Patent application number | Description | Published |
20110145915 | METHOD FOR MANAGING AUTHENTICATION PROCEDURES FOR A USER - A method and technique for managing authentication procedures for a user having access to several applications within a computing environment includes registering at an authentication manager different applications to which a user shall be given an authentication access by defining at the authentication manager a specific address identification allowing addressing the application specific authentication rules, logging the user to the authentication manager, the user requesting access to an application accessible by the authentication manager, and using the application specific address identification stored at the authentication manager to retrieve the application specific authentication rules for authenticating the user to the requested application. | 06-16-2011 |
20110145930 | Method, Program Product and Server for Controlling a Resource Access to an Electronic Resource Stored Within a Protected Data - Controlling a user access through a computer network within a protected data environment of a computer environment. An exception list comprising an Identifier (URI) stored within the protected data environment for granting user access of an unauthorized user is defined. At least one allowed access property relation for user access is defined when accessed by the unauthorized user. A URI of a user access request of unauthorized user is checked in the exception list. A One-Time URI is created. The One-Time URI is assigned to the electronic data resource according to the allowed property relation. The requested is delivered to the unauthorized user by using the assigned One-Time URI. | 06-16-2011 |
20120297333 | METHOD FOR MANAGEMENT AND BROADCASTING AN EVENT CONTEXT - A method is provided for automatically displaying context information to an information fragment with no user interaction. The method includes: displaying the fragment in a first window, wherein the window and fragment each relate to a source process; pointing with a cursor to a part of the fragment displayed in the first window; generating an event object comprising coordinates of the cursor and part of the information fragment; broadcasting the event object to the source process, wherein the only information exchange between the target process and the source process is based on the event object; interpreting the event object by the target process and generating a response by the target process; and displaying the response of the target process in a second window, wherein the second window is related to the coordinates of the cursor. | 11-22-2012 |
20130007244 | OPTIMIZING PROVISIONING WORKFLOWS IN CLOUD COMPUTING - A method for optimizing provisioning workflows in cloud computing is provided. The method comprises determining a time coefficient for each resource type or aggregated resource types which define the installation time of a current workflow; accessing the current workflow and creating a tree topology based on the current workflow which defines serialized and parallelized provisioning steps; dividing the tree topology into independent sub-paths; determining a timing condition for an execution time of an optimized workflow; creating an optimized workflow template maintaining the timing condition by: selecting cheapest installation methods and cheapest resources; and reducing the parallelization of the tree topology; creating the optimized workflow by merging the optimized workflow template with data and the resource types of the current workflow. | 01-03-2013 |
20130036306 | METHOD AND SYSTEM FOR HANDLING DEFINED AREAS WITHIN AN ELECTRONIC DOCUMENT - A method is provided for handling defined areas within an electronic document, which includes: marking at least one area in an electronic source document as indecomposable area which can be processed as a whole content only; generating signature data for the indecomposable area; assigning the signature data to the indecomposable area to create an indecomposable area object; storing the indecomposable object; encrypting and transmitting the indecomposable area object in response to a request of an enhanced content reader application, where the enhanced content reader application decrypts the indecomposable area object and processes the indecomposable area in an electronic target document; and generating and transmitting a protected version of the indecomposable area in response to a request of a regular content reader application, where the regular content reader application outputs the protected version of the indecomposable area in an electronic target document. | 02-07-2013 |
20130117860 | Controlling Access Within a Protected Data Environment - Controlling a user access through a computer network within a protected data environment of a computer environment. An exception list comprising an Identifier (URI) stored within the protected data environment for granting user access of an unauthorized user is defined. At least one allowed access property relation for user access is defined when accessed by the unauthorized user. A URI of a user access request of unauthorized user is checked in the exception list. A One-Time URI is created. The One-Time URI is assigned to the electronic data resource according to the allowed property relation. The requested is delivered to the unauthorized user by using the assigned One-Time URI. | 05-09-2013 |
20140101109 | BACKUP MANAGEMENT OF SOFTWARE ENVIRONMENTS IN A DISTRIBUTED NETWORK ENVIRONMENT - Backup management of software environments in a distributed network environment includes: Creating a platform specific software environment according to a predefined software environment definition by a user in the network environment; automatically creating a generalized backup of the software environment by extracting platform independent data contents and platform specific transformation rules; automatically calculating enhanced meta data describing the generalized backup; assigning the enhanced metadata with the predefined software environment definition; registering the generalized backup with the enhanced metadata in a backup storage accessible by a plurality of distributed users connected via said network environment, creating a software environment according to a predefined software environment definition by automatically checking the backup storage for an available generalized backup by means of the predefined software environment definition. | 04-10-2014 |
20140129922 | ENSURING INTEGRITY OF A DISPLAYED WEB PAGE - Ensuring integrity of a displayed web page in a client-server infrastructure including defining an enhancement for a web page markup for an enhanced web page content including a provided web page content and at least one identified provider added content as prerequisite content for the provided content, implementing a secure web browser document object model (DOM) enhancement and an enhanced document object model (DOM) processing embedding a user-requested content and the at least one corresponding prerequisite content based on the web page markup enhancement so that the requested content and the at least one prerequisite content of the enhanced web page content of an enhanced web page are secured and displayed as entity. | 05-08-2014 |
20140164335 | DATABASE IN-MEMORY PROTECTION SYSTEM - A computer-implemented process provides data protection of an in-memory database. The method may include triggering the securing of data of the in-memory database to a first savepoint; securing data of the in-memory database to the first savepoint; and backing up the data of the first savepoint on a persistent storage medium. The data of the first savepoint may be stored on a first persistent medium and the backup data of the first savepoint are stored on a second persistent storage medium. The availability of two different savepoint data on physically different storage media increases the probability of having always savepoint data ready for recovery purposes dramatically. By using different storage media, even in cases of a hardware damage savepoint data will be available. | 06-12-2014 |