Patent application number | Description | Published |
20080216164 | METHOD FOR PROVIDING ACCESS CONTROL TO SINGLE SIGN-ON COMPUTER NETWORKS - A method for providing access control to a single sign-on computer network is disclosed. A user is assigned to multiple groups within a computer network. In response to an access request by the user, the computer network determines a group pass count based on a user profile of the user. The group pass count is a number of groups in which the access request meets all their access requirements. The computer network grants the access request if the group pass count is greater than a predetermined high group pass threshold value. | 09-04-2008 |
20090328199 | Apparatus for Detecting Password Attacks Using Modeling Techniques - Provided is an apparatus for detecting fraudulent passwords so that computer break-in attempts can be distinguished from authorized users incorrectly entering their passwords. An actual password is mapped against a computer keyboard and the resultant data is stored in memory. The profile of an entered password is compared to the stored profile. If the profile of the entered password differs significantly from the stored profile. then the login attempt is flagged as an attempted intrusion. In one embodiment of the current invention, passwords are mapped according to the distance subsequent keystrokes arc from each other. Different embodiments may have different mapping schemes. For example, mapping data may correspond to statistical data that corresponds to the likelihood that a particular character is typed by mistake when another character is intended. | 12-31-2009 |
20100063995 | Synchronizing Network Feeds in High-Frequency Network Events - A cache server receives a request from a client that includes a requesting entity tag. In turn, the cache server extracts a starting identifier and an ending identifier from the requesting entity tag. The starting identifier is associated with a starting entry and the ending identifier is associated with an ending entry. Next, the cache server determines whether a subsequent entity tag exists that includes a subsequent starting identifier that matches the requesting entity tag's ending identifier. When the cache server identifies a subsequent entity tag, the cache server sends the subsequent entity tag and one or more update entries corresponding to the subsequent entity tag to the client. | 03-11-2010 |
20100073415 | METHOD AND SYSTEM FOR GENERATING DOCUMENTS HAVING STORED ELECTROSTATIC PATTERN INFORMATION - A method and apparatus for generating documents having stored electrostatic pattern information provides security with respect to the authenticity of documents. A liquid medium including a plurality of electrostatic monopoles is applied to the surface of a document, which embeds a permanent electrostatic pattern in the document. The pattern is then readable by an electrostatic scanner. The monopoles may be associated with differing colors, including black and white, may be transparent or have a neutral color. The patterns may embed data, certificates or shapes. The monopoles may provide a watermark or visible image. The apparatus may be a pen or printer, and may include multiple selectable vessels containing ink and/or electrostatic liquid medium of one or both charge states. Visible features of the document can be compared with the detected pattern, or the pattern may be compared to a database or decrypted with a key. | 03-25-2010 |
20100083099 | XML Streaming Parsing with DOM Instances - An apparatus, method, and program product are provided for parsing a document. A match point tuple is passed to a parser instance. The match point tuple comprises a match point. The parser instance stream parses an XML stream. In response to a match point statement in the XML stream matching the match point expression in the match point tuple, the parser instance constructs a DOM instance comprising XML content matching the match point. In a sample embodiment, the match point tuple further comprises a filter, and the parser instance adds XML statements that pass the filter to the DOM instance and discards statements that do not pass the filter. | 04-01-2010 |
20100094984 | METHOD FOR OPTMIZING A PRESENCE ENABLED MANAGED SERVICE - Methods, systems, processes and devices are provided for optimizing throughput and quality of service of a presence enabled managed service. The method includes at least a first entity requesting from an aggregator of presence services presence information of a second entity. The method includes looking up a profile of the aggregator stored in a cache of a presence server hosted by the presence enabled managed service. The method includes determining from the profile an aggregator level of service the aggregator has subscribed to from the presence enabled managed service, wherein the aggregator level of service is one of high level service, medium level service, and low level service. The method includes storing presence information of the second entity on a presence document on the cache and returning the presence information to the first entity based upon the aggregator level of service. | 04-15-2010 |
20100161820 | MULTI-PROTOCOL AUTHENTICATION AND AUTHORIZATION IN COMPUTER NETWORK ENVIRONMENTS - A multi-protocol authentication and authorization system including a request interceptor configured to receive from a requestor a first request using a first transport protocol and a second request using a second transport protocol, and an authenticator for validating a digest received from the requestor, where the request interceptor is configured to authenticate the requestor if the digest is valid and if at least one multi-protocol criterion applied to the requests is met. | 06-24-2010 |
20110022955 | Mashup Application Processing System - A method, programmed medium and system are provided for enabling a user to move a piece of data or context to another page in a mashup application. Rather than linking directly between pages, pages are “linked” by a drag-and-drop action of the user. To move a piece of data or context to another page, the user drags an item from the current mashup page onto the tab of a target page to which the data item is to be moved. The dropping of a text item on, for example, a tab of a target page causes an event to be fired on the target page, which may be wired to widgets contained within the target page. The target tab is then brought into focus and its page contents displayed. Visual indicators are also provided on source pages to indicate the target pages, which will “accept” the dragged contents. | 01-27-2011 |
20120206773 | METHOD FOR GENERATING DOCUMENTS HAVING STORED ELECTROSTATIC PATTERN INFORMATION - A method for generating documents having stored electrostatic pattern information provides security with respect to the authenticity of documents. A liquid medium including a plurality of electrostatic monopoles is applied to the surface of a document, which embeds a permanent electrostatic pattern in the document. The pattern is then readable by an electrostatic scanner. The monopoles may be associated with differing colors, including black and white, may be transparent or have a neutral color. The patterns may embed data, certificates or shapes. The monopoles may provide a watermark or visible image. The apparatus may be a pen or printer, and may include multiple selectable vessels containing ink and/or electrostatic liquid medium of one or both charge states. Visible features of the document can be compared with the detected pattern, or the pattern may be compared to a database or decrypted with a key. | 08-16-2012 |