Patent application number | Description | Published |
20080222096 | DYNAMIC COMPUTATION OF IDENTITY-BASED ATTRIBUTES - Enterprise Identity Management systems control access to information derived from identity-related data stored in various data repositories. An identity-based management system can automatically and dynamically compute derived data when the source data changes. Rule-base tools can be used to compute derived data from arbitrary attribute-based datasets. Dynamic computation of identity-based attributes within information system servers allows data to be aggregated and normalized from multiple data sources deployed across an organization so that updated related information can be persisted and pushed to various servers in the organization. | 09-11-2008 |
20100175105 | Systems and Processes for Managing Policy Change in a Distributed Enterprise - A method for managing changes to policies in an enterprise includes receiving a systems policy change request to change a systems policy that implements a published enterprise policy, determining whether the requested systems policy change complies with the published enterprise policy, and updating the systems policy according to the requested systems policy change if the requested systems policy change complies with the published enterprise policy. A system for managing policies in an enterprise includes a policy management module configured for receiving published policies and generating corresponding systems policies having data for implementing the published policies, and a policy library storing the published policies and the systems policies. | 07-08-2010 |
20110161453 | CALENDAR REPAIR ASSISTANT - Calendar repair may be provided. Calendar events, such as appointments and meetings, may be created and copied to a plurality of attendee calendars. A first copy of the event may be compared to a second copy of the event, and an event property of the second event may be updated to match a corresponding event property of the first event. | 06-30-2011 |
20110161454 | REPAIRING CALENDARS WITH STANDARD MEETING MESSAGES - Calendar repair using a standard message may be provided. Calendar events, such as appointments and meetings, may be created and copied to a plurality of attendee calendars. A first copy of the event may be compared to a second copy of the event to determine whether properties between the events are out-of-sync. If so, a standard meeting request message comprising the correct value may be sent to update the out-of-sync property. | 06-30-2011 |
20110202759 | CERTIFICATE REMOTING AND RECOVERY - Certificate remoting and recovery may be provided. A computer may identify required security certificates and determine whether at least one required security certificate is not available. If the certificate is not available, the computer may identify a peer server and request the missing certificate from the peer server. The computer may also be operative to receive certificate management instructions from other computers. | 08-18-2011 |
20130159042 | Calendar Repair Assistant - Calendar repair may be provided. Calendar events, such as appointments and meetings, may be created and copied to a plurality of attendee calendars. A first copy of the event may be compared to a second copy of the event, and an event property of the second event may be updated to match a corresponding event property of the first event. | 06-20-2013 |
20130191894 | Integrating Server Applications with Multiple Authentication Providers - Online and on-premise applications identify trusted authentication providers. The applications are configured with a list of trusted issuers of authentication credentials. When an application receives a request requiring authentication, the application returns a 401 response that includes the trusted issuer list. The requesting application compares the trusted issuer list from the 401 response to its own list of authentication providers. If there is a match between the two lists, then the requesting application creates a self-issued token for the authentication provider. The authentication provider uses the self-issued token to generate an authentication token for the requesting application. The requesting application may also directly create a token for a target partner application, without an authentication provider, if there is a direct trust between the two applications. | 07-25-2013 |
20130283362 | AUTHENTICATING USER THROUGH WEB EXTENSION USING TOKEN BASED AUTHENTICATION SCHEME - A web extension authenticates a user using a token based authentication scheme. A token is retrieved from a client application to authenticate the user. The web extension transmits the token to a server component to have the server component authenticate the user. The server component validates the token using a validation library. The user is mapped to the token and authenticated upon validating the token. | 10-24-2013 |