Patent application number | Description | Published |
20080320565 | Open enhanced federation security techniques - Techniques to protect from open enhanced federation user enumeration are described. An apparatus may include a network interface operative to establish connections. The access edge server may further include an open enhanced federation (OEF) module communicatively coupled to the network interface. The OEF module may be operative to manage connections between multiple federated networks. In one embodiment, for example, the OEF module may comprise a peer authentication module operative to determine whether a peer making the request is an untrusted peer domain. The OEF module may further comprise a peer tracking module operative to retrieve a total request number and a total limit number associated with the untrusted peer, and compare the total request number with the total limit number to form a threat status indicator value. The OEF module may also comprise a peer authorization module operative to authorize the request based on the threat status indicator value. Other embodiments are described and claimed. | 12-25-2008 |
20090092050 | Open federation security techniques with rate limits - Open federation security techniques with rate limits are described. An apparatus may include a network interface operative to communicate messages, and a secure open federation (SOF) module operative to manage a message rate between multiple federated networks. The SOF module may comprise a peer authentication module operative to determine whether a peer making the message is an untrusted peer. The SOF module may comprise a peer rate tracking module operative to retrieve a message rate value and a message rate limit value associated with the untrusted peer, and compare the message rate value with the message rate limit value to form a threat status indicator value. The SOF module may comprise a peer authorization module operative to authorize communication of the message based on the threat status indicator value. Other embodiments are described and claimed. | 04-09-2009 |
20110055402 | EXPOSING AUTOMATON INFORMATION BASED ON AGGREGATION OF MEMBER INFORMATION - Architecture that exposes automaton information of an automaton based on aggregation of a set of member information and according to aggregation logic. The aggregation logic can include presence state, supported communications modalities, and time availability (e.g., business hours). The aggregation logic for presence state member information can be defined by the most available presence state of all persons the automaton it is hiding. The aggregation logic for capabilities member information can be the capabilities of the most available person the automaton is hiding. The aggregation logic for business hours member information can be defined by the largest interval possible covered by the persons hidden by the automaton. Other types of member information can be considered. | 03-03-2011 |
20120328084 | TECHNIQUES FOR TRANSFER ERROR RECOVERY - Techniques for transfer error recovery are described. A system may comprise a context generator module operative to record context information for a first call session between a first call terminal and a call system resource, and store the context information with a context identifier in a context table. The system may include a transfer error context module to couple to the context generator module, the transfer error context module operative to generate transfer error context information having the context identifier. The system may include a call transfer module to couple to the transfer error context module, the call transfer module operative to send the transfer error context information to the first call terminal for use in case of a transfer failure event. Other embodiments are described and claimed. | 12-27-2012 |