Patent application number | Description | Published |
20140150065 | Methods and Processes for Storing and Utilizing State Information for Service Providers - Methods, computer-readable media, and apparatuses are disclosed for storing and utilizing state information for service providers. In one aspect of the invention, the methods, processes, or apparatus may include one or more of the following steps: 1) storing state information on a vault; 2) requesting state information on the vault from a receiving party and a device and providing identification to the vault; 3) authenticating and certifying the request from the receiving party; 4) providing the state information to the receiving party; 5) using the state information on the device; and 6) returning the state information to the vault. An additional aspect of the invention provides a method and/or process for storing and utilizing web-based cookies on a cloud environment for service providers. | 05-29-2014 |
20140173697 | Identity Attribute Exchange and Validation Ecosystem - Methods and systems are described herein for performing attribute authentication for use by a relying party in providing access to a resource as requested by a user. Attribute authentication may be performed entirely by a single identity service provider, or by multiple identity service providers each authenticating a subset of a plurality of user attributes, such as name, address, phone, email, and the like. Each attribute may be authenticated with a level of assurance. Levels of assurance may vary from attribute to attribute. Different levels of assurance may be required for different attributes before the relying party may grant access to the user-desired resource. An authentication broker may act as a registry or broker of identity service providers, and may store information usable by relying parties to establish a trust relationship with a particular identity service provider on demand, as needed by a relying party. | 06-19-2014 |
20140173754 | Identity Attribute Exchange and Validation Broker - Methods and systems are described herein for performing attribute authentication for use by a relying party in providing access to a resource as requested by a user. Attribute authentication may be performed entirely by a single identity service provider, or by multiple identity service providers each authenticating a subset of a plurality of user attributes, such as name, address, phone, email, and the like. Each attribute may be authenticated with a level of assurance. Levels of assurance may vary from attribute to attribute. Different levels of assurance may be required for different attributes before the relying party may grant access to the user-desired resource. An authentication broker may act as a registry or broker of identity service providers, and may store information usable by relying parties to establish a trust relationship with a particular identity service provider on demand, as needed by a relying party. | 06-19-2014 |
20140180678 | ENTERPRISE CONCEPT DEFINITION MANAGEMENT - A system for managing an enterprise concept dictionary may include an electronic master dictionary and electronic local dictionaries. The master dictionary may include concept entries respectively associated with concept identifiers and with one or more concept definitions. The local dictionaries may include one or more of the concept identifiers of the master dictionary. A dictionary management module may be in signal communication with the master dictionary and the local dictionaries. The dictionary management module may be configured to query the master dictionary for a concept entry that corresponds to a concept associated with a modeling component. If a concept entry is found, the concept identifier may be provided. If a concept entry is not found, a new concept entry may be added to the master dictionary. A notification module may be in signal communication with the master dictionary and automatically provide notification when a concept entry is added or updated. | 06-26-2014 |
20140181003 | COMMON DATA MODEL FOR IDENTITY ACCESS MANAGEMENT DATA - A data model for managing identity and access management (IAM) data implemented at an electronic database may include a set of logical resource elements, a set of physical resource elements, and a set of access requests elements that respectively model logical resources, physical resources, and access requests received at an access request manager of an enterprise. The physical resource elements may be respectively associated with the logical resource elements such that access rights for the physical resources may be obtained based on a logical resource specified in the access request. A system for managing IAM may include a mapping module configured to transform heterogeneous IAM data provided by a plurality of IAM data sources into homogeneous IAM data formatted according to the common IAM data format. A data store may implement the IAM data model such that the data store is configured to store the homogeneous IAM data. | 06-26-2014 |
Patent application number | Description | Published |
20100036520 | METHOD OF CARVING THREE-DIMENSIONAL ARTWORK - A method of producing intricate, three-dimensional artwork requiring high resolution on the part of a Computer Numerical Control (CNC) machine is disclosed. An existing three dimensional carving is captured by a computer, and converted into a NURBS surface. The operator sets forth the dimensions of the surface to be carved, including the width and the length, as well as the width of its component stiles and rails. The operator further selects the corners of such surface in which the artwork is to be carved. Thereafter, the NURBS surface is scaled and positioned in accordance with the dimensions and parameters supplied, and transmitted to respective CNC machines. The CNC machines then perform a series of carving operations in accordance with the instructions supplied by a G-code file processed from the NURBS surfaces. | 02-11-2010 |
20130150994 | METHOD OF CARVING THREE-DIMENSIONAL ARTWORK - A method of producing intricate, three-dimensional artwork requiring high resolution on the part of a Computer Numerical Control (CNC) machine is disclosed. An existing three dimensional carving is captured by a computer, and converted into a NURBS surface. The operator sets forth the dimensions of the surface to be carved, including the width and the length, as well as the width of its component stiles and rails. The operator further selects the corners of such surface in which the artwork is to be carved. Thereafter, the NURBS surface is scaled and positioned in accordance with the dimensions and parameters supplied, and transmitted to respective CNC machines. The CNC machines then perform a series of carving operations in accordance with the instructions supplied by a G-code file processed from the NURBS surfaces. | 06-13-2013 |