in a computational device receives one or more registration details corresponding to an application from a user. Thereafter, the firmware generates a Dynamic Information Number (DIN) based on at least one of the registration details and an application identifier (SIID). The user registers with the application with the DIN and at least one of the registration details. Further, the user may access the application using an OTP generated by the firmware based on the DIN and the application identifier.Type: ApplicationFiled: June 11, 2010Publication date: June 30, 2011Applicant: INFOSYS TECHNOLOGIES LIMITEDInventors: Ashutosh Saxena, Tiruvengalam Kanduri
-
Publication number: 20110162053Abstract: A method for providing a secret that is provisioned to a first device to a second device includes generating a One-Time Password at the first device using the secret and obtaining an identifier of the secret. The method also includes providing the One-Time Password and the identifier to the second device and sending the One-Time Password and the identifier to a remote provisioning service. The method also includes verifying that the One-Time Password corresponds to the secret, and sending to the second device an encrypted secret and a decryption key for decrypting the encrypted secret. The encrypted secret and the decryption key may be sent using different communications methods. The method also includes decrypting the encrypted secret using the decryption key to provide the secret and storing the secret at the second device.Type: ApplicationFiled: December 30, 2009Publication date: June 30, 2011Applicant: VeriSign, Inc.Inventors: Mingliang Pei, Slawek Ligier
-
Patent number: 7970936Abstract: Simplifying any cumbersome URLs that are made public. The function of converting to simplify cumbersome URLs is performed by Web service providers for appropriate fees. Accordingly, the converted URL will have a new domain portion, i.e. the Web service provider's domain along with a simplified path portion defining the path with the Web service provider's domain that will point to the original URL, stored within the service provider. Within the service provider, URLs of said accessed Web documents are converted to include a domain section specifying the service provider's domain and a path portion within said service provider's domain that is simpler than the original URL path portion. The path portion in the converted URL is usually shorter than the path portion in the original URL.Type: GrantFiled: June 26, 2003Date of Patent: June 28, 2011Assignee: International Business Machines CorporationInventors: Timothy Alan Dietz, Walid M. Kobrosly, Nadeem Malik
-
Patent number: 7971228Abstract: An architecture for A method for providing on-line charging in a network environment is provided that includes interacting with an application that is selected by an end user, and with a policy enforcement point to install corresponding policies that are inclusive of charging rules. The method also includes performing, via a policy server, on-line charging interactions on behalf of the selected application itself such that application-specific on-line charging for the application is enabled. In more particular embodiments, the policy server understands which application is interacting with it by use of application tokens, source, or service identifiers. Also, the application element can query the policy server indirectly to grant network resources and the policy server examines an end user's policy profile or a network-wide profile (or both) and recognizes that on-line charging applies to the selected application.Type: GrantFiled: February 7, 2007Date of Patent: June 28, 2011Assignee: Cisco Technology, Inc.Inventors: Jonathan D. Rosenberg, Flemming S. Andreasen, Mark Grayson
-
Patent number: 7971236Abstract: Method and system are provided where a memory key structure is used for authenticating access to a memory location that is registered for a remote direct memory access (RDMA) operation. The memory key structure not only includes a standard memory key that is expected by an RDMA enabled network interface card (RNIC), but also includes an endpoint network address identifier and a transport identifier. The endpoint network address identifier and the transport identifier are verified before an entity is granted access to the registered memory location.Type: GrantFiled: October 29, 2008Date of Patent: June 28, 2011Assignee: NetApp, Inc.Inventor: James Lentini
-
Patent number: 7971235Abstract: A method of user authorization for services in a wireless communications network including the steps of: establishing a connection between user equipment and an authorization server of the network; the user equipment providing user identification to the authorization server; the authorization server retrieving authorization data based on the user identification as to a service available to that user; the authorization server returning authorization to the user equipment for a service indicated by the authorization data; and the user equipment establishing a communication path to the service using the authorizationType: GrantFiled: October 18, 2005Date of Patent: June 28, 2011Assignee: Fujitsu LimitedInventor: Xin Chen
-
Publication number: 20110154459Abstract: A method for secure electronic transaction over a computer network, comprising: at a trusted relationship profile server computer: storing a unique identity of a trusted computing unit; generating a confirmation message regarding the unique identity of the trusted computing unit in response to a request from the trusted computing unit; at a security proxy server computer: storing real credentials and local credentials of a customer in a secure vault; receiving the confirmation message and permitting a login process to be performed with the security proxy server using the local credentials, provided the confirmation message is valid; and replacing the local credentials submitted in the login process with the real credentials. A corresponding system for secure electronic transactions is also provided.Type: ApplicationFiled: February 25, 2011Publication date: June 23, 2011Inventors: Randy KUANG, Stanislus Kisito Xavier, David Michael Mann
-
Publication number: 20110153444Abstract: A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables IP assets to be characterized, rated and valuated in a consistent manner. Project management, workflow and data security functionality enable consistent, efficient and secure interactions between the IP Marketplace participants throughout the IP transaction process. Business rules, workflows, valuation models and rating methods may be user defined or based upon marketplace, industry or technology standards.Type: ApplicationFiled: December 17, 2009Publication date: June 23, 2011Applicant: American Express Travel Related Services Company, Inc.Inventor: Tracey R. Thomas
-
Publication number: 20110154455Abstract: A framework is provided for securing and managing sensitive credential information required for a software program, such as an application or a script, to access a resource. The centralized framework validates a request for access to a resource received from the software program, retrieves the encrypted credentials associated with the requested resource, decrypts the encrypted credentials, and provides decrypted credentials to the software program for use in accessing the resource.Type: ApplicationFiled: February 22, 2005Publication date: June 23, 2011Inventors: Shiva R. Nanjangudu, Philip H. Jung
-
Publication number: 20110154456Abstract: A system and method for sharing data is provided. A request is received from a mobile device to transfer a set of data to a recipient. The set of data is stored by a server and controlled by a user of the mobile device. The request is authenticated, and the data is encrypted. The set of data is transmitted to a recipient specified by the user via the mobile device.Type: ApplicationFiled: December 21, 2009Publication date: June 23, 2011Applicant: DIVERSINET CORP.Inventor: Salah MACHANI
-
Publication number: 20110154457Abstract: A conversion device receives service data including first connection destination data and the authentication information about an authenticated user, generates second connection destination data for designation of the first connection destination data, then associates the authentication information, the first and second connection destination data with one another, transmits them to a relay device, and transmits to a client the service data in which the first connection destination data is replaced with the second connection destination data; the client transmits the second connection destination data selected by the user to the relay device; the relay device transmits the authentication information to a server indicated by the first connection destination data using the authentication information and the first connection destination data corresponding to the second connection destination data, and transmits the address of the server to the client; and the client communicates with the server using the addressType: ApplicationFiled: December 16, 2010Publication date: June 23, 2011Applicant: FUJITSU LIMITEDInventors: Kei HAMADA, Takao OGURA, Hitoshi UENO
-
Publication number: 20110154458Abstract: There is provided a system and method for creating a pre-shared key. More specifically, in one embodiment, there is provided a method comprising accessing an identifier associated with a computer system, and performing at least one mathematical function on the identifier to create a pre-shared key for the computer system.Type: ApplicationFiled: February 23, 2011Publication date: June 23, 2011Applicant: Hewlett-Packard CompanyInventor: Paul J. Broyles
-
Patent number: 7966653Abstract: There is provided a method of determining user specific usage of a network, wherein a user is accessing the network for a session from a client system via a layer two access port of a switch, wherein the layer two access port of the switch is assigned to the user of the client system for that session, wherein a first value, which is indicative of the magnitude of a packet counter of the layer two access port, is determined when the layer two access port becomes active, wherein a second value, which is indicative of the magnitude of the packet counter, is determined when the layer two access port becomes inactive, and wherein the first value and the second value are stored.Type: GrantFiled: February 12, 2007Date of Patent: June 21, 2011Assignee: International Business Machines CorporationInventor: Stefan Gutekunst