Patent application number | Description | Published |
20130086211 | MOBILE APPLICATION, RESOURCE MANAGEMENT ADVICE - Techniques for a resource management advice service are provided. In some examples, resource management advice and/or instructions may be provided for use with mobile devices, mobile applications, cloud applications, and/or other web-based applications. For example a mobile client may request to perform one or more resource management operations associated with a service provider. Based at least in part on the requested operation and/or the particular service provider, advice and/or instructions for managing the resource may be provided. | 04-04-2013 |
20130086639 | MOBILE APPLICATION, IDENTITY INTERFACE - Techniques for managing identities are provided. In some examples, identity management, authentication, authorization, and token exchange frameworks may be provided for use with mobile devices, mobile applications, cloud applications, and/or other web-based applications. For example a mobile client may request to perform one or more identity management operations associated with an account of a service provider. Based at least in part on the requested operation and/or the particular service provider, an application programming interface (API) may be utilized to generate and/or perform one or more instructions and/or method calls for managing identity information of the service provider. | 04-04-2013 |
20130086645 | OAUTH FRAMEWORK - A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access. | 04-04-2013 |
20130086657 | RELYING PARTY PLATFORM - A framework is provided for integrating Internet identities in enterprise identity and access management (IAM) infrastructures. A framework is provided for open authorization. A framework is also provided for relying party functionality. | 04-04-2013 |
20130086669 | MOBILE APPLICATION, SINGLE SIGN-ON MANAGEMENT - Techniques for managing single sign-on are provided. in some examples, single sign-on functionality may be provided for use on mobile devices by utilizing mobile applications, cloud applications, and/or other web-based applications. For example, a mobile application or mobile web browser may request to authenticate with or access one or more service providers. Authentication credentials may be requested from a user of the mobile device to facilitate such authentication and/or access. Based at least in part on a successful log-in, access to server resources from other applications on the same mobile device may be provided without successive or repetitive credential requests to the user. | 04-04-2013 |
20150089569 | BUNDLED AUTHORIZATION REQUESTS - A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access. | 03-26-2015 |
20150089570 | CONFIGURABLE ADAPTIVE ACCESS MANAGER CALLOUTS - A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access. | 03-26-2015 |
20150089571 | PLUGGABLE AUTHORIZATION POLICIES - A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access. | 03-26-2015 |
20150089596 | USING REPRESENTATIONAL STATE TRANSFER (REST) FOR CONSENT MANAGEMENT - A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access. | 03-26-2015 |
20150089597 | MULTIPLE RESOURCE SERVERS INTERACTING WITH SINGLE OAUTH SERVER - A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access. | 03-26-2015 |
20150089617 | SINGLE SIGN-ON (SSO) FOR MOBILE APPLICATIONS - A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access. | 03-26-2015 |
20150089622 | MOBILE OAUTH SERVICE - A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access. | 03-26-2015 |
20150089623 | SERVICE PROFILE-SPECIFIC TOKEN ATTRIBUTES AND RESOURCE SERVER TOKEN ATTRIBUTE OVERRIDING - A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access. | 03-26-2015 |
Patent application number | Description | Published |
20110191213 | SECURING USER ACCESS TO A PARAMETER VALUE ACROSS A SOFTWARE PRODUCT LINE DIFFERENTLY FOR DIFFERENT PRODUCTS - A computer is programmed to receive from an administrator, a rule specifying one or more values of a parameter, identification of software wherein the rule is to be applied, and identification of a user on whom the rule is to be applied. The computer stores an association between the rule, the identified user and the identified software. On receipt of input from the identified user, to access the identified software, the computer uses the association to retrieve the rule, apply the rule to select information based on the value(s) specified in the rule, and execute the identified software to display the selected information to the identified user. Use of a rule that is specific to the user and also specific to the software enables the computer to support security for each user differently for different pieces of software in a software product line. | 08-04-2011 |
20120072415 | BUSINESS PROCESS VISUALIZATION - A business process visualization is described. In one embodiment, process may include searching for documents stored in memory. The search identifies first documents, wherein the first documents comprise data of respective transactions of a first business process sequence implemented by an enterprise application. A user interface (UI) is then generated that includes components corresponding to the first documents, respectively, and components that visually identify relationships between the first documents. | 03-22-2012 |
20120072817 | ENTERPRISE APPLICATION WORKCENTER - A first computer system displays a user interface that includes a first portion and a non-overlapping, second portion. The first portion includes a first pagelet that comprises a plurality of first active links. The first portion also includes a second pagelet that includes a plurality of second active links. One of the first active links is activated, and in response the first computer system displays a first user interface in the second area. The first user interface includes a list of first links, wherein the list of first links is displayed while the first active links and the second active links are displayed in the first and second pagelets, respectively. | 03-22-2012 |
20140085307 | AUTOMATIC GENERATION OF HIERARCHY VISUALIZATIONS - A method, system, and computer program product for presentation of data in enterprise applications. The method form commences by identifying a hierarchy of data maintained by an enterprise application (e.g., in a database). A hierarchy processor or other processor reads the hierarchy of data to configure a graphical representation of the hierarchy of data to be displayed on a display device. The graphical representation includes a graphical display indication corresponding to one or more relationships between items in the displayed hierarchy. Additional display indications include a calculated summary value of aggregated data, such as where the aggregated data is calculated using an aggregation function. | 03-27-2014 |
20140095390 | MOBILE TRANSACTION APPROVALS - A method, system, and computer program product for delivery of enterprise application data to users. Processing commences by identifying an enterprise application running on a server (e.g., an application server) for which approval processing is to be performed to approve transactions pertaining to the enterprise application. Further processing aggregates groups of transactions, and generates transaction approval display data (e.g., for display screens) that can be displayed on a mobile device (e.g., a smartphone, a mobile terminal, etc.). A sending module participates in sending the transaction approval display data to the mobile device, after which a mobile user performs approvals (e.g., singly or in groups), and transmits data back to (e.g., as an approval or as a disapproval or both). The approvals or disapprovals responsive to the displayed transaction approval display data are processed (e.g., as approvals or as disapprovals or both) for retrieval by the enterprise application. | 04-03-2014 |
Patent application number | Description | Published |
20140189199 | FALSE POWER FAILURE ALERT IMPACT MITIGATION - Apparatus and computer program products implement embodiments of the present invention that include copying, by a storage system having a volatile memory configured as a write cache, write cache data from the volatile memory to a solid state device, upon receiving a signal indicating a loss of power to the storage system. Subsequent to copying the write cache data, the solid state device is configured as the write cache. | 07-03-2014 |
20140189214 | FALSE POWER FAILURE ALERT IMPACT MITIGATION - Methods, apparatus and computer program products implement embodiments of the present invention that include copying, by a storage system having a volatile memory configured as a write cache, write cache data from the volatile memory to a solid state device, upon receiving a signal indicating a loss of power to the storage system. Subsequent to copying the write cache data, the solid state device is configured as the write cache. | 07-03-2014 |
20140201480 | Data Recovery Scheme Based on Data Backup Status - Machines, systems and methods for increasing data resiliency in a computing system, the method comprising distinguishing between first data and second data stored in one or more data storage mediums, wherein the first data is more vulnerable than the second data for the purpose of recovering lost data; and recovering the first data before recovering the second data. Increasing redundancy protection for the first data to increase chances for data recovery by way of data reconstruction; and decreasing redundancy protection for the first data, after the first data has been backed up at least once. | 07-17-2014 |
20140343832 | USING PASS CODE VERIFICATION TO ORGANIZE A VEHICLE CARAVAN - A reference pass code is received from a first user. Location information of a vehicle of the first user is received from a first computer. A pass code is received from a second user. Location information of a vehicle of the second user is received from a second computer. One or more computer processors verify that the pass code received from the second user matches the reference pass code. Based on verification of the pass code received from the second user, the location information of the vehicle of the first user is transmitted to the second computer and the location information of the vehicle of the second user is transmitted to the first computer. | 11-20-2014 |
20150058297 | ADDING COOPERATIVE FILE COLORING PROTOCOLS IN A DATA DEDUPLICATION SYSTEM - For adding cooperative file coloring protocols in a data deduplication system using a processor device in a computing environment, a preferred character is represented for file coloring in a file using a code selected from a multiplicity of codes that represent a variety of contexts. The original meaning of the preferred character is retained when representing the preferred character for the file coloring by the code selected from the multiplicity of codes. | 02-26-2015 |
20150074064 | DEFRAGMENTATION-LESS DEDUPLICATION - For defragmentation-less deduplication using a processor device, holes are punched in a file in a data deduplication process for avoiding the use of defragmenting by allowing a file system to use the punched holes for reclaiming the free space for adding to a free space pool of the file system. | 03-12-2015 |