会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明公开
    • Relevancy filter for new data based on underlying files
    • 相关资料
    • EP2487630A1
    • 2012-08-15
    • EP11161790.8
    • 2011-04-08
    • Novell, Inc.
    • Isaacson, ScottTeerlink, Craig N.Nazeer, Nadeem A.
    • G06Q10/00G06F7/00G06F17/30G06F12/00H03M7/30
    • G06F17/30029
    • Methods and apparatus teach a digital spectrum of a file representing underlying original data. The digital spectrum is used to map a file's position. This position relative to another file's position reveals closest neighbors (910). When multiple such neighbors are grouped together (930,960) they can be used to indicate relevance in current data under consideration on a same or different computing device. Also, relevance can be found without traditional notions of needing structured data or users initiating searching for relevance or by examining metadata/administrative information associated with the files. A plurality of original files represent underlying original bits of data (82) from which a key (200) is created (810) in a mapping space for a relevancy topic. If new data is sufficiently close to this (830,840), it is related to the topic and presented to users (850). Various closeness measures are defined (820) as are methods for key creation. Still other features contemplate computing arrangements and program products.
    • 方法和装置教授表示底层原始数据的文件的数字频谱。 数字频谱用于映射文件的位置。 相对于另一个文件位置的这个位置显示最近的邻居(910)。 当多个这样的邻居被分组在一起(930,960)时,它们可以用于指示在相同或不同的计算设备上考虑的当前数据中的相关性。 而且,如果没有需要结构化数据的传统概念或发起搜索相关性的用户或通过检查与文件相关联的元数据/管理信息,则可以找到相关性。 多个原始文件表示在相关主题的映射空间中从其创建密钥(200)的数据(82)的底层原始比特。 如果新数据足够接近(830,840),则与主题相关,并呈现给用户(850)。 定义了各种紧密度度量(820),以及关键创建的方法。 还有其他功能考虑了计算安排和程序产品。
    • 2. 发明公开
    • Dynamic service access
    • Dynamischer Zugang zu Diensten
    • EP2391087A1
    • 2011-11-30
    • EP11166776.2
    • 2011-05-19
    • Novell, Inc.
    • Burch, Lloyd LeonMukkara, Prakash UmasankarEarl, Douglas G.
    • H04L29/06H04L29/08H04L29/12
    • H04L63/0807H04L29/12066H04L29/12113H04L61/1511H04L61/1541H04L63/0272H04L67/08H04L67/16H04L67/38
    • Apparatus, systems, and methods may operate to authenticate a desktop client to an identity service (IS) (326), to receive a request (344), from an application (356), at the IS via the desktop client for a virtual service internet protocol (IP) address associated with a service (332). The IS may operate to build a routing token (340) that includes an original physical IP address associated with the service when a policy (338) associated with the IS permits access to the service by a user identity (346) associated with the desktop client. After the routing token is validated, the application may be connected to the service via the desktop client. The application may comprise an e-mail application or a remote control application, such as a virtual network computing (VNC) application. Additional apparatus, systems, and methods are disclosed.
    • 设备,系统和方法可以操作以将桌面客户端认证为身份服务(IS)(326),以从应用程序(356)在IS经由桌面客户端接收用于虚拟服务的请求(344) 与服务相关联的互联网协议(IP)地址(332)。 当与IS相关联的策略(338)允许通过与桌面客户端相关联的用户标识(346)访问服务时,IS可以操作以构建包括与服务相关联的原始物理IP地址的路由令牌(340) 。 路由令牌验证后,应用程序可能通过桌面客户端连接到服务。 应用可以包括电子邮件应用或诸如虚拟网络计算(VNC)应用的远程控制应用。 公开了附加装置,系统和方法。
    • 5. 发明公开
    • Integration of a non-token-based relying party into a token-based information card system
    • Auf von entfernten Standpunkten zugreifbare Informationskarten
    • EP2239677A1
    • 2010-10-13
    • EP10164484.7
    • 2009-03-26
    • Novell, Inc.
    • Burch, Lloyd LeonSanders, Daniel SHodgkinson, Andrew ACarter, Stephen R
    • G06F21/00
    • G06F21/34
    • An accessor function (215) interfaces among a client (105, 205), a relying party (130, 210), and an identity provider (135). The identity provider can "manage" personal (i.e., self-asserted) information cards (320, 405, 410) on behalf of a user, making the personal information cards available on clients on which the personal information cards are not installed. The client can be an untrusted client (205), vulnerable to attacks such as key logging, screen capture, and memory interrogation. The accessor function can also be asked as a proxy for the relying party in terms of invoking and using the information card system, for use with legacy relying parties, by identifying (805) a request of a resource of a legacy relying party (210) received from a client (105, 205), the legacy relying party being a relying party that does not process security tokens (160); requesting (810) the security token (160) from the client (105, 205) by the accessor function (215); and using (815) the security token (160) by the accessor function on behalf of the user to access the resource.
    • 存取器功能(215)在客户端(105,205),依赖方(130,210)和身份提供者(135)之间进行接口。 身份提供者可以代表用户“管理”个人(即,自我主张的)信息卡(320,405,410),使个人信息卡在其上没有安装个人信息卡的客户端上可用。 客户端可以是不受信任的客户端(205),容易受到密钥记录,屏幕捕获和内存询问等攻击。 还可以通过识别(805)遗留依赖方(210)的资源的请求来调用和使用信息卡系统以供与传统依赖方一起使用的存取器功能作为依赖方的代理, 从客户端(105,205)接收到,传统依赖方是不处理安全性令牌的依赖方(160); 通过访问器功能(215)向客户机(105,205)请求(810)安全令牌(160); 以及代表用户使用(815)安全令牌(160)由访问者功能访问资源。