US20220294788A1 - Customizing authentication and handling pre and post authentication in identity cloud service - Google Patents
Customizing authentication and handling pre and post authentication in identity cloud service Download PDFInfo
- Publication number
- US20220294788A1 US20220294788A1 US17/196,907 US202117196907A US2022294788A1 US 20220294788 A1 US20220294788 A1 US 20220294788A1 US 202117196907 A US202117196907 A US 202117196907A US 2022294788 A1 US2022294788 A1 US 2022294788A1
- Authority
- US
- United States
- Prior art keywords
- plug
- ins
- user
- authentication
- post
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims abstract description 103
- 238000013475 authorization Methods 0.000 claims description 58
- 230000008569 process Effects 0.000 claims description 56
- 230000004044 response Effects 0.000 claims description 50
- 238000012545 processing Methods 0.000 claims description 48
- 235000014510 cooky Nutrition 0.000 claims description 37
- 238000004891 communication Methods 0.000 claims description 28
- 230000015654 memory Effects 0.000 claims description 23
- 238000004458 analytical method Methods 0.000 abstract description 5
- 238000007726 management method Methods 0.000 description 100
- 230000001960 triggered effect Effects 0.000 description 24
- 238000010586 diagram Methods 0.000 description 23
- 230000009471 action Effects 0.000 description 10
- 238000012986 modification Methods 0.000 description 6
- 230000004048 modification Effects 0.000 description 6
- 238000013403 standard screening design Methods 0.000 description 6
- 238000012550 audit Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 239000011521 glass Substances 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000002093 peripheral effect Effects 0.000 description 4
- 238000013519 translation Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 239000000243 solution Substances 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 101100509468 Arabidopsis thaliana JASON gene Proteins 0.000 description 1
- VYZAMTAEIAYCRO-UHFFFAOYSA-N Chromium Chemical compound [Cr] VYZAMTAEIAYCRO-UHFFFAOYSA-N 0.000 description 1
- 241000238558 Eucarida Species 0.000 description 1
- 241000699666 Mus <mouse, genus> Species 0.000 description 1
- 241000699670 Mus sp. Species 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000013474 audit trail Methods 0.000 description 1
- 230000004397 blinking Effects 0.000 description 1
- 238000002591 computed tomography Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000002059 diagnostic imaging Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000002595 magnetic resonance imaging Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 239000012086 standard solution Substances 0.000 description 1
- 230000026676 system process Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000003325 tomography Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000013024 troubleshooting Methods 0.000 description 1
- 238000002604 ultrasonography Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44521—Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
- G06F9/44526—Plug-ins; Add-ons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Definitions
- Cloud-based computing platforms offer significant advantages over traditional on-premises computing platforms. For instance, cloud-based computing platforms provide scalable and flexible computing resources for users and can be deployed across geographic regions that are widely spaced apart (e.g., in different countries). Cloud-based computing platforms can provide one or more categories of services, including Software as a Service (SaaS), Platform as a Service (PaaS), or Infrastructure as a Service (IaaS).
- SaaS Software as a Service
- PaaS Platform as a Service
- IaaS Infrastructure as a Service
- An identity service provider can be responsible for handling, for example, authentication, authorization, single sign-on (SSO), user management, application management and audit.
- An identity service provider can offer flexibility and standard solutions.
- an authentication flow for authenticating a user, is performed in a closed-control manner. Once an identity system starts an authentication flow, the control leaves a business application until required artifacts or tokens are generated.
- identity solutions do not provide any flexibility. Further, such identity solutions do not provide plug-in customized code as part of the login control flow so as to influence a login decision or cleanup during logout.
- Back end API calls do not provide complete control for performing login orchestration. For example, if the system would like to create a session on the user browser as part of login process or if the system would like to clear something during logout process then, it may not be possible using back end API calls. Also, the user is not given the ability to completely control a session.
- API Application Programming Interface
- the present disclosure relates to cloud computing systems, and more particularly, to techniques for customizing authentication and handling pre-authentication and post-authentication processes in an identity cloud service.
- Various embodiments are described herein, including methods, systems, non-transitory computer-readable storage media storing programs, code, or instructions executable by one or more processors, and the like.
- Example embodiments can be configured for authentication and authorization by an identity cloud service of an identity and access management (IAM) system.
- An identity and access management can also be referred to as an Access Management System (AMS).
- AMS Access Management System
- the IAM can also be generally referred to as an identity system or cloud identity system.
- a cloud service can include a plurality of different types of services that are provided to companies and customers over the internet.
- resources can include computing resources (e.g., compute instances), networking resources (e.g., a virtual private network), storage resources (e.g., cloud-based databases), and other hardware or software resources.
- Resources may be provisioned for use in a tenancy associated with a particular client. Within the tenancy, the client may have secure and isolated access to the provisioned resources, and the cloud platform may provide the client with software tools for organizing, administering, or otherwise managing the provisioned resources. For instance, an enterprise client may be provided with tools for defining the scope of access privileges to resources by different groups of employees of the enterprise client.
- a protected resource can include a business application such as an application used to manage employees or to conduct a payment.
- An application can be accessed through a website or URL.
- a protected resource can also include a machine.
- the level of access can vary among entities. For instance, as indicated above, different users within a tenancy may have access privileges that depend on their user role (e.g., human resources, administrators, sales, etc.). Thus, access control can be based upon user identity.
- entities that require access to resources may include compute instances (e.g., virtual or bare metal machines).
- the access management system When a user wants to access a resource that is protected by an access management system, the access management system receives information indicating that a particular user is requesting access to a particular protected resource. The system can then execute or invoke a process flow comprising a set of operations for authenticating the particular user. If authentication of the user is successful, then a session can be created for the user. After the session is created, the user can be redirected to the protected resource (or application) via the created session and the user is given the ability to control the application.
- a user may want to be able to plug-in their own code or create their own modules for a protected resource, such as an application. For example, a user may want to modify the authentication process for an application.
- a user can also be known as a client, customer, enterprise customer, or tenant. Plug-ins can be triggered so as to influence an authentication decision while establishing login or for cleanup during logout from an application.
- a plug-in can also be referred to as a plugin, add-in, addin, add-on, or addon.
- a plug-in can include computer implemented instructions to add specified rules or features to processes performed by the access management system. The example embodiments are described with respect to plug-ins for an access management system in a cloud environment. However, plug-ins can be created and applied for systems other than access management system, such as on-premise enterprise systems. Plug-ins can allow users to create and apply customizations to the authentication process. A plug-in can be triggered or activated in response to specified conditions being met.
- plug-ins can be configured to trigger at various points during the process in which a protected resource is requested and accessed.
- a plug-in may be configured to trigger after the access management system receives an indication that a user is requesting access to a particular protected resource (e.g., pre-login).
- a plug-in can also be configured to trigger before a session has been established for a user (e.g., pre-login) or after a session has been established for user (e.g., post-login), but before the user has logged out.
- Example embodiments can provide plug-ins that can be triggered pre-login, post-login, pre-logout, or post-logout.
- a plug-in that is triggered “pre-login” can be triggered before creating a single sign-on session. Pre-login can occur after an access management system receives an indication that a user is requesting access to a particular protected resource, or at a point in time before a session is established.
- a plug-in that is triggered “post-login” can be triggered after creating a single sign-on (SSO) session.
- a plug-in that is triggered “pre-logout” can be triggered before clearing a single sign-on session.
- a plug-in that is triggered “post-logout” can be triggered after clearing a single sign-on session.
- Logout can also be referred to as logoff or log-off.
- Pre-login can also be referred to as pre-authentication or pre-login authentication.
- Post-login can also be referred to as post-authentication or post-login authentication.
- the plug-ins can be triggered in response to an event.
- a pre-login trigger can be triggered in response to a log-on event.
- a post-logon plugin can occur after an authentication phase of logging in finishes, but before the user session is actually established.
- a post-logout plugin can occur when a session disconnects.
- plug-ins that can be provided by a user, however, plug-ins in addition to those identified can be provided for the login process and logout process or while determining whether a user is an authorized user of the application.
- Example embodiments provide users with the flexibility of customizing the authentication process for applications. Although users are granted permission to generate and implement their own plug-ins, measures are in place to prevent the user from controlling the overall code of the cloud identity system. Further, measures are also in place to prevent the plug-ins generated by the user from putting service provider computing systems (e.g., IAM) at risk, such as by preventing the plug-ins from consuming too much computing power and/or memory, etc. Measures are also placed to decrease the risk on the service provider computing system.
- service provider computing systems e.g., IAM
- API Application Programming Interface
- Example embodiments address these deficiencies by providing a solution where the control is forwarded to the application to handle and participate in, for example, pre-login, post-login, post-login, and post-logout ceremonies.
- an example embodiment can provide the user with complete control over a user session and the browser. Since configurations are loosely coupled, the configurations are not tied to the system. For example, a user is given the ability to change user interface structures. The user can be given complete control over the user session in the browser so as to control an authentication process and apply their own configurations. Measures are put in place to ensure that the system operates correctly.
- a system in accordance with some example embodiments benefits the cloud architecture where customers want to inject and trigger their piece of code in the identity system to make pre-authentication and post-authentication decisions.
- An example embodiment ensures that a user's customized processing and decisions are handled before the session is created or access is given.
- Example embodiments helps customers to inject their pre-login, post-login, pre-logout, and post-logout configurations. Further, example embodiments can assist users in writing their implementation and deploy the implementation on their chosen platform. Example embodiments can allow customer applications to take part in single sign-on (SSO) session creation. In example embodiments, a POST/GET call with a required input can be called to the configured endpoint. Further, the deployed service can process the incoming request and return the result as a post redirect back to the identity system. Also, an identity management system of an example embodiment can process results sent by a pre-authenticated module or a post-authenticated module which are included in the decision making. Further, example embodiments can return a risk score for adaptive authentication. The risk score can be used to compute policy decisions, such as determining whether access to the system should be avoided.
- SSO single sign-on
- FIG. 1 illustrates a simplified block diagram of an example cloud computing environment, in accordance with one or more embodiments.
- FIG. 2 illustrates a system architecture of a cloud identity system, in accordance with some example embodiments
- FIG. 3 illustrates a sequence diagram for a method of applying customized plug-ins, in accordance with some example embodiments.
- FIG. 4 illustrates a method of customizing plug-ins, in accordance with some example embodiments.
- FIG. 5 illustrates a method of analyzing a plugin, in accordance with some example embodiments.
- FIG. 6 illustrates a sequence diagram of a method for customizing a plug-in, in accordance with some example embodiments.
- FIG. 7 illustrates a request format of a request used in handling plug-ins, in accordance with some example embodiments.
- FIG. 8 illustrates a response format of a response used in handling plug-ins, in accordance with some example embodiments.
- FIG. 9 illustrates a simplified block diagram of an access management system including a plug-in system, in accordance with some example embodiments.
- FIG. 10 illustrates a method of applying plug-ins, in accordance with some example embodiments.
- FIGS. 11A and 11B illustrate a flow diagram of a method for handling pre-login plug-ins, in accordance with some example embodiments.
- FIG. 12 is a block diagram illustrating one pattern for implementing a cloud infrastructure as a service system, in accordance with some example embodiments.
- FIG. 13 is a block diagram illustrating another pattern for implementing a cloud infrastructure as a service system, in accordance with some example embodiments.
- FIG. 14 is a block diagram illustrating another pattern for implementing a cloud infrastructure as a service system, in accordance with some example embodiments.
- FIG. 15 is a block diagram illustrating another pattern for implementing a cloud infrastructure as a service system, in accordance with some example embodiments.
- FIG. 16 is a block diagram illustrating an example computer system, in accordance with some example embodiments.
- the present disclosure relates to cloud computing systems, and more particularly, to techniques for customizing authentication and for handling pre-authentication and post-authentication plug-ins in an identity cloud service of an access management system.
- a user such as a customer of an enterprise system, may want to write their own code or modules for handling customization during the login process for an application. Users may want to modify the predefined login process or add additional steps to the login process. For example, the user may want to create their own session instead of using an existing session with an application. Further, a user may want to create their own notifying events about pre-login, post-login, pre-logout and post-logout, or add additional authentication measures.
- Example embodiments allow users to inject their own pre-authentication and post-authentication configurations.
- a user can write their own implementation and deploy the implementation on their chosen platform.
- Example embodiments ensure that the user's customized processing and decisions are addressed before the session is created or before access is given.
- FIG. 1 illustrates a simplified block diagram of an example cloud computing environment 100 , in accordance with one or more embodiments.
- the environment 100 includes a cloud infrastructure system 110 operated by a cloud service provider.
- the cloud infrastructure system 110 may include infrastructure resources 140 (e.g., hardware and/or software components configurable to provide cloud services 130 to clients of the cloud infrastructure system 110 .
- the infrastructure resources can be partitioned into different client tenancies 145 A- 145 N.
- Each client tenancy 145 A- 145 N is a logical container that can contain logical resources to which the corresponding client (e.g., customer or user) has secure and private access.
- a logical resource could be a database, a load balancer, or a testing platform for testing software code.
- the cloud infrastructure system 110 may include an Identity Access Management (IAM) system 120 .
- IAM Identity Access Management
- the Identity Access Management (IAM) system can also be known as an Access Management System (AMS), identity system, or cloud identity system.
- AMS Access Management System
- identity system identity system
- cloud identity system cloud identity system
- the IAM system 120 may be configured to manage access to the infrastructure resources 140 by user principals and/or resource principals.
- the functionality provided by the IAM system 120 may include an identity cloud service 135 (another example of cloud services 130 ).
- the cloud based identity service e.g., identity cloud service 135
- IAM system 120 can be implemented in hardware and/or software and may include, for example, one or more access management servers configured to process requests from client devices for access to resources within the client tenancies 145 A- 145 N.
- the IAM system 120 is configured to protect access to protected resources, such as applications.
- Each of the client tenancies 145 A- 145 N can include one or more applications 155 A- 155 N.
- Applications 155 A- 155 N can correspond to business applications that are used by the client, such as human resource applications, payment applications, etc.
- Each of the tenants client tenancies 145 A- 145 N can include a plurality of different applications based on their business needs. Further, each of the applications can be configured to include different authentication processes and can be configured to provide different information during the authentication process.
- FIG. 2 illustrates a system architecture of a system 200 , in accordance with some example embodiments.
- the system architecture 200 includes a user 210 , a browser 220 , one or more customer applications 230 , the internet 240 , an identity service 251 , a database 252 , and plug-ins 253 .
- Identity service 251 , database 252 , and plug-ins 253 can make up an access management system 250 or the domain of an access management system.
- a user 210 such as a customer of the access management system, may want to configure plug-ins.
- the user 210 can use a browser 220 on their computing device (e.g., laptop, desktop, mobile device) to request to configure and apply pre-authentication and/or post-authentication plug-ins.
- the user 210 can access customer applications 230 through the internet 240 .
- the applications can include any applications that exist in the access management system and are accessible and configurable by the user.
- the applications that can be configured by the user can vary based on the administrator rights and permissions given to the user.
- the access management system 250 can include one or more identity services 251 , one or more databases 252 , and plug-ins 253 .
- Identity service 251 is an example of cloud service.
- Database 252 can be configured to store login actions and rules for the access management system 250 .
- Plug-ins 253 can include pre-authentication and post-authentication plug-ins that are configured to be implemented in customer applications 230 .
- the system 200 exposes configurations so that the customer can configure pre-authentication and post-authentication plugins, which allow customers to create customized code.
- a plug-in can also be referred to as a plugin, add-in, addin, add-on, addon or a plug-in extension.
- a plug-in can include computer implemented instructions to add specified rules or features to processes performed by the access management system.
- a plug-in can also be known as a trigger.
- a plug-in can be composed to trigger at a particular time during, for example, an authentication process.
- the example embodiments are described with respect to plug-ins for an access management system, in a cloud environment. However, plug-ins can be created and applied for systems other than access management system, such as on-premise enterprise systems.
- Plug-ins can be used to, for example, provide notifications regarding events, to provide audit information, to provide third-party applications with information, for creating a footprint in a browser, for modifying an application session cookie, or for calculating and returning application-based business logic risk-scores.
- a user may want to be notified whenever a login occurs, or the user may want to be notified regarding what happened during login. Alternatively, the user may want to be notified regarding what is occurring during pre-login or post-login.
- An audit can include creating an audit trail.
- the conditions for a plug-in are audited to determine whether the conditions for the plug-in are being met.
- a user may want to make an audit for a particular user accessing an application on a tenant's account.
- Providing third-party applications with information may be used when a user wants to bring in a third-party authentication or another form of authentication, in addition to that which is already provided.
- the user may want to inform the third-party application regarding the status of the authentication.
- Creating a footprint in a browser may occur when a user wants to create a footprint in the browser for a specific application, even before creating a session. Further, a user may want to calculate a score based on their environment. That is, a user may want to calculate and return application-based business logic risk-scores.
- a user may want to add another level of authentication (e.g., multi-factor authentication (MFA).
- MFA multi-factor authentication
- the user may want to add an additional authentication requirement, such as generating a token or requesting biometric information.
- Plug-ins can be configured to trigger at various points in time.
- a plug-in that is triggered “pre-login” can be triggered before creating a single sign-on session. Pre-login can occur after an access management system receives an indication that a user is requesting access to a particular protected resource, or at a point in time before a session is established.
- a plug-in that is triggered “post-login” can be triggered after created a single sign-on (SSO) session.
- a plug-in that is triggered “pre-logout” can be triggered before clearing a single sign-on session.
- a plug-in that is triggered “post-logout” can be triggered after clearing a single sign-on session.
- the user In order to configure a plug-in, the user has to be an authorized user of the system. Users may have to go through multi-factor authentication (MFA) to get a token or console, so only valid users are able to configure the plugins. In order to obtain the token indicating that the user is an authorized user, the user may perform a sign on session.
- a user can include an administrator of a tenant in the multitenant cloud environment.
- a tenant can include, for example, a company or a branch within a company.
- the level of authorization needed can vary. That is, the type of plug-in generated can vary depending on the authorized role of the administrator.
- the access management system can provide the user with attributes and values the user can change.
- the user will upload their public key and forward their public key to the access management system.
- After the user configures the plug-in they will forward the plug-in along with their private key to the access management system.
- the access management system will verify the signature of the response using the public key provided by the user. Therefore, no other third parties can interfere since they do not have the private key of the user.
- Plug-ins can be configured using an identity system admin console or with a token with an identity domain administrator role.
- the user can access an administrator control which identifies permissions needed in order to generate the one or more plug-ins. If the administrator does not have the needed permissions for a particular plug-in, then the user will not be allowed to configure the particular plug-in.
- a plug-in will be configured to include an application URL.
- the URL will correspond to the application for which the plug-in is configured.
- the plug-in code will also include information regarding the state of the application for implementing the plug-in, such as whether the application should be in a pre-login state, a post-login state, a pre-logout state or a post-logout state.
- the plug-in configuration can also include information such as whether it is mandatory or optional.
- the plug-in configuration can also include information regarding security, such as any required username or password.
- the configuration can also include details of a service endpoint, or what kinds of signatures are needed.
- the level of sensitivity configured by the user can vary based on the administrator role.
- the plug-in will also include account information of the user. Based on the information in the plug-in, the access management system can determine whether or not user is authorized to implement the plug-in and whether the criteria for the plug-ins have been met.
- the plug-in will also include the public key of the user.
- the access management system will verify signatures in responses using a public key to ensure that no third party factor has interfered in the response.
- the access management system will verify that the user is to correct user by using the public key.
- the plug-in can sign their responses using their private key.
- Plug-ins can also be configured to ensure that the plug-ins comply with system requirements.
- the plug-in is configured to ensure that security measures are maintained. For example, a plug-in is configured with a nonce so as to prevent an external request replay attack.
- a replay attack can include when a third party obtains the request or transmission and fraudulently or maliciously duplicates the request one or more times.
- a replay attack can also occur if there is a bug in the code of the plug-in and the code sends a request multiple times to the access management system.
- a nonce Through the use of a nonce, a second request will be rejected, as the earlier request would have an evicted nonce. Only one response will be accepted from a plug-in in a single session.
- the access management system would not reply to a request if it has previously replied to a request with the identified nonce.
- a nonce is generated for every request so that a request cannot be duplicated.
- a nonce can include randomly generated numbers and/or letters that would be unique to the specific instance of the plug-in.
- An example embodiment can also prevent forged requests.
- the identity system sets the nonce in a cookie, so that even if someone captures the nonce, they cannot succeed without the cookie containing the nonce.
- the cookies are set in the browser.
- the browser will have the corresponding data and the corresponding data has the nonce.
- the cookies in a browser are set for the particular domain corresponding to the plug-in. An improper user cannot forge the system because each request coming from a plug-in calls a particular domain.
- the nonce will be compared in the backend as well as in the cookie.
- An example embodiment also ensures data integrity with respect to request data and data integrity with respect to response data.
- the access management system will sign the data output.
- the corresponding tenant's private key and the plug-in has to verify the response using the public key of the access management system.
- All requests and response data can be sent in a JASON web token (JWT format), which is signed by the private key of the sender.
- JWT format JASON web token
- a recipient can be required to verify the signature using a public key of sender.
- the identity system can sign the request data using its private key when sending to application.
- the application can access a data store (e.g. admin/v1/SignedCertJwk) to get the public key for verification.
- the application builds its own data and can send the data to the identity system.
- the data will be signed by its private key, and the counter part of this key (i.e., public key) can already be uploaded to identity system at the time of configuring the plug-in.
- the identity system can verify the data sent by application using the public key of the user.
- the tenant will sign the response with their own private key and access management system will verify the signature using the public key uploaded for the plug-in.
- the access management can send a response to the plug-in using the tenant's private key.
- the plug-in can verify the response from the access management system using the public key of the access management system.
- the plug-in can request the public key of the access management system (e.g., tenant's public key for the access management system).
- Plug-ins that are configured to be triggered during pre-login or pre-authentication can include criteria that are identified by user as being mandatory or optional. If criteria for a plug-in is designated as mandatory, then the plug-in cannot be initiated unless all of the criteria has been met. If criteria for a plug-in is designated as optional, then all of the criteria does not need to be met before the plug-in is initiated.
- a mandatory plug-in is a plug-in which has one or more factors or criteria that is required in order for the plug-in to be implemented in the current session. If factors of the plug-in are not met, the session will not be created. For example, if a plug-in is a multi-factor authentication plug-in, then the user must provide the information needed in order to implement the plug-in. However, if the plug-in is, for example, an audit plug-in, no additional information may be needed from the user since the plug-in can perform the task without requiring any additional information. Plug-ins that require additional information can be placed in the list for the pre-authentication process whereas plug-ins that do not require additional information from the user can be placed in a list of post-authentication process plug-ins.
- the plug-in will not be implemented in the current session. For example, if the plug-in is for another layer of authentication, such as requesting biometric information, then the authentication process will not resume without requesting biometric information. Therefore factors for pre-login plug-ins have to be satisfied in order for the session control to be transferred to the user.
- Pre-login plug-ins can, as a default, be configured to be mandatory. That is the pre-login plug-in criteria must be satisfied before the plug-in is allowed to access application since access to the application could be controlled. If the mandatory criteria is not satisfied then the one or more plug-ins including the mandatory criteria will be denied. A decision can be returned to a user denying the user access to the protected resource for that plug-in.
- Post-login plug-ins may not need to be designated as mandatory as the user will not usually be prevented from logging out of an application. That is, logging out of an application will usually not be prohibited due to an error with a plug-in. Therefore, even if a post-login plug-ins fails, the user will not be prohibited from leaving an application. However, the user can be notified regarding any issues with a plug-in.
- An optional plug-in is a plug-in which has one or more factors or criteria that is not required in order for the plug-in to be implemented in a current session. If one or more factors or criteria for an optional plug-in are not satisfied, the plug-in can still be implemented in a current session with an application. Therefore, if any of the plug-ins which are optional fail, that is one or more factors or criteria for the plug-ins fail, the session can still proceed.
- Plug-ins that are triggered to occur post-login can be identified as optional plug-ins. Plug-ins that are triggered to occur post-login are identified as optional because post-login plug-ins can be grouped together as a group, and therefore processed as a group. Whereas plug-ins that occur pre-login are processed individually. Therefore, if any factors are not met for post-login plug-ins a session can still be created.
- Plug-in factors that can be considered optional can include application specific audit-logging plugins, application login reporting plugins, and application session tracker plugins.
- a user may want to generate plug-ins to be used to during the authentication process.
- the authentication process can generally refer to the stages that occur before, during and after authentication of a user with an application.
- An example embodiment ensures that the user's customized processing and decisions are addressed before the session is created or before access is given. Therefore, before the session is created or before access is given, it is determined whether any pre-authentication or post-authentication plug-in can be applied.
- Plug-ins can be generated for various points in the process of requesting access to a particular protected resource.
- a plug-in may be configured to trigger after the access management system receives an indication that a user is requesting access to a particular protected resource (e.g., pre-login).
- a plug-in can also be configured to trigger before a session has been established for a user (e.g., pre-login) or after a session has been established for user (e.g., post-login), but before the user has logged out. Therefore, a user is provided with a plurality of different possibilities for customizing plug-ins.
- FIG. 3 illustrates a sequence diagram 300 of the stages during which plug-ins can be applied, in accordance with some example embodiments.
- Stage 310 discloses a pre-login or pre-authentication stage. At this point, the user has not yet established a login session. That is, the user has not yet logged into an application.
- One or more plug-ins can be generated for implementation pre-login.
- the plurality of plug-ins can be stored in an ordered list. If there is more than one plug-in than the plug-ins are evaluated sequentially.
- Stage 320 discloses a stage during which a session has been established.
- Stage 330 illustrates a post-login stage which is also a post-authentication stage. At this point in time the user has established a login session and has been authenticated.
- Stage 340 illustrates a pre-logout stage which is also a post-authentication stage. This is a stage after the user has logged in, but before the user has logged out of the application.
- Stage 350 illustrates a stop session stage. At this point, the user has indicated that they would like to end their session with the application.
- Stage 360 illustrates a post-logout stage, which is also a post-authentication stage. At this stage, the user has logged out of the application.
- FIG. 3 illustrates example stages for which plug-ins can be configured. However, additional pre-authentication and post-authentication stages can be included other than those shown in FIG. 3 .
- FIG. 4 illustrates a method 400 of customizing plug-ins, in with some example embodiments.
- the access management system may receive a request to access a protected resource.
- the request can be received from a user (e.g., tenant) of the cloud computing environment to access a protected resource managed by the access management system, such as a business application.
- a user may submit a request indicating that they would like to implement a customized a plug-in.
- a user can customize plug-ins that will trigger pre-authentication or post-authentication.
- the access management system can determine whether the user is authorized to access the protected resource. Since the resource is a protected resource, it must be determined whether the user is an authorized user before the user is allowed to customize or modify any aspect of the business application. If the user is not authorized to access the resource, then the user will not be allowed to configure plug-ins for the resource.
- An authorization process can be performed with the user to ensure that the user is an authorized user. Further, the authorization process can ensure that a particular plug-in is configured within the permissions for a particular user.
- the access management system can determine whether the user is authorized to access the resource by performing an identity service authentication process, such as single sign-on (SSO). If the identity service authentication process fails, then the user will not be authorized to implement any customized plug-ins.
- the identity service authentication process can include a challenge and response authentication. If the user fails to respond correctly to any of the challenges, then no calls will be made for any configured plug-ins.
- the access management system can identify one or more plug-ins for controlling an authentication session for the protected resource.
- step 404 the one or more plug-ins generated by the user are analyzed to determine that criteria for the one or more plug-ins are satisfied. This step can occur after creating a single sign-on session, but before redirecting to the actual application.
- the access management system can give a call back to plug-ins. Step 404 is explained is greater detail with respect to FIG. 5 .
- a session in response to determining that the criteria for the one or more plug-ins are satisfied, a session can be created for the user.
- a session includes a period a time during which a user is given access to the application.
- the user is provided with direct access and control of the application.
- FIG. 5 illustrates a method 500 of analyzing a plugin, in accordance with some example embodiments.
- FIG. 5 can correspond to step 404 of FIG. 4 .
- All of the plug-ins that the user would like to implement for a session will be generated before a session is established.
- An example embodiment analyzes the plug-ins to determine whether or not the plug-in can be implemented for session.
- Pre-authorization plug-ins are plug-in to be implemented before a session is established.
- the plug-ins can be obtained from an ordered list.
- the ordered list can include one or more plug-ins that are configured for a particular application.
- the ordered list can be stored on a data store that is accessible by the access management system.
- the ordered list can include pre-authentication and post authentication plug-ins that are configured by the user.
- Pre-authentication plug-ins will be processed before any post-authentication plugins in the ordered list.
- the first plugin in the ordered list or the plug-in in the ordered list having the highest priority can be identified as a highest ordered plug-in.
- a second plug-in in the ordered list having a second highest priority can be identified as a second highest ordered plug-in, and so forth for any remaining plug-ins.
- the pre-authorization plug-in is executed and a response is returned. Processing of the pre-authorization plug-in can be performed. Processing can include determining whether the criteria for implementing the plug-in have been met. For example, if there are mandatory criteria for implementing the plug in, then it is determined whether the mandatory criteria have been met. Processing can also include determining whether security measures are in place. For example, that the plug-in includes a nonce and public/or private key information.
- a cookie can be created for a browser session with the application.
- the cookie can be updated based on the results of processing the pre-authorization plug-in.
- a cookie is a file which is used to keep track of events occurring during a session. The user can refer to the cookie to determine the results of processing the plug-in for implementation.
- the access management system can determine whether there are any post-authorization plug-ins.
- the access management system can identify any post-authorization plug-ins from the ordered list.
- the post-authorization plug-ins can occur after the pre-authorization plug-ins on the ordered list.
- post-authorization plug-ins are executed and a response is returned.
- the post-authorization plug-in can be processed. Processing of post-authentication plug-ins would occur after all of the pre-authentication plug-ins have been processed. Processing can include determining whether the criteria for implementing the plug-in have been met.
- the cookie for the session is updated based on the results of processing the post-authorization plug-in.
- the cookie is updated to include information regarding the processing of the post-authentication plug in.
- FIG. 6 illustrates a sequence diagram of a method 600 for customizing a plug-in, in accordance with some example embodiments.
- the sequence includes a browser 610 , an application system 620 , an identity system domain 630 , and pre-authentication and post-authentication plug-in system 640 .
- the application domain 620 can include an application gateway server 621 and one or more customer applications 622 .
- the identity system domain 630 can include an access gateway server 631 and an identity and access management system 632 .
- Pre-authentication plug-in and post-authentication plug-in system 640 is configured to provide the plug-ins.
- the plug-ins can also be called plug-in extensions as they extend operations currently provided by the access management system.
- Pre-authentication plug-in and post-authentication plug-in system 640 can include a pre-authentication handler 641 and a post-authentication handler 642 .
- the pre-authentication handler 641 can be configured to process pre-authentication or pre-login plug-ins hosted by the customer.
- the post-authentication handler 642 can be configured to process post-authentication or post login, pre-logout and post logout plug-ins hosted by the customer.
- the pre-authentication plug-in and postauthentication plug-in system 540 can be part of a customer hosted plug-in system in the cloud environment.
- the cloud identity system when it detects configured pre-authentication or post-authentication plugins, it sends a request back to the configured URL with proper request data.
- the third party plugin can take action on the received input and provide a necessary result so that cloud identity system can take appropriate decisions while allowing access to the system.
- a plug-in can be invoked by the access management system using a URL corresponding to that plug-in.
- the URL for a plug-in is configured and identified when the plug-in is registered with the access management system.
- Registration and generation of the plug-in can be done via a console, such as a web interface provided by a cloud services provider for making configuration changes to a customer's account.
- the registering of a plug-in can be performed by, for example, a user (e.g., administrator) that is designated for the customer (e.g., designated for a customer tenancy). Only an administrator with the appropriate credentials for logging onto the console can make changes to an application.
- Access management system can control the console that is provided to the administrator.
- the steps occur in the front end or front channel and there are no backend or back channel communications.
- the user can open an application on the browser 610 .
- the user can select an application, such as a human resources application or a payment application of the tenant, that is protected by the access management system.
- an application such as a human resources application or a payment application of the tenant, that is protected by the access management system.
- the user can select a webpage for an application or enter a URL on a browser.
- the gateway server 621 can determine that the application that the user wants to access is a protected resource and therefore the user cannot access the application without a session cookie.
- the can gateway server 621 can then send a URL redirection code (e.g., 302 ) to request authorization to access an application.
- the request can performed using a method for accessing websites or applications, such as OAuth.
- the browser sends a GET request to the access gateway server 631 to request authorization.
- the redirect from step 651 goes back to the browser 610 and the browser 610 sends it to the access gateway server 631 .
- the access gateway server 631 can determine whether the application, for which access is requested, is a protected resource.
- the access gateway server 631 forwards the GET request to the identity and access management system 632 .
- the access gateway server 631 determines that the application is a protected application, the call is redirected to the identity and access management system 632 .
- the call is redirected to the identity and access management system 632 since the access gateway server 631 can identify that it does not have a cookie for the session.
- the authorization ceremony is started.
- Primary authorization or primary authentication is performed such as requiring a user name and password.
- Primary authorization can include implementing multifactor authentication (MFA) policies, Terms of Use (ToU) policies, etc.
- MFA multifactor authentication
- ToU Terms of Use
- the primary authentication value using the password and any multi-factor authentication is performed so as to initiate the process of allowing the user to access the application.
- step 655 the process can proceed to cookie creation. If there are plug-ins, then the method proceeds to step 655 .
- Authorization is shown as occurring at step 654 after the GET authorization is sent by the access gateway server 631 to the identity and access management system 632 . That is, this is performed before the login and password page is presented to the user. However, the authorization process can instead occur after the user name and password have been verified (step 667 ), that is after the user has entered their login and password.
- a check is performed to determine whether pre-authentication plug-ins have been configured.
- the plug-ins can be obtained from one or more databases of the tenant that act as microservices to the access management system.
- Steps 655 and 668 are explained in greater detail with respect to FIGS. 11A and 11B .
- the identity and access management system 632 with forward the pre-authentication plug-in to the access gateway server 631 .
- the access management system 632 will send an OK and forward pre-authentication to the access gateway server 631 of the identity system domain 630 .
- the access gateway server 631 will forward the pre-authentication plug-in to the browser 610 .
- the access gateway server 631 will forward an OK and pre-authentication information to the browser 610 .
- the browser 610 will forward the pre-authentication plug-in to the pre-authentication handler 641 for execution.
- the browser 610 will send a POST execute pre-authentication call to the pre-authentication handler 641 .
- the pre-authentication handler 641 will process the pre-authentication.
- the pre-authentication and post authentication system 540 can be part of a customer hosted plug-in system in their tenancy.
- the pre-authentication handler 641 will return a pre-authentication result to the browser 610 . For example, if the plug-in is a mandatory plug in, it will determine whether the criteria for the plug-in has been met.
- the browser 610 forward the pre-authentication result to the access gateway server 631 . That is, the browser 610 will send a POST pre-authentication result to the access gateway server 631 .
- the access management system 632 will receive the pre-authentication result information and take any actions associated with the result. For example, if the plug-in includes factors that are mandatory and the factors were not met, then the flow will not proceed. However, if the plug-in evaluation does not result in errors, then it can proceed to step 663 .
- the identity and access management system 632 will send the login page to the access gateway server 631 .
- the access gateway server 631 will forward the login page to the browser 610 .
- the browser will forward the user name and password to the access gateway server 631 .
- the browser can send a POST call forwarding the username and password to the access gateway server 631 .
- the access gateway server 631 will forward the user name and password to the identity and access management system 632 .
- the user name and password can be forwarded via a POST call to the identity and access management system 632 .
- the identity and access management system 632 will verify the username and password. After the user name and password is verified, a session can be established for the user and a session cookie is generated.
- a check is performed to determine whether any post-authentication plug-ins have been configured.
- the identity and access management system 632 will forward the post-authentication plug in to the access gateway server 631 .
- the access gateway server 631 will forward the post-authentication plug-in to the browser 610 .
- the browser 610 will forward the post-authentication plug-in to the post-authentication handler in order to execute or invoke the post-authentication plugin.
- the post-authentication handler 642 will execute or invoke the post-authentication plug-in.
- the post-authentication handler 642 will forward the post-authentication plug-in processing results along with a session cookie for the user's browser session.
- the browser 610 will forward the post-authentication plug-in results to the access gateway server 631 .
- the access gateway will forward the post-authentication plug-in result to the identity and access management system 632 .
- the identity and authentication component will compute post-authentication actions, if any.
- Post authentication actions can be defined using a post authentication plugin sequence. If there are plugins present, then the plug-ins include post-authentication actions to be completed.
- the session cookie is sent to the to the access gateway server 631 .
- the identity and access management system 632 will forward a session cookie and an authorization code to the access gateway server 631 .
- An authorization code can include an opaque token containing information used by system to grant an access token (e.g., used for access token exchange).
- An authorization code can include an OpenID Connect (OIDC) authorization code.
- the access gateway server 631 will forward the session cookie and an authorization code to the browser 610 .
- the browser will forward the authorization code and token ID to the gateway server 621 of the application.
- the gateway server 621 of the application will evaluate the authorization and ID token and create a session.
- the gateway server 621 will send the application and session cookie to the browser 610 .
- the browser 610 will send a GET command for the application to the application gateway server 621 .
- the application gateway server 621 will forward the GET command for the application to the application 622
- the application 622 will send an application console to the gateway server 621 .
- the gateway server 621 will provide application access to the browser 610 .
- the user is given access to the protected resource, such as a business application.
- An example embodiment can allow a user to configure pre-authentication and post-authentication plug-ins.
- the system can send requests (i.e., POST request) and provide responses (i.e., POST response) throughout the process of handling the pre-authentication and post authentication plugins.
- FIG. 7 illustrates a request format of a request 700 used in handling plug-ins, in accordance with some example embodiments.
- the request 700 can include a plugin-ID 710 , a nonce 720 , a redirect URL 730 and a data structure 740 .
- a plugin-ID 710 can be used to identify a plug-in from other plug-ins.
- a plug-in ID can be an alphanumeric identifier or a name for the plug-in.
- a nonce 720 is included to provide, for example, security measures.
- a nonce can include randomly generated numbers and/or letters.
- An external request replay attack can be prevented by having a nonce with each request.
- a second request will be rejected, as the earlier request would have an evicted nonce.
- a nonce is generated for every request so that a request cannot be duplicated.
- a redirect URL 730 will be a URL of the access management system and is used to redirect to the application page.
- Data structure 740 can include data structures to indicate the request. Data can be sent as a JWT token signed by a tenant key.
- a JWT can contain any information that would be useful or relevant to the client. Further, the format of the JWT can vary based on the desired information for the token.
- FIG. 8 illustrates a response format of a response 800 used in handling plug-ins, in accordance with some example embodiments.
- the response 800 can include a plug-in ID 810 , a nonce 820 , a status of execution 830 , and a data structure 840 .
- a plugin-ID 810 can be used to identify a plug-in from other plug-ins.
- a plug-in ID can be an alphanumeric identifier or a name for the plug-in.
- a nonce 820 is included to provide, for example, security measures.
- a nonce can include randomly generated numbers and/or letters.
- An external request replay attack can be prevented by having a nonce with each request.
- a second request will be rejected, as the earlier request would have an evicted nonce.
- a nonce is generated for every request so that a request cannot be duplicated.
- a status of execution 830 can indicate the processing status of a plug-in.
- a data structure 840 can include data structures to indicate the response. Data can be sent as a JWT token signed by a tenant key.
- FIG. 9 illustrates a simplified block diagram of an identity and access management system 900 including a plug-in system 910 , in accordance with some example embodiments.
- the identity and access management system (IAM) 900 can include a plug-in system 910 for identifying and analyzing plug-ins.
- the plug-in system 910 can include a pre-authentication identification sub-system 911 , a post-authentication identification sub-system 912 and an analysis sub-system 920 .
- the analysis sub-system 920 can include execution sub-system 921 and post execution sub-system 922 .
- the plug-in system 910 can include one or more processors and memories for each of the sub-systems.
- FIG. 10 illustrates an overview of method 1000 of applying plug-ins, in accordance with some example embodiments. The steps shown in FIG. 10 are explained in greater detail with respect to FIGS. 11A and 11B .
- the plug-ins to be analyzed are identified. This includes identifying pre-authentication and post-authentication plug-ins. For example, any pre-login, post-login, pre-logout and post-logout plug-ins are identified. All of the plug-ins to be implemented for an application are identified prior to initiating the analyzing of the plug-ins. This step can be performed by, for example, the pre-authentication identification sub-system 911 and the post-authentication identification sub-system 912 of FIG. 9 .
- the execute stage can be performed. This step can be performed by, for example, the execution sub-system 921 of FIG. 9 .
- the execute stage will prepare the data for the plugin or the browser can sign the data using a current private key to generate a nonce and store it in the back end.
- Various actions can be performed to prepare the plug-in. Further, the request to be sent to the browser can be prepared.
- the post execute stage can be performed. This can be performed by, for example, the post execution sub-system 922 of FIG. 9 .
- the POST execute will return a plug-in result and verifies the that the plug-in can operate correctly.
- FIGS. 11A and 11B illustrates a flow diagram of a method 1100 for handling pre-login plug-ins, in accordance with some example embodiments.
- pre-login plug-ins are analyzed. Similar processing can be performed for post authentication or post-login plugins. However, the processing needed for post authentication plug-ins may include fewer steps since the post-login plug-ins will often be optional and not mandatory. Post-authentication plug-ins maybe be identified as optional since a user is often not prohibited from logging out of an application due to issues with plug-ins.
- a pre-login plug-in that is identified as a mandatory plug-in is not successful, then the process will not continue. For example, if there are three plug-ins in ordered list and the first plug-in that is being evaluated fails, then the process does not evaluate the second and third pre-login plug-ins.
- the ordered list can include plug-ins for all of the phases including plug-ins to be invoked during pre-authentication and post-authentication.
- plug-ins are handled sequentially. Plug-ins are directed to the user for handling after the session is created, but before the user is redirected to the actual resource
- Alternative embodiments can include a plug-in list which does not require a specified order or a sequential order.
- An alternative embodiment can include a plug-in list which does not require that all of the plug-ins in the list be satisfied in order for the one or more plug-ins in the list be implemented.
- plug-ins can be handled in parallel and asynchronously.
- FIGS. 11A and 11B are directed to an ordered list of plug-ins which are handled synchronously.
- pre-login plug-ins are identified (e.g., primary authentication, MFA, browser response, etc.).
- a request can be sent for a cookie including plug-in information for plug-ins to be implemented.
- the request can be sent from the browser to the access management system.
- FIG. 11A three plug-ins are identified. The three plug-ins will be handled sequentially. Therefore, the primary authentication plug-in will be handled, followed by the multifactor authentication plug-in and lastly, the browser response plug-in.
- a plug-in ID is obtained for the first plug-in (e.g., primary authentication plug-in).
- a plug-in ID can also be known as a trigger ID.
- the plug-in ID is obtained from the request cookie.
- the plug-in ID is used to identify the plug-in from the remaining plug-ins to be processed and keeps track of which plug-ins have been processed.
- An example embodiment uses a stateless protocol. Therefore, instead of maintaining information in a database, the information is maintained in the cookie. Information between the plug-in and the access management system can be exchanged with information being maintained in the cookie. The state information is stored on the cookie and can keep track of the plug-ins that have been processed. The cookie is used by the access management system to determine the results of the processing for each of the pre-login plug-ins.
- the plug-ins can be ordered in the ordered list based on priority.
- the ordered list can be created by the user or can be automatically set by the access management system based on the type of plug-in.
- the ordered list can be automatically created by the access management system based on the type of plug-in.
- a type associated with the plug-in can identify its priority level with respect to other plug-ins.
- the plug-ins are in an ordered list since the plug-ins are processed sequentially. For example, the criteria for a first plug-in in ordered list should be satisfied before considering a second plug-in on the ordered list, and a second plug-in on the ordered this should be satisfied before considering the third plug-in on the ordered list. If the first plug-in in the ordered list is not satisfied, then the process will not evaluate the second and third plug-ins. Therefore, the plug-ins are analyzed sequentially and in a specified order. The plug-ins are handled synchronously. The order of the plug-ins can be based on the identifier of the plug-in. Further, the order of the plug-ins can be based on the action that the plug-in is to perform.
- step 1113 the plug-in ID is not available in ordered list, the method returns to step 1110 , and the next plug-in is obtained. That is, for example, the multifactor authentication plug-in will then be handled.
- the plug-in ID is available in ordered list
- the plug-in is obtained from the ordered list.
- the first plug-in from the ordered list is obtained.
- Plug-in ID “1” is obtained, which indicates this is the first plug-in in the ordered list.
- step 1115 it is determined whether the plug-in has completed the execute stage, which is the first stage.
- the plug-in will be processed through an execute stage (e.g., first stage) and a POST execute stage (e.g., second stage). If the plug-in has completed the execute stage it will proceed to the POST execute stage.
- Step 1116 a call to execute is placed. This will prepare the data for that plugin or it will sign the data using a current private key to generate a nonce and store it in the back end. Various actions can be performed to prepare the plug-in. The request to be sent to the browser can also be prepared. Step 1116 can correspond to step 1020 of FIG. 10 .
- Step 1117 a call is made to POST execute.
- the POST execute will return a plug-in result and verifies the that the plug-in can operate correctly.
- Step 1117 can correspond to step 1030 of FIG. 10 .
- step 1118 it is determined whether the plug-in has a response.
- the request cookie is updated with the plug-in ID.
- step 1120 a response is sent to the browser and the method returns to step 1110 to handle the next plug-in.
- an exception can include a code issue or an internal coding issue. For example, an application may be expecting a specific response, but the data provided is something different than expected and the application cannot handle the response.
- step 1122 it is determined whether the exception is mandatory.
- an error response is sent to the browser at step 1120 .
- the browser is notified that there was an error in processing the plug-in.
- step 1121 If at step 1121 , it is determined that there is no exception, the client application completes its actions and returns back to the service.
- step 1122 If, at step 1122 , the exception is not mandatory the the method proceeds to step 1123 .
- the plug-in ID is incremented so as to process the next sequential plug-in in the ordered list. After updateding the plug-in ID, the process returns to step 1111 where the next plug-in ID (e.g., ID “2”) is requested for processing.
- ID “2” the next plug-in ID
- the method is described with respect to three plug-ins however, more than three or less than three triggers can be processed. For example, there may be an upper limit of plug-ins to analyze. In an example embodiment, there may be a maximum number (e.g., 4 or 5) of plug-ins that can be customized by the user.
- Example embodiments allow a user to make configurations to a protected resource.
- the configuration is not limited to a single entity, such as the access management system provider.
- example embodiments provide many technological improvements.
- System processes allow for giving the user control of implementing plug-ins. For example, during login, the user can specify the additional or alternative authentication methods (e.g., additional levels of authentication).
- additional or alternative authentication methods e.g., additional levels of authentication
- control is given to the user to perform. Therefore, the user can perform logging out of all of the plug-ins and perform any needed cleanup. Thereby ensuring that sessions are cleared property and plug-ins are cleared properly.
- IaaS infrastructure as a service
- IaaS can be configured to provide virtualized computing resources over a public network (e.g., the Internet).
- a cloud computing provider can host the infrastructure components (e.g., servers, storage devices, network nodes (e.g., hardware), deployment software, platform virtualization (e.g., a hypervisor layer), or the like).
- an IaaS provider may also supply a variety of services to accompany those infrastructure components (e.g., billing, monitoring, logging, security, load balancing and clustering, etc.).
- IaaS users may be able to implement policies to drive load balancing to maintain application availability and performance.
- IaaS customers may access resources and services through a wide area network (WAN), such as the Internet, and can use the cloud provider's services to install the remaining elements of an application stack.
- WAN wide area network
- the user can log in to the IaaS platform to create virtual machines (VMs), install operating systems (OSs) on each VM, deploy middleware such as databases, create storage buckets for workloads and backups, and even install enterprise software into that VM.
- VMs virtual machines
- OSs install operating systems
- middleware such as databases
- storage buckets for workloads and backups
- enterprise software enterprise software into that VM.
- Customers can then use the provider's services to perform various functions, including balancing network traffic, troubleshooting application issues, monitoring performance, managing disaster recovery, etc.
- a cloud computing model will require the participation of a cloud provider.
- the cloud provider may, but need not be, a third-party service that specializes in providing (e.g., offering, renting, selling) IaaS.
- An entity might also opt to deploy a private cloud, becoming its own provider of infrastructure services.
- IaaS deployment is the process of putting a new application, or a new version of an application, onto a prepared application server or the like. It may also include the process of preparing the server (e.g., installing libraries, daemons, etc.). This is often managed by the cloud provider, below the hypervisor layer (e.g., the servers, storage, network hardware, and virtualization). Thus, the customer may be responsible for handling (OS), middleware, and/or application deployment (e.g., on self-service virtual machines (e.g., that can be spun up on demand) or the like.
- OS OS
- middleware middleware
- application deployment e.g., on self-service virtual machines (e.g., that can be spun up on demand) or the like.
- IaaS provisioning may refer to acquiring computers or virtual hosts for use, and even installing needed libraries or services on them. In most cases, deployment does not include provisioning, and the provisioning may need to be performed first.
- the infrastructure e.g., what components are needed and how they interact
- the overall topology of the infrastructure e.g., what resources depend on which, and how they each work together
- a workflow can be generated that creates and/or manages the different components described in the configuration files.
- an infrastructure may have many interconnected elements. For example, there may be one or more virtual private clouds (VPCs) (e.g., a potentially on-demand pool of configurable and/or shared computing resources), also known as a core network. In some examples, there may also be one or more security group rules provisioned to define how the security of the network will be set up and one or more virtual machines (VMs). Other infrastructure elements may also be provisioned, such as a load balancer, a database, or the like. As more and more infrastructure elements are desired and/or added, the infrastructure may incrementally evolve.
- VPCs virtual private clouds
- security group rules provisioned to define how the security of the network will be set up and one or more virtual machines (VMs).
- Other infrastructure elements may also be provisioned, such as a load balancer, a database, or the like. As more and more infrastructure elements are desired and/or added, the infrastructure may incrementally evolve.
- continuous deployment techniques may be employed to enable deployment of infrastructure code across various virtual computing environments. Additionally, the described techniques can enable infrastructure management within these environments.
- service teams can write code that is desired to be deployed to one or more, but often many, different production environments (e.g., across various different geographic locations, sometimes spanning the entire world).
- the infrastructure on which the code will be deployed must first be set up.
- the provisioning can be done manually, a provisioning tool may be utilized to provision the resources, and/or deployment tools may be utilized to deploy the code once the infrastructure is provisioned.
- FIG. 12 is a block diagram 1200 illustrating an example pattern of an IaaS architecture, according to at least one embodiment.
- Service operators 1202 can be communicatively coupled to a secure host tenancy 1204 that can include a virtual cloud network (VCN) 1206 and a secure host subnet 1208 .
- VCN virtual cloud network
- the service operators 1202 may be using one or more client computing devices, which may be portable handheld devices (e.g., an iPhone®, cellular telephone, an iPad®, computing tablet, a personal digital assistant (PDA)) or wearable devices (e.g., a Google Glass® head mounted display), running software such as Microsoft Windows Mobile®, and/or a variety of mobile operating systems such as iOS, Windows Phone, Android, BlackBerry 8, Palm OS, and the like, and being Internet, e-mail, short message service (SMS), Blackberry®, or other communication protocol enabled.
- the client computing devices can be general purpose personal computers including, by way of example, personal computers and/or laptop computers running various versions of Microsoft Windows®, Apple Macintosh®, and/or Linux operating systems.
- the client computing devices can be workstation computers running any of a variety of commercially-available UNIX® or UNIX-like operating systems, including without limitation the variety of GNU/Linux operating systems, such as for example, Google Chrome OS.
- client computing devices may be any other electronic device, such as a thin-client computer, an Internet-enabled gaming system (e.g., a Microsoft Xbox gaming console with or without a Kinect® gesture input device), and/or a personal messaging device, capable of communicating over a network that can access the VCN 1206 and/or the Internet.
- the VCN 1206 can include a local peering gateway (LPG) 1210 that can be communicatively coupled to a secure shell (SSH) VCN 1212 via an LPG 1210 contained in the SSH VCN 1212 .
- the SSH VCN 1212 can include an SSH subnet 1214 , and the SSH VCN 1212 can be communicatively coupled to a control plane VCN 1216 via the LPG 1210 contained in the control plane VCN 1216 .
- the SSH VCN 1212 can be communicatively coupled to a data plane VCN 1218 via an LPG 1210 .
- the control plane VCN 1216 and the data plane VCN 1218 can be contained in a service tenancy 1219 that can be owned and/or operated by the IaaS provider.
- the control plane VCN 1216 can include a control plane demilitarized zone (DMZ) tier 1220 that acts as a perimeter network (e.g., portions of a corporate network between the corporate intranet and external networks).
- the DMZ-based servers may have restricted responsibilities and help keep security breaches contained.
- the DMZ tier 1220 can include one or more load balancer (LB) subnet(s) 1222 , a control plane app tier 1224 that can include app subnet(s) 1226 , a control plane data tier 1228 that can include database (DB) subnet(s) 1230 (e.g., frontend DB subnet(s) and/or backend DB subnet(s)).
- LB load balancer
- the LB subnet(s) 1222 contained in the control plane DMZ tier 1220 can be communicatively coupled to the app subnet(s) 1226 contained in the control plane app tier 1224 and an Internet gateway 1234 that can be contained in the control plane VCN 1216
- the app subnet(s) 1226 can be communicatively coupled to the DB subnet(s) 1230 contained in the control plane data tier 1228 and a service gateway 1236 and a network address translation (NAT) gateway 1238
- the control plane VCN 1216 can include the service gateway 1236 and the NAT gateway 1238 .
- the control plane VCN 1216 can include a data plane mirror app tier 1240 that can include app subnet(s) 1226 .
- the app subnet(s) 1226 contained in the data plane mirror app tier 1240 can include a virtual network interface controller (VNIC) 1242 that can execute a compute instance 1244 .
- the compute instance 1244 can communicatively couple the app subnet(s) 1226 of the data plane mirror app tier 1240 to app subnet(s) 1226 that can be contained in a data plane app tier 1246 .
- the data plane VCN 1218 can include the data plane app tier 1246 , a data plane DMZ tier 1248 , and a data plane data tier 1250 .
- the data plane DMZ tier 1248 can include LB subnet(s) 1222 that can be communicatively coupled to the app subnet(s) 1226 of the data plane app tier 1246 and the Internet gateway 1234 of the data plane VCN 1218 .
- the app subnet(s) 1226 can be communicatively coupled to the service gateway 1236 of the data plane VCN 1218 and the NAT gateway 1238 of the data plane VCN 1218 .
- the data plane data tier 1250 can also include the DB subnet(s) 1230 that can be communicatively coupled to the app subnet(s) 1226 of the data plane app tier 1246 .
- the Internet gateway 1234 of the control plane VCN 1216 and of the data plane VCN 1218 can be communicatively coupled to a metadata management service 1252 that can be communicatively coupled to public Internet 1254 .
- Public Internet 1254 can be communicatively coupled to the NAT gateway 1238 of the control plane VCN 1216 and of the data plane VCN 1218 .
- the service gateway 1236 of the control plane VCN 1216 and of the data plane VCN 1218 can be communicatively couple to cloud services 1256 .
- the service gateway 1236 of the control plane VCN 1216 or of the data plan VCN 1218 can make application programming interface (API) calls to cloud services 1256 without going through public Internet 1254 .
- the API calls to cloud services 1256 from the service gateway 1236 can be one-way: the service gateway 1236 can make API calls to cloud services 1256 , and cloud services 1256 can send requested data to the service gateway 1236 . But, cloud services 1256 may not initiate API calls to the service gateway 1236 .
- the secure host tenancy 1204 can be directly connected to the service tenancy 1219 , which may be otherwise isolated.
- the secure host subnet 1208 can communicate with the SSH subnet 1214 through an LPG 1210 that may enable two-way communication over an otherwise isolated system. Connecting the secure host subnet 1208 to the SSH subnet 1214 may give the secure host subnet 1208 access to other entities within the service tenancy 1219 .
- the control plane VCN 1216 may allow users of the service tenancy 1219 to set up or otherwise provision desired resources. Desired resources provisioned in the control plane VCN 1216 may be deployed or otherwise used in the data plane VCN 1218 .
- the control plane VCN 1216 can be isolated from the data plane VCN 1218 , and the data plane mirror app tier 1240 of the control plane VCN 1216 can communicate with the data plane app tier 1246 of the data plane VCN 1218 via VNICs 1242 that can be contained in the data plane mirror app tier 1240 and the data plane app tier 1246 .
- users of the system, or customers can make requests, for example create, read, update, or delete (CRUD) operations, through public Internet 1254 that can communicate the requests to the metadata management service 1252 .
- the metadata management service 1252 can communicate the request to the control plane VCN 1216 through the Internet gateway 1234 .
- the request can be received by the LB subnet(s) 1222 contained in the control plane DMZ tier 1220 .
- the LB subnet(s) 1222 may determine that the request is valid, and in response to this determination, the LB subnet(s) 1222 can transmit the request to app subnet(s) 1226 contained in the control plane app tier 1224 .
- the call to public Internet 1254 may be transmitted to the NAT gateway 1238 that can make the call to public Internet 1254 .
- Memory that may be desired to be stored by the request can be stored in the DB subnet(s) 1230 .
- the data plane mirror app tier 1240 can facilitate direct communication between the control plane VCN 1216 and the data plane VCN 1218 .
- changes, updates, or other suitable modifications to configuration may be desired to be applied to the resources contained in the data plane VCN 1218 .
- the control plane VCN 1216 can directly communicate with, and can thereby execute the changes, updates, or other suitable modifications to configuration to, resources contained in the data plane VCN 1218 .
- control plane VCN 1216 and the data plane VCN 1218 can be contained in the service tenancy 1219 .
- the user, or the customer, of the system may not own or operate either the control plane VCN 1216 or the data plane VCN 1218 .
- the IaaS provider may own or operate the control plane VCN 1216 and the data plane VCN 1218 , both of which may be contained in the service tenancy 1219 .
- This embodiment can enable isolation of networks that may prevent users or customers from interacting with other users', or other customers', resources. Also, this embodiment may allow users or customers of the system to store databases privately without needing to rely on public Internet 1254 , which may not have a desired level of security, for storage.
- the LB subnet(s) 1222 contained in the control plane VCN 1216 can be configured to receive a signal from the service gateway 1236 .
- the control plane VCN 1216 and the data plane VCN 1218 may be configured to be called by a customer of the IaaS provider without calling public Internet 1254 .
- Customers of the IaaS provider may desire this embodiment since database(s) that the customers use may be controlled by the IaaS provider and may be stored on the service tenancy 1219 , which may be isolated from public Internet 1254 .
- FIG. 13 is a block diagram 1300 illustrating another example pattern of an IaaS architecture, according to at least one embodiment.
- Service operators 1302 e.g. service operators 1202 of FIG. 12
- a secure host tenancy 1304 e.g. the secure host tenancy 1204 of FIG. 12
- VCN virtual cloud network
- the VCN 1306 can include a local peering gateway (LPG) 1310 (e.g. the LPG 1210 of FIG.
- the SSH VCN 1312 can include an SSH subnet 1314 (e.g. the SSH subnet 1214 of FIG. 12 ), and the SSH VCN 1312 can be communicatively coupled to a control plane VCN 1316 (e.g. the control plane VCN 1216 of FIG. 12 ) via an LPG 1310 contained in the control plane VCN 1316 .
- the control plane VCN 1316 can be contained in a service tenancy 1319 (e.g. the service tenancy 1219 of FIG. 12 ), and the data plane VCN 1318 (e.g. the data plane VCN 1218 of FIG. 12 ) can be contained in a customer tenancy 1321 that may be owned or operated by users, or customers, of the system.
- the control plane VCN 1316 can include a control plane DMZ tier 1320 (e.g. the control plane DMZ tier 1220 of FIG. 12 ) that can include LB subnet(s) 1322 (e.g. LB subnet(s) 1222 of FIG. 12 ), a control plane app tier 1324 (e.g. the control plane app tier 1224 of FIG. 12 ) that can include app subnet(s) 1326 (e.g. app subnet(s) 1226 of FIG. 12 ), a control plane data tier 1328 (e.g. the control plane data tier 1228 of FIG. 12 ) that can include database (DB) subnet(s) 1330 (e.g. similar to DB subnet(s) 1230 of FIG.
- DB database
- the LB subnet(s) 1322 contained in the control plane DMZ tier 1320 can be communicatively coupled to the app subnet(s) 1326 contained in the control plane app tier 1324 and an Internet gateway 1334 (e.g. the Internet gateway 1234 of FIG. 12 ) that can be contained in the control plane VCN 1316
- the app subnet(s) 1326 can be communicatively coupled to the DB subnet(s) 1330 contained in the control plane data tier 1328 and a service gateway 1336 (e.g. the service gateway of FIG. 12 ) and a network address translation (NAT) gateway 1338 (e.g. the NAT gateway 1238 of FIG. 12 ).
- the control plane VCN 1316 can include the service gateway 1336 and the NAT gateway 1338 .
- the control plane VCN 1316 can include a data plane mirror app tier 1340 (e.g. the data plane mirror app tier 1240 of FIG. 12 ) that can include app subnet(s) 1326 .
- the app subnet(s) 1326 contained in the data plane mirror app tier 1340 can include a virtual network interface controller (VNIC) 1342 (e.g. the VNIC of 1242 ) that can execute a compute instance 1344 (e.g. similar to the compute instance 1244 of FIG. 12 ).
- the compute instance 1344 can facilitate communication between the app subnet(s) 1326 of the data plane mirror app tier 1340 and the app subnet(s) 1326 that can be contained in a data plane app tier 1346 (e.g. the data plane app tier 1246 of FIG. 12 ) via the VNIC 1342 contained in the data plane mirror app tier 1340 and the VNIC 1342 contained in the data plan app tier 1346 .
- the Internet gateway 1334 contained in the control plane VCN 1316 can be communicatively coupled to a metadata management service 1352 (e.g. the metadata management service 1252 of FIG. 12 ) that can be communicatively coupled to public Internet 1354 (e.g. public Internet 1254 of FIG. 12 ).
- Public Internet 1354 can be communicatively coupled to the NAT gateway 1338 contained in the control plane VCN 1316 .
- the service gateway 1336 contained in the control plane VCN 1316 can be communicatively couple to cloud services 1356 (e.g. cloud services 1256 of FIG. 12 ).
- the data plane VCN 1318 can be contained in the customer tenancy 1321 .
- the IaaS provider may provide the control plane VCN 1316 for each customer, and the IaaS provider may, for each customer, set up a unique compute instance 1344 that is contained in the service tenancy 1319 .
- Each compute instance 1344 may allow communication between the control plane VCN 1316 , contained in the service tenancy 1319 , and the data plane VCN 1318 that is contained in the customer tenancy 1321 .
- the compute instance 1344 may allow resources, that are provisioned in the control plane VCN 1316 that is contained in the service tenancy 1319 , to be deployed or otherwise used in the data plane VCN 1318 that is contained in the customer tenancy 1321 .
- the customer of the IaaS provider may have databases that live in the customer tenancy 1321 .
- the control plane VCN 1316 can include the data plane mirror app tier 1340 that can include app subnet(s) 1326 .
- the data plane mirror app tier 1340 can reside in the data plane VCN 1318 , but the data plane mirror app tier 1340 may not live in the data plane VCN 1318 . That is, the data plane mirror app tier 1340 may have access to the customer tenancy 1321 , but the data plane mirror app tier 1340 may not exist in the data plane VCN 1318 or be owned or operated by the customer of the IaaS provider.
- the data plane mirror app tier 1340 may be configured to make calls to the data plane VCN 1318 but may not be configured to make calls to any entity contained in the control plane VCN 1316 .
- the customer may desire to deploy or otherwise use resources in the data plane VCN 1318 that are provisioned in the control plane VCN 1316 , and the data plane mirror app tier 1340 can facilitate the desired deployment, or other usage of resources, of the customer.
- the customer of the IaaS provider can apply filters to the data plane VCN 1318 .
- the customer can determine what the data plane VCN 1318 can access, and the customer may restrict access to public Internet 1354 from the data plane VCN 1318 .
- the IaaS provider may not be able to apply filters or otherwise control access of the data plane VCN 1318 to any outside networks or databases. Applying filters and controls by the customer onto the data plane VCN 1318 , contained in the customer tenancy 1321 , can help isolate the data plane VCN 1318 from other customers and from public Internet 1354 .
- cloud services 1356 can be called by the service gateway 1336 to access services that may not exist on public Internet 1354 , on the control plane VCN 1316 , or on the data plane VCN 1318 .
- the connection between cloud services 1356 and the control plane VCN 1316 or the data plane VCN 1318 may not be live or continuous.
- Cloud services 1356 may exist on a different network owned or operated by the IaaS provider. Cloud services 1356 may be configured to receive calls from the service gateway 1336 and may be configured to not receive calls from public Internet 1354 .
- Some cloud services 1356 may be isolated from other cloud services 1356 , and the control plane VCN 1316 may be isolated from cloud services 1356 that may not be in the same region as the control plane VCN 1316 .
- control plane VCN 1316 may be located in “Region 1 ,” and cloud service “Deployment 12 ,” may be located in Region 1 and in “Region 2 .” If a call to Deployment 12 is made by the service gateway 1336 contained in the control plane VCN 1316 located in Region 1 , the call may be transmitted to Deployment 12 in Region 1 .
- the control plane VCN 1316 , or Deployment 12 in Region 1 may not be communicatively coupled to, or otherwise in communication with, Deployment 12 in Region 2 .
- FIG. 14 is a block diagram 1400 illustrating another example pattern of an IaaS architecture, according to at least one embodiment.
- Service operators 1402 e.g. service operators 1202 of FIG. 12
- a secure host tenancy 1404 e.g. the secure host tenancy 1204 of FIG. 12
- VCN virtual cloud network
- the VCN 1406 can include an LPG 1410 (e.g. the LPG 1210 of FIG. 12 ) that can be communicatively coupled to an SSH VCN 1412 (e.g.
- the SSH VCN 1412 can include an SSH subnet 1414 (e.g. the SSH subnet 1214 of FIG. 12 ), and the SSH VCN 1412 can be communicatively coupled to a control plane VCN 1416 (e.g. the control plane VCN 1216 of FIG. 12 ) via an LPG 1410 contained in the control plane VCN 1416 and to a data plane VCN 1418 (e.g. the data plane 1218 of FIG. 12 ) via an LPG 1410 contained in the data plane VCN 1418 .
- the control plane VCN 1416 and the data plane VCN 1418 can be contained in a service tenancy 1419 (e.g. the service tenancy 1219 of FIG. 12 ).
- the control plane VCN 1416 can include a control plane DMZ tier 1420 (e.g. the control plane DMZ tier 1220 of FIG. 12 ) that can include load balancer (LB) subnet(s) 1422 (e.g. LB subnet(s) 1222 of FIG. 12 ), a control plane app tier 1424 (e.g. the control plane app tier 1224 of FIG. 12 ) that can include app subnet(s) 1426 (e.g. similar to app subnet(s) 1226 of FIG. 12 ), a control plane data tier 1428 (e.g. the control plane data tier 1228 of FIG. 12 ) that can include DB subnet(s) 1430 .
- LB load balancer
- a control plane app tier 1424 e.g. the control plane app tier 1224 of FIG. 12
- app subnet(s) 1426 e.g. similar to app subnet(s) 1226 of FIG. 12
- a control plane data tier 1428
- the LB subnet(s) 1422 contained in the control plane DMZ tier 1420 can be communicatively coupled to the app subnet(s) 1426 contained in the control plane app tier 1424 and to an Internet gateway 1434 (e.g. the Internet gateway 1234 of FIG. 12 ) that can be contained in the control plane VCN 1416
- the app subnet(s) 1426 can be communicatively coupled to the DB subnet(s) 1430 contained in the control plane data tier 1428 and to a service gateway 1436 (e.g. the service gateway of FIG. 12 ) and a network address translation (NAT) gateway 1438 (e.g. the NAT gateway 1238 of FIG. 12 ).
- the control plane VCN 1416 can include the service gateway 1436 and the NAT gateway 1438 .
- the data plane VCN 1418 can include a data plane app tier 1446 (e.g. the data plane app tier 1246 of FIG. 12 ), a data plane DMZ tier 1448 (e.g. the data plane DMZ tier 1248 of FIG. 12 ), and a data plane data tier 1450 (e.g. the data plane data tier 1250 of FIG. 12 ).
- the data plane DMZ tier 1448 can include LB subnet(s) 1422 that can be communicatively coupled to trusted app subnet(s) 1460 and untrusted app subnet(s) 1462 of the data plane app tier 1446 and the Internet gateway 1434 contained in the data plane VCN 1418 .
- the trusted app subnet(s) 1460 can be communicatively coupled to the service gateway 1436 contained in the data plane VCN 1418 , the NAT gateway 1438 contained in the data plane VCN 1418 , and DB subnet(s) 1430 contained in the data plane data tier 1450 .
- the untrusted app subnet(s) 1462 can be communicatively coupled to the service gateway 1436 contained in the data plane VCN 1418 and DB subnet(s) 1430 contained in the data plane data tier 1450 .
- the data plane data tier 1450 can include DB subnet(s) 1430 that can be communicatively coupled to the service gateway 1436 contained in the data plane VCN 1418 .
- the untrusted app subnet(s) 1462 can include one or more primary VNICs 1464 ( 1 )-(N) that can be communicatively coupled to tenant virtual machines (VMs) 1466 ( 1 )-(N). Each tenant VM 1466 ( 1 )-(N) can be communicatively coupled to a respective app subnet 1467 ( 1 )-(N) that can be contained in respective container egress VCNs 1468 ( 1 )-(N) that can be contained in respective customer tenancies 1470 ( 1 )-(N).
- VMs virtual machines
- Each tenant VM 1466 ( 1 )-(N) can be communicatively coupled to a respective app subnet 1467 ( 1 )-(N) that can be contained in respective container egress VCNs 1468 ( 1 )-(N) that can be contained in respective customer tenancies 1470 ( 1 )-(N).
- Respective secondary VNICs 1472 ( 1 )-(N) can facilitate communication between the untrusted app subnet(s) 1462 contained in the data plane VCN 1418 and the app subnet contained in the container egress VCNs 1468 ( 1 )-(N).
- Each container egress VCNs 1468 ( 1 )-(N) can include a NAT gateway 1438 that can be communicatively coupled to public Internet 1454 (e.g. public Internet 1254 of FIG. 12 ).
- the Internet gateway 1434 contained in the control plane VCN 1416 and contained in the data plane VCN 1418 can be communicatively coupled to a metadata management service 1452 (e.g. the metadata management system 1252 of FIG. 12 ) that can be communicatively coupled to public Internet 1454 .
- Public Internet 1454 can be communicatively coupled to the NAT gateway 1438 contained in the control plane VCN 1416 and contained in the data plane VCN 1418 .
- the service gateway 1436 contained in the control plane VCN 1416 and contained in the data plane VCN 1418 can be communicatively couple to cloud services 1456 .
- the data plane VCN 1418 can be integrated with customer tenancies 1470 .
- This integration can be useful or desirable for customers of the IaaS provider in some cases such as a case that may desire support when executing code.
- the customer may provide code to run that may be destructive, may communicate with other customer resources, or may otherwise cause undesirable effects.
- the IaaS provider may determine whether to run code given to the IaaS provider by the customer.
- the customer of the IaaS provider may grant temporary network access to the IaaS provider and request a function to be attached to the data plane tier app 1446 .
- Code to run the function may be executed in the VMs 1466 ( 1 )-(N), and the code may not be configured to run anywhere else on the data plane VCN 1418 .
- Each VM 1466 ( 1 )-(N) may be connected to one customer tenancy 1470 .
- Respective containers 1471 ( 1 )-(N) contained in the VMs 1466 ( 1 )-(N) may be configured to run the code.
- the containers 1471 ( 1 )-(N) running code, where the containers 1471 ( 1 )-(N) may be contained in at least the VM 1466 ( 1 )-(N) that are contained in the untrusted app subnet(s) 1462 ), which may help prevent incorrect or otherwise undesirable code from damaging the network of the IaaS provider or from damaging a network of a different customer.
- the containers 1471 ( 1 )-(N) may be communicatively coupled to the customer tenancy 1470 and may be configured to transmit or receive data from the customer tenancy 1470 .
- the containers 1471 ( 1 )-(N) may not be configured to transmit or receive data from any other entity in the data plane VCN 1418 .
- the IaaS provider may kill or otherwise dispose of the containers 1471 ( 1 )-(N).
- the trusted app subnet(s) 1460 may run code that may be owned or operated by the IaaS provider.
- the trusted app subnet(s) 1460 may be communicatively coupled to the DB subnet(s) 1430 and be configured to execute CRUD operations in the DB subnet(s) 1430 .
- the untrusted app subnet(s) 1462 may be communicatively coupled to the DB subnet(s) 1430 , but in this embodiment, the untrusted app subnet(s) may be configured to execute read operations in the DB subnet(s) 1430 .
- the containers 1471 ( 1 )-(N) that can be contained in the VM 1466 ( 1 )-(N) of each customer and that may run code from the customer may not be communicatively coupled with the DB subnet(s) 1430 .
- control plane VCN 1416 and the data plane VCN 1418 may not be directly communicatively coupled. In this embodiment, there may be no direct communication between the control plane VCN 1416 and the data plane VCN 1418 . However, communication can occur indirectly through at least one method.
- An LPG 1410 may be established by the IaaS provider that can facilitate communication between the control plane VCN 1416 and the data plane VCN 1418 .
- the control plane VCN 1416 or the data plane VCN 1418 can make a call to cloud services 1456 via the service gateway 1436 .
- a call to cloud services 1456 from the control plane VCN 1416 can include a request for a service that can communicate with the data plane VCN 1418 .
- FIG. 15 is a block diagram 1500 illustrating another example pattern of an IaaS architecture, according to at least one embodiment.
- Service operators 1502 e.g. service operators 1202 of FIG. 12
- a secure host tenancy 1504 e.g. the secure host tenancy 1204 of FIG. 12
- VCN virtual cloud network
- the VCN 1506 can include an LPG 1510 (e.g. the LPG 1210 of FIG. 12 ) that can be communicatively coupled to an SSH VCN 1512 (e.g.
- the SSH VCN 1512 can include an SSH subnet 1514 (e.g. the SSH subnet 1214 of FIG. 12 ), and the SSH VCN 1512 can be communicatively coupled to a control plane VCN 1516 (e.g. the control plane VCN 1216 of FIG. 12 ) via an LPG 1510 contained in the control plane VCN 1516 and to a data plane VCN 1518 (e.g. the data plane 1218 of FIG. 12 ) via an LPG 1510 contained in the data plane VCN 1518 .
- the control plane VCN 1516 and the data plane VCN 1518 can be contained in a service tenancy 1519 (e.g. the service tenancy 1219 of FIG. 12 ).
- the control plane VCN 1516 can include a control plane DMZ tier 1520 (e.g. the control plane DMZ tier 1220 of FIG. 12 ) that can include LB subnet(s) 1522 (e.g. LB subnet(s) 1222 of FIG. 12 ), a control plane app tier 1524 (e.g. the control plane app tier 1224 of FIG. 12 ) that can include app subnet(s) 1526 (e.g. app subnet(s) 1226 of FIG. 12 ), a control plane data tier 1528 (e.g. the control plane data tier 1228 of FIG. 12 ) that can include DB subnet(s) 1530 (e.g. DB subnet(s) 1430 of FIG. 14 ).
- a control plane DMZ tier 1520 e.g. the control plane DMZ tier 1220 of FIG. 12
- LB subnet(s) 1522 e.g. LB subnet(s) 1222 of FIG. 12
- the LB subnet(s) 1522 contained in the control plane DMZ tier 1520 can be communicatively coupled to the app subnet(s) 1526 contained in the control plane app tier 1524 and to an Internet gateway 1534 (e.g. the Internet gateway 1234 of FIG. 12 ) that can be contained in the control plane VCN 1516
- the app subnet(s) 1526 can be communicatively coupled to the DB subnet(s) 1530 contained in the control plane data tier 1528 and to a service gateway 1536 (e.g. the service gateway of FIG. 12 ) and a network address translation (NAT) gateway 1538 (e.g. the NAT gateway 1238 of FIG. 12 ).
- the control plane VCN 1516 can include the service gateway 1536 and the NAT gateway 1538 .
- the data plane VCN 1518 can include a data plane app tier 1546 (e.g. the data plane app tier 1246 of FIG. 12 ), a data plane DMZ tier 1548 (e.g. the data plane DMZ tier 1248 of FIG. 12 ), and a data plane data tier 1550 (e.g. the data plane data tier 1250 of FIG. 12 ).
- the data plane DMZ tier 1548 can include LB subnet(s) 1522 that can be communicatively coupled to trusted app subnet(s) 1560 (e.g. trusted app subnet(s) 1460 of FIG. 14 ) and untrusted app subnet(s) 1562 (e.g. untrusted app subnet(s) 1462 of FIG.
- the trusted app subnet(s) 1560 can be communicatively coupled to the service gateway 1536 contained in the data plane VCN 1518 , the NAT gateway 1538 contained in the data plane VCN 1518 , and DB subnet(s) 1530 contained in the data plane data tier 1550 .
- the untrusted app subnet(s) 1562 can be communicatively coupled to the service gateway 1536 contained in the data plane VCN 1518 and DB subnet(s) 1530 contained in the data plane data tier 1550 .
- the data plane data tier 1550 can include DB subnet(s) 1530 that can be communicatively coupled to the service gateway 1536 contained in the data plane VCN 1518 .
- the untrusted app subnet(s) 1562 can include primary VNICs 1564 ( 1 )-(N) that can be communicatively coupled to tenant virtual machines (VMs) 1566 ( 1 )-(N) residing within the untrusted app subnet(s) 1562 .
- Each tenant VM 1566 ( 1 )-(N) can run code in a respective container 1567 ( 1 )-(N), and be communicatively coupled to an app subnet 1526 that can be contained in a data plane app tier 1546 that can be contained in a container egress VCN 1568 .
- Respective secondary VNICs 1572 ( 1 )-(N) can facilitate communication between the untrusted app subnet(s) 1562 contained in the data plane VCN 1518 and the app subnet contained in the container egress VCN 1568 .
- the container egress VCN can include a NAT gateway 1538 that can be communicatively coupled to public Internet 1554 (e.g. public Internet 1254 of FIG. 12 ).
- the Internet gateway 1534 contained in the control plane VCN 1516 and contained in the data plane VCN 1518 can be communicatively coupled to a metadata management service 1552 (e.g. the metadata management system 1252 of FIG. 12 ) that can be communicatively coupled to public Internet 1554 .
- Public Internet 1554 can be communicatively coupled to the NAT gateway 1538 contained in the control plane VCN 1516 and contained in the data plane VCN 1518 .
- the service gateway 1536 contained in the control plane VCN 1516 and contained in the data plane VCN 1518 can be communicatively couple to cloud services 1556 .
- the pattern illustrated by the architecture of block diagram 1500 of FIG. 15 may be considered an exception to the pattern illustrated by the architecture of block diagram 1400 of FIG. 14 and may be desirable for a customer of the IaaS provider if the IaaS provider cannot directly communicate with the customer (e.g., a disconnected region).
- the respective containers 1567 ( 1 )-(N) that are contained in the VMs 1566 ( 1 )-(N) for each customer can be accessed in real-time by the customer.
- the containers 1567 ( 1 )-(N) may be configured to make calls to respective secondary VNICs 1572 ( 1 )-(N) contained in app subnet(s) 1526 of the data plane app tier 1546 that can be contained in the container egress VCN 1568 .
- the secondary VNICs 1572 ( 1 )-(N) can transmit the calls to the NAT gateway 1538 that may transmit the calls to public Internet 1554 .
- the containers 1567 ( 1 )-(N) that can be accessed in real-time by the customer can be isolated from the control plane VCN 1516 and can be isolated from other entities contained in the data plane VCN 1518 .
- the containers 1567 ( 1 )-(N) may also be isolated from resources from other customers.
- the customer can use the containers 1567 ( 1 )-(N) to call cloud services 1556 .
- the customer may run code in the containers 1567 ( 1 )-(N) that requests a service from cloud services 1556 .
- the containers 1567 ( 1 )-(N) can transmit this request to the secondary VNICs 1572 ( 1 )-(N) that can transmit the request to the NAT gateway that can transmit the request to public Internet 1554 .
- Public Internet 1554 can transmit the request to LB subnet(s) 1522 contained in the control plane VCN 1516 via the Internet gateway 1534 .
- the LB subnet(s) can transmit the request to app subnet(s) 1526 that can transmit the request to cloud services 1556 via the service gateway 1536 .
- IaaS architectures 1200 , 1300 , 1400 , 1500 depicted in the figures may have other components than those depicted. Further, the embodiments shown in the figures are only some examples of a cloud infrastructure system that may incorporate an embodiment of the disclosure. In some other embodiments, the IaaS systems may have more or fewer components than shown in the figures, may combine two or more components, or may have a different configuration or arrangement of components.
- the IaaS systems described herein may include a suite of applications, middleware, and database service offerings that are delivered to a customer in a self-service, subscription-based, elastically scalable, reliable, highly available, and secure manner.
- An example of such an IaaS system is the Oracle Cloud Infrastructure (OCI) provided by the present assignee.
- OCI Oracle Cloud Infrastructure
- FIG. 16 illustrates an example computer system 1600 , in which various embodiments of the present disclosure may be implemented.
- the system 1600 may be used to implement any of the computer systems described above.
- computer system 1600 includes a processing unit 1604 that communicates with a number of peripheral subsystems via a bus subsystem 1602 .
- peripheral subsystems may include a processing acceleration unit 1606 , an I/O subsystem 1608 , a storage subsystem 1618 and a communications subsystem 1624 .
- Storage subsystem 1618 includes tangible computer-readable storage media 1622 and a system memory 1610 .
- Bus subsystem 1602 provides a mechanism for letting the various components and subsystems of computer system 1600 communicate with each other as intended. Although bus subsystem 1602 is shown schematically as a single bus, alternative embodiments of the bus subsystem may utilize multiple buses. Bus subsystem 1602 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. For example, such architectures may include an Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus, which can be implemented as a Mezzanine bus manufactured to the IEEE P1386.1 standard.
- ISA Industry Standard Architecture
- MCA Micro Channel Architecture
- EISA Enhanced ISA
- VESA Video Electronics Standards Association
- PCI Peripheral Component Interconnect
- Processing unit 1604 which can be implemented as one or more integrated circuits (e.g., a conventional microprocessor or microcontroller), controls the operation of computer system 1600 .
- processors may be included in processing unit 1604 . These processors may include single core or multicore processors.
- processing unit 1604 may be implemented as one or more independent processing units 1632 and/or 1634 with single or multicore processors included in each processing unit.
- processing unit 1604 may also be implemented as a quad-core processing unit formed by integrating two dual-core processors into a single chip.
- processing unit 1604 can execute a variety of programs in response to program code and can maintain multiple concurrently executing programs or processes. At any given time, some or all of the program code to be executed can be resident in processor(s) 1604 and/or in storage subsystem 1618 . Through suitable programming, processor(s) 1604 can provide various functionalities described above.
- Computer system 1600 may additionally include a processing acceleration unit 1606 , which can include a digital signal processor (DSP), a special-purpose processor, and/or the like.
- DSP digital signal processor
- I/O subsystem 1608 may include user interface input devices and user interface output devices.
- User interface input devices may include a keyboard, pointing devices such as a mouse or trackball, a touchpad or touch screen incorporated into a display, a scroll wheel, a click wheel, a dial, a button, a switch, a keypad, audio input devices with voice command recognition systems, microphones, and other types of input devices.
- User interface input devices may include, for example, motion sensing and/or gesture recognition devices such as the Microsoft Kinect® motion sensor that enables users to control and interact with an input device, such as the Microsoft Xbox® 360 game controller, through a natural user interface using gestures and spoken commands.
- User interface input devices may also include eye gesture recognition devices such as the Google Glass® blink detector that detects eye activity (e.g., ‘blinking’ while taking pictures and/or making a menu selection) from users and transforms the eye gestures as input into an input device (e.g., Google Glass®). Additionally, user interface input devices may include voice recognition sensing devices that enable users to interact with voice recognition systems (e.g., Siri® navigator), through voice commands.
- eye gesture recognition devices such as the Google Glass® blink detector that detects eye activity (e.g., ‘blinking’ while taking pictures and/or making a menu selection) from users and transforms the eye gestures as input into an input device (e.g., Google Glass®).
- user interface input devices may include voice recognition sensing devices that enable users to interact with voice recognition systems (e.g., Siri® navigator), through voice commands.
- voice recognition systems e.g., Siri® navigator
- User interface input devices may also include, without limitation, three dimensional (3D) mice, joysticks or pointing sticks, gamepads and graphic tablets, and audio/visual devices such as speakers, digital cameras, digital camcorders, portable media players, webcams, image scanners, fingerprint scanners, barcode reader 3D scanners, 3D printers, laser rangefinders, and eye gaze tracking devices.
- user interface input devices may include, for example, medical imaging input devices such as computed tomography, magnetic resonance imaging, position emission tomography, medical ultrasonography devices.
- User interface input devices may also include, for example, audio input devices such as MIDI keyboards, digital musical instruments and the like.
- User interface output devices may include a display subsystem, indicator lights, or non-visual displays such as audio output devices, etc.
- the display subsystem may be a cathode ray tube (CRT), a flat-panel device, such as that using a liquid crystal display (LCD) or plasma display, a projection device, a touch screen, and the like.
- CTR cathode ray tube
- LCD liquid crystal display
- plasma display a projection device
- touch screen a touch screen
- output device is intended to include all possible types of devices and mechanisms for outputting information from computer system 1600 to a user or other computer.
- user interface output devices may include, without limitation, a variety of display devices that visually convey text, graphics and audio/video information such as monitors, printers, speakers, headphones, automotive navigation systems, plotters, voice output devices, and modems.
- Computer system 1600 may comprise a storage subsystem 1618 that comprises software elements, shown as being currently located within a system memory 1610 .
- System memory 1610 may store program instructions that are loadable and executable on processing unit 1604 , as well as data generated during the execution of these programs.
- system memory 1610 may be volatile (such as random access memory (RAM)) and/or non-volatile (such as read-only memory (ROM), flash memory, etc.)
- RAM random access memory
- ROM read-only memory
- system memory 1610 may include multiple different types of memory, such as static random access memory (SRAM) or dynamic random access memory (DRAM).
- SRAM static random access memory
- DRAM dynamic random access memory
- BIOS basic input/output system
- BIOS basic input/output system
- BIOS basic routines that help to transfer information between elements within computer system 1600 , such as during start-up, may typically be stored in the ROM.
- system memory 1610 also illustrates application programs 1612 , which may include client applications, Web browsers, mid-tier applications, relational database management systems (RDBMS), etc., program data 1614 , and an operating system 1616 .
- operating system 1616 may include various versions of Microsoft Windows®, Apple Macintosh®, and/or Linux operating systems, a variety of commercially-available UNIX® or UNIX-like operating systems (including without limitation the variety of GNU/Linux operating systems, the Google Chrome® OS, and the like) and/or mobile operating systems such as iOS, Windows® Phone, Android® OS, BlackBerry® 16 OS, and Palm® OS operating systems.
- Storage subsystem 1618 may also provide a tangible computer-readable storage medium for storing the basic programming and data constructs that provide the functionality of some embodiments.
- Software programs, code modules, instructions that when executed by a processor provide the functionality described above may be stored in storage subsystem 1618 .
- These software modules or instructions may be executed by processing unit 1604 .
- Storage subsystem 1618 may also provide a repository for storing data used in accordance with the present disclosure.
- Storage subsystem 1600 may also include a computer-readable storage media reader 1620 that can further be connected to computer-readable storage media 1622 .
- computer-readable storage media 1622 may comprehensively represent remote, local, fixed, and/or removable storage devices plus storage media for temporarily and/or more permanently containing, storing, transmitting, and retrieving computer-readable information.
- Computer-readable storage media 1622 containing code, or portions of code can also include any appropriate media known or used in the art, including storage media and communication media, such as but not limited to, volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage and/or transmission of information.
- This can include tangible computer-readable storage media such as RAM, ROM, electronically erasable programmable ROM (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disk (DVD), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or other tangible computer readable media.
- This can also include nontangible computer-readable media, such as data signals, data transmissions, or any other medium which can be used to transmit the desired information and which can be accessed by computing system 1600 .
- computer-readable storage media 1622 may include a hard disk drive that reads from or writes to non-removable, nonvolatile magnetic media, a magnetic disk drive that reads from or writes to a removable, nonvolatile magnetic disk, and an optical disk drive that reads from or writes to a removable, nonvolatile optical disk such as a CD ROM, DVD, and Blu-Ray® disk, or other optical media.
- Computer-readable storage media 1622 may include, but is not limited to, Zip® drives, flash memory cards, universal serial bus (USB) flash drives, secure digital (SD) cards, DVD disks, digital video tape, and the like.
- Computer-readable storage media 1622 may also include, solid-state drives (SSD) based on non-volatile memory such as flash-memory based SSDs, enterprise flash drives, solid state ROM, and the like, SSDs based on volatile memory such as solid state RAM, dynamic RAM, static RAM, DRAM-based SSDs, magnetoresistive RAM (MRAM) SSDs, and hybrid SSDs that use a combination of DRAM and flash memory based SSDs.
- SSD solid-state drives
- volatile memory such as solid state RAM, dynamic RAM, static RAM, DRAM-based SSDs, magnetoresistive RAM (MRAM) SSDs, and hybrid SSDs that use a combination of DRAM and flash memory based SSDs.
- MRAM magnetoresistive RAM
- hybrid SSDs that use a combination of DRAM and flash memory based SSDs.
- the disk drives and their associated computer-readable media may provide non-volatile storage of computer-readable instructions, data structures, program modules, and other data for computer system 1600 .
- Communications subsystem 1624 provides an interface to other computer systems and networks. Communications subsystem 1624 serves as an interface for receiving data from and transmitting data to other systems from computer system 1600 . For example, communications subsystem 1624 may enable computer system 1600 to connect to one or more devices via the Internet.
- communications subsystem 1624 can include radio frequency (RF) transceiver components for accessing wireless voice and/or data networks (e.g., using cellular telephone technology, advanced data network technology, such as 3G, 4G or EDGE (enhanced data rates for global evolution), WiFi (IEEE 802.11 family standards, or other mobile communication technologies, or any combination thereof), global positioning system (GPS) receiver components, and/or other components.
- RF radio frequency
- communications subsystem 1624 can provide wired network connectivity (e.g., Ethernet) in addition to or instead of a wireless interface.
- communications subsystem 1624 may also receive input communication in the form of structured and/or unstructured data feeds 1626 , event streams 1628 , event updates 1630 , and the like on behalf of one or more users who may use computer system 1600 .
- communications subsystem 1624 may be configured to receive data feeds 1626 in real-time from users of social networks and/or other communication services such as Twitter® feeds, Facebook® updates, web feeds such as Rich Site Summary (RSS) feeds, and/or real-time updates from one or more third party information sources.
- RSS Rich Site Summary
- communications subsystem 1624 may also be configured to receive data in the form of continuous data streams, which may include event streams 1628 of real-time events and/or event updates 1630 , that may be continuous or unbounded in nature with no explicit end.
- continuous data streams may include, for example, sensor data applications, financial tickers, network performance measuring tools (e.g. network monitoring and traffic management applications), clickstream analysis tools, automobile traffic monitoring, and the like.
- Communications subsystem 1624 may also be configured to output the structured and/or unstructured data feeds 1626 , event streams 1628 , event updates 1630 , and the like to one or more databases that may be in communication with one or more streaming data source computers coupled to computer system 1600 .
- Computer system 1600 can be one of various types, including a handheld portable device (e.g., an iPhone® cellular phone, an iPad® computing tablet, a PDA), a wearable device (e.g., a Google Glass® head mounted display), a PC, a workstation, a mainframe, a kiosk, a server rack, or any other data processing system.
- a handheld portable device e.g., an iPhone® cellular phone, an iPad® computing tablet, a PDA
- a wearable device e.g., a Google Glass® head mounted display
- PC personal computer
- workstation e.g., a workstation
- mainframe e.g., a mainframe
- kiosk e.g., a server rack
- server rack e.g., a server rack
- computer system 1600 depicted in the figure is intended only as a specific example. Many other configurations having more or fewer components than the system depicted in the figure are possible. For example, customized hardware might also be used and/or particular elements might be implemented in hardware, firmware, software (including applets), or a combination. Further, connection to other computing devices, such as network input/output devices, may be employed. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will appreciate other ways and/or methods to implement the various embodiments.
- Embodiments of the present disclosure have been described using a particular combination of hardware and software, it should be recognized that other combinations of hardware and software are also within the scope of the present disclosure.
- Embodiments of the present disclosure may be implemented only in hardware, or only in software, or using combinations thereof.
- the various processes described herein can be implemented on the same processor or different processors in any combination. Accordingly, where components or modules are described as being configured to perform certain operations, such configuration can be accomplished, e.g., by designing electronic circuits to perform the operation, by programming programmable electronic circuits (such as microprocessors) to perform the operation, or any combination thereof.
- Processes can communicate using a variety of techniques including but not limited to conventional techniques for inter process communication, and different pairs of processes may use different techniques, or the same pair of processes may use different techniques at different times.
- Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is intended to be understood within the context as used in general to present that an item, term, etc., may be either X, Y, or Z, or any combination thereof (e.g., X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.
- Example embodiments of this disclosure are described herein, including the best mode known to the inventors for carrying out the disclosure. Variations of those example embodiments may become apparent to those of ordinary skill in the art upon reading the foregoing description. The inventors expect skilled artisans to employ such variations as appropriate and the inventors intend for the disclosure to be practiced otherwise than as specifically described herein. Accordingly, this disclosure includes all modifications and equivalents of the subject matter recited in the claims appended hereto as permitted by applicable law. Moreover, any combination of the above-described elements in all possible variations thereof is encompassed by the disclosure unless otherwise indicated herein or otherwise clearly contradicted by context.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Stored Programmes (AREA)
Abstract
Description
- Cloud-based computing platforms offer significant advantages over traditional on-premises computing platforms. For instance, cloud-based computing platforms provide scalable and flexible computing resources for users and can be deployed across geographic regions that are widely spaced apart (e.g., in different countries). Cloud-based computing platforms can provide one or more categories of services, including Software as a Service (SaaS), Platform as a Service (PaaS), or Infrastructure as a Service (IaaS).
- In a cloud environment, resources can be secured and protected by an identity service provider. An identity service provider can be responsible for handling, for example, authentication, authorization, single sign-on (SSO), user management, application management and audit. An identity service provider can offer flexibility and standard solutions.
- In an identity system, an authentication flow, for authenticating a user, is performed in a closed-control manner. Once an identity system starts an authentication flow, the control leaves a business application until required artifacts or tokens are generated. However, these identity solutions do not provide any flexibility. Further, such identity solutions do not provide plug-in customized code as part of the login control flow so as to influence a login decision or cleanup during logout.
- Further, some systems may provide pre-authentication and post-authentication control, however, such systems use back end Application Programming Interface (API) calls. Back end API calls do not provide complete control for performing login orchestration. For example, if the system would like to create a session on the user browser as part of login process or if the system would like to clear something during logout process then, it may not be possible using back end API calls. Also, the user is not given the ability to completely control a session.
- The present disclosure relates to cloud computing systems, and more particularly, to techniques for customizing authentication and handling pre-authentication and post-authentication processes in an identity cloud service. Various embodiments are described herein, including methods, systems, non-transitory computer-readable storage media storing programs, code, or instructions executable by one or more processors, and the like.
- Example embodiments can be configured for authentication and authorization by an identity cloud service of an identity and access management (IAM) system. An identity and access management can also be referred to as an Access Management System (AMS). The IAM can also be generally referred to as an identity system or cloud identity system.
- A cloud service can include a plurality of different types of services that are provided to companies and customers over the internet. Under an IaaS cloud service model, one or more types of resources are hosted by a cloud service provider and made available to a client (e.g., an enterprise customer). Such resources can include computing resources (e.g., compute instances), networking resources (e.g., a virtual private network), storage resources (e.g., cloud-based databases), and other hardware or software resources. Resources may be provisioned for use in a tenancy associated with a particular client. Within the tenancy, the client may have secure and isolated access to the provisioned resources, and the cloud platform may provide the client with software tools for organizing, administering, or otherwise managing the provisioned resources. For instance, an enterprise client may be provided with tools for defining the scope of access privileges to resources by different groups of employees of the enterprise client.
- In a distributed computing environment, such as an environment that includes a computing platform operating under an IaaS cloud service model, various entities may request access permission to protected resources. A protected resource can include a business application such as an application used to manage employees or to conduct a payment. An application can be accessed through a website or URL. A protected resource can also include a machine. The level of access can vary among entities. For instance, as indicated above, different users within a tenancy may have access privileges that depend on their user role (e.g., human resources, administrators, sales, etc.). Thus, access control can be based upon user identity. In addition to human users, entities that require access to resources may include compute instances (e.g., virtual or bare metal machines).
- When a user wants to access a resource that is protected by an access management system, the access management system receives information indicating that a particular user is requesting access to a particular protected resource. The system can then execute or invoke a process flow comprising a set of operations for authenticating the particular user. If authentication of the user is successful, then a session can be created for the user. After the session is created, the user can be redirected to the protected resource (or application) via the created session and the user is given the ability to control the application.
- A user may want to be able to plug-in their own code or create their own modules for a protected resource, such as an application. For example, a user may want to modify the authentication process for an application. A user can also be known as a client, customer, enterprise customer, or tenant. Plug-ins can be triggered so as to influence an authentication decision while establishing login or for cleanup during logout from an application.
- A plug-in can also be referred to as a plugin, add-in, addin, add-on, or addon. A plug-in can include computer implemented instructions to add specified rules or features to processes performed by the access management system. The example embodiments are described with respect to plug-ins for an access management system in a cloud environment. However, plug-ins can be created and applied for systems other than access management system, such as on-premise enterprise systems. Plug-ins can allow users to create and apply customizations to the authentication process. A plug-in can be triggered or activated in response to specified conditions being met.
- Therefore, plug-ins can be configured to trigger at various points during the process in which a protected resource is requested and accessed. For example, a plug-in may be configured to trigger after the access management system receives an indication that a user is requesting access to a particular protected resource (e.g., pre-login). A plug-in can also be configured to trigger before a session has been established for a user (e.g., pre-login) or after a session has been established for user (e.g., post-login), but before the user has logged out.
- Example embodiments can provide plug-ins that can be triggered pre-login, post-login, pre-logout, or post-logout. A plug-in that is triggered “pre-login” can be triggered before creating a single sign-on session. Pre-login can occur after an access management system receives an indication that a user is requesting access to a particular protected resource, or at a point in time before a session is established. A plug-in that is triggered “post-login” can be triggered after creating a single sign-on (SSO) session. A plug-in that is triggered “pre-logout” can be triggered before clearing a single sign-on session. A plug-in that is triggered “post-logout” can be triggered after clearing a single sign-on session. Logout can also be referred to as logoff or log-off. Pre-login can also be referred to as pre-authentication or pre-login authentication. Post-login can also be referred to as post-authentication or post-login authentication.
- The plug-ins can be triggered in response to an event. For example, a pre-login trigger can be triggered in response to a log-on event. A post-logon plugin can occur after an authentication phase of logging in finishes, but before the user session is actually established. A post-logout plugin can occur when a session disconnects.
- These are examples of plug-ins that can be provided by a user, however, plug-ins in addition to those identified can be provided for the login process and logout process or while determining whether a user is an authorized user of the application.
- Example embodiments provide users with the flexibility of customizing the authentication process for applications. Although users are granted permission to generate and implement their own plug-ins, measures are in place to prevent the user from controlling the overall code of the cloud identity system. Further, measures are also in place to prevent the plug-ins generated by the user from putting service provider computing systems (e.g., IAM) at risk, such as by preventing the plug-ins from consuming too much computing power and/or memory, etc. Measures are also placed to decrease the risk on the service provider computing system.
- As discussed above, some systems may provide pre-authentication and post-authentication control, however, such systems use back end Application Programming Interface (API) calls. Back end API calls do not provide complete control for performing login orchestration. Further, some implementations require an ID associated with the system since any changes or configurations are configured based on the system, and therefore, the user is limited in configuration options.
- Example embodiments address these deficiencies by providing a solution where the control is forwarded to the application to handle and participate in, for example, pre-login, post-login, post-login, and post-logout ceremonies.
- Further, an example embodiment can provide the user with complete control over a user session and the browser. Since configurations are loosely coupled, the configurations are not tied to the system. For example, a user is given the ability to change user interface structures. The user can be given complete control over the user session in the browser so as to control an authentication process and apply their own configurations. Measures are put in place to ensure that the system operates correctly.
- A system in accordance with some example embodiments benefits the cloud architecture where customers want to inject and trigger their piece of code in the identity system to make pre-authentication and post-authentication decisions. An example embodiment ensures that a user's customized processing and decisions are handled before the session is created or access is given.
- Benefits provided by example embodiments can include the following. Example embodiments helps customers to inject their pre-login, post-login, pre-logout, and post-logout configurations. Further, example embodiments can assist users in writing their implementation and deploy the implementation on their chosen platform. Example embodiments can allow customer applications to take part in single sign-on (SSO) session creation. In example embodiments, a POST/GET call with a required input can be called to the configured endpoint. Further, the deployed service can process the incoming request and return the result as a post redirect back to the identity system. Also, an identity management system of an example embodiment can process results sent by a pre-authenticated module or a post-authenticated module which are included in the decision making. Further, example embodiments can return a risk score for adaptive authentication. The risk score can be used to compute policy decisions, such as determining whether access to the system should be avoided.
-
FIG. 1 illustrates a simplified block diagram of an example cloud computing environment, in accordance with one or more embodiments. -
FIG. 2 illustrates a system architecture of a cloud identity system, in accordance with some example embodiments -
FIG. 3 illustrates a sequence diagram for a method of applying customized plug-ins, in accordance with some example embodiments. -
FIG. 4 illustrates a method of customizing plug-ins, in accordance with some example embodiments. -
FIG. 5 illustrates a method of analyzing a plugin, in accordance with some example embodiments. -
FIG. 6 illustrates a sequence diagram of a method for customizing a plug-in, in accordance with some example embodiments. -
FIG. 7 illustrates a request format of a request used in handling plug-ins, in accordance with some example embodiments. -
FIG. 8 illustrates a response format of a response used in handling plug-ins, in accordance with some example embodiments. -
FIG. 9 illustrates a simplified block diagram of an access management system including a plug-in system, in accordance with some example embodiments. -
FIG. 10 illustrates a method of applying plug-ins, in accordance with some example embodiments. -
FIGS. 11A and 11B illustrate a flow diagram of a method for handling pre-login plug-ins, in accordance with some example embodiments. -
FIG. 12 is a block diagram illustrating one pattern for implementing a cloud infrastructure as a service system, in accordance with some example embodiments. -
FIG. 13 is a block diagram illustrating another pattern for implementing a cloud infrastructure as a service system, in accordance with some example embodiments. -
FIG. 14 is a block diagram illustrating another pattern for implementing a cloud infrastructure as a service system, in accordance with some example embodiments. -
FIG. 15 is a block diagram illustrating another pattern for implementing a cloud infrastructure as a service system, in accordance with some example embodiments. -
FIG. 16 is a block diagram illustrating an example computer system, in accordance with some example embodiments. - In the following description, various embodiments will be described. For purposes of explanation, specific configurations and details are set forth in order to provide a thorough understanding of the embodiments. However, it will also be apparent to one skilled in the art that the embodiments may be practiced without the specific details. Furthermore, well-known features may be omitted or simplified in order not to obscure the embodiment being described.
- The present disclosure relates to cloud computing systems, and more particularly, to techniques for customizing authentication and for handling pre-authentication and post-authentication plug-ins in an identity cloud service of an access management system.
- A user, such as a customer of an enterprise system, may want to write their own code or modules for handling customization during the login process for an application. Users may want to modify the predefined login process or add additional steps to the login process. For example, the user may want to create their own session instead of using an existing session with an application. Further, a user may want to create their own notifying events about pre-login, post-login, pre-logout and post-logout, or add additional authentication measures.
- Example embodiments allow users to inject their own pre-authentication and post-authentication configurations. A user can write their own implementation and deploy the implementation on their chosen platform. Example embodiments ensure that the user's customized processing and decisions are addressed before the session is created or before access is given.
-
FIG. 1 illustrates a simplified block diagram of an examplecloud computing environment 100, in accordance with one or more embodiments. - The
environment 100 includes acloud infrastructure system 110 operated by a cloud service provider. Thecloud infrastructure system 110 may include infrastructure resources 140 (e.g., hardware and/or software components configurable to providecloud services 130 to clients of thecloud infrastructure system 110. As illustrated, the infrastructure resources can be partitioned into different client tenancies 145A-145N. Each client tenancy 145A-145N is a logical container that can contain logical resources to which the corresponding client (e.g., customer or user) has secure and private access. For example a logical resource could be a database, a load balancer, or a testing platform for testing software code. - As illustrated in
FIG. 1 , thecloud infrastructure system 110 may include an Identity Access Management (IAM)system 120. The Identity Access Management (IAM) system can also be known as an Access Management System (AMS), identity system, or cloud identity system. - The
IAM system 120 may be configured to manage access to theinfrastructure resources 140 by user principals and/or resource principals. For example, the functionality provided by theIAM system 120 may include an identity cloud service 135 (another example of cloud services 130). The cloud based identity service (e.g., identity cloud service 135) can be configured to maintain stored information about users associated with the tenancies 145A-145N, such as usernames, passwords or other credential information, user information, and the like.IAM system 120 can be implemented in hardware and/or software and may include, for example, one or more access management servers configured to process requests from client devices for access to resources within the client tenancies 145A-145N. - The
IAM system 120 is configured to protect access to protected resources, such as applications. Each of the client tenancies 145A-145N can include one ormore applications 155A-155N.Applications 155A-155N can correspond to business applications that are used by the client, such as human resource applications, payment applications, etc. Each of the tenants client tenancies 145A-145N can include a plurality of different applications based on their business needs. Further, each of the applications can be configured to include different authentication processes and can be configured to provide different information during the authentication process. -
FIG. 2 illustrates a system architecture of asystem 200, in accordance with some example embodiments. Thesystem architecture 200 includes auser 210, abrowser 220, one ormore customer applications 230, theinternet 240, anidentity service 251, adatabase 252, and plug-ins 253.Identity service 251,database 252, and plug-ins 253 can make up anaccess management system 250 or the domain of an access management system. - A
user 210, such as a customer of the access management system, may want to configure plug-ins. Theuser 210 can use abrowser 220 on their computing device (e.g., laptop, desktop, mobile device) to request to configure and apply pre-authentication and/or post-authentication plug-ins. Theuser 210 can accesscustomer applications 230 through theinternet 240. The applications can include any applications that exist in the access management system and are accessible and configurable by the user. The applications that can be configured by the user can vary based on the administrator rights and permissions given to the user. - The
access management system 250 can include one ormore identity services 251, one ormore databases 252, and plug-ins 253.Identity service 251 is an example of cloud service.Database 252 can be configured to store login actions and rules for theaccess management system 250. Plug-ins 253 can include pre-authentication and post-authentication plug-ins that are configured to be implemented incustomer applications 230. - The
system 200 exposes configurations so that the customer can configure pre-authentication and post-authentication plugins, which allow customers to create customized code. - An example embodiment provides for authorized use of plug-ins. A plug-in can also be referred to as a plugin, add-in, addin, add-on, addon or a plug-in extension. A plug-in can include computer implemented instructions to add specified rules or features to processes performed by the access management system. A plug-in can also be known as a trigger. A plug-in can be composed to trigger at a particular time during, for example, an authentication process. The example embodiments are described with respect to plug-ins for an access management system, in a cloud environment. However, plug-ins can be created and applied for systems other than access management system, such as on-premise enterprise systems.
- Plug-ins can be used to, for example, provide notifications regarding events, to provide audit information, to provide third-party applications with information, for creating a footprint in a browser, for modifying an application session cookie, or for calculating and returning application-based business logic risk-scores.
- With respect to notification regarding events, a user may want to be notified whenever a login occurs, or the user may want to be notified regarding what happened during login. Alternatively, the user may want to be notified regarding what is occurring during pre-login or post-login.
- An audit can include creating an audit trail. The conditions for a plug-in are audited to determine whether the conditions for the plug-in are being met. As another example, a user may want to make an audit for a particular user accessing an application on a tenant's account.
- Providing third-party applications with information may be used when a user wants to bring in a third-party authentication or another form of authentication, in addition to that which is already provided. The user may want to inform the third-party application regarding the status of the authentication.
- Creating a footprint in a browser may occur when a user wants to create a footprint in the browser for a specific application, even before creating a session. Further, a user may want to calculate a score based on their environment. That is, a user may want to calculate and return application-based business logic risk-scores.
- As another example, a user may want to add another level of authentication (e.g., multi-factor authentication (MFA). The user may want to add an additional authentication requirement, such as generating a token or requesting biometric information.
- These are merely examples and plug-ins can be used to accomplish other tasks than those identified above.
- A. Plug-In Configuration
- Plug-ins can be configured to trigger at various points in time. A plug-in that is triggered “pre-login” can be triggered before creating a single sign-on session. Pre-login can occur after an access management system receives an indication that a user is requesting access to a particular protected resource, or at a point in time before a session is established. A plug-in that is triggered “post-login” can be triggered after created a single sign-on (SSO) session. A plug-in that is triggered “pre-logout” can be triggered before clearing a single sign-on session. A plug-in that is triggered “post-logout” can be triggered after clearing a single sign-on session.
- In order to configure a plug-in, the user has to be an authorized user of the system. Users may have to go through multi-factor authentication (MFA) to get a token or console, so only valid users are able to configure the plugins. In order to obtain the token indicating that the user is an authorized user, the user may perform a sign on session. A user can include an administrator of a tenant in the multitenant cloud environment. A tenant can include, for example, a company or a branch within a company. Further, depending on the type of plug-in generated, the level of authorization needed can vary. That is, the type of plug-in generated can vary depending on the authorized role of the administrator.
- The access management system can provide the user with attributes and values the user can change. The user will upload their public key and forward their public key to the access management system. After the user configures the plug-in, they will forward the plug-in along with their private key to the access management system. The access management system will verify the signature of the response using the public key provided by the user. Therefore, no other third parties can interfere since they do not have the private key of the user.
- Plug-ins can be configured using an identity system admin console or with a token with an identity domain administrator role. When the user logs into the access management system, the user can access an administrator control which identifies permissions needed in order to generate the one or more plug-ins. If the administrator does not have the needed permissions for a particular plug-in, then the user will not be allowed to configure the particular plug-in.
- A plug-in will be configured to include an application URL. The URL will correspond to the application for which the plug-in is configured. The plug-in code will also include information regarding the state of the application for implementing the plug-in, such as whether the application should be in a pre-login state, a post-login state, a pre-logout state or a post-logout state. The plug-in configuration can also include information such as whether it is mandatory or optional.
- The plug-in configuration can also include information regarding security, such as any required username or password. The configuration can also include details of a service endpoint, or what kinds of signatures are needed. The level of sensitivity configured by the user can vary based on the administrator role. The plug-in will also include account information of the user. Based on the information in the plug-in, the access management system can determine whether or not user is authorized to implement the plug-in and whether the criteria for the plug-ins have been met.
- The plug-in will also include the public key of the user. The access management system will verify signatures in responses using a public key to ensure that no third party factor has interfered in the response. The access management system will verify that the user is to correct user by using the public key. The plug-in can sign their responses using their private key.
- Since the call for the plug-in is going out of the access management system, validation measures (e.g., private key, public key) are implemented ensure that there are no security issues. Plug-ins can also be configured to ensure that the plug-ins comply with system requirements. The plug-in is configured to ensure that security measures are maintained. For example, a plug-in is configured with a nonce so as to prevent an external request replay attack.
- A replay attack can include when a third party obtains the request or transmission and fraudulently or maliciously duplicates the request one or more times. A replay attack can also occur if there is a bug in the code of the plug-in and the code sends a request multiple times to the access management system. Through the use of a nonce, a second request will be rejected, as the earlier request would have an evicted nonce. Only one response will be accepted from a plug-in in a single session. The access management system would not reply to a request if it has previously replied to a request with the identified nonce. A nonce is generated for every request so that a request cannot be duplicated. A nonce can include randomly generated numbers and/or letters that would be unique to the specific instance of the plug-in.
- An example embodiment can also prevent forged requests. The identity system sets the nonce in a cookie, so that even if someone captures the nonce, they cannot succeed without the cookie containing the nonce. The cookies are set in the browser. The browser will have the corresponding data and the corresponding data has the nonce. The cookies in a browser are set for the particular domain corresponding to the plug-in. An improper user cannot forge the system because each request coming from a plug-in calls a particular domain. The nonce will be compared in the backend as well as in the cookie.
- An example embodiment also ensures data integrity with respect to request data and data integrity with respect to response data. The access management system will sign the data output. The corresponding tenant's private key and the plug-in has to verify the response using the public key of the access management system.
- All requests and response data can be sent in a JASON web token (JWT format), which is signed by the private key of the sender. Upon receiving the data, a recipient can be required to verify the signature using a public key of sender. With respect to request data, the identity system can sign the request data using its private key when sending to application. Upon receiving, the application can access a data store (e.g. admin/v1/SignedCertJwk) to get the public key for verification.
- With respect to data integrity, after processing request data, the application builds its own data and can send the data to the identity system. The data will be signed by its private key, and the counter part of this key (i.e., public key) can already be uploaded to identity system at the time of configuring the plug-in. The identity system can verify the data sent by application using the public key of the user. The tenant will sign the response with their own private key and access management system will verify the signature using the public key uploaded for the plug-in.
- Further, the access management can send a response to the plug-in using the tenant's private key. The plug-in can verify the response from the access management system using the public key of the access management system. The plug-in can request the public key of the access management system (e.g., tenant's public key for the access management system).
- B. Mandatory Plug-Ins
- Plug-ins that are configured to be triggered during pre-login or pre-authentication can include criteria that are identified by user as being mandatory or optional. If criteria for a plug-in is designated as mandatory, then the plug-in cannot be initiated unless all of the criteria has been met. If criteria for a plug-in is designated as optional, then all of the criteria does not need to be met before the plug-in is initiated.
- A mandatory plug-in is a plug-in which has one or more factors or criteria that is required in order for the plug-in to be implemented in the current session. If factors of the plug-in are not met, the session will not be created. For example, if a plug-in is a multi-factor authentication plug-in, then the user must provide the information needed in order to implement the plug-in. However, if the plug-in is, for example, an audit plug-in, no additional information may be needed from the user since the plug-in can perform the task without requiring any additional information. Plug-ins that require additional information can be placed in the list for the pre-authentication process whereas plug-ins that do not require additional information from the user can be placed in a list of post-authentication process plug-ins.
- If one or more factors or criteria for a mandatory plug-in are not satisfied, then the plug-in will not be implemented in the current session. For example, if the plug-in is for another layer of authentication, such as requesting biometric information, then the authentication process will not resume without requesting biometric information. Therefore factors for pre-login plug-ins have to be satisfied in order for the session control to be transferred to the user.
- Pre-login plug-ins can, as a default, be configured to be mandatory. That is the pre-login plug-in criteria must be satisfied before the plug-in is allowed to access application since access to the application could be controlled. If the mandatory criteria is not satisfied then the one or more plug-ins including the mandatory criteria will be denied. A decision can be returned to a user denying the user access to the protected resource for that plug-in.
- Post-login plug-ins may not need to be designated as mandatory as the user will not usually be prevented from logging out of an application. That is, logging out of an application will usually not be prohibited due to an error with a plug-in. Therefore, even if a post-login plug-ins fails, the user will not be prohibited from leaving an application. However, the user can be notified regarding any issues with a plug-in.
- C. Optional Plug-Ins
- An optional plug-in is a plug-in which has one or more factors or criteria that is not required in order for the plug-in to be implemented in a current session. If one or more factors or criteria for an optional plug-in are not satisfied, the plug-in can still be implemented in a current session with an application. Therefore, if any of the plug-ins which are optional fail, that is one or more factors or criteria for the plug-ins fail, the session can still proceed.
- Plug-ins that are triggered to occur post-login can be identified as optional plug-ins. Plug-ins that are triggered to occur post-login are identified as optional because post-login plug-ins can be grouped together as a group, and therefore processed as a group. Whereas plug-ins that occur pre-login are processed individually. Therefore, if any factors are not met for post-login plug-ins a session can still be created.
- Plug-in factors that can be considered optional can include application specific audit-logging plugins, application login reporting plugins, and application session tracker plugins.
- A user may want to generate plug-ins to be used to during the authentication process. The authentication process can generally refer to the stages that occur before, during and after authentication of a user with an application. An example embodiment ensures that the user's customized processing and decisions are addressed before the session is created or before access is given. Therefore, before the session is created or before access is given, it is determined whether any pre-authentication or post-authentication plug-in can be applied.
- Even though a session has been created after authentication, the session is created in the background and the user is not given control of the application until after the plug-ins have been evaluated. The application will not be redirected to the user to control until the plug-ins have been evaluated.
- Plug-ins can be generated for various points in the process of requesting access to a particular protected resource. For example, a plug-in may be configured to trigger after the access management system receives an indication that a user is requesting access to a particular protected resource (e.g., pre-login). A plug-in can also be configured to trigger before a session has been established for a user (e.g., pre-login) or after a session has been established for user (e.g., post-login), but before the user has logged out. Therefore, a user is provided with a plurality of different possibilities for customizing plug-ins.
-
FIG. 3 illustrates a sequence diagram 300 of the stages during which plug-ins can be applied, in accordance with some example embodiments. -
Stage 310 discloses a pre-login or pre-authentication stage. At this point, the user has not yet established a login session. That is, the user has not yet logged into an application. One or more plug-ins can be generated for implementation pre-login. The plurality of plug-ins can be stored in an ordered list. If there is more than one plug-in than the plug-ins are evaluated sequentially. -
Stage 320 discloses a stage during which a session has been established. -
Stage 330 illustrates a post-login stage which is also a post-authentication stage. At this point in time the user has established a login session and has been authenticated. -
Stage 340 illustrates a pre-logout stage which is also a post-authentication stage. This is a stage after the user has logged in, but before the user has logged out of the application. -
Stage 350 illustrates a stop session stage. At this point, the user has indicated that they would like to end their session with the application. -
Stage 360 illustrates a post-logout stage, which is also a post-authentication stage. At this stage, the user has logged out of the application. -
FIG. 3 illustrates example stages for which plug-ins can be configured. However, additional pre-authentication and post-authentication stages can be included other than those shown inFIG. 3 . -
FIG. 4 illustrates amethod 400 of customizing plug-ins, in with some example embodiments. - At
step 401, the access management system may receive a request to access a protected resource. The request can be received from a user (e.g., tenant) of the cloud computing environment to access a protected resource managed by the access management system, such as a business application. A user may submit a request indicating that they would like to implement a customized a plug-in. A user can customize plug-ins that will trigger pre-authentication or post-authentication. - At
step 402, the access management system can determine whether the user is authorized to access the protected resource. Since the resource is a protected resource, it must be determined whether the user is an authorized user before the user is allowed to customize or modify any aspect of the business application. If the user is not authorized to access the resource, then the user will not be allowed to configure plug-ins for the resource. An authorization process can be performed with the user to ensure that the user is an authorized user. Further, the authorization process can ensure that a particular plug-in is configured within the permissions for a particular user. - The access management system can determine whether the user is authorized to access the resource by performing an identity service authentication process, such as single sign-on (SSO). If the identity service authentication process fails, then the user will not be authorized to implement any customized plug-ins. The identity service authentication process can include a challenge and response authentication. If the user fails to respond correctly to any of the challenges, then no calls will be made for any configured plug-ins.
- At
step 403, in response to determining that the user is authorized to access the protected resource, the access management system can identify one or more plug-ins for controlling an authentication session for the protected resource. - At
step 404, the one or more plug-ins generated by the user are analyzed to determine that criteria for the one or more plug-ins are satisfied. This step can occur after creating a single sign-on session, but before redirecting to the actual application. The access management system can give a call back to plug-ins. Step 404 is explained is greater detail with respect toFIG. 5 . - At
step 405, in response to determining that the criteria for the one or more plug-ins are satisfied, a session can be created for the user. A session includes a period a time during which a user is given access to the application. - At
step 406, the user is provided with direct access and control of the application. -
FIG. 5 illustrates amethod 500 of analyzing a plugin, in accordance with some example embodiments.FIG. 5 can correspond to step 404 ofFIG. 4 . - All of the plug-ins that the user would like to implement for a session will be generated before a session is established. An example embodiment analyzes the plug-ins to determine whether or not the plug-in can be implemented for session.
- At
step 501, it is determined whether there are any pre-authorization plug-ins. Pre-authorization plug-ins are plug-in to be implemented before a session is established. The plug-ins can be obtained from an ordered list. The ordered list can include one or more plug-ins that are configured for a particular application. The ordered list can be stored on a data store that is accessible by the access management system. The ordered list can include pre-authentication and post authentication plug-ins that are configured by the user. - Pre-authentication plug-ins will be processed before any post-authentication plugins in the ordered list. The first plugin in the ordered list or the plug-in in the ordered list having the highest priority can be identified as a highest ordered plug-in. A second plug-in in the ordered list having a second highest priority can be identified as a second highest ordered plug-in, and so forth for any remaining plug-ins.
- At
step 502, the pre-authorization plug-in is executed and a response is returned. Processing of the pre-authorization plug-in can be performed. Processing can include determining whether the criteria for implementing the plug-in have been met. For example, if there are mandatory criteria for implementing the plug in, then it is determined whether the mandatory criteria have been met. Processing can also include determining whether security measures are in place. For example, that the plug-in includes a nonce and public/or private key information. - At
step 503, a cookie can be created for a browser session with the application. The cookie can be updated based on the results of processing the pre-authorization plug-in. A cookie is a file which is used to keep track of events occurring during a session. The user can refer to the cookie to determine the results of processing the plug-in for implementation. - At
step 504, the access management system can determine whether there are any post-authorization plug-ins. The access management system can identify any post-authorization plug-ins from the ordered list. The post-authorization plug-ins can occur after the pre-authorization plug-ins on the ordered list. - At
step 505, post-authorization plug-ins are executed and a response is returned. The post-authorization plug-in can be processed. Processing of post-authentication plug-ins would occur after all of the pre-authentication plug-ins have been processed. Processing can include determining whether the criteria for implementing the plug-in have been met. - At
step 506, the cookie for the session is updated based on the results of processing the post-authorization plug-in. The cookie is updated to include information regarding the processing of the post-authentication plug in. -
FIG. 6 illustrates a sequence diagram of amethod 600 for customizing a plug-in, in accordance with some example embodiments. - As shown in
FIG. 6 , the sequence includes abrowser 610, anapplication system 620, anidentity system domain 630, and pre-authentication and post-authentication plug-insystem 640. Theapplication domain 620 can include anapplication gateway server 621 and one ormore customer applications 622. Theidentity system domain 630 can include anaccess gateway server 631 and an identity andaccess management system 632. - Pre-authentication plug-in and post-authentication plug-in
system 640 is configured to provide the plug-ins. The plug-ins can also be called plug-in extensions as they extend operations currently provided by the access management system. Pre-authentication plug-in and post-authentication plug-insystem 640 can include apre-authentication handler 641 and apost-authentication handler 642. Thepre-authentication handler 641 can be configured to process pre-authentication or pre-login plug-ins hosted by the customer. Thepost-authentication handler 642 can be configured to process post-authentication or post login, pre-logout and post logout plug-ins hosted by the customer. The pre-authentication plug-in and postauthentication plug-in system 540 can be part of a customer hosted plug-in system in the cloud environment. - As illustrated in the sequence diagram shown in
FIG. 6 , when the cloud identity system detects configured pre-authentication or post-authentication plugins, it sends a request back to the configured URL with proper request data. The third party plugin can take action on the received input and provide a necessary result so that cloud identity system can take appropriate decisions while allowing access to the system. - A plug-in can be invoked by the access management system using a URL corresponding to that plug-in. The URL for a plug-in is configured and identified when the plug-in is registered with the access management system. Registration and generation of the plug-in can be done via a console, such as a web interface provided by a cloud services provider for making configuration changes to a customer's account. The registering of a plug-in can be performed by, for example, a user (e.g., administrator) that is designated for the customer (e.g., designated for a customer tenancy). Only an administrator with the appropriate credentials for logging onto the console can make changes to an application. Access management system can control the console that is provided to the administrator.
- In the example embodiment shown in FG. 6, the steps occur in the front end or front channel and there are no backend or back channel communications.
- At
step 650, the user can open an application on thebrowser 610. The user can select an application, such as a human resources application or a payment application of the tenant, that is protected by the access management system. For example, the user can select a webpage for an application or enter a URL on a browser. - At
step 651, thegateway server 621 can determine that the application that the user wants to access is a protected resource and therefore the user cannot access the application without a session cookie. Thecan gateway server 621 can then send a URL redirection code (e.g., 302) to request authorization to access an application. The request can performed using a method for accessing websites or applications, such as OAuth. - At
step 652, the browser sends a GET request to theaccess gateway server 631 to request authorization. The redirect fromstep 651 goes back to thebrowser 610 and thebrowser 610 sends it to theaccess gateway server 631. Theaccess gateway server 631 can determine whether the application, for which access is requested, is a protected resource. - At
step 653, theaccess gateway server 631 forwards the GET request to the identity andaccess management system 632. After theaccess gateway server 631 determines that the application is a protected application, the call is redirected to the identity andaccess management system 632. The call is redirected to the identity andaccess management system 632 since theaccess gateway server 631 can identify that it does not have a cookie for the session. - At step 654, the authorization ceremony is started. Primary authorization or primary authentication is performed such as requiring a user name and password. Primary authorization can include implementing multifactor authentication (MFA) policies, Terms of Use (ToU) policies, etc. The primary authentication value using the password and any multi-factor authentication is performed so as to initiate the process of allowing the user to access the application.
- If there are no plug-ins, then the process can proceed to cookie creation. However, if there are plug-ins, then the method proceeds to step 655.
- Authorization is shown as occurring at step 654 after the GET authorization is sent by the
access gateway server 631 to the identity andaccess management system 632. That is, this is performed before the login and password page is presented to the user. However, the authorization process can instead occur after the user name and password have been verified (step 667), that is after the user has entered their login and password. - At step 655, a check is performed to determine whether pre-authentication plug-ins have been configured. The plug-ins can be obtained from one or more databases of the tenant that act as microservices to the access management system.
- Steps 655 and 668 are explained in greater detail with respect to
FIGS. 11A and 11B . - At
step 656, the identity andaccess management system 632 with forward the pre-authentication plug-in to theaccess gateway server 631. Theaccess management system 632 will send an OK and forward pre-authentication to theaccess gateway server 631 of theidentity system domain 630. - At
step 657, theaccess gateway server 631 will forward the pre-authentication plug-in to thebrowser 610. Theaccess gateway server 631 will forward an OK and pre-authentication information to thebrowser 610. - At
step 658, thebrowser 610 will forward the pre-authentication plug-in to thepre-authentication handler 641 for execution. Thebrowser 610 will send a POST execute pre-authentication call to thepre-authentication handler 641. - At
step 659, thepre-authentication handler 641 will process the pre-authentication. The pre-authentication and post authentication system 540 can be part of a customer hosted plug-in system in their tenancy. - At step 660, the
pre-authentication handler 641 will return a pre-authentication result to thebrowser 610. For example, if the plug-in is a mandatory plug in, it will determine whether the criteria for the plug-in has been met. - At step 661, the
browser 610 forward the pre-authentication result to theaccess gateway server 631. That is, thebrowser 610 will send a POST pre-authentication result to theaccess gateway server 631. - At step 662, the
access management system 632 will receive the pre-authentication result information and take any actions associated with the result. For example, if the plug-in includes factors that are mandatory and the factors were not met, then the flow will not proceed. However, if the plug-in evaluation does not result in errors, then it can proceed to step 663. - At
step 663, the identity andaccess management system 632 will send the login page to theaccess gateway server 631. - At
step 664, theaccess gateway server 631 will forward the login page to thebrowser 610. - At step 665, after the
browser 610 has received a user name and password via the login page, the browser will forward the user name and password to theaccess gateway server 631. The browser can send a POST call forwarding the username and password to theaccess gateway server 631. - At step 666, the
access gateway server 631 will forward the user name and password to the identity andaccess management system 632. The user name and password can be forwarded via a POST call to the identity andaccess management system 632. - At step 667, the identity and
access management system 632 will verify the username and password. After the user name and password is verified, a session can be established for the user and a session cookie is generated. - At step 668, a check is performed to determine whether any post-authentication plug-ins have been configured.
- At
step 669, the identity andaccess management system 632 will forward the post-authentication plug in to theaccess gateway server 631. - At
step 670, theaccess gateway server 631 will forward the post-authentication plug-in to thebrowser 610. - At
step 671, thebrowser 610 will forward the post-authentication plug-in to the post-authentication handler in order to execute or invoke the post-authentication plugin. - At
step 672, thepost-authentication handler 642 will execute or invoke the post-authentication plug-in. - At
step 673, thepost-authentication handler 642 will forward the post-authentication plug-in processing results along with a session cookie for the user's browser session. - At step 674, the
browser 610 will forward the post-authentication plug-in results to theaccess gateway server 631. - At
step 675, the access gateway will forward the post-authentication plug-in result to the identity andaccess management system 632. - At
step 676, the identity and authentication component will compute post-authentication actions, if any. Post authentication actions can be defined using a post authentication plugin sequence. If there are plugins present, then the plug-ins include post-authentication actions to be completed. - At
step 677, the session cookie is sent to the to theaccess gateway server 631. The identity andaccess management system 632 will forward a session cookie and an authorization code to theaccess gateway server 631. An authorization code can include an opaque token containing information used by system to grant an access token (e.g., used for access token exchange). An authorization code can include an OpenID Connect (OIDC) authorization code. - At
step 678, theaccess gateway server 631 will forward the session cookie and an authorization code to thebrowser 610. - At
step 679, the browser will forward the authorization code and token ID to thegateway server 621 of the application. - At
step 680, thegateway server 621 of the application will evaluate the authorization and ID token and create a session. - At
step 681, thegateway server 621 will send the application and session cookie to thebrowser 610. - At step 682, the
browser 610 will send a GET command for the application to theapplication gateway server 621. - At
step 683, theapplication gateway server 621 will forward the GET command for the application to theapplication 622 - At step 684, the
application 622 will send an application console to thegateway server 621. - At
step 685, thegateway server 621 will provide application access to thebrowser 610. The user is given access to the protected resource, such as a business application. - A. Request Format
- An example embodiment can allow a user to configure pre-authentication and post-authentication plug-ins. The system can send requests (i.e., POST request) and provide responses (i.e., POST response) throughout the process of handling the pre-authentication and post authentication plugins.
-
FIG. 7 illustrates a request format of arequest 700 used in handling plug-ins, in accordance with some example embodiments. - As shown in
FIG. 7 , therequest 700 can include a plugin-ID 710, anonce 720, aredirect URL 730 and adata structure 740. - A plugin-
ID 710 can be used to identify a plug-in from other plug-ins. A plug-in ID can be an alphanumeric identifier or a name for the plug-in. - A nonce 720 is included to provide, for example, security measures. A nonce can include randomly generated numbers and/or letters. An external request replay attack can be prevented by having a nonce with each request. A second request will be rejected, as the earlier request would have an evicted nonce. A nonce is generated for every request so that a request cannot be duplicated.
- A
redirect URL 730 will be a URL of the access management system and is used to redirect to the application page. -
Data structure 740 can include data structures to indicate the request. Data can be sent as a JWT token signed by a tenant key. A JWT can contain any information that would be useful or relevant to the client. Further, the format of the JWT can vary based on the desired information for the token. - B. Response Format
-
FIG. 8 illustrates a response format of aresponse 800 used in handling plug-ins, in accordance with some example embodiments. - As shown in
FIG. 8 , theresponse 800 can include a plug-inID 810, anonce 820, a status ofexecution 830, and adata structure 840. - A plugin-
ID 810 can be used to identify a plug-in from other plug-ins. A plug-in ID can be an alphanumeric identifier or a name for the plug-in. - A nonce 820 is included to provide, for example, security measures. A nonce can include randomly generated numbers and/or letters. An external request replay attack can be prevented by having a nonce with each request. A second request will be rejected, as the earlier request would have an evicted nonce. A nonce is generated for every request so that a request cannot be duplicated.
- A status of
execution 830 can indicate the processing status of a plug-in. - A
data structure 840 can include data structures to indicate the response. Data can be sent as a JWT token signed by a tenant key. - C. Plug-In System and Method
-
FIG. 9 illustrates a simplified block diagram of an identity andaccess management system 900 including a plug-insystem 910, in accordance with some example embodiments. - The identity and access management system (IAM) 900 can include a plug-in
system 910 for identifying and analyzing plug-ins. The plug-insystem 910 can include a pre-authentication identification sub-system 911, apost-authentication identification sub-system 912 and ananalysis sub-system 920. Theanalysis sub-system 920 can includeexecution sub-system 921 and postexecution sub-system 922. The plug-insystem 910 can include one or more processors and memories for each of the sub-systems. -
FIG. 10 illustrates an overview ofmethod 1000 of applying plug-ins, in accordance with some example embodiments. The steps shown inFIG. 10 are explained in greater detail with respect toFIGS. 11A and 11B . - At
step 1010, the plug-ins to be analyzed are identified. This includes identifying pre-authentication and post-authentication plug-ins. For example, any pre-login, post-login, pre-logout and post-logout plug-ins are identified. All of the plug-ins to be implemented for an application are identified prior to initiating the analyzing of the plug-ins. This step can be performed by, for example, the pre-authentication identification sub-system 911 and thepost-authentication identification sub-system 912 ofFIG. 9 . - At
step 1020, the execute stage can be performed. This step can be performed by, for example, theexecution sub-system 921 ofFIG. 9 . The execute stage will prepare the data for the plugin or the browser can sign the data using a current private key to generate a nonce and store it in the back end. Various actions can be performed to prepare the plug-in. Further, the request to be sent to the browser can be prepared. - At
step 1030, the post execute stage can be performed. This can be performed by, for example, thepost execution sub-system 922 ofFIG. 9 . The POST execute will return a plug-in result and verifies the that the plug-in can operate correctly. - D. Plug-In Processing
-
FIGS. 11A and 11B illustrates a flow diagram of amethod 1100 for handling pre-login plug-ins, in accordance with some example embodiments. - In the example shown in
FIGS. 11A and 11B , pre-login plug-ins are analyzed. Similar processing can be performed for post authentication or post-login plugins. However, the processing needed for post authentication plug-ins may include fewer steps since the post-login plug-ins will often be optional and not mandatory. Post-authentication plug-ins maybe be identified as optional since a user is often not prohibited from logging out of an application due to issues with plug-ins. - If a pre-login plug-in that is identified as a mandatory plug-in is not successful, then the process will not continue. For example, if there are three plug-ins in ordered list and the first plug-in that is being evaluated fails, then the process does not evaluate the second and third pre-login plug-ins. The ordered list can include plug-ins for all of the phases including plug-ins to be invoked during pre-authentication and post-authentication.
- In an example embodiment, only one plug-in is handled at a time since the browser can often only handle one redirect at a time. Therefore, the plug-ins are handled sequentially. Plug-ins are directed to the user for handling after the session is created, but before the user is redirected to the actual resource
- Alternative embodiments can include a plug-in list which does not require a specified order or a sequential order. An alternative embodiment can include a plug-in list which does not require that all of the plug-ins in the list be satisfied in order for the one or more plug-ins in the list be implemented. For example, plug-ins can be handled in parallel and asynchronously. However, the example embodiment discussed with respect to
FIGS. 11A and 11B are directed to an ordered list of plug-ins which are handled synchronously. - At
step 1110, pre-login plug-ins are identified (e.g., primary authentication, MFA, browser response, etc.). A request can be sent for a cookie including plug-in information for plug-ins to be implemented. The request can be sent from the browser to the access management system. As shown inFIG. 11A , three plug-ins are identified. The three plug-ins will be handled sequentially. Therefore, the primary authentication plug-in will be handled, followed by the multifactor authentication plug-in and lastly, the browser response plug-in. - At
step 1111, a plug-in ID is obtained for the first plug-in (e.g., primary authentication plug-in). A plug-in ID can also be known as a trigger ID. The plug-in ID is obtained from the request cookie. The plug-in ID is used to identify the plug-in from the remaining plug-ins to be processed and keeps track of which plug-ins have been processed. - An example embodiment uses a stateless protocol. Therefore, instead of maintaining information in a database, the information is maintained in the cookie. Information between the plug-in and the access management system can be exchanged with information being maintained in the cookie. The state information is stored on the cookie and can keep track of the plug-ins that have been processed. The cookie is used by the access management system to determine the results of the processing for each of the pre-login plug-ins.
- At
step 1112, the analysis starts for the first plug-in (e.g., first plug-in ID=“1”). - At
step 1113, it is determined whether the plug-in ID is available in the ordered list. The plug-ins can be ordered in the ordered list based on priority. The ordered list can be created by the user or can be automatically set by the access management system based on the type of plug-in. For example, the ordered list can be automatically created by the access management system based on the type of plug-in. For example, a type associated with the plug-in can identify its priority level with respect to other plug-ins. - The plug-ins are in an ordered list since the plug-ins are processed sequentially. For example, the criteria for a first plug-in in ordered list should be satisfied before considering a second plug-in on the ordered list, and a second plug-in on the ordered this should be satisfied before considering the third plug-in on the ordered list. If the first plug-in in the ordered list is not satisfied, then the process will not evaluate the second and third plug-ins. Therefore, the plug-ins are analyzed sequentially and in a specified order. The plug-ins are handled synchronously. The order of the plug-ins can be based on the identifier of the plug-in. Further, the order of the plug-ins can be based on the action that the plug-in is to perform.
- If, at
step 1113, the plug-in ID is not available in ordered list, the method returns to step 1110, and the next plug-in is obtained. That is, for example, the multifactor authentication plug-in will then be handled. - If, at
step 1113, the plug-in ID is available in ordered list, atstep 1114, the plug-in is obtained from the ordered list. The first plug-in from the ordered list is obtained. Plug-in ID “1” is obtained, which indicates this is the first plug-in in the ordered list. - At
step 1115, it is determined whether the plug-in has completed the execute stage, which is the first stage. The plug-in will be processed through an execute stage (e.g., first stage) and a POST execute stage (e.g., second stage). If the plug-in has completed the execute stage it will proceed to the POST execute stage. - If the plug-in has not completed the first stage, at step 1116 a call to execute is placed. This will prepare the data for that plugin or it will sign the data using a current private key to generate a nonce and store it in the back end. Various actions can be performed to prepare the plug-in. The request to be sent to the browser can also be prepared.
Step 1116 can correspond to step 1020 ofFIG. 10 . - If the plug-in has completed the first stage, at step 1117 a call is made to POST execute. The POST execute will return a plug-in result and verifies the that the plug-in can operate correctly.
Step 1117 can correspond to step 1030 ofFIG. 10 . - At
step 1118, it is determined whether the plug-in has a response. - If the plug-in has a response, at
step 1119, the request cookie is updated with the plug-in ID. - At
step 1120, a response is sent to the browser and the method returns to step 1110 to handle the next plug-in. - If at
step 1118, the plug-in does not have a response, atstep 1121, it is determined whether there is an exception to receiving a response An exception can include a code issue or an internal coding issue. For example, an application may be expecting a specific response, but the data provided is something different than expected and the application cannot handle the response. - If there is an exception, at
step 1122, it is determined whether the exception is mandatory. - If the exception is mandatory then an error response is sent to the browser at
step 1120. The browser is notified that there was an error in processing the plug-in. - If at
step 1121, it is determined that there is no exception, the client application completes its actions and returns back to the service. - If, at
step 1122, the exception is not mandatory the the method proceeds to step 1123. - At
step 1123, the plug-in ID is incremented so as to process the next sequential plug-in in the ordered list. After updateding the plug-in ID, the process returns to step 1111 where the next plug-in ID (e.g., ID “2”) is requested for processing. - The method is described with respect to three plug-ins however, more than three or less than three triggers can be processed. For example, there may be an upper limit of plug-ins to analyze. In an example embodiment, there may be a maximum number (e.g., 4 or 5) of plug-ins that can be customized by the user.
- Example embodiments allow a user to make configurations to a protected resource. The configuration is not limited to a single entity, such as the access management system provider.
- As indicated above, example embodiments provide many technological improvements. System processes allow for giving the user control of implementing plug-ins. For example, during login, the user can specify the additional or alternative authentication methods (e.g., additional levels of authentication). In addition, during logout, control is given to the user to perform. Therefore, the user can perform logging out of all of the plug-ins and perform any needed cleanup. Thereby ensuring that sessions are cleared property and plug-ins are cleared properly.
- As noted above, infrastructure as a service (IaaS) is one particular type of cloud computing. IaaS can be configured to provide virtualized computing resources over a public network (e.g., the Internet). In an IaaS model, a cloud computing provider can host the infrastructure components (e.g., servers, storage devices, network nodes (e.g., hardware), deployment software, platform virtualization (e.g., a hypervisor layer), or the like). In some cases, an IaaS provider may also supply a variety of services to accompany those infrastructure components (e.g., billing, monitoring, logging, security, load balancing and clustering, etc.). Thus, as these services may be policy-driven, IaaS users may be able to implement policies to drive load balancing to maintain application availability and performance.
- In some instances, IaaS customers may access resources and services through a wide area network (WAN), such as the Internet, and can use the cloud provider's services to install the remaining elements of an application stack. For example, the user can log in to the IaaS platform to create virtual machines (VMs), install operating systems (OSs) on each VM, deploy middleware such as databases, create storage buckets for workloads and backups, and even install enterprise software into that VM. Customers can then use the provider's services to perform various functions, including balancing network traffic, troubleshooting application issues, monitoring performance, managing disaster recovery, etc.
- In most cases, a cloud computing model will require the participation of a cloud provider. The cloud provider may, but need not be, a third-party service that specializes in providing (e.g., offering, renting, selling) IaaS. An entity might also opt to deploy a private cloud, becoming its own provider of infrastructure services.
- In some examples, IaaS deployment is the process of putting a new application, or a new version of an application, onto a prepared application server or the like. It may also include the process of preparing the server (e.g., installing libraries, daemons, etc.). This is often managed by the cloud provider, below the hypervisor layer (e.g., the servers, storage, network hardware, and virtualization). Thus, the customer may be responsible for handling (OS), middleware, and/or application deployment (e.g., on self-service virtual machines (e.g., that can be spun up on demand) or the like.
- In some examples, IaaS provisioning may refer to acquiring computers or virtual hosts for use, and even installing needed libraries or services on them. In most cases, deployment does not include provisioning, and the provisioning may need to be performed first.
- In some cases, there are two different problems for IaaS provisioning. First, there is the initial challenge of provisioning the initial set of infrastructure before anything is running. Second, there is the challenge of evolving the existing infrastructure (e.g., adding new services, changing services, removing services, etc.) once everything has been provisioned. In some cases, these two challenges may be addressed by enabling the configuration of the infrastructure to be defined declaratively. In other words, the infrastructure (e.g., what components are needed and how they interact) can be defined by one or more configuration files. Thus, the overall topology of the infrastructure (e.g., what resources depend on which, and how they each work together) can be described declaratively. In some instances, once the topology is defined, a workflow can be generated that creates and/or manages the different components described in the configuration files.
- In some examples, an infrastructure may have many interconnected elements. For example, there may be one or more virtual private clouds (VPCs) (e.g., a potentially on-demand pool of configurable and/or shared computing resources), also known as a core network. In some examples, there may also be one or more security group rules provisioned to define how the security of the network will be set up and one or more virtual machines (VMs). Other infrastructure elements may also be provisioned, such as a load balancer, a database, or the like. As more and more infrastructure elements are desired and/or added, the infrastructure may incrementally evolve.
- In some instances, continuous deployment techniques may be employed to enable deployment of infrastructure code across various virtual computing environments. Additionally, the described techniques can enable infrastructure management within these environments. In some examples, service teams can write code that is desired to be deployed to one or more, but often many, different production environments (e.g., across various different geographic locations, sometimes spanning the entire world). However, in some examples, the infrastructure on which the code will be deployed must first be set up. In some instances, the provisioning can be done manually, a provisioning tool may be utilized to provision the resources, and/or deployment tools may be utilized to deploy the code once the infrastructure is provisioned.
-
FIG. 12 is a block diagram 1200 illustrating an example pattern of an IaaS architecture, according to at least one embodiment. Service operators 1202 can be communicatively coupled to a secure host tenancy 1204 that can include a virtual cloud network (VCN) 1206 and a secure host subnet 1208. In some examples, the service operators 1202 may be using one or more client computing devices, which may be portable handheld devices (e.g., an iPhone®, cellular telephone, an iPad®, computing tablet, a personal digital assistant (PDA)) or wearable devices (e.g., a Google Glass® head mounted display), running software such as Microsoft Windows Mobile®, and/or a variety of mobile operating systems such as iOS, Windows Phone, Android, BlackBerry 8, Palm OS, and the like, and being Internet, e-mail, short message service (SMS), Blackberry®, or other communication protocol enabled. Alternatively, the client computing devices can be general purpose personal computers including, by way of example, personal computers and/or laptop computers running various versions of Microsoft Windows®, Apple Macintosh®, and/or Linux operating systems. The client computing devices can be workstation computers running any of a variety of commercially-available UNIX® or UNIX-like operating systems, including without limitation the variety of GNU/Linux operating systems, such as for example, Google Chrome OS. Alternatively, or in addition, client computing devices may be any other electronic device, such as a thin-client computer, an Internet-enabled gaming system (e.g., a Microsoft Xbox gaming console with or without a Kinect® gesture input device), and/or a personal messaging device, capable of communicating over a network that can access the VCN 1206 and/or the Internet. - The VCN 1206 can include a local peering gateway (LPG) 1210 that can be communicatively coupled to a secure shell (SSH) VCN 1212 via an LPG 1210 contained in the SSH VCN 1212. The SSH VCN 1212 can include an SSH subnet 1214, and the SSH VCN 1212 can be communicatively coupled to a control plane VCN 1216 via the LPG 1210 contained in the control plane VCN 1216. Also, the SSH VCN 1212 can be communicatively coupled to a data plane VCN 1218 via an LPG 1210. The control plane VCN 1216 and the data plane VCN 1218 can be contained in a service tenancy 1219 that can be owned and/or operated by the IaaS provider.
- The control plane VCN 1216 can include a control plane demilitarized zone (DMZ) tier 1220 that acts as a perimeter network (e.g., portions of a corporate network between the corporate intranet and external networks). The DMZ-based servers may have restricted responsibilities and help keep security breaches contained. Additionally, the DMZ tier 1220 can include one or more load balancer (LB) subnet(s) 1222, a control plane app tier 1224 that can include app subnet(s) 1226, a control plane data tier 1228 that can include database (DB) subnet(s) 1230 (e.g., frontend DB subnet(s) and/or backend DB subnet(s)). The LB subnet(s) 1222 contained in the control plane DMZ tier 1220 can be communicatively coupled to the app subnet(s) 1226 contained in the control plane app tier 1224 and an Internet gateway 1234 that can be contained in the control plane VCN 1216, and the app subnet(s) 1226 can be communicatively coupled to the DB subnet(s) 1230 contained in the control plane data tier 1228 and a service gateway 1236 and a network address translation (NAT) gateway 1238. The control plane VCN 1216 can include the service gateway 1236 and the NAT gateway 1238.
- The control plane VCN 1216 can include a data plane mirror app tier 1240 that can include app subnet(s) 1226. The app subnet(s) 1226 contained in the data plane mirror app tier 1240 can include a virtual network interface controller (VNIC) 1242 that can execute a compute instance 1244. The compute instance 1244 can communicatively couple the app subnet(s) 1226 of the data plane mirror app tier 1240 to app subnet(s) 1226 that can be contained in a data plane app tier 1246.
- The data plane VCN 1218 can include the data plane app tier 1246, a data plane DMZ tier 1248, and a data plane data tier 1250. The data plane DMZ tier 1248 can include LB subnet(s) 1222 that can be communicatively coupled to the app subnet(s) 1226 of the data plane app tier 1246 and the Internet gateway 1234 of the data plane VCN 1218. The app subnet(s) 1226 can be communicatively coupled to the service gateway 1236 of the data plane VCN 1218 and the NAT gateway 1238 of the data plane VCN 1218. The data plane data tier 1250 can also include the DB subnet(s) 1230 that can be communicatively coupled to the app subnet(s) 1226 of the data plane app tier 1246.
- The Internet gateway 1234 of the control plane VCN 1216 and of the data plane VCN 1218 can be communicatively coupled to a metadata management service 1252 that can be communicatively coupled to public Internet 1254. Public Internet 1254 can be communicatively coupled to the NAT gateway 1238 of the control plane VCN 1216 and of the data plane VCN 1218. The service gateway 1236 of the control plane VCN 1216 and of the data plane VCN 1218 can be communicatively couple to cloud services 1256.
- In some examples, the service gateway 1236 of the control plane VCN 1216 or of the data plan VCN 1218 can make application programming interface (API) calls to cloud services 1256 without going through public Internet 1254. The API calls to cloud services 1256 from the service gateway 1236 can be one-way: the service gateway 1236 can make API calls to cloud services 1256, and cloud services 1256 can send requested data to the service gateway 1236. But, cloud services 1256 may not initiate API calls to the service gateway 1236.
- In some examples, the secure host tenancy 1204 can be directly connected to the service tenancy 1219, which may be otherwise isolated. The secure host subnet 1208 can communicate with the SSH subnet 1214 through an LPG 1210 that may enable two-way communication over an otherwise isolated system. Connecting the secure host subnet 1208 to the SSH subnet 1214 may give the secure host subnet 1208 access to other entities within the service tenancy 1219.
- The control plane VCN 1216 may allow users of the service tenancy 1219 to set up or otherwise provision desired resources. Desired resources provisioned in the control plane VCN 1216 may be deployed or otherwise used in the data plane VCN 1218. In some examples, the control plane VCN 1216 can be isolated from the data plane VCN 1218, and the data plane mirror app tier 1240 of the control plane VCN 1216 can communicate with the data plane app tier 1246 of the data plane VCN 1218 via VNICs 1242 that can be contained in the data plane mirror app tier 1240 and the data plane app tier 1246.
- In some examples, users of the system, or customers, can make requests, for example create, read, update, or delete (CRUD) operations, through public Internet 1254 that can communicate the requests to the metadata management service 1252. The metadata management service 1252 can communicate the request to the control plane VCN 1216 through the Internet gateway 1234. The request can be received by the LB subnet(s) 1222 contained in the control plane DMZ tier 1220. The LB subnet(s) 1222 may determine that the request is valid, and in response to this determination, the LB subnet(s) 1222 can transmit the request to app subnet(s) 1226 contained in the control plane app tier 1224. If the request is validated and requires a call to public Internet 1254, the call to public Internet 1254 may be transmitted to the NAT gateway 1238 that can make the call to public Internet 1254. Memory that may be desired to be stored by the request can be stored in the DB subnet(s) 1230.
- In some examples, the data plane mirror app tier 1240 can facilitate direct communication between the control plane VCN 1216 and the data plane VCN 1218. For example, changes, updates, or other suitable modifications to configuration may be desired to be applied to the resources contained in the data plane VCN 1218. Via a VNIC 1242, the control plane VCN 1216 can directly communicate with, and can thereby execute the changes, updates, or other suitable modifications to configuration to, resources contained in the data plane VCN 1218.
- In some embodiments, the control plane VCN 1216 and the data plane VCN 1218 can be contained in the service tenancy 1219. In this case, the user, or the customer, of the system may not own or operate either the control plane VCN 1216 or the data plane VCN 1218. Instead, the IaaS provider may own or operate the control plane VCN 1216 and the data plane VCN 1218, both of which may be contained in the service tenancy 1219. This embodiment can enable isolation of networks that may prevent users or customers from interacting with other users', or other customers', resources. Also, this embodiment may allow users or customers of the system to store databases privately without needing to rely on public Internet 1254, which may not have a desired level of security, for storage.
- In other embodiments, the LB subnet(s) 1222 contained in the control plane VCN 1216 can be configured to receive a signal from the service gateway 1236. In this embodiment, the control plane VCN 1216 and the data plane VCN 1218 may be configured to be called by a customer of the IaaS provider without calling public Internet 1254. Customers of the IaaS provider may desire this embodiment since database(s) that the customers use may be controlled by the IaaS provider and may be stored on the service tenancy 1219, which may be isolated from public Internet 1254.
-
FIG. 13 is a block diagram 1300 illustrating another example pattern of an IaaS architecture, according to at least one embodiment. Service operators 1302 (e.g. service operators 1202 ofFIG. 12 ) can be communicatively coupled to a secure host tenancy 1304 (e.g. the secure host tenancy 1204 ofFIG. 12 ) that can include a virtual cloud network (VCN) 1306 (e.g. the VCN 1206 ofFIG. 12 ) and a secure host subnet 1308 (e.g. the secure host subnet 1208 ofFIG. 12 ). TheVCN 1306 can include a local peering gateway (LPG) 1310 (e.g. the LPG 1210 ofFIG. 12 ) that can be communicatively coupled to a secure shell (SSH) VCN 1312 (e.g. the SSH VCN 1212 ofFIG. 12 ) via an LPG 1210 contained in theSSH VCN 1312. TheSSH VCN 1312 can include an SSH subnet 1314 (e.g. the SSH subnet 1214 ofFIG. 12 ), and theSSH VCN 1312 can be communicatively coupled to a control plane VCN 1316 (e.g. the control plane VCN 1216 ofFIG. 12 ) via anLPG 1310 contained in thecontrol plane VCN 1316. Thecontrol plane VCN 1316 can be contained in a service tenancy 1319 (e.g. the service tenancy 1219 ofFIG. 12 ), and the data plane VCN 1318 (e.g. the data plane VCN 1218 ofFIG. 12 ) can be contained in a customer tenancy 1321 that may be owned or operated by users, or customers, of the system. - The
control plane VCN 1316 can include a control plane DMZ tier 1320 (e.g. the control plane DMZ tier 1220 ofFIG. 12 ) that can include LB subnet(s) 1322 (e.g. LB subnet(s) 1222 ofFIG. 12 ), a control plane app tier 1324 (e.g. the control plane app tier 1224 ofFIG. 12 ) that can include app subnet(s) 1326 (e.g. app subnet(s) 1226 ofFIG. 12 ), a control plane data tier 1328 (e.g. the control plane data tier 1228 ofFIG. 12 ) that can include database (DB) subnet(s) 1330 (e.g. similar to DB subnet(s) 1230 ofFIG. 12 ). The LB subnet(s) 1322 contained in the controlplane DMZ tier 1320 can be communicatively coupled to the app subnet(s) 1326 contained in the controlplane app tier 1324 and an Internet gateway 1334 (e.g. the Internet gateway 1234 ofFIG. 12 ) that can be contained in thecontrol plane VCN 1316, and the app subnet(s) 1326 can be communicatively coupled to the DB subnet(s) 1330 contained in the controlplane data tier 1328 and a service gateway 1336 (e.g. the service gateway ofFIG. 12 ) and a network address translation (NAT) gateway 1338 (e.g. the NAT gateway 1238 ofFIG. 12 ). Thecontrol plane VCN 1316 can include theservice gateway 1336 and theNAT gateway 1338. - The
control plane VCN 1316 can include a data plane mirror app tier 1340 (e.g. the data plane mirror app tier 1240 ofFIG. 12 ) that can include app subnet(s) 1326. The app subnet(s) 1326 contained in the data planemirror app tier 1340 can include a virtual network interface controller (VNIC) 1342 (e.g. the VNIC of 1242) that can execute a compute instance 1344 (e.g. similar to the compute instance 1244 ofFIG. 12 ). Thecompute instance 1344 can facilitate communication between the app subnet(s) 1326 of the data planemirror app tier 1340 and the app subnet(s) 1326 that can be contained in a data plane app tier 1346 (e.g. the data plane app tier 1246 ofFIG. 12 ) via theVNIC 1342 contained in the data planemirror app tier 1340 and theVNIC 1342 contained in the data planapp tier 1346. - The
Internet gateway 1334 contained in thecontrol plane VCN 1316 can be communicatively coupled to a metadata management service 1352 (e.g. the metadata management service 1252 ofFIG. 12 ) that can be communicatively coupled to public Internet 1354 (e.g. public Internet 1254 ofFIG. 12 ).Public Internet 1354 can be communicatively coupled to theNAT gateway 1338 contained in thecontrol plane VCN 1316. Theservice gateway 1336 contained in thecontrol plane VCN 1316 can be communicatively couple to cloud services 1356 (e.g. cloud services 1256 ofFIG. 12 ). - In some examples, the
data plane VCN 1318 can be contained in the customer tenancy 1321. In this case, the IaaS provider may provide thecontrol plane VCN 1316 for each customer, and the IaaS provider may, for each customer, set up aunique compute instance 1344 that is contained in theservice tenancy 1319. Eachcompute instance 1344 may allow communication between thecontrol plane VCN 1316, contained in theservice tenancy 1319, and thedata plane VCN 1318 that is contained in the customer tenancy 1321. Thecompute instance 1344 may allow resources, that are provisioned in thecontrol plane VCN 1316 that is contained in theservice tenancy 1319, to be deployed or otherwise used in thedata plane VCN 1318 that is contained in the customer tenancy 1321. - In other examples, the customer of the IaaS provider may have databases that live in the customer tenancy 1321. In this example, the
control plane VCN 1316 can include the data planemirror app tier 1340 that can include app subnet(s) 1326. The data planemirror app tier 1340 can reside in thedata plane VCN 1318, but the data planemirror app tier 1340 may not live in thedata plane VCN 1318. That is, the data planemirror app tier 1340 may have access to the customer tenancy 1321, but the data planemirror app tier 1340 may not exist in thedata plane VCN 1318 or be owned or operated by the customer of the IaaS provider. The data planemirror app tier 1340 may be configured to make calls to thedata plane VCN 1318 but may not be configured to make calls to any entity contained in thecontrol plane VCN 1316. The customer may desire to deploy or otherwise use resources in thedata plane VCN 1318 that are provisioned in thecontrol plane VCN 1316, and the data planemirror app tier 1340 can facilitate the desired deployment, or other usage of resources, of the customer. - In some embodiments, the customer of the IaaS provider can apply filters to the
data plane VCN 1318. In this embodiment, the customer can determine what thedata plane VCN 1318 can access, and the customer may restrict access topublic Internet 1354 from thedata plane VCN 1318. The IaaS provider may not be able to apply filters or otherwise control access of thedata plane VCN 1318 to any outside networks or databases. Applying filters and controls by the customer onto thedata plane VCN 1318, contained in the customer tenancy 1321, can help isolate thedata plane VCN 1318 from other customers and frompublic Internet 1354. - In some embodiments, cloud services 1356 can be called by the
service gateway 1336 to access services that may not exist onpublic Internet 1354, on thecontrol plane VCN 1316, or on thedata plane VCN 1318. The connection between cloud services 1356 and thecontrol plane VCN 1316 or thedata plane VCN 1318 may not be live or continuous. Cloud services 1356 may exist on a different network owned or operated by the IaaS provider. Cloud services 1356 may be configured to receive calls from theservice gateway 1336 and may be configured to not receive calls frompublic Internet 1354. Some cloud services 1356 may be isolated from other cloud services 1356, and thecontrol plane VCN 1316 may be isolated from cloud services 1356 that may not be in the same region as thecontrol plane VCN 1316. For example, thecontrol plane VCN 1316 may be located in “Region 1,” and cloud service “Deployment 12,” may be located inRegion 1 and in “Region 2.” If a call to Deployment 12 is made by theservice gateway 1336 contained in thecontrol plane VCN 1316 located inRegion 1, the call may be transmitted to Deployment 12 inRegion 1. In this example, thecontrol plane VCN 1316, or Deployment 12 inRegion 1, may not be communicatively coupled to, or otherwise in communication with, Deployment 12 inRegion 2. -
FIG. 14 is a block diagram 1400 illustrating another example pattern of an IaaS architecture, according to at least one embodiment. Service operators 1402 (e.g. service operators 1202 ofFIG. 12 ) can be communicatively coupled to a secure host tenancy 1404 (e.g. the secure host tenancy 1204 ofFIG. 12 ) that can include a virtual cloud network (VCN) 1406 (e.g. the VCN 1206 ofFIG. 12 ) and a secure host subnet 1408 (e.g. the secure host subnet 1208 ofFIG. 12 ). TheVCN 1406 can include an LPG 1410 (e.g. the LPG 1210 ofFIG. 12 ) that can be communicatively coupled to an SSH VCN 1412 (e.g. the SSH VCN 1212 ofFIG. 12 ) via anLPG 1410 contained in theSSH VCN 1412. TheSSH VCN 1412 can include an SSH subnet 1414 (e.g. the SSH subnet 1214 ofFIG. 12 ), and theSSH VCN 1412 can be communicatively coupled to a control plane VCN 1416 (e.g. the control plane VCN 1216 ofFIG. 12 ) via anLPG 1410 contained in thecontrol plane VCN 1416 and to a data plane VCN 1418 (e.g. the data plane 1218 ofFIG. 12 ) via anLPG 1410 contained in thedata plane VCN 1418. Thecontrol plane VCN 1416 and thedata plane VCN 1418 can be contained in a service tenancy 1419 (e.g. the service tenancy 1219 ofFIG. 12 ). - The
control plane VCN 1416 can include a control plane DMZ tier 1420 (e.g. the control plane DMZ tier 1220 ofFIG. 12 ) that can include load balancer (LB) subnet(s) 1422 (e.g. LB subnet(s) 1222 ofFIG. 12 ), a control plane app tier 1424 (e.g. the control plane app tier 1224 ofFIG. 12 ) that can include app subnet(s) 1426 (e.g. similar to app subnet(s) 1226 ofFIG. 12 ), a control plane data tier 1428 (e.g. the control plane data tier 1228 ofFIG. 12 ) that can include DB subnet(s) 1430. The LB subnet(s) 1422 contained in the controlplane DMZ tier 1420 can be communicatively coupled to the app subnet(s) 1426 contained in the controlplane app tier 1424 and to an Internet gateway 1434 (e.g. the Internet gateway 1234 ofFIG. 12 ) that can be contained in thecontrol plane VCN 1416, and the app subnet(s) 1426 can be communicatively coupled to the DB subnet(s) 1430 contained in the controlplane data tier 1428 and to a service gateway 1436 (e.g. the service gateway ofFIG. 12 ) and a network address translation (NAT) gateway 1438 (e.g. the NAT gateway 1238 ofFIG. 12 ). Thecontrol plane VCN 1416 can include theservice gateway 1436 and theNAT gateway 1438. - The
data plane VCN 1418 can include a data plane app tier 1446 (e.g. the data plane app tier 1246 ofFIG. 12 ), a data plane DMZ tier 1448 (e.g. the data plane DMZ tier 1248 ofFIG. 12 ), and a data plane data tier 1450 (e.g. the data plane data tier 1250 ofFIG. 12 ). The data plane DMZ tier 1448 can include LB subnet(s) 1422 that can be communicatively coupled to trusted app subnet(s) 1460 and untrusted app subnet(s) 1462 of the dataplane app tier 1446 and theInternet gateway 1434 contained in thedata plane VCN 1418. The trusted app subnet(s) 1460 can be communicatively coupled to theservice gateway 1436 contained in thedata plane VCN 1418, theNAT gateway 1438 contained in thedata plane VCN 1418, and DB subnet(s) 1430 contained in the data plane data tier 1450. The untrusted app subnet(s) 1462 can be communicatively coupled to theservice gateway 1436 contained in thedata plane VCN 1418 and DB subnet(s) 1430 contained in the data plane data tier 1450. The data plane data tier 1450 can include DB subnet(s) 1430 that can be communicatively coupled to theservice gateway 1436 contained in thedata plane VCN 1418. - The untrusted app subnet(s) 1462 can include one or more primary VNICs 1464(1)-(N) that can be communicatively coupled to tenant virtual machines (VMs) 1466(1)-(N). Each tenant VM 1466(1)-(N) can be communicatively coupled to a respective app subnet 1467(1)-(N) that can be contained in respective container egress VCNs 1468(1)-(N) that can be contained in respective customer tenancies 1470(1)-(N). Respective secondary VNICs 1472(1)-(N) can facilitate communication between the untrusted app subnet(s) 1462 contained in the
data plane VCN 1418 and the app subnet contained in the container egress VCNs 1468(1)-(N). Each container egress VCNs 1468(1)-(N) can include aNAT gateway 1438 that can be communicatively coupled to public Internet 1454 (e.g. public Internet 1254 ofFIG. 12 ). - The
Internet gateway 1434 contained in thecontrol plane VCN 1416 and contained in thedata plane VCN 1418 can be communicatively coupled to a metadata management service 1452 (e.g. the metadata management system 1252 ofFIG. 12 ) that can be communicatively coupled topublic Internet 1454.Public Internet 1454 can be communicatively coupled to theNAT gateway 1438 contained in thecontrol plane VCN 1416 and contained in thedata plane VCN 1418. Theservice gateway 1436 contained in thecontrol plane VCN 1416 and contained in thedata plane VCN 1418 can be communicatively couple to cloudservices 1456. - In some embodiments, the
data plane VCN 1418 can be integrated with customer tenancies 1470. This integration can be useful or desirable for customers of the IaaS provider in some cases such as a case that may desire support when executing code. The customer may provide code to run that may be destructive, may communicate with other customer resources, or may otherwise cause undesirable effects. In response to this, the IaaS provider may determine whether to run code given to the IaaS provider by the customer. - In some examples, the customer of the IaaS provider may grant temporary network access to the IaaS provider and request a function to be attached to the data
plane tier app 1446. Code to run the function may be executed in the VMs 1466(1)-(N), and the code may not be configured to run anywhere else on thedata plane VCN 1418. Each VM 1466(1)-(N) may be connected to one customer tenancy 1470. Respective containers 1471(1)-(N) contained in the VMs 1466(1)-(N) may be configured to run the code. In this case, there can be a dual isolation (e.g., the containers 1471(1)-(N) running code, where the containers 1471(1)-(N) may be contained in at least the VM 1466(1)-(N) that are contained in the untrusted app subnet(s) 1462), which may help prevent incorrect or otherwise undesirable code from damaging the network of the IaaS provider or from damaging a network of a different customer. The containers 1471(1)-(N) may be communicatively coupled to the customer tenancy 1470 and may be configured to transmit or receive data from the customer tenancy 1470. The containers 1471(1)-(N) may not be configured to transmit or receive data from any other entity in thedata plane VCN 1418. Upon completion of running the code, the IaaS provider may kill or otherwise dispose of the containers 1471(1)-(N). - In some embodiments, the trusted app subnet(s) 1460 may run code that may be owned or operated by the IaaS provider. In this embodiment, the trusted app subnet(s) 1460 may be communicatively coupled to the DB subnet(s) 1430 and be configured to execute CRUD operations in the DB subnet(s) 1430. The untrusted app subnet(s) 1462 may be communicatively coupled to the DB subnet(s) 1430, but in this embodiment, the untrusted app subnet(s) may be configured to execute read operations in the DB subnet(s) 1430. The containers 1471(1)-(N) that can be contained in the VM 1466(1)-(N) of each customer and that may run code from the customer may not be communicatively coupled with the DB subnet(s) 1430.
- In other embodiments, the
control plane VCN 1416 and thedata plane VCN 1418 may not be directly communicatively coupled. In this embodiment, there may be no direct communication between thecontrol plane VCN 1416 and thedata plane VCN 1418. However, communication can occur indirectly through at least one method. AnLPG 1410 may be established by the IaaS provider that can facilitate communication between thecontrol plane VCN 1416 and thedata plane VCN 1418. In another example, thecontrol plane VCN 1416 or thedata plane VCN 1418 can make a call tocloud services 1456 via theservice gateway 1436. For example, a call tocloud services 1456 from thecontrol plane VCN 1416 can include a request for a service that can communicate with thedata plane VCN 1418. -
FIG. 15 is a block diagram 1500 illustrating another example pattern of an IaaS architecture, according to at least one embodiment. Service operators 1502 (e.g. service operators 1202 ofFIG. 12 ) can be communicatively coupled to a secure host tenancy 1504 (e.g. the secure host tenancy 1204 ofFIG. 12 ) that can include a virtual cloud network (VCN) 1506 (e.g. the VCN 1206 ofFIG. 12 ) and a secure host subnet 1508 (e.g. the secure host subnet 1208 ofFIG. 12 ). TheVCN 1506 can include an LPG 1510 (e.g. the LPG 1210 ofFIG. 12 ) that can be communicatively coupled to an SSH VCN 1512 (e.g. the SSH VCN 1212 ofFIG. 12 ) via anLPG 1510 contained in theSSH VCN 1512. TheSSH VCN 1512 can include an SSH subnet 1514 (e.g. the SSH subnet 1214 ofFIG. 12 ), and theSSH VCN 1512 can be communicatively coupled to a control plane VCN 1516 (e.g. the control plane VCN 1216 ofFIG. 12 ) via anLPG 1510 contained in thecontrol plane VCN 1516 and to a data plane VCN 1518 (e.g. the data plane 1218 ofFIG. 12 ) via anLPG 1510 contained in thedata plane VCN 1518. Thecontrol plane VCN 1516 and thedata plane VCN 1518 can be contained in a service tenancy 1519 (e.g. the service tenancy 1219 ofFIG. 12 ). - The
control plane VCN 1516 can include a control plane DMZ tier 1520 (e.g. the control plane DMZ tier 1220 ofFIG. 12 ) that can include LB subnet(s) 1522 (e.g. LB subnet(s) 1222 ofFIG. 12 ), a control plane app tier 1524 (e.g. the control plane app tier 1224 ofFIG. 12 ) that can include app subnet(s) 1526 (e.g. app subnet(s) 1226 ofFIG. 12 ), a control plane data tier 1528 (e.g. the control plane data tier 1228 ofFIG. 12 ) that can include DB subnet(s) 1530 (e.g. DB subnet(s) 1430 ofFIG. 14 ). The LB subnet(s) 1522 contained in the controlplane DMZ tier 1520 can be communicatively coupled to the app subnet(s) 1526 contained in the controlplane app tier 1524 and to an Internet gateway 1534 (e.g. the Internet gateway 1234 ofFIG. 12 ) that can be contained in thecontrol plane VCN 1516, and the app subnet(s) 1526 can be communicatively coupled to the DB subnet(s) 1530 contained in the controlplane data tier 1528 and to a service gateway 1536 (e.g. the service gateway ofFIG. 12 ) and a network address translation (NAT) gateway 1538 (e.g. the NAT gateway 1238 ofFIG. 12 ). Thecontrol plane VCN 1516 can include theservice gateway 1536 and theNAT gateway 1538. - The
data plane VCN 1518 can include a data plane app tier 1546 (e.g. the data plane app tier 1246 ofFIG. 12 ), a data plane DMZ tier 1548 (e.g. the data plane DMZ tier 1248 ofFIG. 12 ), and a data plane data tier 1550 (e.g. the data plane data tier 1250 ofFIG. 12 ). The dataplane DMZ tier 1548 can include LB subnet(s) 1522 that can be communicatively coupled to trusted app subnet(s) 1560 (e.g. trusted app subnet(s) 1460 ofFIG. 14 ) and untrusted app subnet(s) 1562 (e.g. untrusted app subnet(s) 1462 ofFIG. 14 ) of the dataplane app tier 1546 and theInternet gateway 1534 contained in thedata plane VCN 1518. The trusted app subnet(s) 1560 can be communicatively coupled to theservice gateway 1536 contained in thedata plane VCN 1518, theNAT gateway 1538 contained in thedata plane VCN 1518, and DB subnet(s) 1530 contained in the dataplane data tier 1550. The untrusted app subnet(s) 1562 can be communicatively coupled to theservice gateway 1536 contained in thedata plane VCN 1518 and DB subnet(s) 1530 contained in the dataplane data tier 1550. The dataplane data tier 1550 can include DB subnet(s) 1530 that can be communicatively coupled to theservice gateway 1536 contained in thedata plane VCN 1518. - The untrusted app subnet(s) 1562 can include primary VNICs 1564(1)-(N) that can be communicatively coupled to tenant virtual machines (VMs) 1566(1)-(N) residing within the untrusted app subnet(s) 1562. Each tenant VM 1566(1)-(N) can run code in a respective container 1567(1)-(N), and be communicatively coupled to an
app subnet 1526 that can be contained in a dataplane app tier 1546 that can be contained in acontainer egress VCN 1568. Respective secondary VNICs 1572(1)-(N) can facilitate communication between the untrusted app subnet(s) 1562 contained in thedata plane VCN 1518 and the app subnet contained in thecontainer egress VCN 1568. The container egress VCN can include aNAT gateway 1538 that can be communicatively coupled to public Internet 1554 (e.g. public Internet 1254 ofFIG. 12 ). - The
Internet gateway 1534 contained in thecontrol plane VCN 1516 and contained in thedata plane VCN 1518 can be communicatively coupled to a metadata management service 1552 (e.g. the metadata management system 1252 ofFIG. 12 ) that can be communicatively coupled topublic Internet 1554.Public Internet 1554 can be communicatively coupled to theNAT gateway 1538 contained in thecontrol plane VCN 1516 and contained in thedata plane VCN 1518. Theservice gateway 1536 contained in thecontrol plane VCN 1516 and contained in thedata plane VCN 1518 can be communicatively couple to cloudservices 1556. - In some examples, the pattern illustrated by the architecture of block diagram 1500 of
FIG. 15 may be considered an exception to the pattern illustrated by the architecture of block diagram 1400 ofFIG. 14 and may be desirable for a customer of the IaaS provider if the IaaS provider cannot directly communicate with the customer (e.g., a disconnected region). The respective containers 1567(1)-(N) that are contained in the VMs 1566(1)-(N) for each customer can be accessed in real-time by the customer. The containers 1567(1)-(N) may be configured to make calls to respective secondary VNICs 1572(1)-(N) contained in app subnet(s) 1526 of the dataplane app tier 1546 that can be contained in thecontainer egress VCN 1568. The secondary VNICs 1572(1)-(N) can transmit the calls to theNAT gateway 1538 that may transmit the calls topublic Internet 1554. In this example, the containers 1567(1)-(N) that can be accessed in real-time by the customer can be isolated from thecontrol plane VCN 1516 and can be isolated from other entities contained in thedata plane VCN 1518. The containers 1567(1)-(N) may also be isolated from resources from other customers. - In other examples, the customer can use the containers 1567(1)-(N) to call
cloud services 1556. In this example, the customer may run code in the containers 1567(1)-(N) that requests a service fromcloud services 1556. The containers 1567(1)-(N) can transmit this request to the secondary VNICs 1572(1)-(N) that can transmit the request to the NAT gateway that can transmit the request topublic Internet 1554.Public Internet 1554 can transmit the request to LB subnet(s) 1522 contained in thecontrol plane VCN 1516 via theInternet gateway 1534. In response to determining the request is valid, the LB subnet(s) can transmit the request to app subnet(s) 1526 that can transmit the request to cloudservices 1556 via theservice gateway 1536. - It should be appreciated that
IaaS architectures - In certain embodiments, the IaaS systems described herein may include a suite of applications, middleware, and database service offerings that are delivered to a customer in a self-service, subscription-based, elastically scalable, reliable, highly available, and secure manner. An example of such an IaaS system is the Oracle Cloud Infrastructure (OCI) provided by the present assignee.
-
FIG. 16 illustrates anexample computer system 1600, in which various embodiments of the present disclosure may be implemented. Thesystem 1600 may be used to implement any of the computer systems described above. As shown in the figure,computer system 1600 includes aprocessing unit 1604 that communicates with a number of peripheral subsystems via abus subsystem 1602. These peripheral subsystems may include aprocessing acceleration unit 1606, an I/O subsystem 1608, astorage subsystem 1618 and acommunications subsystem 1624.Storage subsystem 1618 includes tangible computer-readable storage media 1622 and asystem memory 1610. -
Bus subsystem 1602 provides a mechanism for letting the various components and subsystems ofcomputer system 1600 communicate with each other as intended. Althoughbus subsystem 1602 is shown schematically as a single bus, alternative embodiments of the bus subsystem may utilize multiple buses.Bus subsystem 1602 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. For example, such architectures may include an Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus, which can be implemented as a Mezzanine bus manufactured to the IEEE P1386.1 standard. -
Processing unit 1604, which can be implemented as one or more integrated circuits (e.g., a conventional microprocessor or microcontroller), controls the operation ofcomputer system 1600. One or more processors may be included inprocessing unit 1604. These processors may include single core or multicore processors. In certain embodiments,processing unit 1604 may be implemented as one or more independent processing units 1632 and/or 1634 with single or multicore processors included in each processing unit. In other embodiments,processing unit 1604 may also be implemented as a quad-core processing unit formed by integrating two dual-core processors into a single chip. - In various embodiments,
processing unit 1604 can execute a variety of programs in response to program code and can maintain multiple concurrently executing programs or processes. At any given time, some or all of the program code to be executed can be resident in processor(s) 1604 and/or instorage subsystem 1618. Through suitable programming, processor(s) 1604 can provide various functionalities described above.Computer system 1600 may additionally include aprocessing acceleration unit 1606, which can include a digital signal processor (DSP), a special-purpose processor, and/or the like. - I/
O subsystem 1608 may include user interface input devices and user interface output devices. User interface input devices may include a keyboard, pointing devices such as a mouse or trackball, a touchpad or touch screen incorporated into a display, a scroll wheel, a click wheel, a dial, a button, a switch, a keypad, audio input devices with voice command recognition systems, microphones, and other types of input devices. User interface input devices may include, for example, motion sensing and/or gesture recognition devices such as the Microsoft Kinect® motion sensor that enables users to control and interact with an input device, such as theMicrosoft Xbox® 360 game controller, through a natural user interface using gestures and spoken commands. User interface input devices may also include eye gesture recognition devices such as the Google Glass® blink detector that detects eye activity (e.g., ‘blinking’ while taking pictures and/or making a menu selection) from users and transforms the eye gestures as input into an input device (e.g., Google Glass®). Additionally, user interface input devices may include voice recognition sensing devices that enable users to interact with voice recognition systems (e.g., Siri® navigator), through voice commands. - User interface input devices may also include, without limitation, three dimensional (3D) mice, joysticks or pointing sticks, gamepads and graphic tablets, and audio/visual devices such as speakers, digital cameras, digital camcorders, portable media players, webcams, image scanners, fingerprint scanners, barcode reader 3D scanners, 3D printers, laser rangefinders, and eye gaze tracking devices. Additionally, user interface input devices may include, for example, medical imaging input devices such as computed tomography, magnetic resonance imaging, position emission tomography, medical ultrasonography devices. User interface input devices may also include, for example, audio input devices such as MIDI keyboards, digital musical instruments and the like.
- User interface output devices may include a display subsystem, indicator lights, or non-visual displays such as audio output devices, etc. The display subsystem may be a cathode ray tube (CRT), a flat-panel device, such as that using a liquid crystal display (LCD) or plasma display, a projection device, a touch screen, and the like. In general, use of the term “output device” is intended to include all possible types of devices and mechanisms for outputting information from
computer system 1600 to a user or other computer. For example, user interface output devices may include, without limitation, a variety of display devices that visually convey text, graphics and audio/video information such as monitors, printers, speakers, headphones, automotive navigation systems, plotters, voice output devices, and modems. -
Computer system 1600 may comprise astorage subsystem 1618 that comprises software elements, shown as being currently located within asystem memory 1610.System memory 1610 may store program instructions that are loadable and executable onprocessing unit 1604, as well as data generated during the execution of these programs. - Depending on the configuration and type of
computer system 1600,system memory 1610 may be volatile (such as random access memory (RAM)) and/or non-volatile (such as read-only memory (ROM), flash memory, etc.) The RAM typically contains data and/or program modules that are immediately accessible to and/or presently being operated and executed byprocessing unit 1604. In some implementations,system memory 1610 may include multiple different types of memory, such as static random access memory (SRAM) or dynamic random access memory (DRAM). In some implementations, a basic input/output system (BIOS), containing the basic routines that help to transfer information between elements withincomputer system 1600, such as during start-up, may typically be stored in the ROM. By way of example, and not limitation,system memory 1610 also illustratesapplication programs 1612, which may include client applications, Web browsers, mid-tier applications, relational database management systems (RDBMS), etc.,program data 1614, and anoperating system 1616. By way of example,operating system 1616 may include various versions of Microsoft Windows®, Apple Macintosh®, and/or Linux operating systems, a variety of commercially-available UNIX® or UNIX-like operating systems (including without limitation the variety of GNU/Linux operating systems, the Google Chrome® OS, and the like) and/or mobile operating systems such as iOS, Windows® Phone, Android® OS, BlackBerry® 16 OS, and Palm® OS operating systems. -
Storage subsystem 1618 may also provide a tangible computer-readable storage medium for storing the basic programming and data constructs that provide the functionality of some embodiments. Software (programs, code modules, instructions) that when executed by a processor provide the functionality described above may be stored instorage subsystem 1618. These software modules or instructions may be executed byprocessing unit 1604.Storage subsystem 1618 may also provide a repository for storing data used in accordance with the present disclosure. -
Storage subsystem 1600 may also include a computer-readablestorage media reader 1620 that can further be connected to computer-readable storage media 1622. Together and, optionally, in combination withsystem memory 1610, computer-readable storage media 1622 may comprehensively represent remote, local, fixed, and/or removable storage devices plus storage media for temporarily and/or more permanently containing, storing, transmitting, and retrieving computer-readable information. - Computer-
readable storage media 1622 containing code, or portions of code, can also include any appropriate media known or used in the art, including storage media and communication media, such as but not limited to, volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage and/or transmission of information. This can include tangible computer-readable storage media such as RAM, ROM, electronically erasable programmable ROM (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disk (DVD), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or other tangible computer readable media. This can also include nontangible computer-readable media, such as data signals, data transmissions, or any other medium which can be used to transmit the desired information and which can be accessed bycomputing system 1600. - By way of example, computer-
readable storage media 1622 may include a hard disk drive that reads from or writes to non-removable, nonvolatile magnetic media, a magnetic disk drive that reads from or writes to a removable, nonvolatile magnetic disk, and an optical disk drive that reads from or writes to a removable, nonvolatile optical disk such as a CD ROM, DVD, and Blu-Ray® disk, or other optical media. Computer-readable storage media 1622 may include, but is not limited to, Zip® drives, flash memory cards, universal serial bus (USB) flash drives, secure digital (SD) cards, DVD disks, digital video tape, and the like. Computer-readable storage media 1622 may also include, solid-state drives (SSD) based on non-volatile memory such as flash-memory based SSDs, enterprise flash drives, solid state ROM, and the like, SSDs based on volatile memory such as solid state RAM, dynamic RAM, static RAM, DRAM-based SSDs, magnetoresistive RAM (MRAM) SSDs, and hybrid SSDs that use a combination of DRAM and flash memory based SSDs. The disk drives and their associated computer-readable media may provide non-volatile storage of computer-readable instructions, data structures, program modules, and other data forcomputer system 1600. -
Communications subsystem 1624 provides an interface to other computer systems and networks.Communications subsystem 1624 serves as an interface for receiving data from and transmitting data to other systems fromcomputer system 1600. For example,communications subsystem 1624 may enablecomputer system 1600 to connect to one or more devices via the Internet. In someembodiments communications subsystem 1624 can include radio frequency (RF) transceiver components for accessing wireless voice and/or data networks (e.g., using cellular telephone technology, advanced data network technology, such as 3G, 4G or EDGE (enhanced data rates for global evolution), WiFi (IEEE 802.11 family standards, or other mobile communication technologies, or any combination thereof), global positioning system (GPS) receiver components, and/or other components. In someembodiments communications subsystem 1624 can provide wired network connectivity (e.g., Ethernet) in addition to or instead of a wireless interface. - In some embodiments,
communications subsystem 1624 may also receive input communication in the form of structured and/or unstructured data feeds 1626, event streams 1628,event updates 1630, and the like on behalf of one or more users who may usecomputer system 1600. - By way of example,
communications subsystem 1624 may be configured to receivedata feeds 1626 in real-time from users of social networks and/or other communication services such as Twitter® feeds, Facebook® updates, web feeds such as Rich Site Summary (RSS) feeds, and/or real-time updates from one or more third party information sources. - Additionally,
communications subsystem 1624 may also be configured to receive data in the form of continuous data streams, which may includeevent streams 1628 of real-time events and/orevent updates 1630, that may be continuous or unbounded in nature with no explicit end. Examples of applications that generate continuous data may include, for example, sensor data applications, financial tickers, network performance measuring tools (e.g. network monitoring and traffic management applications), clickstream analysis tools, automobile traffic monitoring, and the like. -
Communications subsystem 1624 may also be configured to output the structured and/or unstructured data feeds 1626, event streams 1628,event updates 1630, and the like to one or more databases that may be in communication with one or more streaming data source computers coupled tocomputer system 1600. -
Computer system 1600 can be one of various types, including a handheld portable device (e.g., an iPhone® cellular phone, an iPad® computing tablet, a PDA), a wearable device (e.g., a Google Glass® head mounted display), a PC, a workstation, a mainframe, a kiosk, a server rack, or any other data processing system. - Due to the ever-changing nature of computers and networks, the description of
computer system 1600 depicted in the figure is intended only as a specific example. Many other configurations having more or fewer components than the system depicted in the figure are possible. For example, customized hardware might also be used and/or particular elements might be implemented in hardware, firmware, software (including applets), or a combination. Further, connection to other computing devices, such as network input/output devices, may be employed. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will appreciate other ways and/or methods to implement the various embodiments. - Although specific embodiments of the disclosure have been described, various modifications, alterations, alternative constructions, and equivalents are also encompassed within the scope of the disclosure. Embodiments of the present disclosure are not restricted to operation within certain specific data processing environments, but are free to operate within a plurality of data processing environments. Additionally, although embodiments of the present disclosure have been described using a particular series of transactions and steps, it should be apparent to those skilled in the art that the scope of the present disclosure is not limited to the described series of transactions and steps. Various features and aspects of the above-described embodiments may be used individually or jointly.
- Further, while embodiments of the present disclosure have been described using a particular combination of hardware and software, it should be recognized that other combinations of hardware and software are also within the scope of the present disclosure. Embodiments of the present disclosure may be implemented only in hardware, or only in software, or using combinations thereof. The various processes described herein can be implemented on the same processor or different processors in any combination. Accordingly, where components or modules are described as being configured to perform certain operations, such configuration can be accomplished, e.g., by designing electronic circuits to perform the operation, by programming programmable electronic circuits (such as microprocessors) to perform the operation, or any combination thereof. Processes can communicate using a variety of techniques including but not limited to conventional techniques for inter process communication, and different pairs of processes may use different techniques, or the same pair of processes may use different techniques at different times.
- The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. It will, however, be evident that additions, subtractions, deletions, and other modifications and changes may be made thereunto without departing from the broader spirit and scope as set forth in the claims. Thus, although specific disclosure embodiments have been described, these are not intended to be limiting. Various modifications and equivalents are within the scope of the following claims.
- The use of the terms “a” and “an” and “the” and similar referents in the context of describing the disclosed embodiments (especially in the context of the following claims) are to be construed to cover both the singular and the plural, unless otherwise indicated herein or clearly contradicted by context. The terms “comprising,” “having,” “including,” and “containing” are to be construed as open-ended terms (i.e., meaning “including, but not limited to,”) unless otherwise noted. The term “connected” is to be construed as partly or wholly contained within, attached to, or joined together, even if there is something intervening. Recitation of ranges of values herein are merely intended to serve as a shorthand method of referring individually to each separate value falling within the range, unless otherwise indicated herein and each separate value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., “such as”) provided herein, is intended merely to better illuminate embodiments of the disclosure and does not pose a limitation on the scope of the disclosure unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the disclosure.
- Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is intended to be understood within the context as used in general to present that an item, term, etc., may be either X, Y, or Z, or any combination thereof (e.g., X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.
- Example embodiments of this disclosure are described herein, including the best mode known to the inventors for carrying out the disclosure. Variations of those example embodiments may become apparent to those of ordinary skill in the art upon reading the foregoing description. The inventors expect skilled artisans to employ such variations as appropriate and the inventors intend for the disclosure to be practiced otherwise than as specifically described herein. Accordingly, this disclosure includes all modifications and equivalents of the subject matter recited in the claims appended hereto as permitted by applicable law. Moreover, any combination of the above-described elements in all possible variations thereof is encompassed by the disclosure unless otherwise indicated herein or otherwise clearly contradicted by context.
- All references, including publications, patent applications, and patents, cited herein are hereby incorporated by reference to the same extent as if each reference were individually and specifically indicated to be incorporated by reference and were set forth in its entirety herein.
- In the foregoing specification, aspects of the disclosure are described with reference to specific embodiments thereof, but those skilled in the art will recognize that the disclosure is not limited thereto. Various features and aspects of the above-described disclosure may be used individually or jointly. Further, embodiments can be utilized in any number of environments and applications beyond those described herein without departing from the broader spirit and scope of the specification. The specification and drawings are, accordingly, to be regarded as illustrative rather than restrictive.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/196,907 US12238101B2 (en) | 2021-03-09 | 2021-03-09 | Customizing authentication and handling pre and post authentication in identity cloud service |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/196,907 US12238101B2 (en) | 2021-03-09 | 2021-03-09 | Customizing authentication and handling pre and post authentication in identity cloud service |
Publications (2)
Publication Number | Publication Date |
---|---|
US20220294788A1 true US20220294788A1 (en) | 2022-09-15 |
US12238101B2 US12238101B2 (en) | 2025-02-25 |
Family
ID=83194166
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/196,907 Active 2042-08-22 US12238101B2 (en) | 2021-03-09 | 2021-03-09 | Customizing authentication and handling pre and post authentication in identity cloud service |
Country Status (1)
Country | Link |
---|---|
US (1) | US12238101B2 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230103087A1 (en) * | 2021-09-24 | 2023-03-30 | Sap Se | Cloud plugin for legacy on-premise application |
US11621830B1 (en) | 2021-06-28 | 2023-04-04 | SHAYRE, Inc. | Systems and methods for facilitating asynchronous secured point-to-point communications |
US11620363B1 (en) | 2021-03-15 | 2023-04-04 | SHAYRE, Inc. | Systems and methods for authentication and authorization for software license management |
US11632362B1 (en) * | 2021-04-14 | 2023-04-18 | SHAYRE, Inc. | Systems and methods for using JWTs for information security |
US11922163B2 (en) | 2021-09-24 | 2024-03-05 | Sap Se | Cloud version management for legacy on-premise application |
US12026496B2 (en) | 2021-09-24 | 2024-07-02 | Sap Se | Cloud upgrade for legacy on-premise application |
US12238101B2 (en) * | 2021-03-09 | 2025-02-25 | Oracle International Corporation | Customizing authentication and handling pre and post authentication in identity cloud service |
US12254020B2 (en) | 2021-09-24 | 2025-03-18 | Sap Se | Container plugin for legacy on-premise application |
Citations (742)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5918228A (en) * | 1997-01-28 | 1999-06-29 | International Business Machines Corporation | Method and apparatus for enabling a web server to impersonate a user of a distributed file system to obtain secure access to supported web documents |
US5974566A (en) * | 1997-10-07 | 1999-10-26 | International Business Machines Corporation | Method and apparatus for providing persistent fault-tolerant proxy login to a web-based distributed file service |
US6018570A (en) * | 1997-05-12 | 2000-01-25 | Nynex Science And Technology Inc. | Methods and apparatus for regulating the remote ordering, authorization, access and control of services and service features associated with a terminal |
US6098093A (en) * | 1998-03-19 | 2000-08-01 | International Business Machines Corp. | Maintaining sessions in a clustered server environment |
US6272639B1 (en) * | 1996-07-30 | 2001-08-07 | Micron Technology, Inc. | Mixed enclave operation in a computer network |
US6272538B1 (en) * | 1996-07-30 | 2001-08-07 | Micron Technology, Inc. | Method and system for establishing a security perimeter in computer networks |
US20010032878A1 (en) * | 2000-02-09 | 2001-10-25 | Tsiounis Yiannis S. | Method and system for making anonymous electronic payments on the world wide web |
US20010044787A1 (en) * | 2000-01-13 | 2001-11-22 | Gil Shwartz | Secure private agent for electronic transactions |
US6339828B1 (en) * | 1997-05-28 | 2002-01-15 | Symantec Corporation | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record |
US6341352B1 (en) * | 1998-10-15 | 2002-01-22 | International Business Machines Corporation | Method for changing a security policy during processing of a transaction request |
US20020010684A1 (en) * | 1999-12-07 | 2002-01-24 | Moskowitz Scott A. | Systems, methods and devices for trusted transactions |
US20020029275A1 (en) * | 1997-06-19 | 2002-03-07 | Thomas Drennan Selgas | Method and apparatus for providing fungible intercourse over a network |
US6377939B1 (en) * | 1999-05-04 | 2002-04-23 | Metratech | Pipelined method and apparatus for processing communication metering data |
US20020071564A1 (en) * | 2000-12-11 | 2002-06-13 | Kurn David Michael | Scalable computer system using password-based private key encryption |
US20020116616A1 (en) * | 1999-01-19 | 2002-08-22 | James Mi | System and method for using internet based caller ID for controlling access to an object stored in a computer |
US20020129088A1 (en) * | 2001-02-17 | 2002-09-12 | Pei-Yuan Zhou | Content-based billing |
US20020144109A1 (en) * | 2001-03-29 | 2002-10-03 | International Business Machines Corporation | Method and system for facilitating public key credentials acquisition |
US20020143944A1 (en) * | 2001-01-22 | 2002-10-03 | Traversat Bernard A. | Advertisements for peer-to-peer computing resources |
US20020165912A1 (en) * | 2001-02-25 | 2002-11-07 | Storymail, Inc. | Secure certificate and system and method for issuing and using same |
US20020178360A1 (en) * | 2001-02-25 | 2002-11-28 | Storymail, Inc. | System and method for communicating a secure unidirectional response message |
US20020194483A1 (en) * | 2001-02-25 | 2002-12-19 | Storymail, Inc. | System and method for authorization of access to a resource |
US20020194501A1 (en) * | 2001-02-25 | 2002-12-19 | Storymail, Inc. | System and method for conducting a secure interactive communication session |
US20020198888A1 (en) * | 1999-05-04 | 2002-12-26 | Metratech | Method and apparatus for ordering data processing by multiple processing modules |
US20020199001A1 (en) * | 2001-02-25 | 2002-12-26 | Storymail, Inc. | System and method for conducting a secure response communication session |
US20020196935A1 (en) * | 2001-02-25 | 2002-12-26 | Storymail, Inc. | Common security protocol structure and mechanism and system and method for using |
US20020199096A1 (en) * | 2001-02-25 | 2002-12-26 | Storymail, Inc. | System and method for secure unidirectional messaging |
US20030041110A1 (en) * | 2000-07-28 | 2003-02-27 | Storymail, Inc. | System, Method and Structure for generating and using a compressed digital certificate |
US6539093B1 (en) * | 1998-12-31 | 2003-03-25 | International Business Machines Corporation | Key ring organizer for an electronic business using public key infrastructure |
US20030065921A1 (en) * | 2001-09-28 | 2003-04-03 | Chang Kae-Por F. | Authority-neutral certification for multiple-authority PKI environments |
US20030115267A1 (en) * | 2001-12-19 | 2003-06-19 | International Business Machines Corporation | System and method for user enrollment in an e-community |
US20030163733A1 (en) * | 2002-02-28 | 2003-08-28 | Ericsson Telefon Ab L M | System, method and apparatus for federated single sign-on services |
US20030196080A1 (en) * | 2002-04-16 | 2003-10-16 | Izecom B.V. | Secure communication via the internet |
US20030195967A1 (en) * | 1997-06-19 | 2003-10-16 | Selgas Thomas Drennan | Method of cost reduction/billing |
US20030195858A1 (en) * | 2002-04-10 | 2003-10-16 | Fujio Watanabe | Distributed information storage, authentication and authorization system |
US6659861B1 (en) * | 1999-02-26 | 2003-12-09 | Reveo, Inc. | Internet-based system for enabling a time-constrained competition among a plurality of participants over the internet |
US6668322B1 (en) * | 1999-08-05 | 2003-12-23 | Sun Microsystems, Inc. | Access management system and method employing secure credentials |
US20040002902A1 (en) * | 2000-09-01 | 2004-01-01 | Max Muehlhaeuser | System and method for the wireless access of computer-based services in an attributable manner |
US20040054899A1 (en) * | 2002-08-30 | 2004-03-18 | Xerox Corporation | Apparatus and methods for providing secured communication |
US20040088333A1 (en) * | 2002-01-25 | 2004-05-06 | David Sidman | Apparatus method and system for tracking information access |
US20040098581A1 (en) * | 2002-08-30 | 2004-05-20 | Xerox Corporation | Method and apparatus for establishing and using a secure credential infrastructure |
US20040107366A1 (en) * | 2002-08-30 | 2004-06-03 | Xerox Corporation | Method, apparatus, and program product for automatically provisioning secure network elements |
US6754829B1 (en) * | 1999-12-14 | 2004-06-22 | Intel Corporation | Certificate-based authentication system for heterogeneous environments |
US20040123144A1 (en) * | 2002-12-19 | 2004-06-24 | International Business Machines Corporation | Method and system for authentication using forms-based single-sign-on operations |
US20040139327A1 (en) * | 1999-04-13 | 2004-07-15 | Ilumin Corporation | System and method for document-driven processing of digitally-signed electronic documents |
US20040176071A1 (en) * | 2001-05-08 | 2004-09-09 | Christian Gehrmann | Secure remote subscription module access |
US20040221163A1 (en) * | 2003-05-02 | 2004-11-04 | Jorgensen Jimi T. | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
US20040225716A1 (en) * | 2000-05-31 | 2004-11-11 | Ilan Shamir | Methods and systems for allowing a group of users to interactively tour a computer network |
US20040243349A1 (en) * | 2003-05-30 | 2004-12-02 | Segue Software, Inc. | Method of non-intrusive analysis of secure and non-secure web application traffic in real-time |
US20040242228A1 (en) * | 2003-01-14 | 2004-12-02 | Samsung Electronics Co., Ltd. | Method for fast roaming in a wireless network |
US20040249927A1 (en) * | 2000-07-17 | 2004-12-09 | David Pezutti | Intelligent network providing network access services (INP-NAS) |
US20040249768A1 (en) * | 2001-07-06 | 2004-12-09 | Markku Kontio | Digital rights management in a mobile communications environment |
US20040254848A1 (en) * | 2000-10-23 | 2004-12-16 | Lior Golan | Transaction system |
US20040268119A1 (en) * | 2003-06-24 | 2004-12-30 | Palo Alto Research Center, Incorporated | Method, apparatus, and program product for securely presenting situation information |
US20050071630A1 (en) * | 2003-08-15 | 2005-03-31 | Imcentric, Inc. | Processing apparatus for monitoring and renewing digital certificates |
US20050076216A1 (en) * | 2003-10-01 | 2005-04-07 | Nokia Corporation | Method for securing a communication |
US20050100166A1 (en) * | 2003-11-10 | 2005-05-12 | Parc Inc. | Systems and methods for authenticating communications in a network medium |
US20050114545A1 (en) * | 2003-11-20 | 2005-05-26 | International Business Machines Corporation | Method and apparatus for marking of web pages |
US20050125669A1 (en) * | 2003-12-08 | 2005-06-09 | Palo Alto Research Center Incorporated | Method and apparatus for using a secure credential infrastructure to access vehicle components |
US6907531B1 (en) * | 2000-06-30 | 2005-06-14 | Internet Security Systems, Inc. | Method and system for identifying, fixing, and updating security vulnerabilities |
US20050129240A1 (en) * | 2003-12-15 | 2005-06-16 | Palo Alto Research Center Incorporated | Method and apparatus for establishing a secure ad hoc command structure |
US20050135624A1 (en) * | 2003-12-19 | 2005-06-23 | Ya-Hsang Tsai | System and method for pre-authentication across wireless local area networks (WLANS) |
US6918038B1 (en) * | 1996-08-13 | 2005-07-12 | Angel Secure Networks, Inc. | System and method for installing an auditable secure network |
US20050163078A1 (en) * | 2004-01-22 | 2005-07-28 | Toshiba America Research, Inc. | Mobility architecture using pre-authentication, pre-configuration and/or virtual soft-handoff |
US20050166041A1 (en) * | 2004-01-23 | 2005-07-28 | Gridlron Software, Inc. | Authentication in a distributed computing environment |
US20050172018A1 (en) * | 1997-09-26 | 2005-08-04 | Devine Carol Y. | Integrated customer interface system for communications network management |
US20050177723A1 (en) * | 2004-02-10 | 2005-08-11 | Industrial Technology Research Institute | SIM-based authentication method capable of supporting inter-AP fast handover |
US20050184145A1 (en) * | 2004-02-05 | 2005-08-25 | Simon Law | Secure wireless authorization system |
US20050193118A1 (en) * | 2004-02-27 | 2005-09-01 | Wyse Technology Inc. | Session manager for secured remote computing |
US20050204168A1 (en) * | 2004-03-10 | 2005-09-15 | Keith Johnston | System and method for double-capture/double-redirect to a different location |
US20050235044A1 (en) * | 2004-04-20 | 2005-10-20 | Tazuma Stanley K | Apparatus and methods relating to web browser redirection |
US6978367B1 (en) * | 1999-10-21 | 2005-12-20 | International Business Machines Corporation | Selective data encryption using style sheet processing for decryption by a client proxy |
US20060021017A1 (en) * | 2004-07-21 | 2006-01-26 | International Business Machines Corporation | Method and system for establishing federation relationships through imported configuration files |
US20060031494A1 (en) * | 2004-06-28 | 2006-02-09 | Marcus Jane B | Method and system for providing single sign-on user names for Web cookies in a multiple user information directory environment |
US20060031510A1 (en) * | 2004-01-26 | 2006-02-09 | Forte Internet Software, Inc. | Methods and apparatus for enabling a dynamic network of interactors according to personal trust levels between interactors |
US20060041759A1 (en) * | 2004-07-02 | 2006-02-23 | Rsa Security, Inc. | Password-protection module |
US7032110B1 (en) * | 2000-06-30 | 2006-04-18 | Landesk Software Limited | PKI-based client/server authentication |
US20060104234A1 (en) * | 2003-12-08 | 2006-05-18 | Huawei Technologies Co., Ltd. | Method for establishment of a service tunnel in a WLAN |
US20060136595A1 (en) * | 1998-12-08 | 2006-06-22 | Ramakrishna Satyavolu | Network-based verification and fraud-prevention system |
US20060136990A1 (en) * | 2004-12-16 | 2006-06-22 | Hinton Heather M | Specializing support for a federation relationship |
US20060146803A1 (en) * | 2004-11-26 | 2006-07-06 | Samsung Electronics Co., Ltd. | System and method for seamless handoff of WLAN-UMTS interworking |
US20060155985A1 (en) * | 2002-11-14 | 2006-07-13 | France Telecom | Method and system with authentication, revocable anonymity and non-repudiation |
US20060165083A1 (en) * | 2004-12-20 | 2006-07-27 | Lg Electronics Inc. | Multimedia access system |
US20060176852A1 (en) * | 2005-02-04 | 2006-08-10 | Industrial Technology Research Institute | System and method for connection handover in a virtual private network |
US20060179307A1 (en) * | 2005-02-04 | 2006-08-10 | Cisco Technology, Inc. | Method and system for inter-subnet pre-authentication |
US20060185004A1 (en) * | 2005-02-11 | 2006-08-17 | Samsung Electronics Co., Ltd. | Method and system for single sign-on in a network |
US20060187858A1 (en) * | 2004-11-05 | 2006-08-24 | Taniuchi Kenichi | Network discovery mechanisms |
US20060224686A1 (en) * | 2005-03-30 | 2006-10-05 | Hiroshi Kitada | System and method for managing documents with multiple network applications |
US20060239235A1 (en) * | 2005-04-25 | 2006-10-26 | Cisco Technology, Inc. | Authorizing a mobile node for service |
US20060248350A1 (en) * | 2005-04-29 | 2006-11-02 | Georgi Stanev | Persistent storage implementations for session data within a multi-tiered enterprise network |
US20060248036A1 (en) * | 2005-04-29 | 2006-11-02 | Georgi Stanev | Internal persistence of session state information |
US20060248200A1 (en) * | 2005-04-29 | 2006-11-02 | Georgi Stanev | Shared memory implementations for session data within a multi-tiered enterprise network |
US20060248199A1 (en) * | 2005-04-29 | 2006-11-02 | Georgi Stanev | Shared closure persistence of session state information |
US20060248198A1 (en) * | 2005-04-29 | 2006-11-02 | Galin Galchev | Flexible failover configuration |
US20060248119A1 (en) * | 2005-04-29 | 2006-11-02 | Georgi Stanev | External persistence of session state information |
US20060277596A1 (en) * | 2005-06-06 | 2006-12-07 | Calvert Peter S | Method and system for multi-instance session support in a load-balanced environment |
US20060294366A1 (en) * | 2005-06-23 | 2006-12-28 | International Business Machines Corp. | Method and system for establishing a secure connection based on an attribute certificate having user credentials |
US20070005801A1 (en) * | 2005-06-21 | 2007-01-04 | Sandeep Kumar | Identity brokering in a network element |
US20070022292A1 (en) * | 2005-07-19 | 2007-01-25 | The Go Daddy Group, Inc. | Receiving encrypted emails via a web-based email system |
US20070038862A1 (en) * | 2003-06-04 | 2007-02-15 | Noble Gary P | Method and system for controlling the disclosure time of information |
US7181076B1 (en) * | 2000-07-26 | 2007-02-20 | Lockheed Martin Corporation | Wavelet-based data compression using principal components transformation |
US7181620B1 (en) * | 2001-11-09 | 2007-02-20 | Cisco Technology, Inc. | Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach |
US20070049335A1 (en) * | 2005-08-08 | 2007-03-01 | Robert Haitani | Operating multiple views on a computing device in connection with a wireless communication session |
US20070055781A1 (en) * | 2005-09-06 | 2007-03-08 | Christian Fleischer | Connection manager capable of supporting both distributed computing sessions and non distributed computing sessions |
US20070061869A1 (en) * | 2005-07-25 | 2007-03-15 | Dehaas Ronald J | Access of Internet use for a selected user |
US20070064673A1 (en) * | 2005-03-10 | 2007-03-22 | Nehru Bhandaru | Flexible, scalable, wireless data forwarding and mobility for secure wireless networks |
US20070082656A1 (en) * | 2005-10-11 | 2007-04-12 | Cisco Technology, Inc. | Method and system for filtered pre-authentication and roaming |
US20070101145A1 (en) * | 2005-10-31 | 2007-05-03 | Axalto Inc. | Framework for obtaining cryptographically signed consent |
US20070106897A1 (en) * | 2005-11-07 | 2007-05-10 | Michael Kulakowski | Secure RFID authentication system |
US7236956B1 (en) * | 1999-10-18 | 2007-06-26 | Stamps.Com | Role assignments in a cryptographic module for secure processing of value-bearing items |
US20070174467A1 (en) * | 2005-04-11 | 2007-07-26 | Lastmile Communications Limited | Communications network |
US20070185814A1 (en) * | 2005-10-18 | 2007-08-09 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
US20070198674A1 (en) * | 2004-03-12 | 2007-08-23 | Jun Li | Automated Remote Site Downloading On A Geographic Drive |
US20070204155A1 (en) * | 2005-02-04 | 2007-08-30 | Toshiba America Research, Inc. | Framework of Media-Independent Pre-Authentication |
US20070204078A1 (en) * | 2006-02-09 | 2007-08-30 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
US20070208936A1 (en) * | 2003-12-29 | 2007-09-06 | Luis Ramos Robles | Means and Method for Single Sign-On Access to a Service Network Through an Access Network |
US20070213033A1 (en) * | 2006-03-10 | 2007-09-13 | Samsung Electronics Co., Ltd. | Method and apparatus for authenticating mobile terminal on handover |
US20070214454A1 (en) * | 2004-03-10 | 2007-09-13 | Handmark, Inc. | Data Access Architecture |
US20070234408A1 (en) * | 2006-03-31 | 2007-10-04 | Novell, Inc. | Methods and systems for multifactor authentication |
US7293096B1 (en) * | 2001-09-28 | 2007-11-06 | Cisco Technology, Inc. | Maintaining a common AAA session id for a call over a network |
US20070261108A1 (en) * | 2004-06-14 | 2007-11-08 | Matsushita Electric Industrial Co., Ltd. | Service Method and Apparatus by Granting Authorization Before Authentication |
US20070282757A1 (en) * | 2006-06-02 | 2007-12-06 | Microsoft Corporation | Logon and machine unlock integration |
US20070294752A1 (en) * | 2006-06-01 | 2007-12-20 | Novell, Inc. | Single sign on with proxy services |
US20070297430A1 (en) * | 2006-05-19 | 2007-12-27 | Nokia Corporation | Terminal reachability |
US20080002653A1 (en) * | 2006-06-13 | 2008-01-03 | Accton Technology Corporation | Method of connecting a new discovered AP by early 4-way handshaking |
US7322040B1 (en) * | 2001-03-27 | 2008-01-22 | Microsoft Corporation | Authentication architecture |
US20080092215A1 (en) * | 2006-09-25 | 2008-04-17 | Nortel Networks Limited | System and method for transparent single sign-on |
US20080109553A1 (en) * | 2006-11-08 | 2008-05-08 | Brian Fowler | System and method for reducing click fraud |
US20080134306A1 (en) * | 2006-12-04 | 2008-06-05 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for fast handover and authentication in a packet data network |
US20080132235A1 (en) * | 2006-11-30 | 2008-06-05 | Motorola, Inc. | Method to Facilitate Pre-Provisioning a Wireless Access Point With a One-Time Password to Facilitate Authorized Handoffs for a Given Communication Session |
US20080212771A1 (en) * | 2005-10-05 | 2008-09-04 | Privasphere Ag | Method and Devices For User Authentication |
US20080222299A1 (en) * | 2007-03-07 | 2008-09-11 | Trusteer Ltd. | Method for preventing session token theft |
US20080271121A1 (en) * | 2007-04-27 | 2008-10-30 | Heather Maria Hinton | External user lifecycle management for federated environments |
US20080271120A1 (en) * | 2007-04-23 | 2008-10-30 | 1020, Inc. | Network Pre-Authentication |
US20080270803A1 (en) * | 1998-05-07 | 2008-10-30 | Stephen Zizzi | Biometric Encryption And Decryption |
US20080282327A1 (en) * | 2007-05-11 | 2008-11-13 | Cisco Technology, Inc. | Network authorization status notification |
US7457948B1 (en) * | 2000-09-29 | 2008-11-25 | Lucent Technologies Inc. | Automated authentication handling system |
US7461369B2 (en) * | 2001-03-30 | 2008-12-02 | Bmc Software, Inc. | Java application response time analyzer |
US20080307506A1 (en) * | 2007-06-11 | 2008-12-11 | Anil Saldhana | Authorization framework |
US20080310366A1 (en) * | 2007-06-08 | 2008-12-18 | Toshiba America Research, Inc | MIH Pre-Authentication |
US20090007248A1 (en) * | 2007-01-18 | 2009-01-01 | Michael Kovaleski | Single sign-on system and method |
US20090028101A1 (en) * | 2005-03-15 | 2009-01-29 | Nec Corporation | Authentication method in a radio communication system, a radio terminal device and radio base station using the method, a radio communication system using them, and a program thereof |
US20090037514A1 (en) * | 2006-03-18 | 2009-02-05 | Peter Lankford | System And Method For Integration Of Streaming And Static Data |
US20090037544A1 (en) * | 2007-07-30 | 2009-02-05 | International Business Machines Corporation | Method to provide assistant role in instant message software |
US20090055642A1 (en) * | 2004-06-21 | 2009-02-26 | Steven Myers | Method, system and computer program for protecting user credentials against security attacks |
US20090064102A1 (en) * | 2007-08-28 | 2009-03-05 | International Business Machines Corporation | Method and system for navigationally displaying http session entry and exit points |
US20090064088A1 (en) * | 2007-08-28 | 2009-03-05 | Roland Barcia | Method and system for displaying http session entry and exit points |
US7506047B2 (en) * | 2001-03-30 | 2009-03-17 | Bmc Software, Inc. | Synthetic transaction monitor with replay capability |
US20090119364A1 (en) * | 2007-11-07 | 2009-05-07 | Oberthur Technologies | Method and system for exchange of data between remote servers |
US20090119754A1 (en) * | 2006-02-03 | 2009-05-07 | Mideye Ab | System, an Arrangement and a Method for End User Authentication |
US20090150989A1 (en) * | 2007-12-07 | 2009-06-11 | Pistolstar, Inc. | User authentication |
US20090147957A1 (en) * | 2006-05-22 | 2009-06-11 | Nxp B.V. | Secure internet transaction method and apparatus |
US20090186601A1 (en) * | 2008-01-09 | 2009-07-23 | Lg Electronics Inc. | Pre-authentication method for inter-rat handover |
US20090222905A1 (en) * | 2008-02-28 | 2009-09-03 | Hoon Choi | Method, apparatus, and system for pre-authentication and processing of data streams |
US7590687B2 (en) * | 2005-11-17 | 2009-09-15 | Bea Systems, Inc. | System and method for providing notifications in a communities framework |
US20090235069A1 (en) * | 2006-04-10 | 2009-09-17 | Trust Integration Services B.V. | Arrangement of and method for secure data transmission |
US20090240936A1 (en) * | 2008-03-20 | 2009-09-24 | Mark Lambiase | System and method for storing client-side certificate credentials |
US20090259838A1 (en) * | 2008-04-15 | 2009-10-15 | Authenex, Inc. | Hardware-Bonded Credential Manager Method and System |
US20090276667A1 (en) * | 2008-05-02 | 2009-11-05 | Microsoft Corporation | Session Broker Extensibility Application Program Interface |
US20090307496A1 (en) * | 2008-06-03 | 2009-12-10 | Lg Electronics Inc. | Method of deriving and updating traffic encryption key |
US20090319776A1 (en) * | 2008-05-16 | 2009-12-24 | Lloyd Leon Burch | Techniques for secure network communication |
US20090328187A1 (en) * | 2006-03-03 | 2009-12-31 | Art of Defense GmBHBruderwohrdstrasse | Distributed web application firewall |
US20100005168A1 (en) * | 2008-07-03 | 2010-01-07 | Ebay Inc. | Systems and methods for unification of local and remote resources over a network |
US20100030862A1 (en) * | 2008-07-31 | 2010-02-04 | International Business Machines Corporation | Testing a network system |
US7665125B2 (en) * | 2002-09-23 | 2010-02-16 | Heard Robert W | System and method for distribution of security policies for mobile devices |
US20100088698A1 (en) * | 2008-10-03 | 2010-04-08 | Ravishankar Krishnamurthy | Techniques for managing communication sessions |
US20100091733A1 (en) * | 2007-10-17 | 2010-04-15 | Gene Beck Hahn | Method for handover between heterogenous radio access networks |
US20100131654A1 (en) * | 2008-11-25 | 2010-05-27 | Microsoft Corporation | Platform for enabling terminal services virtualization |
US20100174900A1 (en) * | 2008-12-19 | 2010-07-08 | Lin Paul Y | Method and apparatus for authenticating online transactions using a browser |
US20100198730A1 (en) * | 2007-12-21 | 2010-08-05 | Ahmed Zahid N | System and method for securing tenant data on a local appliance prior to delivery to a SaaS data center hosted application service |
US20100198712A1 (en) * | 2009-02-02 | 2010-08-05 | Trustifi, Inc. | Certified Email System and Method |
US7792948B2 (en) * | 2001-03-30 | 2010-09-07 | Bmc Software, Inc. | Method and system for collecting, aggregating and viewing performance data on a site-wide basis |
US20100250497A1 (en) * | 2007-01-05 | 2010-09-30 | Redlich Ron M | Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor |
US20100257451A1 (en) * | 2009-04-05 | 2010-10-07 | Hbr Labs Inc. | System and method for synchronizing collaborative web applications |
US20100257582A1 (en) * | 2007-11-19 | 2010-10-07 | David Castellanos Zamora | Pre-authorization of bearer set-up |
US20100263032A1 (en) * | 2009-04-08 | 2010-10-14 | Krishna Bhuyan | Web to IMS Registration and Authentication for an Unmanaged IP Client Device |
US20100299525A1 (en) * | 2005-08-10 | 2010-11-25 | Riverbed Technology, Inc. | Method and apparatus for split-terminating a secure network connection, with client authentication |
US20100313014A1 (en) * | 2009-06-04 | 2010-12-09 | General Instrument Corporation | Downloadable security based on certificate status |
US20110035294A1 (en) * | 2009-08-04 | 2011-02-10 | Authernative, Inc. | Multi-tier transaction processing method and payment system in m- and e- commerce |
US20110055573A1 (en) * | 2009-09-03 | 2011-03-03 | International Business Machines Corporation | Supporting flexible use of smart cards with web applications |
US20110066849A1 (en) * | 2008-04-30 | 2011-03-17 | Nec Europe, Ltd. | Method and system for verifying the identity of a communication partner |
US7912906B2 (en) * | 2005-07-19 | 2011-03-22 | The Go Daddy Group, Inc. | Generating PKI email accounts on a web-based email system |
US7921210B1 (en) * | 2002-10-01 | 2011-04-05 | Cisco Technology, Inc. | Policy system throttling and load balancing |
US7930411B1 (en) * | 1998-12-08 | 2011-04-19 | Yodlee.Com, Inc. | Network-based verification and fraud-prevention system |
US20110107099A1 (en) * | 2008-06-25 | 2011-05-05 | Yunbo Pan | Pre-authentication method, authentication system and authentication apparatus |
US20110126207A1 (en) * | 2009-11-25 | 2011-05-26 | Novell, Inc. | System and method for providing annotated service blueprints in an intelligent workload management system |
US20110185411A1 (en) * | 1997-06-19 | 2011-07-28 | Thomas Drennan Selgas | Method of obtaining a network address |
US20110209210A1 (en) * | 2002-02-19 | 2011-08-25 | Miller Lawrence R | System and Method for Single Sign-On Session Management Without Central Server |
US20110208657A1 (en) * | 2010-02-19 | 2011-08-25 | Bindu Rama Rao | Mobile monetary transactions and banking for rural populations |
US20110214176A1 (en) * | 2010-02-27 | 2011-09-01 | Lloyd Leon Burch | Techniques for secure access management in virtual environments |
US20110215921A1 (en) * | 2009-06-22 | 2011-09-08 | Mourad Ben Ayed | Systems for wireless authentication based on bluetooth proximity |
US20110238988A1 (en) * | 2010-01-25 | 2011-09-29 | Yu Tanaka | Appliance authentication system, and method of controlling power supply |
US20110239270A1 (en) * | 2010-03-26 | 2011-09-29 | Nokia Corporation | Method and apparatus for providing heterogeneous security management |
US20110251992A1 (en) * | 2004-12-02 | 2011-10-13 | Desktopsites Inc. | System and method for launching a resource in a network |
US20110265172A1 (en) * | 2010-04-26 | 2011-10-27 | Research In Motion Limited | Method and system for third party client authentication |
US20110295988A1 (en) * | 2010-05-28 | 2011-12-01 | Le Jouan Herve | Managing data on computer and telecommunications networks |
US20110296440A1 (en) * | 2010-05-28 | 2011-12-01 | Security First Corp. | Accelerator system for use with secure data storage |
US20110314532A1 (en) * | 2010-06-17 | 2011-12-22 | Kyle Dean Austin | Identity provider server configured to validate authentication requests from identity broker |
US20120005731A1 (en) * | 2008-12-29 | 2012-01-05 | Samsung Electronics Co., Ltd. | Handover method of mobile terminal between heterogeneous networks |
US20120011576A1 (en) * | 2009-03-18 | 2012-01-12 | Huawei Technologies Co., Ltd. | Method, device, and system for pre-authentication |
US20120011578A1 (en) * | 2010-07-08 | 2012-01-12 | International Business Machines Corporation | Cross-protocol federated single sign-on (F-SSO) for cloud enablement |
US20120017088A1 (en) * | 2009-04-08 | 2012-01-19 | Zte Corporation | Wireless local area network terminal pre-authentication method and wireless local area network system |
US20120042358A1 (en) * | 2010-08-10 | 2012-02-16 | DevSquare Inc. | Proctoring System |
US20120054625A1 (en) * | 2010-08-30 | 2012-03-01 | Vmware, Inc. | Unified workspace for thin, remote, and saas applications |
US20120089659A1 (en) * | 2010-10-06 | 2012-04-12 | Hbr Labs Inc. | System and method for synchronizing collaborative form filling |
US20120096271A1 (en) * | 2010-10-15 | 2012-04-19 | Microsoft Corporation | Remote Access to Hosted Virtual Machines By Enterprise Users |
US20120124369A1 (en) * | 2010-11-09 | 2012-05-17 | Jose Castejon Amenedo | Secure publishing of public-key certificates |
US20120131647A1 (en) * | 2010-11-19 | 2012-05-24 | Lan Gang Tiger | System and Methods for Facilitating Secure Communications on a Website |
US20120143752A1 (en) * | 2010-08-12 | 2012-06-07 | Mastercard International, Inc. | Multi-commerce channel wallet for authenticated transactions |
US20120151568A1 (en) * | 2010-12-13 | 2012-06-14 | International Business Machines Corporation | Method and system for authenticating a rich client to a web or cloud application |
US20120185911A1 (en) * | 2010-09-30 | 2012-07-19 | Khandys Polite | Mlweb: a multilevel web application framework |
US20120204231A1 (en) * | 2009-10-19 | 2012-08-09 | Nokia Corporation | User identity management for permitting interworking of a bootstrapping architecture and a shared identity service |
US8261093B1 (en) * | 2008-03-27 | 2012-09-04 | Mcafee, Inc. | System, method, and computer program product for disabling a communication channel during authentication |
US20120226611A1 (en) * | 2011-03-01 | 2012-09-06 | Nimish Radia | Method and system for conducting a monetary transaction using a mobile communication device |
US20120233668A1 (en) * | 2011-03-08 | 2012-09-13 | Rackspace Us, Inc. | Pluggable Allocation in a Cloud Computing System |
US20120260329A1 (en) * | 2011-04-11 | 2012-10-11 | Research In Motion Limited | Mitigation of application-level distributed denial-of-service attacks |
US20120260321A1 (en) * | 2011-04-07 | 2012-10-11 | International Business Machines Corporation | Method and apparatus to auto-login to a browser application launched from an authenticated client application |
US20120266258A1 (en) * | 2011-04-12 | 2012-10-18 | Teletech Holdings, Inc. | Methods for providing cross-vendor support services |
US20120284632A1 (en) * | 2011-05-06 | 2012-11-08 | Cisco Technology, Inc. | Integrated Rendering of Streaming Media in Virtualized Desktop Environment |
US20120291090A1 (en) * | 2011-05-11 | 2012-11-15 | Oracle International Corporation | Access management architecture |
US20120300937A1 (en) * | 2010-01-29 | 2012-11-29 | Trevor Burbridge | Access control |
US8325625B2 (en) * | 2004-03-23 | 2012-12-04 | Smith Micro Software, Inc. | Method and system for automatic data transfer on a network-connected device |
US20120324242A1 (en) * | 2011-06-16 | 2012-12-20 | OneID Inc. | Method and system for fully encrypted repository |
US20130007840A1 (en) * | 2011-06-28 | 2013-01-03 | Jason Allen Sabin | Techniques for prevent information disclosure via dynamic secure cloud resources |
US20130007845A1 (en) * | 2011-06-30 | 2013-01-03 | International Business Machines Corporation | Authentication and authorization methods for cloud computing security platform |
US8351327B1 (en) * | 2006-08-28 | 2013-01-08 | Juniper Networks, Inc. | Intermediate network device applying application-layer quality of service to channels within a communication session |
US20130067225A1 (en) * | 2008-09-08 | 2013-03-14 | Ofer Shochet | Appliance, system, method and corresponding software components for encrypting and processing data |
US20130080570A1 (en) * | 2011-09-23 | 2013-03-28 | Roche Diagnostics Operations Inc. | Communication test framework |
US20130080832A1 (en) * | 2011-09-23 | 2013-03-28 | Roche Diagnostics Operations, Inc. | Protocol independent interface supporting general communications interface debugging and testing tool |
US20130080503A1 (en) * | 2011-09-23 | 2013-03-28 | Roche Diagnostics Operations, Inc. | Command interface for communication test framework |
US20130086657A1 (en) * | 2011-09-29 | 2013-04-04 | Oracle International Corporation | Relying party platform |
US20130091582A1 (en) * | 2011-10-08 | 2013-04-11 | Broadcom Corporation | Content security in a social network |
US20130133048A1 (en) * | 2010-08-02 | 2013-05-23 | 3Fish Limited | Identity assessment method and system |
US20130136253A1 (en) * | 2011-11-28 | 2013-05-30 | Hadas Liberman Ben-Ami | System and method for tracking web interactions with real time analytics |
US20130143513A1 (en) * | 2011-12-05 | 2013-06-06 | Thomas Ginter | User Accessible Multimedia Geospatial Routing Engine |
US8467290B2 (en) * | 2006-12-26 | 2013-06-18 | Ciena Corporation | Methods and systems for distributed authentication and caching for internet protocol multimedia subsystem and other session initiation protocol systems |
US20130190968A1 (en) * | 2012-01-24 | 2013-07-25 | Jason-David Nitzberg | Electric vehicle supply equipment testing apparatus |
US8498618B2 (en) * | 2009-06-22 | 2013-07-30 | Mourad Ben Ayed | Systems for intelligent authentication based on proximity |
US8516566B2 (en) * | 2007-10-25 | 2013-08-20 | Apple Inc. | Systems and methods for using external authentication service for Kerberos pre-authentication |
US20130219456A1 (en) * | 2012-01-06 | 2013-08-22 | Rahul Sharma | Secure Virtual File Management System |
US20130238903A1 (en) * | 2010-07-09 | 2013-09-12 | Takeshi Mizunuma | Service provision method |
US20130239185A1 (en) * | 2012-03-07 | 2013-09-12 | Bill.Com, Inc. | Method and system for using social networks to verify entity affiliations and identities |
US20130239089A1 (en) * | 2011-09-07 | 2013-09-12 | Brick Eksten | Systems and methods for computing applications |
US20130246225A1 (en) * | 2012-03-14 | 2013-09-19 | Accenture Global Services Limited | Social in line consumer interaction launch pad |
US20130263211A1 (en) * | 2012-04-01 | 2013-10-03 | Authentify, Inc. | Secure authentication in a multi-party system |
US20130276146A1 (en) * | 2011-12-22 | 2013-10-17 | Imtel Corporation | Method and apparatus to using storage devices to implement digital rights management protection |
US20130276053A1 (en) * | 2012-04-11 | 2013-10-17 | Mcafee, Inc. | System asset repository management |
US20130275574A1 (en) * | 2012-04-11 | 2013-10-17 | Mcafee, Inc. | Asset detection system |
US20130291070A1 (en) * | 2011-12-22 | 2013-10-31 | Nicholas D. Triantafillou | Activation and monetization of features built into storage subsystems using a trusted connect service back end infrastructure |
US20130305392A1 (en) * | 2012-05-08 | 2013-11-14 | Hagai Bar-El | System, device, and method of secure entry and handling of passwords |
US8590014B1 (en) * | 2010-09-13 | 2013-11-19 | Zynga Inc. | Network application security utilizing network-provided identities |
US20130318347A1 (en) * | 2010-10-08 | 2013-11-28 | Brian Lee Moffat | Private data sharing system |
US8601550B2 (en) * | 2004-06-24 | 2013-12-03 | Aventail Llc | Remote access to resources over a network |
US20130326075A1 (en) * | 2010-06-23 | 2013-12-05 | Microsoft Corporation | Handling of a Communication Session |
US20130326595A1 (en) * | 2011-01-07 | 2013-12-05 | Gary L. Myers | System and Method for Access Control Via Mobile Device |
US20140007222A1 (en) * | 2011-10-11 | 2014-01-02 | Zenprise, Inc. | Secure execution of enterprise applications on mobile devices |
US20140013394A1 (en) * | 2008-03-27 | 2014-01-09 | Mcafee, Inc. | System, method, and computer program product for a pre-deactivation grace period |
US20140020083A1 (en) * | 2006-05-17 | 2014-01-16 | Richard Fetik | Customizable Storage Controller With Integrated F+ Storage Firewall Protection |
US20140068702A1 (en) * | 2012-08-31 | 2014-03-06 | Avaya Inc. | Single sign-on system and method |
US20140096190A1 (en) * | 2012-10-01 | 2014-04-03 | Oracle International Corporation | Dynamic flow control for access managers |
US20140095637A1 (en) * | 2012-10-02 | 2014-04-03 | Tanner Cropper | System for sharing and tracking review of rich content, and methods associated therewith |
US8695074B2 (en) * | 2007-04-26 | 2014-04-08 | Microsoft Corporation | Pre-authenticated calling for voice applications |
US20140108542A1 (en) * | 2012-10-11 | 2014-04-17 | Nec Europe Ltd. | Method and system for providing a multiuser web session |
US20140136837A1 (en) * | 2012-04-16 | 2014-05-15 | Jordi Baylina Melé | Method for identifying and authenticating a user via a portable device |
US20140162598A1 (en) * | 2010-11-17 | 2014-06-12 | Antony-Euclid C. Villa-Real | Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true- personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions |
US20140181013A1 (en) * | 2012-08-31 | 2014-06-26 | Salesforce.Com, Inc. | Systems and methods for providing access to external content objects |
US20140189808A1 (en) * | 2012-12-28 | 2014-07-03 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
US20140189483A1 (en) * | 2012-04-27 | 2014-07-03 | Intralinks, Inc. | Spreadsheet viewer facility |
US20140189818A1 (en) * | 2012-04-27 | 2014-07-03 | Intralinks, Inc. | Email effectivity facilty in a networked secure collaborative exchange environment |
US8776209B1 (en) * | 2012-03-09 | 2014-07-08 | Juniper Networks, Inc. | Tunneling session detection to provide single-sign on (SSO) functionality for a VPN gateway |
US20140195626A1 (en) * | 2013-01-09 | 2014-07-10 | Evernym, Inc. | Systems and methods for access-controlled interactions |
US20140208408A1 (en) * | 2011-12-28 | 2014-07-24 | Aras Bilgen | Methods and apparatus to facilitate single sign-on services |
US20140223175A1 (en) * | 2012-12-31 | 2014-08-07 | Piyush Bhatnagar | System, design and process for easy to use credentials management for online accounts using out-of-band authentication |
US8805980B1 (en) * | 2002-11-01 | 2014-08-12 | Cisco Technology, Inc. | Accounting for policy enforcement decisions in radius systems |
US20140230076A1 (en) * | 2012-08-31 | 2014-08-14 | Salesforce.Com, Inc. | Systems and methods for content management in an on-demand environment |
US20140244998A1 (en) * | 2010-11-09 | 2014-08-28 | Secure64 Software Corporation | Secure publishing of public-key certificates |
US20140245015A1 (en) * | 2012-04-27 | 2014-08-28 | Intralinks, Inc. | Offline file access |
US8831979B1 (en) * | 2011-05-06 | 2014-09-09 | Howard Jeffrey Gerson | System and method for anonymous processing of financial transactions |
US20140280498A1 (en) * | 2013-03-14 | 2014-09-18 | Synacor, Inc. | Media sharing communications system |
US20140280952A1 (en) * | 2013-03-15 | 2014-09-18 | Advanced Elemental Technologies | Purposeful computing |
US20140279546A1 (en) * | 2011-10-17 | 2014-09-18 | Capital One Financial Corporation | Enhanced near field communications attachment |
US20140282586A1 (en) * | 2013-03-15 | 2014-09-18 | Advanced Elemental Technologies | Purposeful computing |
US20140282978A1 (en) * | 2013-03-15 | 2014-09-18 | Sergio Demian LERNER | Method and apparatus for secure interaction with a computer service provider |
US8850050B1 (en) * | 2013-03-29 | 2014-09-30 | Citrix Systems, Inc. | Providing a managed browser |
US20140298010A1 (en) * | 2013-03-26 | 2014-10-02 | Cloudtomo Limited | Public-key certificate management system and method |
US20140304836A1 (en) * | 2012-04-27 | 2014-10-09 | Intralinks, Inc. | Digital rights management through virtual container partitioning |
US8875285B2 (en) * | 2010-03-24 | 2014-10-28 | Microsoft Corporation | Executable code validation in a web browser |
US8881256B1 (en) * | 2011-12-21 | 2014-11-04 | Amazon Technologies, Inc. | Portable access to auditing information |
US20140359482A1 (en) * | 2013-06-03 | 2014-12-04 | Adobe Systems Incorporated | Image Session Ranking |
US20140380411A1 (en) * | 2011-06-17 | 2014-12-25 | Novell, Inc. | Techniques for workload spawning |
US20150007264A1 (en) * | 2013-06-30 | 2015-01-01 | Citrix Systems, Inc. | Secure hybrid file-sharing system |
US8966578B1 (en) * | 2014-08-07 | 2015-02-24 | Hytrust, Inc. | Intelligent system for enabling automated secondary authorization for service requests in an agile information technology environment |
US8966374B1 (en) * | 2009-03-30 | 2015-02-24 | Glance Networks, Inc. | Method and apparatus for enabling participants to assume control over a presentation in a remote viewing session |
US20150067089A1 (en) * | 2013-09-05 | 2015-03-05 | Hintroapps Limited | Metadata driven declarative client-side session management and differential server side data submission |
US20150073807A1 (en) * | 2008-12-04 | 2015-03-12 | At&T Intellectual Property I, L.P. | System and metod for voice authentication over a computer network |
US20150082396A1 (en) * | 2013-09-19 | 2015-03-19 | Oracle International Corporation | Privileged account plug-in framework - network - connected objects |
US20150081472A1 (en) * | 2013-09-18 | 2015-03-19 | LympheDIVAs | Computational Size Selection For Off The Shelf Garments |
US20150089619A1 (en) * | 2013-09-20 | 2015-03-26 | Oracle International Corporation | Web-based interface integration for single sign-on |
US20150128105A1 (en) * | 2013-11-07 | 2015-05-07 | Sap Ag | Dynamic containerization |
US9032498B1 (en) * | 2014-05-25 | 2015-05-12 | Mourad Ben Ayed | Method for changing authentication for a legacy access interface |
US20150135300A1 (en) * | 2013-11-14 | 2015-05-14 | Intralinks, Inc. | Litigation support in cloud-hosted file sharing and collaboration |
US9043883B2 (en) * | 2004-12-13 | 2015-05-26 | Alcatel Lucent | Secure authentication advertisement protocol |
US20150161410A1 (en) * | 2011-04-19 | 2015-06-11 | Invenia As | Method for secure storing of a data file via a computer communication network |
US20150163206A1 (en) * | 2013-12-11 | 2015-06-11 | Intralinks, Inc. | Customizable secure data exchange environment |
US9065819B1 (en) * | 2013-12-23 | 2015-06-23 | Cellco Partnership | Single sign on (SSO) authorization and authentication for mobile communication devices |
US20150178769A1 (en) * | 2013-12-24 | 2015-06-25 | Google Inc. | Systems and methods for audience measurement |
US20150180846A1 (en) * | 2013-12-19 | 2015-06-25 | Dropbox, Inc. | Pre-authorizing a client application to access a user account on a content management system |
US20150180844A1 (en) * | 2013-12-19 | 2015-06-25 | Cisco Technology, Inc. | Low latency authentication of gated media relay services |
US20150188956A1 (en) * | 2013-12-27 | 2015-07-02 | T-Mobile Usa, Inc. | Unified Communication Device |
US20150193744A1 (en) * | 2014-01-07 | 2015-07-09 | Elementum, LLC | Methods and systems for creating and using massless currency |
US9088556B2 (en) * | 2013-05-10 | 2015-07-21 | Blackberry Limited | Methods and devices for detecting unauthorized access to credentials of a credential store |
US20150205955A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating among users based on responses to injected interferences |
US20150205957A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating between a legitimate user and a cyber-attacker |
US20150205958A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating among users based on user classification |
US20150205944A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating among users based on platform configurations |
US20150213246A1 (en) * | 2010-11-29 | 2015-07-30 | Biocatch Ltd. | Method, device, and system of generating fraud-alerts for cyber-attacks |
US20150213251A1 (en) * | 2010-11-29 | 2015-07-30 | Biocatch Ltd. | Method, device, and system of protecting a log-in process of a computerized service |
US20150213568A1 (en) * | 2014-01-29 | 2015-07-30 | Adobe Systems Incorporated | Location aware selection of electronic signatures |
US20150237527A1 (en) * | 2012-09-25 | 2015-08-20 | Thompson Licensing | Reducing core network traffic caused by migrant users |
US20150254450A1 (en) * | 2014-03-10 | 2015-09-10 | Cisco Technology, Inc. | Disposition engine for single sign on (sso) requests |
US20150256337A1 (en) * | 2014-03-05 | 2015-09-10 | Qualcomm Incorporated | Using end-user federated login to detect a breach in a key exchange encrypted channel |
US20150288666A1 (en) * | 2014-04-05 | 2015-10-08 | Wearable Intelligence, Inc. | Systems and methods for digital workflow and communication |
US20150304359A1 (en) * | 2014-04-17 | 2015-10-22 | Avaya Inc. | APPLICATION OF ENTERPRISE POLICIES TO WEB REAL-TIME COMMUNICATIONS (WebRTC) INTERACTIVE SESSIONS USING AN ENTERPRISE SESSION INITIATION PROTOCOL (SIP) ENGINE, AND RELATED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA |
US20150310188A1 (en) * | 2014-04-23 | 2015-10-29 | Intralinks, Inc. | Systems and methods of secure data exchange |
US20150326559A1 (en) * | 2009-02-03 | 2015-11-12 | Inbay Technologies Inc. | Method and system for authorizing secure electronic transactions using a security device |
US9191381B1 (en) * | 2011-08-25 | 2015-11-17 | Symantec Corporation | Strong authentication via a federated identity protocol |
US20150381621A1 (en) * | 2014-06-27 | 2015-12-31 | Citrix Systems, Inc. | Enterprise Authentication Via Third Party Authentication Support |
US9231911B2 (en) * | 2006-10-16 | 2016-01-05 | Aruba Networks, Inc. | Per-user firewall |
US9231955B1 (en) * | 2014-03-26 | 2016-01-05 | Emc Corporation | Multiparty authorization for controlling resource access |
US20160034305A1 (en) * | 2013-03-15 | 2016-02-04 | Advanced Elemental Technologies, Inc. | Methods and systems for purposeful computing |
US20160043973A1 (en) * | 2014-08-11 | 2016-02-11 | SF Incubator LLC | Dynamic resolution of message content |
US20160050193A1 (en) * | 2014-08-15 | 2016-02-18 | Yordan Kanov | System and methods for secure communication in mobile devices |
US20160065571A1 (en) * | 2014-08-26 | 2016-03-03 | Hoyos Labs Corp. | System and methods for secure file sharing and access management |
US20160080346A1 (en) * | 2014-09-17 | 2016-03-17 | Transunion Rental Screening Solutions, Inc. | Identity certification badge |
US20160080374A1 (en) * | 2014-09-16 | 2016-03-17 | Ricoh Company, Ltd. | Output system, output method, output data storage apparatus, and output data relay apparatus |
US20160092246A1 (en) * | 2014-09-26 | 2016-03-31 | Oracle International Corporation | Reverse dependency injection in a system with dynamic code loading |
US20160094546A1 (en) * | 2014-09-30 | 2016-03-31 | Citrix Systems, Inc. | Fast smart card logon |
US20160109954A1 (en) * | 2014-05-16 | 2016-04-21 | Visa International Service Association | Gesture Recognition Cloud Command Platform, System, Method, and Apparatus |
US20160112394A1 (en) * | 2014-10-20 | 2016-04-21 | Yp Llc | Systems and methods for implementing a personalized provider recommendation engine |
US20160127358A1 (en) * | 2014-10-29 | 2016-05-05 | Salesforce.Com, Inc. | Providing a security mechanism on a mobile device |
US9342661B2 (en) * | 2010-03-02 | 2016-05-17 | Time Warner Cable Enterprises Llc | Apparatus and methods for rights-managed content and data delivery |
US20160171354A1 (en) * | 2014-12-16 | 2016-06-16 | Ebay Inc. | Digital rights and integrity management in three-dimensional (3d) printing |
US20160173475A1 (en) * | 2012-09-07 | 2016-06-16 | Oracle International Corporation | Multi-tenancy identity management system |
US20160191554A1 (en) * | 2012-10-18 | 2016-06-30 | White Ops, Inc. | System and method for identification of automated browser agents |
US9384339B2 (en) * | 2012-01-13 | 2016-07-05 | Telecommunication Systems, Inc. | Authenticating cloud computing enabling secure services |
US20160210006A1 (en) * | 2015-01-21 | 2016-07-21 | LogMeln, Inc. | Remote support service with smart whiteboard |
US20160226665A1 (en) * | 2015-02-03 | 2016-08-04 | Stmicroelectronics (Rousset) Sas | Method for authentication of an object by a device capable of mutual contactless communication, corresponding system and object |
US9436762B1 (en) * | 2012-01-03 | 2016-09-06 | Google Inc. | Sharing a plug-in instance in a web client |
US20160269370A1 (en) * | 2015-03-12 | 2016-09-15 | Fornetix Llc | Server-client pki for applied key management system and process |
US20160269411A1 (en) * | 2015-03-12 | 2016-09-15 | Ronen MALACHI | System and Method for Anonymous Biometric Access Control |
US20160285871A1 (en) * | 2015-03-27 | 2016-09-29 | Oracle International Corporation | Declarative techniques for transaction-specific authentication |
US20160294614A1 (en) * | 2014-07-07 | 2016-10-06 | Symphony Teleca Corporation | Remote Embedded Device Update Platform Apparatuses, Methods and Systems |
US20160294831A1 (en) * | 2015-04-03 | 2016-10-06 | United Services Automobile Association (Usaa) | Digital identification system |
US20160291940A1 (en) * | 2014-07-07 | 2016-10-06 | Symphony Teleca Corporation | Remote Embedded Device Update Platform Apparatuses, Methods and Systems |
US20160291959A1 (en) * | 2014-07-07 | 2016-10-06 | Symphony Teleca Corporation | Remote Embedded Device Update Platform Apparatuses, Methods and Systems |
US20160294605A1 (en) * | 2014-07-07 | 2016-10-06 | Symphony Teleca Corporation | Remote Embedded Device Update Platform Apparatuses, Methods and Systems |
US20160294894A1 (en) * | 2015-03-31 | 2016-10-06 | Facebook, Inc. | Multi-user media presentation system |
US9466054B1 (en) * | 2003-06-05 | 2016-10-11 | Intertrust Technologies Corporation | Interoperable systems and methods for peer-to-peer service orchestration |
US9471767B2 (en) * | 2014-08-22 | 2016-10-18 | Oracle International Corporation | CAPTCHA techniques utilizing traceable images |
US20160307194A1 (en) * | 2012-12-31 | 2016-10-20 | Piyush Bhatnagar | System and method for point of sale payment data credentials management using out-of-band authentication |
US20160315910A1 (en) * | 2015-04-27 | 2016-10-27 | Microsoft Technology Licensing, Llc | Persistent Uniform Resource Locators (URLs) for Client Applications acting as Web Services |
US9503452B1 (en) * | 2016-04-07 | 2016-11-22 | Automiti Llc | System and method for identity recognition and affiliation of a user in a service transaction |
US20160344724A1 (en) * | 2014-10-20 | 2016-11-24 | Itzhak SHOSHAN | Encryption/decryption in a cloud storage solution |
US20160344561A1 (en) * | 2015-05-22 | 2016-11-24 | Garret Grajek | Securing multimedia content via certificate-issuing cloud service |
US20160351080A1 (en) * | 2012-12-31 | 2016-12-01 | Piyush Bhatnagar | System, Design and Process for Secure Documents Credentials Management Using Out-of-Band Authentication |
US20170006020A1 (en) * | 2015-07-02 | 2017-01-05 | Adobe Systems Incorporated | Authentication context transfer for accessing computing resources via single sign-on with single use access tokens |
US20170019386A1 (en) * | 2011-12-21 | 2017-01-19 | Ssh Communications Security Oyj | Provisioning new virtual machine with credentials |
US20170026322A1 (en) * | 2015-07-20 | 2017-01-26 | Bank Of America Corporation | Asynchronous event-driven messaging framework for a remote video assistance system |
US20170026613A1 (en) * | 2015-07-20 | 2017-01-26 | Bank Of America Corporation | Personalized presentation of performance ratings of remote video assistant during remote video assistant selection |
US20170024679A1 (en) * | 2015-07-20 | 2017-01-26 | Bank Of America Corporation | Personalized user selection of remote video assistants based on remote video call history |
US20170024781A1 (en) * | 2015-07-20 | 2017-01-26 | Bank Of America Corporation | Providing remote video assistant-specific availability details for previously contacted remote video assistants |
US20170032114A1 (en) * | 2010-11-29 | 2017-02-02 | Biocatch Ltd. | System, method, and device of detecting identity of a user and authenticating a user |
US20170034144A1 (en) * | 2013-11-28 | 2017-02-02 | Friedrich Kisters | Authentication and/or identification method in a communication network |
US20170041304A1 (en) * | 2015-08-05 | 2017-02-09 | Facebook, Inc. | Managing a Device Cloud |
US20170041296A1 (en) * | 2015-08-05 | 2017-02-09 | Intralinks, Inc. | Systems and methods of secure data exchange |
US20170039282A1 (en) * | 2006-03-01 | 2017-02-09 | Oracle International Corporation | Flexible authentication framework |
US9569634B1 (en) * | 2013-12-16 | 2017-02-14 | Amazon Technologies, Inc. | Fine-grained structured data store access using federated identity management |
US9569626B1 (en) * | 2015-04-10 | 2017-02-14 | Dell Software Inc. | Systems and methods of reporting content-exposure events |
US20170048235A1 (en) * | 2015-07-14 | 2017-02-16 | Fmr Llc | Crypto Captcha and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems |
US20170048234A1 (en) * | 2015-07-14 | 2017-02-16 | Fmr Llc | Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems |
US20170048319A1 (en) * | 2015-08-11 | 2017-02-16 | Oracle International Corporation | Asynchronous pre-caching of synchronously loaded resources |
US20170048174A1 (en) * | 2015-08-10 | 2017-02-16 | Facebook, Inc. | Dynamic Communication Participant Identification |
US20170048209A1 (en) * | 2015-07-14 | 2017-02-16 | Fmr Llc | Crypto Key Recovery and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems |
US20170048215A1 (en) * | 2015-08-14 | 2017-02-16 | Oracle International Corporation | Secure storage of enterprise certificates for cloud services |
US20170054717A1 (en) * | 2015-08-20 | 2017-02-23 | Fujitsu Limited | Communication method, communication terminal apparatus, and communication network system |
US20170063551A1 (en) * | 2014-07-25 | 2017-03-02 | Snapfile Ltd. | System and method for securely managing integrity-verifiable and authenticable information |
US20170063842A1 (en) * | 2015-08-24 | 2017-03-02 | Hyundai Motor Company | Method for controlling vehicle security access based on certificate |
US20170085545A1 (en) * | 2015-07-14 | 2017-03-23 | Fmr Llc | Smart Rules and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems |
US20170085587A1 (en) * | 2010-11-29 | 2017-03-23 | Biocatch Ltd. | Device, method, and system of generating fraud-alerts for cyber-attacks |
US20170085555A1 (en) * | 2015-07-14 | 2017-03-23 | Fmr Llc | Point-to-Point Transaction Guidance Apparatuses, Methods and Systems |
US9608810B1 (en) * | 2015-02-05 | 2017-03-28 | Ionic Security Inc. | Systems and methods for encryption and provision of information security using platform services |
US20170099280A1 (en) * | 2015-10-02 | 2017-04-06 | Veritas Technologies Llc | Single Sign-On Method for Appliance Secure Shell |
US20170141921A1 (en) * | 2015-11-12 | 2017-05-18 | International Business Machines Corporation | Location control of cloud data stores |
US20170149795A1 (en) * | 2015-06-25 | 2017-05-25 | Websafety, Inc. | Management and control of mobile computing device using local and remote software agents |
US20170147809A1 (en) * | 2015-11-23 | 2017-05-25 | International Business Machines Corporation | Enhancing security of a mobile device using pre-authentication sequences |
US20170180413A1 (en) * | 2015-02-20 | 2017-06-22 | Authentic8, Inc. | Secure Analysis Application For Accessing Web Resources Via URL Forwarding |
US20170180378A1 (en) * | 2015-09-15 | 2017-06-22 | Mimecast North America, Inc. | Mediated access to resources |
US9690920B2 (en) * | 2012-08-30 | 2017-06-27 | International Business Machines Corporation | Secure configuration catalog of trusted identity providers |
US20170187536A1 (en) * | 2014-06-03 | 2017-06-29 | Arm Ip Limited | Methods of accessing and providing access to data sent between a remote resource and a data processing device |
US20170195332A1 (en) * | 2015-12-31 | 2017-07-06 | General Electric Company | Device enrollment in a cloud service using an authenticated application |
US9703947B2 (en) * | 2008-11-26 | 2017-07-11 | Free Stream Media Corp. | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
US20170206034A1 (en) * | 2006-05-17 | 2017-07-20 | Richard Fetik | Secure Application Acceleration System, Methods and Apparatus |
US20170214684A1 (en) * | 2014-07-21 | 2017-07-27 | Vcare Technologies PVT. LTD. | A contextual scanning device with pre-authenticated identity |
US20170223026A1 (en) * | 2016-02-01 | 2017-08-03 | General Electric Company | System and method for zone access control |
US20170223057A1 (en) * | 2016-02-01 | 2017-08-03 | General Electric Company | System and method for access control services |
US9729539B1 (en) * | 2014-03-28 | 2017-08-08 | Pulse Secure, Llc | Network access session detection to provide single-sign on (SSO) functionality for a network access control device |
US9736145B1 (en) * | 2014-08-01 | 2017-08-15 | Secureauth Corporation | Generation and validation of derived credentials |
US9747562B1 (en) * | 2012-03-19 | 2017-08-29 | Apttex Corporation | Linking structured database management systems with document creation and word processing tools |
US9760698B2 (en) * | 2013-09-17 | 2017-09-12 | Toyota Motor Sales, U.S.A., Inc. | Integrated wearable article for interactive vehicle control system |
US20170264653A1 (en) * | 2015-01-21 | 2017-09-14 | Logmein, Inc. | Remote support service with two-way smart whiteboard |
US9767309B1 (en) * | 2015-11-23 | 2017-09-19 | Experian Information Solutions, Inc. | Access control system for implementing access restrictions of regulated database records while identifying and providing indicators of regulated database records matching validation criteria |
US20170277774A1 (en) * | 2012-10-30 | 2017-09-28 | FHOOSH, Inc. | Systems and methods for secure storage of user information in a user profile |
US20170277773A1 (en) * | 2012-10-30 | 2017-09-28 | FHOOSH, Inc. | Systems and methods for secure storage of user information in a user profile |
US9781122B1 (en) * | 2016-05-11 | 2017-10-03 | Oracle International Corporation | Multi-tenant identity and data security management cloud service |
US20170289168A1 (en) * | 2016-03-31 | 2017-10-05 | Microsoft Technology Licensing, Llc | Personalized Inferred Authentication For Virtual Assistance |
US20170300910A1 (en) * | 2016-04-13 | 2017-10-19 | American Express Travel Related Services Company, Inc. | Presenting a personalized value added offer during an advanced verification process |
US20170310686A1 (en) * | 2016-04-22 | 2017-10-26 | Sophos Limited | Labeling network flows according to source applications |
US20170317997A1 (en) * | 2016-04-30 | 2017-11-02 | Civic Technologies, Inc. | Methods and systems of providing verification of the identity of a digital entity using a centralized or distributed ledger |
US20170323087A1 (en) * | 2016-05-03 | 2017-11-09 | Pegasus Media Security, Llc | Methods and apparatus for device authentication and secure data exchange between a server application and a device |
US20170331829A1 (en) * | 2016-05-11 | 2017-11-16 | Oracle International Corporation | Security tokens for a multi-tenant identity and data security management cloud service |
US20170331791A1 (en) * | 2016-05-11 | 2017-11-16 | Oracle International Corporation | Policy enforcement point for a multi-tenant identity and data security management cloud service |
US20170331802A1 (en) * | 2016-05-11 | 2017-11-16 | Oracle International Corporation | Key Generation and Rollover |
US20170331832A1 (en) * | 2016-05-11 | 2017-11-16 | Oracle International Corporation | Identity cloud service authorization model |
US20170331813A1 (en) * | 2016-05-11 | 2017-11-16 | Oracle International Corporation | Task segregation in a multi-tenant identity and data security management cloud service |
US20170331812A1 (en) * | 2016-05-11 | 2017-11-16 | Oracle International Corporation | Microservices based multi-tenant identity and data security management cloud service |
US20170346851A1 (en) * | 2016-05-30 | 2017-11-30 | Christopher Nathan Tyrwhitt Drake | Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements. |
US9838758B2 (en) * | 2008-11-26 | 2017-12-05 | David Harrison | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
US20170359306A1 (en) * | 2016-06-10 | 2017-12-14 | Sophos Limited | Network security |
US20170359370A1 (en) * | 2016-06-10 | 2017-12-14 | Sophos Limited | Key throttling to mitigate unauthorized file access |
US9847994B1 (en) * | 2015-09-30 | 2017-12-19 | Surfdash | System and method for providing a secure network |
US9853959B1 (en) * | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US20170372046A1 (en) * | 2016-06-23 | 2017-12-28 | Yahoo! Inc. | Computerized system and method for modifying a media file by automatically applying security features to select portions of media file content |
US20180007059A1 (en) * | 2014-09-30 | 2018-01-04 | Citrix Systems, Inc. | Dynamic Access Control to Network Resources Using Federated Full Domain Logon |
US20180025442A1 (en) * | 2014-03-31 | 2018-01-25 | Monticello Enterprises LLC | System and method for managing cryptocurrency payments via the payment request api |
US20180039501A1 (en) * | 2016-08-05 | 2018-02-08 | Oracle International Corporation | Tenant self-service troubleshooting for a multi-tenant identity and data security management cloud service |
US20180041491A1 (en) * | 2016-08-05 | 2018-02-08 | Oracle International Corporation | Caching framework for a multi-tenant identity and data security management cloud service |
US20180041515A1 (en) * | 2016-08-05 | 2018-02-08 | Oracle International Corporation | Service discovery for a multi-tenant identity and data security management cloud service |
US20180039737A1 (en) * | 2016-08-02 | 2018-02-08 | Umbra Health Corporation | Patient directed data synchronization of electronic health records using a patient controlled health record |
US20180039494A1 (en) * | 2016-08-05 | 2018-02-08 | Oracle International Corporation | Zero down time upgrade for a multi-tenant identity and data security management cloud service |
US20180041598A1 (en) * | 2016-08-05 | 2018-02-08 | Oracle International Corporation | Hierarchical Processing for a Virtual Directory System for LDAP to SCIM Proxy Service |
US20180047014A1 (en) * | 2014-01-13 | 2018-02-15 | uQontrol, Inc. | Multi-Function Data Key |
US20180063143A1 (en) * | 2016-08-31 | 2018-03-01 | Oracle International Corporation | Data management for a multi-tenant identity cloud service |
US20180069702A1 (en) * | 2016-08-22 | 2018-03-08 | Akamai Technologies, Inc. | Providing Single Sign-On (SSO) in disjoint networks with non-overlapping authentication protocols |
US20180077139A1 (en) * | 2012-05-14 | 2018-03-15 | Nec Europe Ltd. | Method and system for accessing service/data of a first network from a second network for service/data access via the second network |
US20180077144A1 (en) * | 2016-09-14 | 2018-03-15 | Oracle International Corporation | Single logout functionality for a multi-tenant identity and data security management cloud service |
US20180075231A1 (en) * | 2016-09-14 | 2018-03-15 | Oracle International Corporation | Single sign-on functionality for a multi-tenant identity and data security management cloud service |
US20180077138A1 (en) * | 2016-09-14 | 2018-03-15 | Oracle International Corporation | Generating derived credentials for a multi-tenant identity cloud service |
US20180083967A1 (en) * | 2016-09-16 | 2018-03-22 | Oracle International Corporation | Tenant and Service Management For A Multi-Tenant Identity and Data Security Management Cloud Service |
US20180081983A1 (en) * | 2016-09-16 | 2018-03-22 | Oracle International Corporation | Cookie based state propagation for a multi-tenant identity cloud service |
US20180083826A1 (en) * | 2016-09-17 | 2018-03-22 | Oracle International Corporation | Composite event handler for a multi-tenant identity cloud service |
US20180083977A1 (en) * | 2016-09-16 | 2018-03-22 | Oracle International Corporation | Distributed High Availability Agent Architecture |
US20180083944A1 (en) * | 2016-09-16 | 2018-03-22 | Oracle International Corporation | Preserving LDAP Hierarchy in a SCIM Directory Using Special Marker Groups |
US20180083915A1 (en) * | 2016-09-16 | 2018-03-22 | Oracle International Corporation | SCIM to LDAP Mapping Using Subtype Attributes |
US9930475B1 (en) * | 2015-01-02 | 2018-03-27 | Wells Fargo Bank, N.A. | Customer service document with data storage device |
US20180091974A1 (en) * | 2016-09-28 | 2018-03-29 | Hospitality Core Services, LLC | Network Operations Center With User Authorization Interface |
US20180091930A1 (en) * | 2016-09-29 | 2018-03-29 | Mobilogix, Inc. | Systems and methods for vehicle access and management |
US20180096552A1 (en) * | 2016-09-26 | 2018-04-05 | PollMole Corporation | Cloud-based connectivity tool and method |
US20180097829A1 (en) * | 2016-09-30 | 2018-04-05 | Mcafee, Inc | Safe sharing of sensitive data |
US9948612B1 (en) * | 2017-09-27 | 2018-04-17 | Citrix Systems, Inc. | Secure single sign on and conditional access for client applications |
US20180109549A1 (en) * | 2016-08-30 | 2018-04-19 | International Business Machines Corporation | Securing services in a networked computing environment |
US9959398B1 (en) * | 2015-04-30 | 2018-05-01 | Ims Health Incorporated | Dynamic user authentication and authorization |
US9961083B2 (en) * | 2014-02-26 | 2018-05-01 | International Business Machines Corporation | Dynamic extensible application server management |
US9965133B1 (en) * | 2011-07-22 | 2018-05-08 | Ntrepid Corporation | Application for assisting in conducting covert cyber operations |
US9973488B1 (en) * | 2013-12-04 | 2018-05-15 | Amazon Technologies, Inc. | Authentication in a multi-tenant environment |
US20180137303A1 (en) * | 2016-11-15 | 2018-05-17 | International Business Machines Corporation | Intercepting sensitive data using hashed candidates |
US20180160309A1 (en) * | 2010-11-29 | 2018-06-07 | Biocatch Ltd. | Method, device, and system of differentiating between a cyber-attacker and a legitimate user |
US20180167378A1 (en) * | 2016-11-23 | 2018-06-14 | Ingram Micro, Inc. | System and Method for Multi-Tenant SSO With Dynamic Attribute Retrieval |
US20180183805A1 (en) * | 2014-12-18 | 2018-06-28 | Ivan Mauricio GONZALEZ CORONA | System and method of authorization of simple, sequential and parallel requests with means of authorization through previously defined parameters |
US10015167B1 (en) * | 2017-03-17 | 2018-07-03 | Accenture Global Solutions Limited | Extensible key management system for application program interfaces |
US20180198878A1 (en) * | 2017-01-09 | 2018-07-12 | Hewlett Packard Enterprise Development Lp | Shared sessions through reverse proxy |
US10027657B1 (en) * | 2016-07-06 | 2018-07-17 | Wells Fargo Bank, N.A. | Authentication/authorization without a password |
US20180205715A1 (en) * | 2017-01-16 | 2018-07-19 | Citrix Systems, Inc. | Secure Device Notifications From Remote Applications |
US20180232817A1 (en) * | 2014-03-31 | 2018-08-16 | Monticello Enterprises, Llc | System and method for providing multiple payment method options to browser |
US20180233236A1 (en) * | 2017-02-15 | 2018-08-16 | Stephen A. Dawkins | Occupational telemedicine |
US20180247312A1 (en) * | 2017-02-28 | 2018-08-30 | Early Warning Services, Llc | Authentication and security for mobile-device transactions |
US10075437B1 (en) * | 2012-11-06 | 2018-09-11 | Behaviosec | Secure authentication of a user of a device during a session with a connected server |
US20180262388A1 (en) * | 2006-09-25 | 2018-09-13 | Weaved, Inc. | Remote device deployment |
US20180278419A1 (en) * | 2017-03-22 | 2018-09-27 | Extrahop Networks, Inc. | Managing session secrets for continuous packet capture systems |
US20180278612A1 (en) * | 2017-03-22 | 2018-09-27 | Oracle International Corporation | Techniques for implementing a data storage device as a security device for managing access to resources |
US10091311B2 (en) * | 2014-11-04 | 2018-10-02 | Entit Software Llc | Smart location determination |
US20180285466A1 (en) * | 2017-04-04 | 2018-10-04 | Yandex Europe Ag | Method of and server for classifying a web resource |
US20180293371A1 (en) * | 2015-09-30 | 2018-10-11 | Friedrich Kisters | Method and device for authenticating an object or a person using a security element with a modular structure |
US20180308566A1 (en) * | 2016-08-02 | 2018-10-25 | Invaryant, Inc. | System and method for predictive and preventative treatment guidance for secure storage electronic medical records |
US20180316777A1 (en) * | 2017-04-26 | 2018-11-01 | International Business Machines Corporation | Invoking enhanced plug-ins and creating workflows having a series of enhanced plug-ins |
US10129228B1 (en) * | 2016-03-30 | 2018-11-13 | Amazon Technologies, Inc. | Authenticated communication between devices |
US20180329693A1 (en) * | 2011-09-07 | 2018-11-15 | Imagine Communications Corp. | Distributed ledger platform for computing applications |
US20180337914A1 (en) * | 2017-05-18 | 2018-11-22 | Oracle International Corporation | User authentication using kerberos with identity cloud service |
US20180337907A1 (en) * | 2017-05-16 | 2018-11-22 | Softex Incorporated | Integrated cybersecurity system and method for providing restricted client access to a website |
US10148786B1 (en) * | 2015-07-26 | 2018-12-04 | RedCritter Corp. | Method of generating a unified user profile |
US20180359234A1 (en) * | 2015-12-18 | 2018-12-13 | Nippon Telegraph And Telephone Corporation | Authentication control system, server apparatus, client apparatus, authentication control method, authentication method, and program |
US20180359233A1 (en) * | 2017-06-13 | 2018-12-13 | Salesforce.Com, Inc. | Conversational Authentication |
US20180359244A1 (en) * | 2017-06-09 | 2018-12-13 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
US20190007381A1 (en) * | 2014-03-31 | 2019-01-03 | Monticello Enterprises LLC | System and method for providing a search entity-based payment process |
US20190005508A1 (en) * | 2003-09-30 | 2019-01-03 | Nokia Technologies Oy | Active ticket with dynamic characteristic such as appearance with various validation options |
US20190014468A1 (en) * | 2017-07-06 | 2019-01-10 | Bank Of America Corporation | Frictionless hardening of digital consent |
US20190028468A1 (en) * | 2017-07-24 | 2019-01-24 | Bernard GARCIA | Biometric cloud authentication gateway database system and method of use |
US20190028517A1 (en) * | 2017-07-21 | 2019-01-24 | Freefly881 Communications Inc. | Network voice communication method and system implemented based on web communication plug-in |
US20190036906A1 (en) * | 2017-07-28 | 2019-01-31 | SmartAxiom, Inc. | System and method for iot security |
US10200351B2 (en) * | 2013-03-14 | 2019-02-05 | Google Llc | System for managing remote software applications |
US20190044942A1 (en) * | 2017-08-01 | 2019-02-07 | Twosense, Inc. | Deep Learning for Behavior-Based, Invisible Multi-Factor Authentication |
US20190052659A1 (en) * | 2017-08-08 | 2019-02-14 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US10216921B1 (en) * | 2011-03-01 | 2019-02-26 | Amazon Technologies, Inc. | Techniques for attesting to information |
US20190068382A1 (en) * | 2017-08-30 | 2019-02-28 | Raytheon Company | Self-organizing mobile peer-to-peer mesh network authentication |
US20190075130A1 (en) * | 2015-02-20 | 2019-03-07 | Authentic8, Inc. | Secure application for accessing web resources |
US20190087902A1 (en) * | 2017-08-18 | 2019-03-21 | Stephen A. Dawkins | Occupational telemedicine |
US20190089809A1 (en) * | 2017-09-15 | 2019-03-21 | Oracle International Corporation | Dynamic message queues for a microservice based cloud service |
US20190089757A1 (en) * | 2017-09-18 | 2019-03-21 | Inclusive Technology Solutions, LLC | Secure, multi-lingual, flexible access system and method |
US20190098056A1 (en) * | 2017-09-28 | 2019-03-28 | Oracle International Corporation | Rest-based declarative policy management |
US20190096013A1 (en) * | 2017-09-26 | 2019-03-28 | Joseph Balzamo, JR. | System and method for providing customizable property management services enabling increased transparency and communication |
US20190095516A1 (en) * | 2017-09-27 | 2019-03-28 | Oracle International Corporation | Reference attributes for related stored objects in a multi-tenant cloud service |
US20190098055A1 (en) * | 2017-09-28 | 2019-03-28 | Oracle International Corporation | Rest-based declarative policy management |
US20190104196A1 (en) * | 2017-09-29 | 2019-04-04 | Oracle International Corporation | System and method for providing a representational state transfer proxy service for a blockchain cloud service |
US20190102162A1 (en) * | 2017-09-29 | 2019-04-04 | Oracle International Corporation | Application Templates and Upgrade Framework for a Multi-Tenant Identity Cloud Service |
US20190108419A1 (en) * | 2017-10-09 | 2019-04-11 | Box, Inc. | Combining outputs of data processing services in a cloud-based collaboration platform |
US20190124112A1 (en) * | 2016-06-30 | 2019-04-25 | Sophos Limited | Baiting endpoints for improved detection of authentication attacks |
US20190121989A1 (en) * | 2017-10-19 | 2019-04-25 | 3D Bridge Solutions Inc. | Systems, devices and methods for protecting and exchanging electronic computer files |
US10284543B2 (en) * | 2016-06-24 | 2019-05-07 | AO Kaspersky Lab | System and method for secure online authentication |
US10282559B2 (en) * | 2016-06-10 | 2019-05-07 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US20190141021A1 (en) * | 2014-03-31 | 2019-05-09 | Monticello Enterprises LLC | System and method for providing simplified in store purchases and in-app purchases using a use- interface- based payment apt |
US20190147515A1 (en) * | 2017-11-10 | 2019-05-16 | Facebook, Inc. | Facilitating transactions using transaction tokens |
US10331471B1 (en) * | 2017-03-29 | 2019-06-25 | Parallels International Gmbh | Browser credential management for virtual execution environments |
US20190207912A1 (en) * | 2018-01-03 | 2019-07-04 | Syccure Inc. | Distributed authentication between network nodes |
US10356112B2 (en) * | 2016-03-10 | 2019-07-16 | Huawei Technologies Co., Ltd. | Method of mitigating cookie-injection and cookie-replaying attacks |
US10356088B1 (en) * | 2017-01-25 | 2019-07-16 | Salesforce.Com, Inc. | User authentication based on multiple asymmetric cryptography key pairs |
US20190222424A1 (en) * | 2018-01-12 | 2019-07-18 | Nok Nok Labs, Inc. | System and method for binding verifiable claims |
US20190230090A1 (en) * | 2018-01-22 | 2019-07-25 | Salesforce.Com, Inc. | Technologies for integrating and sandboxing web resources |
US20190238519A1 (en) * | 2018-01-31 | 2019-08-01 | Dell Products L. P. | Layered encryption for end to end communication |
US20190238598A1 (en) * | 2018-01-29 | 2019-08-01 | Oracle International Corporation | Dynamic client registration for an identity cloud service |
US20190246160A1 (en) * | 2018-02-06 | 2019-08-08 | Akamai Technologies, Inc. | Securing an overlay network against attack |
US20190245848A1 (en) * | 2018-02-08 | 2019-08-08 | Citrix Systems, Inc. | Fast Smart Card Login |
US20190268165A1 (en) * | 2018-02-27 | 2019-08-29 | Anchor Labs, Inc. | Cryptoasset custodial system with different rules governing access to logically separated cryptoassets |
US20190266576A1 (en) * | 2018-02-27 | 2019-08-29 | Anchor Labs, Inc. | Digital Asset Custodial System |
US20190281030A1 (en) * | 2014-03-31 | 2019-09-12 | Monticello Enterprises LLC | System and method for providing simplified in-store, product-based and rental payment processes |
US20190280876A1 (en) * | 2016-07-18 | 2019-09-12 | bitagentur GmbH & Co. KG | Token-based authentication with signed message |
US20190286812A1 (en) * | 2018-03-14 | 2019-09-19 | Microsoft Technology Licensing, Llc | Autonomous secrets renewal and distribution |
US20190289007A1 (en) * | 2018-03-14 | 2019-09-19 | Bank Of America Corporation | Preventing Unauthorized Access to Secure Information Systems Using Advanced Pre-Authentication Techniques |
US20190306138A1 (en) * | 2018-03-27 | 2019-10-03 | Oracle International Corporation | Cross-Region Trust for a Multi-Tenant Identity Cloud Service |
US20190306010A1 (en) * | 2018-04-02 | 2019-10-03 | Oracle International Corporation | Data Replication Conflict Detection and Resolution for a Multi-Tenant Identity Cloud Service |
US10439825B1 (en) * | 2018-11-13 | 2019-10-08 | INTEGRITY Security Services, Inc. | Providing quality of service for certificate management systems |
US10440053B2 (en) * | 2016-05-31 | 2019-10-08 | Lookout, Inc. | Methods and systems for detecting and preventing network connection compromise |
US10438017B2 (en) * | 2016-06-10 | 2019-10-08 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US20190312883A1 (en) * | 2018-04-05 | 2019-10-10 | The Toronto-Dominion Bank | Dynamic authorization of pre-staged data exchanges based on contextual data |
US20190312857A1 (en) * | 2018-04-04 | 2019-10-10 | Oracle International Corporation | Local Write for a Multi-Tenant Identity Cloud Service |
US20190312882A1 (en) * | 2018-04-05 | 2019-10-10 | The Toronto-Dominion Bank | Real-time authorization of initiated data exchanges based on dynamically generated tokenized data |
US20190318122A1 (en) * | 2018-04-13 | 2019-10-17 | Plaid Inc. | Secure permissioning of access to user accounts, including secure distribution of aggregated user account data |
US20190318816A1 (en) * | 2014-05-13 | 2019-10-17 | Nant Holdings Ip, Llc | Healthcare transaction validation via blockchain proof-of work, systems and methods |
US10454973B2 (en) * | 2016-06-10 | 2019-10-22 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US20190327135A1 (en) * | 2006-09-25 | 2019-10-24 | Remot3.It, Inc. | System, method and computer program product for accessing a device on a network |
US20190332754A1 (en) * | 2018-03-05 | 2019-10-31 | The Boogie Badge, Inc. | Digital identity authentication and verification system, method, and device |
US10467432B2 (en) * | 2016-06-10 | 2019-11-05 | OneTrust, LLC | Data processing systems for use in automatically generating, populating, and submitting data subject access requests |
US20190342329A1 (en) * | 2010-11-29 | 2019-11-07 | Biocatch Ltd. | System, Method, and Device of Authenticating a User based on Selfie Image or Selfie Video |
US20190340376A1 (en) * | 2018-05-04 | 2019-11-07 | Citrix Systems, Inc. | Systems and methods for providing data loss prevention via an embedded browser |
US10509920B2 (en) * | 2016-06-10 | 2019-12-17 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US20190384632A1 (en) * | 2018-05-08 | 2019-12-19 | Thomson Reuters Global Resources Unlimited Company | Systems and method for automating security workflows in a distributed system |
US20190394204A1 (en) * | 2018-06-25 | 2019-12-26 | Oracle International Corporation | Declarative Third Party Identity Provider Integration for a Multi-Tenant Identity Cloud Service |
US20200007530A1 (en) * | 2018-06-28 | 2020-01-02 | Oracle International Corporation | Session Synchronization Across Multiple Devices in an Identity Cloud Service |
US20200007556A1 (en) * | 2017-06-05 | 2020-01-02 | Umajin Inc. | Server kit configured to marshal resource calls and methods therefor |
US20200007615A1 (en) * | 2017-06-05 | 2020-01-02 | Umajin Inc. | Server kit configured to execute custom workflows and methods therefor |
US20200012511A1 (en) * | 2018-07-09 | 2020-01-09 | Samsung Electronics Co., Ltd. | System and method for guest operating system using containers |
US20200036528A1 (en) * | 2018-07-24 | 2020-01-30 | Royal Bank Of Canada | Systems and methods for secure tokenized credentials |
US20200036707A1 (en) * | 2015-08-21 | 2020-01-30 | Veridium Ip Limited | System and method for biometric protocol standards |
US10554624B2 (en) * | 2013-09-25 | 2020-02-04 | Mcafee, Llc | Proxy authentication for single sign-on |
US20200045016A1 (en) * | 2018-07-31 | 2020-02-06 | Splunk Inc. | Trusted tunnel bridge |
US20200042971A1 (en) * | 2018-07-31 | 2020-02-06 | American Express Travel Related Services Co., Inc. | System and method for transaction account based micro-payments |
US10559193B2 (en) * | 2002-02-01 | 2020-02-11 | Comcast Cable Communications, Llc | Premises management systems |
US10565161B2 (en) * | 2016-06-10 | 2020-02-18 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US20200067903A1 (en) * | 2018-08-24 | 2020-02-27 | International Business Machines Corporation | Integration of Publish-Subscribe Messaging with Authentication Tokens |
US20200065300A1 (en) * | 2018-08-24 | 2020-02-27 | Oracle International Corporation | Dag based methods and systems of transaction processing in a distributed ledger |
US20200084284A1 (en) * | 2018-09-12 | 2020-03-12 | Citrix Systems, Inc. | Systems and methods for integrated service discovery for network applications |
US20200084132A1 (en) * | 2018-09-11 | 2020-03-12 | Citrix Systems, Inc. | Systems and methods for application scripts for cross-domain applications |
US20200092382A1 (en) * | 2018-09-19 | 2020-03-19 | Citrix Systems, Inc. | Systems and methods for maintaining and transferring saas session state |
US20200089898A1 (en) * | 2018-09-19 | 2020-03-19 | Citrix Systems, Inc. | Systems and methods for integrating html based application with embedded browser |
US10599486B1 (en) * | 2018-09-21 | 2020-03-24 | Citrix Systems, Inc. | Systems and methods for intercepting and enhancing SaaS application calls via embedded browser |
US20200099738A1 (en) * | 2018-09-24 | 2020-03-26 | Citrix Systems, Inc. | Systems and methods for bridge protocol between diverse applications |
US20200106760A1 (en) * | 2018-10-01 | 2020-04-02 | Citrix Systems, Inc. | Systems and methods for slogan based sharing of living saas objects |
US20200112436A1 (en) * | 2018-10-09 | 2020-04-09 | Ca, Inc. | Token exchange with client generated token |
US20200112589A1 (en) * | 2018-10-05 | 2020-04-09 | Citrix Systems, Inc. | Systems and methods for responsible intermediation of privacy policies |
US20200120088A1 (en) * | 2018-10-10 | 2020-04-16 | Microsoft Technology Licensing, Llc | Progressive access to data and device functionality |
US20200117489A1 (en) * | 2018-10-11 | 2020-04-16 | Citrix Systems, Inc. | Systems and methods for traffic optimization via system on chip of intermediary device |
US10631068B2 (en) * | 2008-11-26 | 2020-04-21 | Free Stream Media Corp. | Content exposure attribution based on renderings of related content across multiple devices |
US20200137110A1 (en) * | 2015-09-15 | 2020-04-30 | Mimecast Services Ltd. | Systems and methods for threat detection and warning |
US20200145425A1 (en) * | 2018-11-07 | 2020-05-07 | Citrix Systems, Inc. | Systems and methods for continuous authentication |
US20200145385A1 (en) * | 2018-11-07 | 2020-05-07 | Citrix Systems, Inc. | Systems and methods for application pre-launch |
US20200145515A1 (en) * | 2018-11-06 | 2020-05-07 | Citrix Systems, Inc. | Systems and methods for managing downloads from an embedded browser |
US10652225B2 (en) * | 2014-06-30 | 2020-05-12 | International Business Machines Corporation | Queue management and load shedding for complex authentication schemes |
US20200153821A1 (en) * | 2018-11-13 | 2020-05-14 | Mastercard International Incorporated | Systems and methods for facilitating network voice authentication |
US20200153818A1 (en) * | 2018-11-08 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for secure saas redirection from native applications |
US20200153862A1 (en) * | 2018-11-12 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for live saas objects |
US20200150838A1 (en) * | 2018-11-12 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for live tiles for saas |
US20200153920A1 (en) * | 2018-11-14 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for push notification service for saas applications |
US20200153931A1 (en) * | 2018-11-08 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for latency masking via prefix caching |
US20200151348A1 (en) * | 2018-11-08 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for a privacy screen for secure saas applications |
US20200150980A1 (en) * | 2018-11-09 | 2020-05-14 | Citrix Systems, Inc. | Rendering content of service providers via web page having dynamically-loaded plugins |
US20200153911A1 (en) * | 2018-11-09 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for sharing saas content across workspace |
US20200151707A1 (en) * | 2018-11-08 | 2020-05-14 | Paypal, Inc. | Card storage handler for tracking of card data storage across service provider platforms |
US20200162454A1 (en) * | 2018-11-21 | 2020-05-21 | Citrix Systems, Inc. | Self-federation in authentication systems |
US20200160458A1 (en) * | 2018-11-21 | 2020-05-21 | Kony Inc. | System and method for generating actionable intelligence based on platform and community originated data |
US20200162359A1 (en) * | 2018-11-16 | 2020-05-21 | Citrix Systems, Inc. | Systems and methods for checking compatibility of saas apps for different browsers |
US20200162471A1 (en) * | 2018-11-16 | 2020-05-21 | Citrix Systems, Inc. | Systems and methods for securely managing browser plugins via embedded browser |
US20200167341A1 (en) * | 2018-11-26 | 2020-05-28 | Akamai Technologies, Inc. | High performance distributed system of record with hosted origin services |
US20200177589A1 (en) * | 2018-11-30 | 2020-06-04 | International Business Machines Corporation | Automated iot device registration |
US20200184558A1 (en) * | 2018-12-05 | 2020-06-11 | Abaxx Technologies Inc. | System and computer method for trading a commodity with carry costs |
US20200183761A1 (en) * | 2018-12-10 | 2020-06-11 | Mcafee, Llc | Portable hosted content |
US20200193426A1 (en) * | 2018-12-18 | 2020-06-18 | Secude Ag | Method and system for creating and updating an authentic log file for a computer system and transactions |
US20200213336A1 (en) * | 2018-12-26 | 2020-07-02 | International Business Machines Corporation | Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence |
US10708305B2 (en) * | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Automated data processing systems and methods for automatically processing requests for privacy-related information |
US20200219094A1 (en) * | 2019-01-03 | 2020-07-09 | American Express Travel Related Services Co., Inc. | Hybrid identity as a service for decentralized browser based wallets |
US20200228345A1 (en) * | 2019-01-15 | 2020-07-16 | Dell Products L.P. | Self-governed secure attestation policy for server data privacy logs |
US20200228561A1 (en) * | 2015-02-20 | 2020-07-16 | Authentic8, Inc. | Secure application for accessing web resources |
US20200236152A1 (en) * | 2019-01-22 | 2020-07-23 | Apple Inc. | Network system for content playback on multiple devices |
US20200242600A1 (en) * | 2019-01-30 | 2020-07-30 | Bank Of America Corporation | System for leveraged collaborative pre-verification and authentication for secure real-time resource distribution |
US20200244797A1 (en) * | 2019-01-30 | 2020-07-30 | Rapidsos, Inc. | Emergency Data Statistics Aggregation with Data Privacy Protection |
US20200250664A1 (en) * | 2019-02-01 | 2020-08-06 | Oracle International Corporation | Multifactor Authentication Without a User Footprint |
US10742634B1 (en) * | 2011-12-27 | 2020-08-11 | Majid Shahbazi | Methods for single sign-on (SSO) using optical codes |
US20200257700A1 (en) * | 2019-02-08 | 2020-08-13 | Oracle International Corporation | Replication of Resource Type and Schema Metadata for a Multi-Tenant Identity Cloud Service |
US20200265062A1 (en) * | 2019-02-19 | 2020-08-20 | Oracle International Corporation | Tenant Replication Bootstrap for a Multi-Tenant Identity Cloud Service |
US10757104B1 (en) * | 2015-06-29 | 2020-08-25 | Veritas Technologies Llc | System and method for authentication in a computing system |
US20200274717A1 (en) * | 2019-02-24 | 2020-08-27 | Ondefend Holdings, Llc | System And Apparatus For Providing Authenticable Electronic Communication |
US20200274900A1 (en) * | 2019-02-25 | 2020-08-27 | Oracle International Corporation | Automatic API Document Generation From SCIM Metadata |
US10764752B1 (en) * | 2018-08-21 | 2020-09-01 | HYPR Corp. | Secure mobile initiated authentication |
US20200280550A1 (en) * | 2019-02-28 | 2020-09-03 | Nok Nok Labs, Inc. | System and method for endorsing a new authenticator |
US20200287894A1 (en) * | 2019-03-05 | 2020-09-10 | Citrix Systems, Inc. | Pre-authorization for service-to-service requests |
US20200285464A1 (en) * | 2017-06-05 | 2020-09-10 | Umajin Inc. | Location tracking system and methods |
US20200311790A1 (en) * | 2013-04-11 | 2020-10-01 | Brandshield Ltd. | System, Device, and Method of Protected Electronic Commerce and Electronic Financial Transactions |
US20200314623A1 (en) * | 2019-03-29 | 2020-10-01 | Rapidsos, Inc. | Systems and methods for emergency data integration |
US10796016B2 (en) * | 2018-03-28 | 2020-10-06 | Visa International Service Association | Untethered resource distribution and management |
US10798133B2 (en) * | 2016-06-10 | 2020-10-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US20200322342A1 (en) * | 2019-04-06 | 2020-10-08 | International Business Machines Corporation | Identity attribute confidence scoring while certifying authorization claims |
US10824702B1 (en) * | 2019-09-09 | 2020-11-03 | Acceptto Corporation | System and method for continuous passwordless authentication across trusted devices |
US10848523B2 (en) * | 2016-06-10 | 2020-11-24 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10846432B2 (en) * | 2018-09-11 | 2020-11-24 | OneLogin, Inc. | Secure data leak detection |
US20200374324A1 (en) * | 2019-05-20 | 2020-11-26 | Citrix Systems, Inc. | Systems and methods for establishing a channel between multiple devices |
US20200389552A1 (en) * | 2019-06-06 | 2020-12-10 | International Business Machines Corporation | Multi-factor authentication of caller identification (id) identifiers |
US10873606B2 (en) * | 2016-06-10 | 2020-12-22 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US20200402049A1 (en) * | 2015-06-11 | 2020-12-24 | APPI Technologia S/A (D.B.A. MUXI) | Antifraud Resilient Transaction Identifier Datastructure Apparatuses, Methods and Systems |
US20200402052A1 (en) * | 2019-06-20 | 2020-12-24 | Bank Of America Corporation | Edge-node touchless authentication architecture |
US10880340B2 (en) * | 2008-11-26 | 2020-12-29 | Free Stream Media Corp. | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
US20210012334A1 (en) * | 2019-07-12 | 2021-01-14 | Aurus | Payment authentication system for electronic commerce transactions |
US20210014266A1 (en) * | 2019-07-09 | 2021-01-14 | Nice Ltd. | System and method for generating and implementing a real-time multi-factor authentication policy across multiple channels |
US20210021642A1 (en) * | 2019-07-16 | 2021-01-21 | International Business Machines Corporation | Multi-domain blockchain network with data flow control |
US20210019436A1 (en) * | 2019-07-18 | 2021-01-21 | Medox Exchange, Inc. | Communicating content over a communications network |
US10911491B2 (en) * | 2017-11-20 | 2021-02-02 | International Business Machines Corporation | Encryption with sealed keys |
US20210036850A1 (en) * | 2019-07-31 | 2021-02-04 | EMC IP Holding Company LLC | Access controls for question delegation environments |
US20210044976A1 (en) * | 2018-08-21 | 2021-02-11 | HYPR Corp. | Secure mobile initiated authentications to web-services |
US20210056547A1 (en) * | 2019-08-19 | 2021-02-25 | Anchor Labs, Inc. | Cryptoasset custodial system with proof-of-stake blockchain support |
US20210069596A1 (en) * | 2018-11-02 | 2021-03-11 | Google Llc | Systems and methods for providing multi-part persistent content |
US10951606B1 (en) * | 2019-12-04 | 2021-03-16 | Acceptto Corporation | Continuous authentication through orchestration and risk calculation post-authorization system and method |
US20210081252A1 (en) * | 2019-09-13 | 2021-03-18 | Oracle International Corporation | Multi-Tenant Identity Cloud Service with On-Premise Authentication Integration and Bridge High Availability |
US20210081536A1 (en) * | 2018-05-11 | 2021-03-18 | Lattice Semiconductor Corporation | Secure boot systems and methods for programmable logic devices |
US20210081947A1 (en) * | 2019-09-17 | 2021-03-18 | Plaid Inc. | System and method linking to accounts using credential-less authentication |
US20210084031A1 (en) * | 2019-09-13 | 2021-03-18 | Oracle International Corporation | Multi-Tenant Identity Cloud Service with On-Premise Authentication Integration |
US20210090183A1 (en) * | 2019-09-23 | 2021-03-25 | Arthur Ray Kerr | System and method for customizable link between two entities |
US20210091951A1 (en) * | 2019-09-25 | 2021-03-25 | Valimail Inc. | Centralized session key issuance and rotation |
US10977354B1 (en) * | 2018-10-25 | 2021-04-13 | Massachusetts Mutual Life Insurance Company | Authentication device for virtual assistant systems |
US20210110392A1 (en) * | 2019-10-11 | 2021-04-15 | Mastercard International Incorporated | Systems and methods for use in facilitating network messaging |
US20210119785A1 (en) * | 2018-04-18 | 2021-04-22 | 2Key New Economics Ltd. | Decentralized protocol for maintaining cryptographically proven multi-step referral networks |
US11005839B1 (en) * | 2018-03-11 | 2021-05-11 | Acceptto Corporation | System and method to identify abnormalities to continuously measure transaction risk |
US20210141913A1 (en) * | 2019-11-12 | 2021-05-13 | Accenture Global Solutions Limited | System and Method for Management of Policies and User Data during Application Access Sessions |
US20210149855A1 (en) * | 2019-11-15 | 2021-05-20 | Bank Of America Corporation | Conversion mechanism for complex cohabitation databases |
US11017372B2 (en) * | 2014-02-12 | 2021-05-25 | Tencent Technology (Shenzhen) Company Limited | Data interaction method, verification terminal, server, and system |
US20210160231A1 (en) * | 2019-11-22 | 2021-05-27 | Oracle International Corporation | Bulk Multifactor Authentication Enrollment |
US20210166573A1 (en) * | 2019-12-01 | 2021-06-03 | Salesforce.Com, Inc. | Systems and methods for validating localized assessments in an external system |
US20210173916A1 (en) * | 2018-07-24 | 2021-06-10 | Royal Bank Of Canada | Systems and methods for dynamic passphrases |
US11038925B2 (en) * | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US20210182895A1 (en) * | 2019-12-17 | 2021-06-17 | Akamai Technologies, Inc. | High performance distributed system of record with extended transaction processing capability |
US20210194704A1 (en) * | 2019-12-11 | 2021-06-24 | Arris Enterprises Llc | Certificate-based client authentication and authorization for automated interface |
US20210194715A1 (en) * | 2006-12-29 | 2021-06-24 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US20210203648A1 (en) * | 2019-12-27 | 2021-07-01 | Paypal, Inc. | Data input using multi-factor authentication |
US11055119B1 (en) * | 2020-02-26 | 2021-07-06 | International Business Machines Corporation | Feedback responsive interface |
US20210216668A1 (en) * | 2020-01-10 | 2021-07-15 | International Business Machines Corporation | Automated web session timeout enforcement |
US20210226933A1 (en) * | 2020-01-16 | 2021-07-22 | 360 It, Uab | Sharing encrypted items with participants verification |
US20210226987A1 (en) * | 2019-12-31 | 2021-07-22 | Akamai Technologies, Inc. | Edge network-based account protection service |
US20210226951A1 (en) * | 2020-01-22 | 2021-07-22 | Valimail Inc. | Automated authentication and authorization in a communication system |
US20210224357A1 (en) * | 2020-01-19 | 2021-07-22 | Cloudinary Ltd. | System, Device, and Method of Providing Authenticity and Rights Verification Mechanism for Media Content and for its Derived Versions |
US20210232306A1 (en) * | 2018-04-24 | 2021-07-29 | Handheld Community Ltd | A swipe to connect system for providing targeted content to a device |
US20210234868A1 (en) * | 2020-01-23 | 2021-07-29 | Bank Of America Corporation | Sleeper keys |
US11082229B2 (en) * | 2019-03-18 | 2021-08-03 | Capital One Services, Llc | System and method for pre-authentication of customer support calls |
US20210243038A1 (en) * | 2020-02-04 | 2021-08-05 | Valimail Inc. | Spatial broadcasting device authentication |
US20210243027A1 (en) * | 2018-04-20 | 2021-08-05 | Vishal Gupta | Decentralized document and entity verification engine |
US11089107B1 (en) * | 2020-01-31 | 2021-08-10 | Splunk Inc. | Management of connected sensor devices |
US11096059B1 (en) * | 2019-08-04 | 2021-08-17 | Acceptto Corporation | System and method for secure touchless authentication of user paired device, behavior and identity |
US11095506B1 (en) * | 2020-07-22 | 2021-08-17 | Servicenow, Inc. | Discovery of resources associated with cloud operating system |
US11093944B1 (en) * | 2020-04-30 | 2021-08-17 | Capital One Services, Llc | Systems and methods for peer-to-peer identity verification |
US11106515B1 (en) * | 2017-12-28 | 2021-08-31 | Wells Fargo Bank, N.A. | Systems and methods for multi-platform product integration |
US20210273961A1 (en) * | 2020-02-28 | 2021-09-02 | Darktrace Limited | Apparatus and method for a cyber-threat defense system |
US20210281573A1 (en) * | 2020-03-06 | 2021-09-09 | Proxy, Inc | Authorized off-line access methods and apparatus |
US20210279734A1 (en) * | 2018-07-06 | 2021-09-09 | Visa International Service Association | Real time interaction processing system and method |
US11120461B1 (en) * | 2014-11-06 | 2021-09-14 | Capital One Services, Llc | Passive user-generated coupon submission |
US20210306334A1 (en) * | 2020-03-31 | 2021-09-30 | Lendingclub Corporation | Conditionally-deferred authentication steps for tiered authentication |
US20210306344A1 (en) * | 2020-03-31 | 2021-09-30 | Lendingclub Corporation | Dynamically-tiered authentication |
US20210306346A1 (en) * | 2020-03-31 | 2021-09-30 | Lendingclub Corporation | Secure content management through authentication |
US20210318894A1 (en) * | 2020-04-10 | 2021-10-14 | Citrix Systems, Inc. | Remoting user credential information to a remote browser |
US11165789B1 (en) * | 2021-01-28 | 2021-11-02 | Zoom Video Communications, Inc. | Application interaction movement between clients |
US11171939B1 (en) * | 2020-12-01 | 2021-11-09 | Valimail Inc. | Automated device discovery and workflow enrichment |
US11171950B1 (en) * | 2018-03-21 | 2021-11-09 | Pure Storage, Inc. | Secure cloud-based storage system management |
US11173517B2 (en) * | 2006-12-29 | 2021-11-16 | Kip Prod P1 Lp | Display inserts, overlays, and graphical user interfaces for multimedia systems |
US20210367784A1 (en) * | 2019-04-16 | 2021-11-25 | Google Llc | Self-authenticating domain specific browser identifiers |
US20210390551A1 (en) * | 2020-06-15 | 2021-12-16 | Capital One Services, Llc | Intelligent transaction pre-authorization using a browser extension |
US20210398124A1 (en) * | 2018-11-06 | 2021-12-23 | Visa International Service Association | Systems and methods for managing a transaction state object |
US20220006774A1 (en) * | 2020-07-02 | 2022-01-06 | Afilias Limited | System and method for publishing dns records of a domain including either signed or unsigned records |
US20220012795A1 (en) * | 2020-07-10 | 2022-01-13 | Paypal, Inc. | Migration of electronic shopping carts between devices |
US11228620B2 (en) * | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US20220021639A1 (en) * | 2020-07-16 | 2022-01-20 | Afilias Limited | System and method for generating concurrently live and test versions of dns data |
US11240275B1 (en) * | 2017-12-28 | 2022-02-01 | Fireeye Security Holdings Us Llc | Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture |
US20220043902A1 (en) * | 2020-08-04 | 2022-02-10 | International Business Machines Corporation | Verifiable labels for mandatory access control |
US11252149B1 (en) * | 2020-09-30 | 2022-02-15 | Amazon Technologies, Inc. | Resource management techniques for dialog-driven applications |
US20220067138A1 (en) * | 2018-12-31 | 2022-03-03 | Thales Dis France Sa | Method and system for managing access to a service |
US20220086132A1 (en) * | 2018-12-18 | 2022-03-17 | Thales Dis France Sa | Method to monitor sensitive web embedded code authenticity |
US20220101326A1 (en) * | 2019-01-18 | 2022-03-31 | Uppsala Pte. Ltd. | Apparatus and method for cybersecurity |
US11303633B1 (en) * | 2017-08-09 | 2022-04-12 | Sailpoint Technologies, Inc. | Identity security gateway agent |
US20220116345A1 (en) * | 2020-10-13 | 2022-04-14 | Citrix Systems, Inc. | State-sharing plug-in citrix workspace environment |
US11310281B2 (en) * | 2015-08-27 | 2022-04-19 | Mastercard International Incorporated | Systems and methods for monitoring computer authentication procedures |
US11316829B2 (en) * | 2017-05-05 | 2022-04-26 | Royal Bank Of Canada | Distributed memory data repository based defense system |
US20220131845A1 (en) * | 2019-04-30 | 2022-04-28 | Visa International Service Association | Decentralized Processing Of Interactions On Delivery |
US20220172251A1 (en) * | 2020-12-01 | 2022-06-02 | Welect GmbH | System for on-demand advertising |
US20220174061A1 (en) * | 2020-12-01 | 2022-06-02 | Oracle International Corporation | Gradual password rollover |
US20220180461A1 (en) * | 2019-03-28 | 2022-06-09 | Orange | Method for negotiating a contract between two parties in a telecommunications network and devices implementing said method |
US20220191186A1 (en) * | 2020-12-10 | 2022-06-16 | Okta, Inc. | Access to federated identities on a shared kiosk computing device |
US20220191199A1 (en) * | 2020-12-10 | 2022-06-16 | Cisco Technology, Inc. | Cloud delivered access |
US20220198394A1 (en) * | 2020-12-23 | 2022-06-23 | Capital One Services, Llc | Secured data workflow integration and methods thereof |
US11386186B2 (en) * | 2012-09-14 | 2022-07-12 | Sdl Netherlands B.V. | External content library connector systems and methods |
US20220239639A1 (en) * | 2021-01-22 | 2022-07-28 | Dell Products L.P. | Multi-Factor Authentication Methods And Related Systems |
US20220260989A1 (en) * | 2021-02-15 | 2022-08-18 | Argo AI, LLC | System and Method for A Modular and Continually Learning Remote Guidance System for Autonomous Vehicles |
US20220272084A1 (en) * | 2021-02-19 | 2022-08-25 | Lenworth Alexander Hyatt | 5G-WiFi inside secure iris biometrics' login |
US11455641B1 (en) * | 2018-03-11 | 2022-09-27 | Secureauth Corporation | System and method to identify user and device behavior abnormalities to continuously measure transaction risk |
US11503031B1 (en) * | 2015-05-29 | 2022-11-15 | Pure Storage, Inc. | Storage array access control from cloud-based user authorization and authentication |
US11503010B2 (en) * | 2015-09-08 | 2022-11-15 | Plaid Inc. | Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts |
US11537701B2 (en) * | 2020-04-01 | 2022-12-27 | Toyota Motor North America, Inc. | Transport related n-factor authentication |
US11537502B1 (en) * | 2021-11-19 | 2022-12-27 | Bank Of America Corporation | Dynamic system for active detection and mitigation of anomalies in program code construction interfaces |
US11550796B2 (en) * | 2020-12-04 | 2023-01-10 | International Business Machines Corporation | Coexistence mediator for facilitating blockchain transactions |
US20230013371A1 (en) * | 2020-10-29 | 2023-01-19 | Tencent Technology (Shenzhen) Company Limited | Data communication method, apparatus, and device, storage medium, and computer program product |
US20230035278A1 (en) * | 2020-01-07 | 2023-02-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Method to access or manage an operator's voicemail system from a digital assist or smart device |
US11574312B2 (en) * | 2009-05-15 | 2023-02-07 | Visa International Service Association | Secure authentication system and method |
US20230052150A1 (en) * | 2020-02-06 | 2023-02-16 | Hyundai Motor Company | Bootstrap method of electric vehicle charging station |
US11588801B1 (en) * | 2020-03-12 | 2023-02-21 | Amazon Technologies, Inc. | Application-centric validation for electronic resources |
US11604842B1 (en) * | 2014-09-15 | 2023-03-14 | Hubspot, Inc. | Method of enhancing customer relationship management content and workflow |
US11681568B1 (en) * | 2017-08-02 | 2023-06-20 | Styra, Inc. | Method and apparatus to reduce the window for policy violations with minimal consistency assumptions |
US20230199032A1 (en) * | 2021-12-22 | 2023-06-22 | Avaya Management L.P. | Endpoint control over a text channel of a real-time communication session |
US11734032B1 (en) * | 2022-03-31 | 2023-08-22 | Microsoft Technology Licensing, Llc | Virtual desktop switching and communications |
US11757891B1 (en) * | 2019-10-29 | 2023-09-12 | Meta Platforms, Inc. | Using a host application to authorize a user of a client device to perform an action within a guest application |
US11785119B2 (en) * | 2018-10-02 | 2023-10-10 | Google Llc | Cloud-based microservices system |
US20230367833A1 (en) * | 2021-07-26 | 2023-11-16 | Bright Data Ltd. | Emulating Web Browser in a Dedicated Intermediary Box |
US11829335B1 (en) * | 2022-06-15 | 2023-11-28 | VJ Solutions LLC | Using machine learning to provide a single user interface for streamlines deployment and management of multiple types of databases |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12238101B2 (en) * | 2021-03-09 | 2025-02-25 | Oracle International Corporation | Customizing authentication and handling pre and post authentication in identity cloud service |
-
2021
- 2021-03-09 US US17/196,907 patent/US12238101B2/en active Active
Patent Citations (942)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6272538B1 (en) * | 1996-07-30 | 2001-08-07 | Micron Technology, Inc. | Method and system for establishing a security perimeter in computer networks |
US6272639B1 (en) * | 1996-07-30 | 2001-08-07 | Micron Technology, Inc. | Mixed enclave operation in a computer network |
US6918038B1 (en) * | 1996-08-13 | 2005-07-12 | Angel Secure Networks, Inc. | System and method for installing an auditable secure network |
US5918228A (en) * | 1997-01-28 | 1999-06-29 | International Business Machines Corporation | Method and apparatus for enabling a web server to impersonate a user of a distributed file system to obtain secure access to supported web documents |
US6018570A (en) * | 1997-05-12 | 2000-01-25 | Nynex Science And Technology Inc. | Methods and apparatus for regulating the remote ordering, authorization, access and control of services and service features associated with a terminal |
US6339828B1 (en) * | 1997-05-28 | 2002-01-15 | Symantec Corporation | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record |
US6571290B2 (en) * | 1997-06-19 | 2003-05-27 | Mymail, Inc. | Method and apparatus for providing fungible intercourse over a network |
US20020029275A1 (en) * | 1997-06-19 | 2002-03-07 | Thomas Drennan Selgas | Method and apparatus for providing fungible intercourse over a network |
US9935814B2 (en) * | 1997-06-19 | 2018-04-03 | My Mail Ltd. | Method of obtaining a network address |
US8516132B2 (en) * | 1997-06-19 | 2013-08-20 | Mymail, Ltd. | Method of accessing a selected network |
US20110185411A1 (en) * | 1997-06-19 | 2011-07-28 | Thomas Drennan Selgas | Method of obtaining a network address |
US20030195967A1 (en) * | 1997-06-19 | 2003-10-16 | Selgas Thomas Drennan | Method of cost reduction/billing |
US20050172018A1 (en) * | 1997-09-26 | 2005-08-04 | Devine Carol Y. | Integrated customer interface system for communications network management |
US5974566A (en) * | 1997-10-07 | 1999-10-26 | International Business Machines Corporation | Method and apparatus for providing persistent fault-tolerant proxy login to a web-based distributed file service |
US6098093A (en) * | 1998-03-19 | 2000-08-01 | International Business Machines Corp. | Maintaining sessions in a clustered server environment |
US20080270803A1 (en) * | 1998-05-07 | 2008-10-30 | Stephen Zizzi | Biometric Encryption And Decryption |
US6341352B1 (en) * | 1998-10-15 | 2002-01-22 | International Business Machines Corporation | Method for changing a security policy during processing of a transaction request |
US20110162052A1 (en) * | 1998-12-08 | 2011-06-30 | Blake Earl Hayward | Network-Based Verification and Fraud-Prevention System |
US7930411B1 (en) * | 1998-12-08 | 2011-04-19 | Yodlee.Com, Inc. | Network-based verification and fraud-prevention system |
US20060136595A1 (en) * | 1998-12-08 | 2006-06-22 | Ramakrishna Satyavolu | Network-based verification and fraud-prevention system |
US6539093B1 (en) * | 1998-12-31 | 2003-03-25 | International Business Machines Corporation | Key ring organizer for an electronic business using public key infrastructure |
US20020116616A1 (en) * | 1999-01-19 | 2002-08-22 | James Mi | System and method for using internet based caller ID for controlling access to an object stored in a computer |
US6659861B1 (en) * | 1999-02-26 | 2003-12-09 | Reveo, Inc. | Internet-based system for enabling a time-constrained competition among a plurality of participants over the internet |
US20040139327A1 (en) * | 1999-04-13 | 2004-07-15 | Ilumin Corporation | System and method for document-driven processing of digitally-signed electronic documents |
US6377939B1 (en) * | 1999-05-04 | 2002-04-23 | Metratech | Pipelined method and apparatus for processing communication metering data |
US20020198888A1 (en) * | 1999-05-04 | 2002-12-26 | Metratech | Method and apparatus for ordering data processing by multiple processing modules |
US6668322B1 (en) * | 1999-08-05 | 2003-12-23 | Sun Microsystems, Inc. | Access management system and method employing secure credentials |
US7236956B1 (en) * | 1999-10-18 | 2007-06-26 | Stamps.Com | Role assignments in a cryptographic module for secure processing of value-bearing items |
US6978367B1 (en) * | 1999-10-21 | 2005-12-20 | International Business Machines Corporation | Selective data encryption using style sheet processing for decryption by a client proxy |
US20020010684A1 (en) * | 1999-12-07 | 2002-01-24 | Moskowitz Scott A. | Systems, methods and devices for trusted transactions |
US6754829B1 (en) * | 1999-12-14 | 2004-06-22 | Intel Corporation | Certificate-based authentication system for heterogeneous environments |
US20010044787A1 (en) * | 2000-01-13 | 2001-11-22 | Gil Shwartz | Secure private agent for electronic transactions |
US20010032878A1 (en) * | 2000-02-09 | 2001-10-25 | Tsiounis Yiannis S. | Method and system for making anonymous electronic payments on the world wide web |
US20040225716A1 (en) * | 2000-05-31 | 2004-11-11 | Ilan Shamir | Methods and systems for allowing a group of users to interactively tour a computer network |
US6907531B1 (en) * | 2000-06-30 | 2005-06-14 | Internet Security Systems, Inc. | Method and system for identifying, fixing, and updating security vulnerabilities |
US7032110B1 (en) * | 2000-06-30 | 2006-04-18 | Landesk Software Limited | PKI-based client/server authentication |
US20040249927A1 (en) * | 2000-07-17 | 2004-12-09 | David Pezutti | Intelligent network providing network access services (INP-NAS) |
US7181076B1 (en) * | 2000-07-26 | 2007-02-20 | Lockheed Martin Corporation | Wavelet-based data compression using principal components transformation |
US20030041110A1 (en) * | 2000-07-28 | 2003-02-27 | Storymail, Inc. | System, Method and Structure for generating and using a compressed digital certificate |
US20040002902A1 (en) * | 2000-09-01 | 2004-01-01 | Max Muehlhaeuser | System and method for the wireless access of computer-based services in an attributable manner |
US7457948B1 (en) * | 2000-09-29 | 2008-11-25 | Lucent Technologies Inc. | Automated authentication handling system |
US20040254848A1 (en) * | 2000-10-23 | 2004-12-16 | Lior Golan | Transaction system |
US20020071564A1 (en) * | 2000-12-11 | 2002-06-13 | Kurn David Michael | Scalable computer system using password-based private key encryption |
US20020143944A1 (en) * | 2001-01-22 | 2002-10-03 | Traversat Bernard A. | Advertisements for peer-to-peer computing resources |
US20020129088A1 (en) * | 2001-02-17 | 2002-09-12 | Pei-Yuan Zhou | Content-based billing |
US20020199096A1 (en) * | 2001-02-25 | 2002-12-26 | Storymail, Inc. | System and method for secure unidirectional messaging |
US20020196935A1 (en) * | 2001-02-25 | 2002-12-26 | Storymail, Inc. | Common security protocol structure and mechanism and system and method for using |
US20020199001A1 (en) * | 2001-02-25 | 2002-12-26 | Storymail, Inc. | System and method for conducting a secure response communication session |
US20020194501A1 (en) * | 2001-02-25 | 2002-12-19 | Storymail, Inc. | System and method for conducting a secure interactive communication session |
US20020194483A1 (en) * | 2001-02-25 | 2002-12-19 | Storymail, Inc. | System and method for authorization of access to a resource |
US20020178360A1 (en) * | 2001-02-25 | 2002-11-28 | Storymail, Inc. | System and method for communicating a secure unidirectional response message |
US20020165912A1 (en) * | 2001-02-25 | 2002-11-07 | Storymail, Inc. | Secure certificate and system and method for issuing and using same |
US7322040B1 (en) * | 2001-03-27 | 2008-01-22 | Microsoft Corporation | Authentication architecture |
US20020144109A1 (en) * | 2001-03-29 | 2002-10-03 | International Business Machines Corporation | Method and system for facilitating public key credentials acquisition |
US7792948B2 (en) * | 2001-03-30 | 2010-09-07 | Bmc Software, Inc. | Method and system for collecting, aggregating and viewing performance data on a site-wide basis |
US7461369B2 (en) * | 2001-03-30 | 2008-12-02 | Bmc Software, Inc. | Java application response time analyzer |
US7506047B2 (en) * | 2001-03-30 | 2009-03-17 | Bmc Software, Inc. | Synthetic transaction monitor with replay capability |
US20040176071A1 (en) * | 2001-05-08 | 2004-09-09 | Christian Gehrmann | Secure remote subscription module access |
US20040249768A1 (en) * | 2001-07-06 | 2004-12-09 | Markku Kontio | Digital rights management in a mobile communications environment |
US7293096B1 (en) * | 2001-09-28 | 2007-11-06 | Cisco Technology, Inc. | Maintaining a common AAA session id for a call over a network |
US20030065921A1 (en) * | 2001-09-28 | 2003-04-03 | Chang Kae-Por F. | Authority-neutral certification for multiple-authority PKI environments |
US7181620B1 (en) * | 2001-11-09 | 2007-02-20 | Cisco Technology, Inc. | Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach |
US20030115267A1 (en) * | 2001-12-19 | 2003-06-19 | International Business Machines Corporation | System and method for user enrollment in an e-community |
US20040088333A1 (en) * | 2002-01-25 | 2004-05-06 | David Sidman | Apparatus method and system for tracking information access |
US10559193B2 (en) * | 2002-02-01 | 2020-02-11 | Comcast Cable Communications, Llc | Premises management systems |
US20110209210A1 (en) * | 2002-02-19 | 2011-08-25 | Miller Lawrence R | System and Method for Single Sign-On Session Management Without Central Server |
US20030163733A1 (en) * | 2002-02-28 | 2003-08-28 | Ericsson Telefon Ab L M | System, method and apparatus for federated single sign-on services |
US20030195858A1 (en) * | 2002-04-10 | 2003-10-16 | Fujio Watanabe | Distributed information storage, authentication and authorization system |
US20030196080A1 (en) * | 2002-04-16 | 2003-10-16 | Izecom B.V. | Secure communication via the internet |
US20040054899A1 (en) * | 2002-08-30 | 2004-03-18 | Xerox Corporation | Apparatus and methods for providing secured communication |
US20040098581A1 (en) * | 2002-08-30 | 2004-05-20 | Xerox Corporation | Method and apparatus for establishing and using a secure credential infrastructure |
US20040107366A1 (en) * | 2002-08-30 | 2004-06-03 | Xerox Corporation | Method, apparatus, and program product for automatically provisioning secure network elements |
US7665125B2 (en) * | 2002-09-23 | 2010-02-16 | Heard Robert W | System and method for distribution of security policies for mobile devices |
US7921210B1 (en) * | 2002-10-01 | 2011-04-05 | Cisco Technology, Inc. | Policy system throttling and load balancing |
US8805980B1 (en) * | 2002-11-01 | 2014-08-12 | Cisco Technology, Inc. | Accounting for policy enforcement decisions in radius systems |
US20060155985A1 (en) * | 2002-11-14 | 2006-07-13 | France Telecom | Method and system with authentication, revocable anonymity and non-repudiation |
US20040123144A1 (en) * | 2002-12-19 | 2004-06-24 | International Business Machines Corporation | Method and system for authentication using forms-based single-sign-on operations |
US20040242228A1 (en) * | 2003-01-14 | 2004-12-02 | Samsung Electronics Co., Ltd. | Method for fast roaming in a wireless network |
US20040221163A1 (en) * | 2003-05-02 | 2004-11-04 | Jorgensen Jimi T. | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
US20040243349A1 (en) * | 2003-05-30 | 2004-12-02 | Segue Software, Inc. | Method of non-intrusive analysis of secure and non-secure web application traffic in real-time |
US20070038862A1 (en) * | 2003-06-04 | 2007-02-15 | Noble Gary P | Method and system for controlling the disclosure time of information |
US9466054B1 (en) * | 2003-06-05 | 2016-10-11 | Intertrust Technologies Corporation | Interoperable systems and methods for peer-to-peer service orchestration |
US20040268119A1 (en) * | 2003-06-24 | 2004-12-30 | Palo Alto Research Center, Incorporated | Method, apparatus, and program product for securely presenting situation information |
US20050071630A1 (en) * | 2003-08-15 | 2005-03-31 | Imcentric, Inc. | Processing apparatus for monitoring and renewing digital certificates |
US20190005508A1 (en) * | 2003-09-30 | 2019-01-03 | Nokia Technologies Oy | Active ticket with dynamic characteristic such as appearance with various validation options |
US20050076216A1 (en) * | 2003-10-01 | 2005-04-07 | Nokia Corporation | Method for securing a communication |
US20050100166A1 (en) * | 2003-11-10 | 2005-05-12 | Parc Inc. | Systems and methods for authenticating communications in a network medium |
US20050114545A1 (en) * | 2003-11-20 | 2005-05-26 | International Business Machines Corporation | Method and apparatus for marking of web pages |
US20060104234A1 (en) * | 2003-12-08 | 2006-05-18 | Huawei Technologies Co., Ltd. | Method for establishment of a service tunnel in a WLAN |
US20050125669A1 (en) * | 2003-12-08 | 2005-06-09 | Palo Alto Research Center Incorporated | Method and apparatus for using a secure credential infrastructure to access vehicle components |
US20050129240A1 (en) * | 2003-12-15 | 2005-06-16 | Palo Alto Research Center Incorporated | Method and apparatus for establishing a secure ad hoc command structure |
US20050135624A1 (en) * | 2003-12-19 | 2005-06-23 | Ya-Hsang Tsai | System and method for pre-authentication across wireless local area networks (WLANS) |
US20070208936A1 (en) * | 2003-12-29 | 2007-09-06 | Luis Ramos Robles | Means and Method for Single Sign-On Access to a Service Network Through an Access Network |
US20050163078A1 (en) * | 2004-01-22 | 2005-07-28 | Toshiba America Research, Inc. | Mobility architecture using pre-authentication, pre-configuration and/or virtual soft-handoff |
US20050166041A1 (en) * | 2004-01-23 | 2005-07-28 | Gridlron Software, Inc. | Authentication in a distributed computing environment |
US20060031510A1 (en) * | 2004-01-26 | 2006-02-09 | Forte Internet Software, Inc. | Methods and apparatus for enabling a dynamic network of interactors according to personal trust levels between interactors |
US20050184145A1 (en) * | 2004-02-05 | 2005-08-25 | Simon Law | Secure wireless authorization system |
US20050177723A1 (en) * | 2004-02-10 | 2005-08-11 | Industrial Technology Research Institute | SIM-based authentication method capable of supporting inter-AP fast handover |
US20050193118A1 (en) * | 2004-02-27 | 2005-09-01 | Wyse Technology Inc. | Session manager for secured remote computing |
US20050204168A1 (en) * | 2004-03-10 | 2005-09-15 | Keith Johnston | System and method for double-capture/double-redirect to a different location |
US20070214454A1 (en) * | 2004-03-10 | 2007-09-13 | Handmark, Inc. | Data Access Architecture |
US20070198674A1 (en) * | 2004-03-12 | 2007-08-23 | Jun Li | Automated Remote Site Downloading On A Geographic Drive |
US8325625B2 (en) * | 2004-03-23 | 2012-12-04 | Smith Micro Software, Inc. | Method and system for automatic data transfer on a network-connected device |
US20050235044A1 (en) * | 2004-04-20 | 2005-10-20 | Tazuma Stanley K | Apparatus and methods relating to web browser redirection |
US20070261108A1 (en) * | 2004-06-14 | 2007-11-08 | Matsushita Electric Industrial Co., Ltd. | Service Method and Apparatus by Granting Authorization Before Authentication |
US20090055642A1 (en) * | 2004-06-21 | 2009-02-26 | Steven Myers | Method, system and computer program for protecting user credentials against security attacks |
US8601550B2 (en) * | 2004-06-24 | 2013-12-03 | Aventail Llc | Remote access to resources over a network |
US20060031494A1 (en) * | 2004-06-28 | 2006-02-09 | Marcus Jane B | Method and system for providing single sign-on user names for Web cookies in a multiple user information directory environment |
US20060041759A1 (en) * | 2004-07-02 | 2006-02-23 | Rsa Security, Inc. | Password-protection module |
US20060021017A1 (en) * | 2004-07-21 | 2006-01-26 | International Business Machines Corporation | Method and system for establishing federation relationships through imported configuration files |
US20060187858A1 (en) * | 2004-11-05 | 2006-08-24 | Taniuchi Kenichi | Network discovery mechanisms |
US20060146803A1 (en) * | 2004-11-26 | 2006-07-06 | Samsung Electronics Co., Ltd. | System and method for seamless handoff of WLAN-UMTS interworking |
US20110251992A1 (en) * | 2004-12-02 | 2011-10-13 | Desktopsites Inc. | System and method for launching a resource in a network |
US9043883B2 (en) * | 2004-12-13 | 2015-05-26 | Alcatel Lucent | Secure authentication advertisement protocol |
US20060136990A1 (en) * | 2004-12-16 | 2006-06-22 | Hinton Heather M | Specializing support for a federation relationship |
US20060165083A1 (en) * | 2004-12-20 | 2006-07-27 | Lg Electronics Inc. | Multimedia access system |
US20070204155A1 (en) * | 2005-02-04 | 2007-08-30 | Toshiba America Research, Inc. | Framework of Media-Independent Pre-Authentication |
US20060179307A1 (en) * | 2005-02-04 | 2006-08-10 | Cisco Technology, Inc. | Method and system for inter-subnet pre-authentication |
US20060176852A1 (en) * | 2005-02-04 | 2006-08-10 | Industrial Technology Research Institute | System and method for connection handover in a virtual private network |
US20060185004A1 (en) * | 2005-02-11 | 2006-08-17 | Samsung Electronics Co., Ltd. | Method and system for single sign-on in a network |
US20070064673A1 (en) * | 2005-03-10 | 2007-03-22 | Nehru Bhandaru | Flexible, scalable, wireless data forwarding and mobility for secure wireless networks |
US20090028101A1 (en) * | 2005-03-15 | 2009-01-29 | Nec Corporation | Authentication method in a radio communication system, a radio terminal device and radio base station using the method, a radio communication system using them, and a program thereof |
US20060224686A1 (en) * | 2005-03-30 | 2006-10-05 | Hiroshi Kitada | System and method for managing documents with multiple network applications |
US20070174467A1 (en) * | 2005-04-11 | 2007-07-26 | Lastmile Communications Limited | Communications network |
US20060239235A1 (en) * | 2005-04-25 | 2006-10-26 | Cisco Technology, Inc. | Authorizing a mobile node for service |
US20060248198A1 (en) * | 2005-04-29 | 2006-11-02 | Galin Galchev | Flexible failover configuration |
US20060248036A1 (en) * | 2005-04-29 | 2006-11-02 | Georgi Stanev | Internal persistence of session state information |
US20060248199A1 (en) * | 2005-04-29 | 2006-11-02 | Georgi Stanev | Shared closure persistence of session state information |
US20060248200A1 (en) * | 2005-04-29 | 2006-11-02 | Georgi Stanev | Shared memory implementations for session data within a multi-tiered enterprise network |
US20060248119A1 (en) * | 2005-04-29 | 2006-11-02 | Georgi Stanev | External persistence of session state information |
US20060248350A1 (en) * | 2005-04-29 | 2006-11-02 | Georgi Stanev | Persistent storage implementations for session data within a multi-tiered enterprise network |
US20060277596A1 (en) * | 2005-06-06 | 2006-12-07 | Calvert Peter S | Method and system for multi-instance session support in a load-balanced environment |
US8266327B2 (en) * | 2005-06-21 | 2012-09-11 | Cisco Technology, Inc. | Identity brokering in a network element |
US20070005801A1 (en) * | 2005-06-21 | 2007-01-04 | Sandeep Kumar | Identity brokering in a network element |
US20060294366A1 (en) * | 2005-06-23 | 2006-12-28 | International Business Machines Corp. | Method and system for establishing a secure connection based on an attribute certificate having user credentials |
US20070022292A1 (en) * | 2005-07-19 | 2007-01-25 | The Go Daddy Group, Inc. | Receiving encrypted emails via a web-based email system |
US7912906B2 (en) * | 2005-07-19 | 2011-03-22 | The Go Daddy Group, Inc. | Generating PKI email accounts on a web-based email system |
US20070061869A1 (en) * | 2005-07-25 | 2007-03-15 | Dehaas Ronald J | Access of Internet use for a selected user |
US20070049335A1 (en) * | 2005-08-08 | 2007-03-01 | Robert Haitani | Operating multiple views on a computing device in connection with a wireless communication session |
US20100299525A1 (en) * | 2005-08-10 | 2010-11-25 | Riverbed Technology, Inc. | Method and apparatus for split-terminating a secure network connection, with client authentication |
US20070055781A1 (en) * | 2005-09-06 | 2007-03-08 | Christian Fleischer | Connection manager capable of supporting both distributed computing sessions and non distributed computing sessions |
US20080212771A1 (en) * | 2005-10-05 | 2008-09-04 | Privasphere Ag | Method and Devices For User Authentication |
US20070082656A1 (en) * | 2005-10-11 | 2007-04-12 | Cisco Technology, Inc. | Method and system for filtered pre-authentication and roaming |
US20070185814A1 (en) * | 2005-10-18 | 2007-08-09 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
US20070101145A1 (en) * | 2005-10-31 | 2007-05-03 | Axalto Inc. | Framework for obtaining cryptographically signed consent |
US20070106897A1 (en) * | 2005-11-07 | 2007-05-10 | Michael Kulakowski | Secure RFID authentication system |
US7590687B2 (en) * | 2005-11-17 | 2009-09-15 | Bea Systems, Inc. | System and method for providing notifications in a communities framework |
US20090119754A1 (en) * | 2006-02-03 | 2009-05-07 | Mideye Ab | System, an Arrangement and a Method for End User Authentication |
US20070204078A1 (en) * | 2006-02-09 | 2007-08-30 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
US20170039282A1 (en) * | 2006-03-01 | 2017-02-09 | Oracle International Corporation | Flexible authentication framework |
US20090328187A1 (en) * | 2006-03-03 | 2009-12-31 | Art of Defense GmBHBruderwohrdstrasse | Distributed web application firewall |
US20070213033A1 (en) * | 2006-03-10 | 2007-09-13 | Samsung Electronics Co., Ltd. | Method and apparatus for authenticating mobile terminal on handover |
US20090037514A1 (en) * | 2006-03-18 | 2009-02-05 | Peter Lankford | System And Method For Integration Of Streaming And Static Data |
US20070234408A1 (en) * | 2006-03-31 | 2007-10-04 | Novell, Inc. | Methods and systems for multifactor authentication |
US20090235069A1 (en) * | 2006-04-10 | 2009-09-17 | Trust Integration Services B.V. | Arrangement of and method for secure data transmission |
US20140020083A1 (en) * | 2006-05-17 | 2014-01-16 | Richard Fetik | Customizable Storage Controller With Integrated F+ Storage Firewall Protection |
US10180809B2 (en) * | 2006-05-17 | 2019-01-15 | Richard Fetik | Secure application acceleration system, methods and apparatus |
US9455955B2 (en) * | 2006-05-17 | 2016-09-27 | Richard Fetik | Customizable storage controller with integrated F+ storage firewall protection |
US20170206034A1 (en) * | 2006-05-17 | 2017-07-20 | Richard Fetik | Secure Application Acceleration System, Methods and Apparatus |
US20070297430A1 (en) * | 2006-05-19 | 2007-12-27 | Nokia Corporation | Terminal reachability |
US20090147957A1 (en) * | 2006-05-22 | 2009-06-11 | Nxp B.V. | Secure internet transaction method and apparatus |
US8615787B2 (en) * | 2006-05-22 | 2013-12-24 | Nxp B.V. | Secure internet transaction method and apparatus |
US20070294752A1 (en) * | 2006-06-01 | 2007-12-20 | Novell, Inc. | Single sign on with proxy services |
US20070282757A1 (en) * | 2006-06-02 | 2007-12-06 | Microsoft Corporation | Logon and machine unlock integration |
US20080002653A1 (en) * | 2006-06-13 | 2008-01-03 | Accton Technology Corporation | Method of connecting a new discovered AP by early 4-way handshaking |
US8351327B1 (en) * | 2006-08-28 | 2013-01-08 | Juniper Networks, Inc. | Intermediate network device applying application-layer quality of service to channels within a communication session |
US20190327135A1 (en) * | 2006-09-25 | 2019-10-24 | Remot3.It, Inc. | System, method and computer program product for accessing a device on a network |
US11184224B2 (en) * | 2006-09-25 | 2021-11-23 | Remot3.It, Inc. | System, method and compute program product for accessing a device on a network |
US20080092215A1 (en) * | 2006-09-25 | 2008-04-17 | Nortel Networks Limited | System and method for transparent single sign-on |
US20180262388A1 (en) * | 2006-09-25 | 2018-09-13 | Weaved, Inc. | Remote device deployment |
US9231911B2 (en) * | 2006-10-16 | 2016-01-05 | Aruba Networks, Inc. | Per-user firewall |
US20080109553A1 (en) * | 2006-11-08 | 2008-05-08 | Brian Fowler | System and method for reducing click fraud |
US20080132235A1 (en) * | 2006-11-30 | 2008-06-05 | Motorola, Inc. | Method to Facilitate Pre-Provisioning a Wireless Access Point With a One-Time Password to Facilitate Authorized Handoffs for a Given Communication Session |
US20080134306A1 (en) * | 2006-12-04 | 2008-06-05 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for fast handover and authentication in a packet data network |
US8467290B2 (en) * | 2006-12-26 | 2013-06-18 | Ciena Corporation | Methods and systems for distributed authentication and caching for internet protocol multimedia subsystem and other session initiation protocol systems |
US20210194715A1 (en) * | 2006-12-29 | 2021-06-24 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US11173517B2 (en) * | 2006-12-29 | 2021-11-16 | Kip Prod P1 Lp | Display inserts, overlays, and graphical user interfaces for multimedia systems |
US20100250497A1 (en) * | 2007-01-05 | 2010-09-30 | Redlich Ron M | Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor |
US8655939B2 (en) * | 2007-01-05 | 2014-02-18 | Digital Doors, Inc. | Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor |
US20090007248A1 (en) * | 2007-01-18 | 2009-01-01 | Michael Kovaleski | Single sign-on system and method |
US20080222299A1 (en) * | 2007-03-07 | 2008-09-11 | Trusteer Ltd. | Method for preventing session token theft |
US20080271120A1 (en) * | 2007-04-23 | 2008-10-30 | 1020, Inc. | Network Pre-Authentication |
US8695074B2 (en) * | 2007-04-26 | 2014-04-08 | Microsoft Corporation | Pre-authenticated calling for voice applications |
US20080271121A1 (en) * | 2007-04-27 | 2008-10-30 | Heather Maria Hinton | External user lifecycle management for federated environments |
US20080282327A1 (en) * | 2007-05-11 | 2008-11-13 | Cisco Technology, Inc. | Network authorization status notification |
US20080310366A1 (en) * | 2007-06-08 | 2008-12-18 | Toshiba America Research, Inc | MIH Pre-Authentication |
US20080307506A1 (en) * | 2007-06-11 | 2008-12-11 | Anil Saldhana | Authorization framework |
US20090037544A1 (en) * | 2007-07-30 | 2009-02-05 | International Business Machines Corporation | Method to provide assistant role in instant message software |
US20090064088A1 (en) * | 2007-08-28 | 2009-03-05 | Roland Barcia | Method and system for displaying http session entry and exit points |
US20090064102A1 (en) * | 2007-08-28 | 2009-03-05 | International Business Machines Corporation | Method and system for navigationally displaying http session entry and exit points |
US20100091733A1 (en) * | 2007-10-17 | 2010-04-15 | Gene Beck Hahn | Method for handover between heterogenous radio access networks |
US8516566B2 (en) * | 2007-10-25 | 2013-08-20 | Apple Inc. | Systems and methods for using external authentication service for Kerberos pre-authentication |
US20090119364A1 (en) * | 2007-11-07 | 2009-05-07 | Oberthur Technologies | Method and system for exchange of data between remote servers |
US20100257582A1 (en) * | 2007-11-19 | 2010-10-07 | David Castellanos Zamora | Pre-authorization of bearer set-up |
US20090150989A1 (en) * | 2007-12-07 | 2009-06-11 | Pistolstar, Inc. | User authentication |
US20100198730A1 (en) * | 2007-12-21 | 2010-08-05 | Ahmed Zahid N | System and method for securing tenant data on a local appliance prior to delivery to a SaaS data center hosted application service |
US20090186601A1 (en) * | 2008-01-09 | 2009-07-23 | Lg Electronics Inc. | Pre-authentication method for inter-rat handover |
US20090222905A1 (en) * | 2008-02-28 | 2009-09-03 | Hoon Choi | Method, apparatus, and system for pre-authentication and processing of data streams |
US20090240936A1 (en) * | 2008-03-20 | 2009-09-24 | Mark Lambiase | System and method for storing client-side certificate credentials |
US20140013394A1 (en) * | 2008-03-27 | 2014-01-09 | Mcafee, Inc. | System, method, and computer program product for a pre-deactivation grace period |
US8261093B1 (en) * | 2008-03-27 | 2012-09-04 | Mcafee, Inc. | System, method, and computer program product for disabling a communication channel during authentication |
US20090259838A1 (en) * | 2008-04-15 | 2009-10-15 | Authenex, Inc. | Hardware-Bonded Credential Manager Method and System |
US20110066849A1 (en) * | 2008-04-30 | 2011-03-17 | Nec Europe, Ltd. | Method and system for verifying the identity of a communication partner |
US20090276667A1 (en) * | 2008-05-02 | 2009-11-05 | Microsoft Corporation | Session Broker Extensibility Application Program Interface |
US20090319776A1 (en) * | 2008-05-16 | 2009-12-24 | Lloyd Leon Burch | Techniques for secure network communication |
US20090307496A1 (en) * | 2008-06-03 | 2009-12-10 | Lg Electronics Inc. | Method of deriving and updating traffic encryption key |
US20110107099A1 (en) * | 2008-06-25 | 2011-05-05 | Yunbo Pan | Pre-authentication method, authentication system and authentication apparatus |
US20100005168A1 (en) * | 2008-07-03 | 2010-01-07 | Ebay Inc. | Systems and methods for unification of local and remote resources over a network |
US20100030862A1 (en) * | 2008-07-31 | 2010-02-04 | International Business Machines Corporation | Testing a network system |
US8966250B2 (en) * | 2008-09-08 | 2015-02-24 | Salesforce.Com, Inc. | Appliance, system, method and corresponding software components for encrypting and processing data |
US20130067225A1 (en) * | 2008-09-08 | 2013-03-14 | Ofer Shochet | Appliance, system, method and corresponding software components for encrypting and processing data |
US20100088698A1 (en) * | 2008-10-03 | 2010-04-08 | Ravishankar Krishnamurthy | Techniques for managing communication sessions |
US20100131654A1 (en) * | 2008-11-25 | 2010-05-27 | Microsoft Corporation | Platform for enabling terminal services virtualization |
US10631068B2 (en) * | 2008-11-26 | 2020-04-21 | Free Stream Media Corp. | Content exposure attribution based on renderings of related content across multiple devices |
US9838758B2 (en) * | 2008-11-26 | 2017-12-05 | David Harrison | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
US10880340B2 (en) * | 2008-11-26 | 2020-12-29 | Free Stream Media Corp. | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
US9703947B2 (en) * | 2008-11-26 | 2017-07-11 | Free Stream Media Corp. | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
US20150073807A1 (en) * | 2008-12-04 | 2015-03-12 | At&T Intellectual Property I, L.P. | System and metod for voice authentication over a computer network |
US20100174900A1 (en) * | 2008-12-19 | 2010-07-08 | Lin Paul Y | Method and apparatus for authenticating online transactions using a browser |
US20120005731A1 (en) * | 2008-12-29 | 2012-01-05 | Samsung Electronics Co., Ltd. | Handover method of mobile terminal between heterogeneous networks |
US20100198712A1 (en) * | 2009-02-02 | 2010-08-05 | Trustifi, Inc. | Certified Email System and Method |
US8374930B2 (en) * | 2009-02-02 | 2013-02-12 | Trustifi Corporation | Certified email system and method |
US20150326559A1 (en) * | 2009-02-03 | 2015-11-12 | Inbay Technologies Inc. | Method and system for authorizing secure electronic transactions using a security device |
US20120011576A1 (en) * | 2009-03-18 | 2012-01-12 | Huawei Technologies Co., Ltd. | Method, device, and system for pre-authentication |
US8966374B1 (en) * | 2009-03-30 | 2015-02-24 | Glance Networks, Inc. | Method and apparatus for enabling participants to assume control over a presentation in a remote viewing session |
US20100257451A1 (en) * | 2009-04-05 | 2010-10-07 | Hbr Labs Inc. | System and method for synchronizing collaborative web applications |
US20100263032A1 (en) * | 2009-04-08 | 2010-10-14 | Krishna Bhuyan | Web to IMS Registration and Authentication for an Unmanaged IP Client Device |
US20120017088A1 (en) * | 2009-04-08 | 2012-01-19 | Zte Corporation | Wireless local area network terminal pre-authentication method and wireless local area network system |
US11574312B2 (en) * | 2009-05-15 | 2023-02-07 | Visa International Service Association | Secure authentication system and method |
US20100313014A1 (en) * | 2009-06-04 | 2010-12-09 | General Instrument Corporation | Downloadable security based on certificate status |
US8498618B2 (en) * | 2009-06-22 | 2013-07-30 | Mourad Ben Ayed | Systems for intelligent authentication based on proximity |
US20110215921A1 (en) * | 2009-06-22 | 2011-09-08 | Mourad Ben Ayed | Systems for wireless authentication based on bluetooth proximity |
US20110035294A1 (en) * | 2009-08-04 | 2011-02-10 | Authernative, Inc. | Multi-tier transaction processing method and payment system in m- and e- commerce |
US20110055573A1 (en) * | 2009-09-03 | 2011-03-03 | International Business Machines Corporation | Supporting flexible use of smart cards with web applications |
US20120204231A1 (en) * | 2009-10-19 | 2012-08-09 | Nokia Corporation | User identity management for permitting interworking of a bootstrapping architecture and a shared identity service |
US8448170B2 (en) * | 2009-11-25 | 2013-05-21 | Novell, Inc. | System and method for providing annotated service blueprints in an intelligent workload management system |
US20110126207A1 (en) * | 2009-11-25 | 2011-05-26 | Novell, Inc. | System and method for providing annotated service blueprints in an intelligent workload management system |
US20110238988A1 (en) * | 2010-01-25 | 2011-09-29 | Yu Tanaka | Appliance authentication system, and method of controlling power supply |
US20120300937A1 (en) * | 2010-01-29 | 2012-11-29 | Trevor Burbridge | Access control |
US20110208657A1 (en) * | 2010-02-19 | 2011-08-25 | Bindu Rama Rao | Mobile monetary transactions and banking for rural populations |
US20110214176A1 (en) * | 2010-02-27 | 2011-09-01 | Lloyd Leon Burch | Techniques for secure access management in virtual environments |
US9342661B2 (en) * | 2010-03-02 | 2016-05-17 | Time Warner Cable Enterprises Llc | Apparatus and methods for rights-managed content and data delivery |
US8875285B2 (en) * | 2010-03-24 | 2014-10-28 | Microsoft Corporation | Executable code validation in a web browser |
US20110239270A1 (en) * | 2010-03-26 | 2011-09-29 | Nokia Corporation | Method and apparatus for providing heterogeneous security management |
US20110265172A1 (en) * | 2010-04-26 | 2011-10-27 | Research In Motion Limited | Method and system for third party client authentication |
US20110296440A1 (en) * | 2010-05-28 | 2011-12-01 | Security First Corp. | Accelerator system for use with secure data storage |
US8601498B2 (en) * | 2010-05-28 | 2013-12-03 | Security First Corp. | Accelerator system for use with secure data storage |
US20110295988A1 (en) * | 2010-05-28 | 2011-12-01 | Le Jouan Herve | Managing data on computer and telecommunications networks |
US10621377B2 (en) * | 2010-05-28 | 2020-04-14 | Privowny, Inc. | Managing data on computer and telecommunications networks |
US20110314532A1 (en) * | 2010-06-17 | 2011-12-22 | Kyle Dean Austin | Identity provider server configured to validate authentication requests from identity broker |
US20130326075A1 (en) * | 2010-06-23 | 2013-12-05 | Microsoft Corporation | Handling of a Communication Session |
US20120011578A1 (en) * | 2010-07-08 | 2012-01-12 | International Business Machines Corporation | Cross-protocol federated single sign-on (F-SSO) for cloud enablement |
US9560036B2 (en) * | 2010-07-08 | 2017-01-31 | International Business Machines Corporation | Cross-protocol federated single sign-on (F-SSO) for cloud enablement |
US20130238903A1 (en) * | 2010-07-09 | 2013-09-12 | Takeshi Mizunuma | Service provision method |
US9122851B2 (en) * | 2010-08-02 | 2015-09-01 | 3 Fish Limited | Identity assessment method and system |
US20130133048A1 (en) * | 2010-08-02 | 2013-05-23 | 3Fish Limited | Identity assessment method and system |
US20120042358A1 (en) * | 2010-08-10 | 2012-02-16 | DevSquare Inc. | Proctoring System |
US20120143752A1 (en) * | 2010-08-12 | 2012-06-07 | Mastercard International, Inc. | Multi-commerce channel wallet for authenticated transactions |
US10460319B2 (en) * | 2010-08-12 | 2019-10-29 | Mastercard International Incorporated | Multi-commerce channel wallet for authenticated transactions |
US20120054625A1 (en) * | 2010-08-30 | 2012-03-01 | Vmware, Inc. | Unified workspace for thin, remote, and saas applications |
US8990699B2 (en) * | 2010-08-30 | 2015-03-24 | Vmware, Inc. | Unified workspace for thin, remote, and SaaS applications |
US8590014B1 (en) * | 2010-09-13 | 2013-11-19 | Zynga Inc. | Network application security utilizing network-provided identities |
US20140040987A1 (en) * | 2010-09-13 | 2014-02-06 | Zynga Inc. | Network Application Security Utilizing Network-Provided Identities |
US20120185911A1 (en) * | 2010-09-30 | 2012-07-19 | Khandys Polite | Mlweb: a multilevel web application framework |
US20120089659A1 (en) * | 2010-10-06 | 2012-04-12 | Hbr Labs Inc. | System and method for synchronizing collaborative form filling |
US20130318347A1 (en) * | 2010-10-08 | 2013-11-28 | Brian Lee Moffat | Private data sharing system |
US9397983B2 (en) * | 2010-10-08 | 2016-07-19 | Brian Lee Moffat | Private data sharing system |
US20120096271A1 (en) * | 2010-10-15 | 2012-04-19 | Microsoft Corporation | Remote Access to Hosted Virtual Machines By Enterprise Users |
US20140244998A1 (en) * | 2010-11-09 | 2014-08-28 | Secure64 Software Corporation | Secure publishing of public-key certificates |
US20120124369A1 (en) * | 2010-11-09 | 2012-05-17 | Jose Castejon Amenedo | Secure publishing of public-key certificates |
US20140162598A1 (en) * | 2010-11-17 | 2014-06-12 | Antony-Euclid C. Villa-Real | Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true- personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions |
US20120131647A1 (en) * | 2010-11-19 | 2012-05-24 | Lan Gang Tiger | System and Methods for Facilitating Secure Communications on a Website |
US8453218B2 (en) * | 2010-11-19 | 2013-05-28 | Reputation.com | System and methods for facilitating secure communications on a website |
US20150205957A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating between a legitimate user and a cyber-attacker |
US20190342329A1 (en) * | 2010-11-29 | 2019-11-07 | Biocatch Ltd. | System, Method, and Device of Authenticating a User based on Selfie Image or Selfie Video |
US9703953B2 (en) * | 2010-11-29 | 2017-07-11 | Biocatch Ltd. | Method, device, and system of differentiating among users based on user classification |
US10917431B2 (en) * | 2010-11-29 | 2021-02-09 | Biocatch Ltd. | System, method, and device of authenticating a user based on selfie image or selfie video |
US10834590B2 (en) * | 2010-11-29 | 2020-11-10 | Biocatch Ltd. | Method, device, and system of differentiating between a cyber-attacker and a legitimate user |
US9418221B2 (en) * | 2010-11-29 | 2016-08-16 | Biocatch Ltd. | Method, device, and system of differentiating among users based on responses to injected interferences |
US20180160309A1 (en) * | 2010-11-29 | 2018-06-07 | Biocatch Ltd. | Method, device, and system of differentiating between a cyber-attacker and a legitimate user |
US9536071B2 (en) * | 2010-11-29 | 2017-01-03 | Biocatch Ltd. | Method, device, and system of differentiating among users based on platform configurations |
US20150213251A1 (en) * | 2010-11-29 | 2015-07-30 | Biocatch Ltd. | Method, device, and system of protecting a log-in process of a computerized service |
US20150213246A1 (en) * | 2010-11-29 | 2015-07-30 | Biocatch Ltd. | Method, device, and system of generating fraud-alerts for cyber-attacks |
US20150205944A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating among users based on platform configurations |
US9552470B2 (en) * | 2010-11-29 | 2017-01-24 | Biocatch Ltd. | Method, device, and system of generating fraud-alerts for cyber-attacks |
US10404729B2 (en) * | 2010-11-29 | 2019-09-03 | Biocatch Ltd. | Device, method, and system of generating fraud-alerts for cyber-attacks |
US20150205958A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating among users based on user classification |
US10395018B2 (en) * | 2010-11-29 | 2019-08-27 | Biocatch Ltd. | System, method, and device of detecting identity of a user and authenticating a user |
US20170085587A1 (en) * | 2010-11-29 | 2017-03-23 | Biocatch Ltd. | Device, method, and system of generating fraud-alerts for cyber-attacks |
US9558339B2 (en) * | 2010-11-29 | 2017-01-31 | Biocatch Ltd. | Method, device, and system of protecting a log-in process of a computerized service |
US20150205955A1 (en) * | 2010-11-29 | 2015-07-23 | Biocatch Ltd. | Method, device, and system of differentiating among users based on responses to injected interferences |
US20170032114A1 (en) * | 2010-11-29 | 2017-02-02 | Biocatch Ltd. | System, method, and device of detecting identity of a user and authenticating a user |
US9699168B2 (en) * | 2010-12-13 | 2017-07-04 | International Business Machines Corporation | Method and system for authenticating a rich client to a web or cloud application |
US20120151568A1 (en) * | 2010-12-13 | 2012-06-14 | International Business Machines Corporation | Method and system for authenticating a rich client to a web or cloud application |
US20130326595A1 (en) * | 2011-01-07 | 2013-12-05 | Gary L. Myers | System and Method for Access Control Via Mobile Device |
US10216921B1 (en) * | 2011-03-01 | 2019-02-26 | Amazon Technologies, Inc. | Techniques for attesting to information |
US20120226611A1 (en) * | 2011-03-01 | 2012-09-06 | Nimish Radia | Method and system for conducting a monetary transaction using a mobile communication device |
US20120233668A1 (en) * | 2011-03-08 | 2012-09-13 | Rackspace Us, Inc. | Pluggable Allocation in a Cloud Computing System |
US9141410B2 (en) * | 2011-03-08 | 2015-09-22 | Rackspace Us, Inc. | Pluggable allocation in a cloud computing system |
US20120260321A1 (en) * | 2011-04-07 | 2012-10-11 | International Business Machines Corporation | Method and apparatus to auto-login to a browser application launched from an authenticated client application |
US20120260329A1 (en) * | 2011-04-11 | 2012-10-11 | Research In Motion Limited | Mitigation of application-level distributed denial-of-service attacks |
US8533857B2 (en) * | 2011-04-12 | 2013-09-10 | Teletech Holdings, Inc. | Methods for providing cross-vendor support services |
US20120266258A1 (en) * | 2011-04-12 | 2012-10-18 | Teletech Holdings, Inc. | Methods for providing cross-vendor support services |
US20150161410A1 (en) * | 2011-04-19 | 2015-06-11 | Invenia As | Method for secure storing of a data file via a computer communication network |
US8831979B1 (en) * | 2011-05-06 | 2014-09-09 | Howard Jeffrey Gerson | System and method for anonymous processing of financial transactions |
US20120284632A1 (en) * | 2011-05-06 | 2012-11-08 | Cisco Technology, Inc. | Integrated Rendering of Streaming Media in Virtualized Desktop Environment |
US20120291090A1 (en) * | 2011-05-11 | 2012-11-15 | Oracle International Corporation | Access management architecture |
US8769304B2 (en) * | 2011-06-16 | 2014-07-01 | OneID Inc. | Method and system for fully encrypted repository |
US20120324242A1 (en) * | 2011-06-16 | 2012-12-20 | OneID Inc. | Method and system for fully encrypted repository |
US20150088754A1 (en) * | 2011-06-16 | 2015-03-26 | OneID Inc. | Method and system for fully encrypted repository |
US20140380411A1 (en) * | 2011-06-17 | 2014-12-25 | Novell, Inc. | Techniques for workload spawning |
US20130007840A1 (en) * | 2011-06-28 | 2013-01-03 | Jason Allen Sabin | Techniques for prevent information disclosure via dynamic secure cloud resources |
US8769622B2 (en) * | 2011-06-30 | 2014-07-01 | International Business Machines Corporation | Authentication and authorization methods for cloud computing security |
US20130007845A1 (en) * | 2011-06-30 | 2013-01-03 | International Business Machines Corporation | Authentication and authorization methods for cloud computing security platform |
US9965133B1 (en) * | 2011-07-22 | 2018-05-08 | Ntrepid Corporation | Application for assisting in conducting covert cyber operations |
US9191381B1 (en) * | 2011-08-25 | 2015-11-17 | Symantec Corporation | Strong authentication via a federated identity protocol |
US9043747B2 (en) * | 2011-09-07 | 2015-05-26 | Imagine Communications Corp. | Systems and methods for dynamic development and deployment of computing applications using blueprints |
US10310824B2 (en) * | 2011-09-07 | 2019-06-04 | Imagine Communications Corp. | Distributed ledger platform for computing applications |
US20130239089A1 (en) * | 2011-09-07 | 2013-09-12 | Brick Eksten | Systems and methods for computing applications |
US20180329693A1 (en) * | 2011-09-07 | 2018-11-15 | Imagine Communications Corp. | Distributed ledger platform for computing applications |
US20130080570A1 (en) * | 2011-09-23 | 2013-03-28 | Roche Diagnostics Operations Inc. | Communication test framework |
US20130080832A1 (en) * | 2011-09-23 | 2013-03-28 | Roche Diagnostics Operations, Inc. | Protocol independent interface supporting general communications interface debugging and testing tool |
US20130080503A1 (en) * | 2011-09-23 | 2013-03-28 | Roche Diagnostics Operations, Inc. | Command interface for communication test framework |
US9043886B2 (en) * | 2011-09-29 | 2015-05-26 | Oracle International Corporation | Relying party platform/framework for access management infrastructures |
US20130086657A1 (en) * | 2011-09-29 | 2013-04-04 | Oracle International Corporation | Relying party platform |
US8966643B2 (en) * | 2011-10-08 | 2015-02-24 | Broadcom Corporation | Content security in a social network |
US20130091582A1 (en) * | 2011-10-08 | 2013-04-11 | Broadcom Corporation | Content security in a social network |
US20140007222A1 (en) * | 2011-10-11 | 2014-01-02 | Zenprise, Inc. | Secure execution of enterprise applications on mobile devices |
US8869235B2 (en) * | 2011-10-11 | 2014-10-21 | Citrix Systems, Inc. | Secure mobile browser for protecting enterprise data |
US9105025B2 (en) * | 2011-10-17 | 2015-08-11 | Capital One Financial Corporation | Enhanced near field communications attachment |
US20140279546A1 (en) * | 2011-10-17 | 2014-09-18 | Capital One Financial Corporation | Enhanced near field communications attachment |
US20130136253A1 (en) * | 2011-11-28 | 2013-05-30 | Hadas Liberman Ben-Ami | System and method for tracking web interactions with real time analytics |
US20130143513A1 (en) * | 2011-12-05 | 2013-06-06 | Thomas Ginter | User Accessible Multimedia Geospatial Routing Engine |
US8881256B1 (en) * | 2011-12-21 | 2014-11-04 | Amazon Technologies, Inc. | Portable access to auditing information |
US20170019386A1 (en) * | 2011-12-21 | 2017-01-19 | Ssh Communications Security Oyj | Provisioning new virtual machine with credentials |
US20130276146A1 (en) * | 2011-12-22 | 2013-10-17 | Imtel Corporation | Method and apparatus to using storage devices to implement digital rights management protection |
US20130291070A1 (en) * | 2011-12-22 | 2013-10-31 | Nicholas D. Triantafillou | Activation and monetization of features built into storage subsystems using a trusted connect service back end infrastructure |
US10742634B1 (en) * | 2011-12-27 | 2020-08-11 | Majid Shahbazi | Methods for single sign-on (SSO) using optical codes |
US20140208408A1 (en) * | 2011-12-28 | 2014-07-24 | Aras Bilgen | Methods and apparatus to facilitate single sign-on services |
US9436762B1 (en) * | 2012-01-03 | 2016-09-06 | Google Inc. | Sharing a plug-in instance in a web client |
US8863299B2 (en) * | 2012-01-06 | 2014-10-14 | Mobile Iron, Inc. | Secure virtual file management system |
US20130219456A1 (en) * | 2012-01-06 | 2013-08-22 | Rahul Sharma | Secure Virtual File Management System |
US9384339B2 (en) * | 2012-01-13 | 2016-07-05 | Telecommunication Systems, Inc. | Authenticating cloud computing enabling secure services |
US20130190968A1 (en) * | 2012-01-24 | 2013-07-25 | Jason-David Nitzberg | Electric vehicle supply equipment testing apparatus |
US8819789B2 (en) * | 2012-03-07 | 2014-08-26 | Bill.Com, Inc. | Method and system for using social networks to verify entity affiliations and identities |
US20130239185A1 (en) * | 2012-03-07 | 2013-09-12 | Bill.Com, Inc. | Method and system for using social networks to verify entity affiliations and identities |
US8776209B1 (en) * | 2012-03-09 | 2014-07-08 | Juniper Networks, Inc. | Tunneling session detection to provide single-sign on (SSO) functionality for a VPN gateway |
US20130246225A1 (en) * | 2012-03-14 | 2013-09-19 | Accenture Global Services Limited | Social in line consumer interaction launch pad |
US9747562B1 (en) * | 2012-03-19 | 2017-08-29 | Apttex Corporation | Linking structured database management systems with document creation and word processing tools |
US20130263211A1 (en) * | 2012-04-01 | 2013-10-03 | Authentify, Inc. | Secure authentication in a multi-party system |
US20130275574A1 (en) * | 2012-04-11 | 2013-10-17 | Mcafee, Inc. | Asset detection system |
US20130276053A1 (en) * | 2012-04-11 | 2013-10-17 | Mcafee, Inc. | System asset repository management |
US9049207B2 (en) * | 2012-04-11 | 2015-06-02 | Mcafee, Inc. | Asset detection system |
US8955036B2 (en) * | 2012-04-11 | 2015-02-10 | Mcafee, Inc. | System asset repository management |
US20140136837A1 (en) * | 2012-04-16 | 2014-05-15 | Jordi Baylina Melé | Method for identifying and authenticating a user via a portable device |
US20140304836A1 (en) * | 2012-04-27 | 2014-10-09 | Intralinks, Inc. | Digital rights management through virtual container partitioning |
US9553860B2 (en) * | 2012-04-27 | 2017-01-24 | Intralinks, Inc. | Email effectivity facility in a networked secure collaborative exchange environment |
US20140189483A1 (en) * | 2012-04-27 | 2014-07-03 | Intralinks, Inc. | Spreadsheet viewer facility |
US20140189818A1 (en) * | 2012-04-27 | 2014-07-03 | Intralinks, Inc. | Email effectivity facilty in a networked secure collaborative exchange environment |
US20140245015A1 (en) * | 2012-04-27 | 2014-08-28 | Intralinks, Inc. | Offline file access |
US9853959B1 (en) * | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US9124419B2 (en) * | 2012-05-08 | 2015-09-01 | Discretix Technologies Ltd. | Method, device, and system of secure entry and handling of passwords |
US20130305392A1 (en) * | 2012-05-08 | 2013-11-14 | Hagai Bar-El | System, device, and method of secure entry and handling of passwords |
US20130305041A1 (en) * | 2012-05-08 | 2013-11-14 | Hagai Bar-El | Method, device, and system of secure entry and handling of passwords |
US20180077139A1 (en) * | 2012-05-14 | 2018-03-15 | Nec Europe Ltd. | Method and system for accessing service/data of a first network from a second network for service/data access via the second network |
US9690920B2 (en) * | 2012-08-30 | 2017-06-27 | International Business Machines Corporation | Secure configuration catalog of trusted identity providers |
US20140181013A1 (en) * | 2012-08-31 | 2014-06-26 | Salesforce.Com, Inc. | Systems and methods for providing access to external content objects |
US20140230076A1 (en) * | 2012-08-31 | 2014-08-14 | Salesforce.Com, Inc. | Systems and methods for content management in an on-demand environment |
US9747388B2 (en) * | 2012-08-31 | 2017-08-29 | Salesforce.Com, Inc. | Systems and methods for providing access to external content objects |
US9990426B2 (en) * | 2012-08-31 | 2018-06-05 | Salesforce.Com, Inc. | Systems and methods for content management in an on-demand environment |
US20140068702A1 (en) * | 2012-08-31 | 2014-03-06 | Avaya Inc. | Single sign-on system and method |
US20160173475A1 (en) * | 2012-09-07 | 2016-06-16 | Oracle International Corporation | Multi-tenancy identity management system |
US11386186B2 (en) * | 2012-09-14 | 2022-07-12 | Sdl Netherlands B.V. | External content library connector systems and methods |
US20150237527A1 (en) * | 2012-09-25 | 2015-08-20 | Thompson Licensing | Reducing core network traffic caused by migrant users |
US20140096190A1 (en) * | 2012-10-01 | 2014-04-03 | Oracle International Corporation | Dynamic flow control for access managers |
US8782158B2 (en) * | 2012-10-02 | 2014-07-15 | Tanner Cropper | System for sharing and tracking review of rich content, and methods associated therewith |
US20140095637A1 (en) * | 2012-10-02 | 2014-04-03 | Tanner Cropper | System for sharing and tracking review of rich content, and methods associated therewith |
US20140108542A1 (en) * | 2012-10-11 | 2014-04-17 | Nec Europe Ltd. | Method and system for providing a multiuser web session |
US20160191554A1 (en) * | 2012-10-18 | 2016-06-30 | White Ops, Inc. | System and method for identification of automated browser agents |
US20170277773A1 (en) * | 2012-10-30 | 2017-09-28 | FHOOSH, Inc. | Systems and methods for secure storage of user information in a user profile |
US20170277774A1 (en) * | 2012-10-30 | 2017-09-28 | FHOOSH, Inc. | Systems and methods for secure storage of user information in a user profile |
US10075437B1 (en) * | 2012-11-06 | 2018-09-11 | Behaviosec | Secure authentication of a user of a device during a session with a connected server |
US9374369B2 (en) * | 2012-12-28 | 2016-06-21 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
US20140189808A1 (en) * | 2012-12-28 | 2014-07-03 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
US20140223175A1 (en) * | 2012-12-31 | 2014-08-07 | Piyush Bhatnagar | System, design and process for easy to use credentials management for online accounts using out-of-band authentication |
US20160351080A1 (en) * | 2012-12-31 | 2016-12-01 | Piyush Bhatnagar | System, Design and Process for Secure Documents Credentials Management Using Out-of-Band Authentication |
US20160307194A1 (en) * | 2012-12-31 | 2016-10-20 | Piyush Bhatnagar | System and method for point of sale payment data credentials management using out-of-band authentication |
US20140195626A1 (en) * | 2013-01-09 | 2014-07-10 | Evernym, Inc. | Systems and methods for access-controlled interactions |
US8874770B2 (en) * | 2013-01-09 | 2014-10-28 | Evernym, Inc. | Systems and methods for access-controlled interactions |
US20140280498A1 (en) * | 2013-03-14 | 2014-09-18 | Synacor, Inc. | Media sharing communications system |
US9882945B2 (en) * | 2013-03-14 | 2018-01-30 | Synacor, Inc. | Media sharing communications system |
US10200351B2 (en) * | 2013-03-14 | 2019-02-05 | Google Llc | System for managing remote software applications |
US20140282586A1 (en) * | 2013-03-15 | 2014-09-18 | Advanced Elemental Technologies | Purposeful computing |
US20140280952A1 (en) * | 2013-03-15 | 2014-09-18 | Advanced Elemental Technologies | Purposeful computing |
US20140282978A1 (en) * | 2013-03-15 | 2014-09-18 | Sergio Demian LERNER | Method and apparatus for secure interaction with a computer service provider |
US20160034305A1 (en) * | 2013-03-15 | 2016-02-04 | Advanced Elemental Technologies, Inc. | Methods and systems for purposeful computing |
US9904579B2 (en) * | 2013-03-15 | 2018-02-27 | Advanced Elemental Technologies, Inc. | Methods and systems for purposeful computing |
US9378065B2 (en) * | 2013-03-15 | 2016-06-28 | Advanced Elemental Technologies, Inc. | Purposeful computing |
US10075384B2 (en) * | 2013-03-15 | 2018-09-11 | Advanced Elemental Technologies, Inc. | Purposeful computing |
US20140298010A1 (en) * | 2013-03-26 | 2014-10-02 | Cloudtomo Limited | Public-key certificate management system and method |
US20140298442A1 (en) * | 2013-03-29 | 2014-10-02 | Citrix Systems, Inc. | Providing a managed browser |
US8850050B1 (en) * | 2013-03-29 | 2014-09-30 | Citrix Systems, Inc. | Providing a managed browser |
US20200311790A1 (en) * | 2013-04-11 | 2020-10-01 | Brandshield Ltd. | System, Device, and Method of Protected Electronic Commerce and Electronic Financial Transactions |
US9088556B2 (en) * | 2013-05-10 | 2015-07-21 | Blackberry Limited | Methods and devices for detecting unauthorized access to credentials of a credential store |
US20140359482A1 (en) * | 2013-06-03 | 2014-12-04 | Adobe Systems Incorporated | Image Session Ranking |
US20150007264A1 (en) * | 2013-06-30 | 2015-01-01 | Citrix Systems, Inc. | Secure hybrid file-sharing system |
US9203904B2 (en) * | 2013-06-30 | 2015-12-01 | Citrix Systems, Inc. | Secure hybrid file-sharing system |
US20150067089A1 (en) * | 2013-09-05 | 2015-03-05 | Hintroapps Limited | Metadata driven declarative client-side session management and differential server side data submission |
US9760698B2 (en) * | 2013-09-17 | 2017-09-12 | Toyota Motor Sales, U.S.A., Inc. | Integrated wearable article for interactive vehicle control system |
US20150081472A1 (en) * | 2013-09-18 | 2015-03-19 | LympheDIVAs | Computational Size Selection For Off The Shelf Garments |
US20150082396A1 (en) * | 2013-09-19 | 2015-03-19 | Oracle International Corporation | Privileged account plug-in framework - network - connected objects |
US20150082373A1 (en) * | 2013-09-19 | 2015-03-19 | Oracle International Corporation | Privileged account plug-in framework - usage policies |
US10693865B2 (en) * | 2013-09-20 | 2020-06-23 | Oracle International Corporation | Web-based interface integration for single sign-on |
US20150089619A1 (en) * | 2013-09-20 | 2015-03-26 | Oracle International Corporation | Web-based interface integration for single sign-on |
US20150089620A1 (en) * | 2013-09-20 | 2015-03-26 | Oracle International Corporation | Virtualized data storage and management of policy and credential data sources |
US10554624B2 (en) * | 2013-09-25 | 2020-02-04 | Mcafee, Llc | Proxy authentication for single sign-on |
US20150128105A1 (en) * | 2013-11-07 | 2015-05-07 | Sap Ag | Dynamic containerization |
US20150135300A1 (en) * | 2013-11-14 | 2015-05-14 | Intralinks, Inc. | Litigation support in cloud-hosted file sharing and collaboration |
US9514327B2 (en) * | 2013-11-14 | 2016-12-06 | Intralinks, Inc. | Litigation support in cloud-hosted file sharing and collaboration |
US20170034144A1 (en) * | 2013-11-28 | 2017-02-02 | Friedrich Kisters | Authentication and/or identification method in a communication network |
US9973488B1 (en) * | 2013-12-04 | 2018-05-15 | Amazon Technologies, Inc. | Authentication in a multi-tenant environment |
US20150163206A1 (en) * | 2013-12-11 | 2015-06-11 | Intralinks, Inc. | Customizable secure data exchange environment |
US20170155686A1 (en) * | 2013-12-16 | 2017-06-01 | Amazon Technologies, Inc. | Fine-grained structured data store access using federated identity management |
US9569634B1 (en) * | 2013-12-16 | 2017-02-14 | Amazon Technologies, Inc. | Fine-grained structured data store access using federated identity management |
US20150180846A1 (en) * | 2013-12-19 | 2015-06-25 | Dropbox, Inc. | Pre-authorizing a client application to access a user account on a content management system |
US20150180844A1 (en) * | 2013-12-19 | 2015-06-25 | Cisco Technology, Inc. | Low latency authentication of gated media relay services |
US9065819B1 (en) * | 2013-12-23 | 2015-06-23 | Cellco Partnership | Single sign on (SSO) authorization and authentication for mobile communication devices |
US20150178769A1 (en) * | 2013-12-24 | 2015-06-25 | Google Inc. | Systems and methods for audience measurement |
US10445769B2 (en) * | 2013-12-24 | 2019-10-15 | Google Llc | Systems and methods for audience measurement |
US20150188956A1 (en) * | 2013-12-27 | 2015-07-02 | T-Mobile Usa, Inc. | Unified Communication Device |
US20150193744A1 (en) * | 2014-01-07 | 2015-07-09 | Elementum, LLC | Methods and systems for creating and using massless currency |
US11392927B2 (en) * | 2014-01-13 | 2022-07-19 | uQontrol, Inc. | Multi-function data key |
US20180047014A1 (en) * | 2014-01-13 | 2018-02-15 | uQontrol, Inc. | Multi-Function Data Key |
US20150213568A1 (en) * | 2014-01-29 | 2015-07-30 | Adobe Systems Incorporated | Location aware selection of electronic signatures |
US11017372B2 (en) * | 2014-02-12 | 2021-05-25 | Tencent Technology (Shenzhen) Company Limited | Data interaction method, verification terminal, server, and system |
US9961083B2 (en) * | 2014-02-26 | 2018-05-01 | International Business Machines Corporation | Dynamic extensible application server management |
US20150256337A1 (en) * | 2014-03-05 | 2015-09-10 | Qualcomm Incorporated | Using end-user federated login to detect a breach in a key exchange encrypted channel |
US20150254450A1 (en) * | 2014-03-10 | 2015-09-10 | Cisco Technology, Inc. | Disposition engine for single sign on (sso) requests |
US9231955B1 (en) * | 2014-03-26 | 2016-01-05 | Emc Corporation | Multiparty authorization for controlling resource access |
US9729539B1 (en) * | 2014-03-28 | 2017-08-08 | Pulse Secure, Llc | Network access session detection to provide single-sign on (SSO) functionality for a network access control device |
US11004139B2 (en) * | 2014-03-31 | 2021-05-11 | Monticello Enterprises LLC | System and method for providing simplified in store purchases and in-app purchases using a use-interface-based payment API |
US10152756B2 (en) * | 2014-03-31 | 2018-12-11 | Monticello Enterprises LLC | System and method for providing multiple payment method options to browser |
US20180232817A1 (en) * | 2014-03-31 | 2018-08-16 | Monticello Enterprises, Llc | System and method for providing multiple payment method options to browser |
US20190281030A1 (en) * | 2014-03-31 | 2019-09-12 | Monticello Enterprises LLC | System and method for providing simplified in-store, product-based and rental payment processes |
US20190007381A1 (en) * | 2014-03-31 | 2019-01-03 | Monticello Enterprises LLC | System and method for providing a search entity-based payment process |
US10726472B2 (en) * | 2014-03-31 | 2020-07-28 | Monticello Enterprises LLC | System and method for providing simplified in-store, product-based and rental payment processes |
US20190141021A1 (en) * | 2014-03-31 | 2019-05-09 | Monticello Enterprises LLC | System and method for providing simplified in store purchases and in-app purchases using a use- interface- based payment apt |
US10832310B2 (en) * | 2014-03-31 | 2020-11-10 | Monticello Enterprises LLC | System and method for providing a search entity-based payment process |
US10497037B2 (en) * | 2014-03-31 | 2019-12-03 | Monticello Enterprises LLC | System and method for managing cryptocurrency payments via the payment request API |
US20180025442A1 (en) * | 2014-03-31 | 2018-01-25 | Monticello Enterprises LLC | System and method for managing cryptocurrency payments via the payment request api |
US20150288666A1 (en) * | 2014-04-05 | 2015-10-08 | Wearable Intelligence, Inc. | Systems and methods for digital workflow and communication |
US20150304359A1 (en) * | 2014-04-17 | 2015-10-22 | Avaya Inc. | APPLICATION OF ENTERPRISE POLICIES TO WEB REAL-TIME COMMUNICATIONS (WebRTC) INTERACTIVE SESSIONS USING AN ENTERPRISE SESSION INITIATION PROTOCOL (SIP) ENGINE, AND RELATED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA |
US9613190B2 (en) * | 2014-04-23 | 2017-04-04 | Intralinks, Inc. | Systems and methods of secure data exchange |
US20150310188A1 (en) * | 2014-04-23 | 2015-10-29 | Intralinks, Inc. | Systems and methods of secure data exchange |
US20190318816A1 (en) * | 2014-05-13 | 2019-10-17 | Nant Holdings Ip, Llc | Healthcare transaction validation via blockchain proof-of work, systems and methods |
US9916010B2 (en) * | 2014-05-16 | 2018-03-13 | Visa International Service Association | Gesture recognition cloud command platform, system, method, and apparatus |
US20160109954A1 (en) * | 2014-05-16 | 2016-04-21 | Visa International Service Association | Gesture Recognition Cloud Command Platform, System, Method, and Apparatus |
US9032498B1 (en) * | 2014-05-25 | 2015-05-12 | Mourad Ben Ayed | Method for changing authentication for a legacy access interface |
US9887970B2 (en) * | 2014-06-03 | 2018-02-06 | Arm Ip Limited | Methods of accessing and providing access to a remote resource from a data processing device |
US20170187536A1 (en) * | 2014-06-03 | 2017-06-29 | Arm Ip Limited | Methods of accessing and providing access to data sent between a remote resource and a data processing device |
US20150381621A1 (en) * | 2014-06-27 | 2015-12-31 | Citrix Systems, Inc. | Enterprise Authentication Via Third Party Authentication Support |
US9531714B2 (en) * | 2014-06-27 | 2016-12-27 | Citrix Systems, Inc. | Enterprise authentication via third party authentication support |
US10652225B2 (en) * | 2014-06-30 | 2020-05-12 | International Business Machines Corporation | Queue management and load shedding for complex authentication schemes |
US20160294605A1 (en) * | 2014-07-07 | 2016-10-06 | Symphony Teleca Corporation | Remote Embedded Device Update Platform Apparatuses, Methods and Systems |
US20160291959A1 (en) * | 2014-07-07 | 2016-10-06 | Symphony Teleca Corporation | Remote Embedded Device Update Platform Apparatuses, Methods and Systems |
US20160291940A1 (en) * | 2014-07-07 | 2016-10-06 | Symphony Teleca Corporation | Remote Embedded Device Update Platform Apparatuses, Methods and Systems |
US20160294614A1 (en) * | 2014-07-07 | 2016-10-06 | Symphony Teleca Corporation | Remote Embedded Device Update Platform Apparatuses, Methods and Systems |
US9891907B2 (en) * | 2014-07-07 | 2018-02-13 | Harman Connected Services, Inc. | Device component status detection and illustration apparatuses, methods, and systems |
US20170214684A1 (en) * | 2014-07-21 | 2017-07-27 | Vcare Technologies PVT. LTD. | A contextual scanning device with pre-authenticated identity |
US20170063551A1 (en) * | 2014-07-25 | 2017-03-02 | Snapfile Ltd. | System and method for securely managing integrity-verifiable and authenticable information |
US9736145B1 (en) * | 2014-08-01 | 2017-08-15 | Secureauth Corporation | Generation and validation of derived credentials |
US8966578B1 (en) * | 2014-08-07 | 2015-02-24 | Hytrust, Inc. | Intelligent system for enabling automated secondary authorization for service requests in an agile information technology environment |
US20160043973A1 (en) * | 2014-08-11 | 2016-02-11 | SF Incubator LLC | Dynamic resolution of message content |
US20160050193A1 (en) * | 2014-08-15 | 2016-02-18 | Yordan Kanov | System and methods for secure communication in mobile devices |
US9471767B2 (en) * | 2014-08-22 | 2016-10-18 | Oracle International Corporation | CAPTCHA techniques utilizing traceable images |
US20160065571A1 (en) * | 2014-08-26 | 2016-03-03 | Hoyos Labs Corp. | System and methods for secure file sharing and access management |
US11604842B1 (en) * | 2014-09-15 | 2023-03-14 | Hubspot, Inc. | Method of enhancing customer relationship management content and workflow |
US20160080374A1 (en) * | 2014-09-16 | 2016-03-17 | Ricoh Company, Ltd. | Output system, output method, output data storage apparatus, and output data relay apparatus |
US20160080346A1 (en) * | 2014-09-17 | 2016-03-17 | Transunion Rental Screening Solutions, Inc. | Identity certification badge |
US20160092246A1 (en) * | 2014-09-26 | 2016-03-31 | Oracle International Corporation | Reverse dependency injection in a system with dynamic code loading |
US20160094546A1 (en) * | 2014-09-30 | 2016-03-31 | Citrix Systems, Inc. | Fast smart card logon |
US20180007059A1 (en) * | 2014-09-30 | 2018-01-04 | Citrix Systems, Inc. | Dynamic Access Control to Network Resources Using Federated Full Domain Logon |
US10021088B2 (en) * | 2014-09-30 | 2018-07-10 | Citrix Systems, Inc. | Fast smart card logon |
US10841316B2 (en) * | 2014-09-30 | 2020-11-17 | Citrix Systems, Inc. | Dynamic access control to network resources using federated full domain logon |
US10341317B2 (en) * | 2014-10-20 | 2019-07-02 | Yp Llc | Systems and methods for implementing a personalized provider recommendation engine |
US20160112394A1 (en) * | 2014-10-20 | 2016-04-21 | Yp Llc | Systems and methods for implementing a personalized provider recommendation engine |
US20160344724A1 (en) * | 2014-10-20 | 2016-11-24 | Itzhak SHOSHAN | Encryption/decryption in a cloud storage solution |
US9544307B2 (en) * | 2014-10-29 | 2017-01-10 | Salesforce.Com, Inc. | Providing a security mechanism on a mobile device |
US20160127358A1 (en) * | 2014-10-29 | 2016-05-05 | Salesforce.Com, Inc. | Providing a security mechanism on a mobile device |
US10091311B2 (en) * | 2014-11-04 | 2018-10-02 | Entit Software Llc | Smart location determination |
US11120461B1 (en) * | 2014-11-06 | 2021-09-14 | Capital One Services, Llc | Passive user-generated coupon submission |
US20160171354A1 (en) * | 2014-12-16 | 2016-06-16 | Ebay Inc. | Digital rights and integrity management in three-dimensional (3d) printing |
US20180183805A1 (en) * | 2014-12-18 | 2018-06-28 | Ivan Mauricio GONZALEZ CORONA | System and method of authorization of simple, sequential and parallel requests with means of authorization through previously defined parameters |
US9930475B1 (en) * | 2015-01-02 | 2018-03-27 | Wells Fargo Bank, N.A. | Customer service document with data storage device |
US20160210006A1 (en) * | 2015-01-21 | 2016-07-21 | LogMeln, Inc. | Remote support service with smart whiteboard |
US20170264653A1 (en) * | 2015-01-21 | 2017-09-14 | Logmein, Inc. | Remote support service with two-way smart whiteboard |
US20160226665A1 (en) * | 2015-02-03 | 2016-08-04 | Stmicroelectronics (Rousset) Sas | Method for authentication of an object by a device capable of mutual contactless communication, corresponding system and object |
US11387986B1 (en) * | 2015-02-05 | 2022-07-12 | Ionic Security Inc. | Systems and methods for encryption and provision of information security using platform services |
US9608810B1 (en) * | 2015-02-05 | 2017-03-28 | Ionic Security Inc. | Systems and methods for encryption and provision of information security using platform services |
US20190075130A1 (en) * | 2015-02-20 | 2019-03-07 | Authentic8, Inc. | Secure application for accessing web resources |
US20170180413A1 (en) * | 2015-02-20 | 2017-06-22 | Authentic8, Inc. | Secure Analysis Application For Accessing Web Resources Via URL Forwarding |
US10027700B2 (en) * | 2015-02-20 | 2018-07-17 | Authentic8, Inc. | Secure analysis application for accessing web resources via URL forwarding |
US11032309B2 (en) * | 2015-02-20 | 2021-06-08 | Authentic8, Inc. | Secure application for accessing web resources |
US10542031B2 (en) * | 2015-02-20 | 2020-01-21 | Authentic8, Inc. | Secure application for accessing web resources |
US20200228561A1 (en) * | 2015-02-20 | 2020-07-16 | Authentic8, Inc. | Secure application for accessing web resources |
US20160269370A1 (en) * | 2015-03-12 | 2016-09-15 | Fornetix Llc | Server-client pki for applied key management system and process |
US20160269411A1 (en) * | 2015-03-12 | 2016-09-15 | Ronen MALACHI | System and Method for Anonymous Biometric Access Control |
US10250594B2 (en) * | 2015-03-27 | 2019-04-02 | Oracle International Corporation | Declarative techniques for transaction-specific authentication |
US20160285871A1 (en) * | 2015-03-27 | 2016-09-29 | Oracle International Corporation | Declarative techniques for transaction-specific authentication |
US20160294894A1 (en) * | 2015-03-31 | 2016-10-06 | Facebook, Inc. | Multi-user media presentation system |
US10057204B2 (en) * | 2015-03-31 | 2018-08-21 | Facebook, Inc. | Multi-user media presentation system |
US20160294831A1 (en) * | 2015-04-03 | 2016-10-06 | United Services Automobile Association (Usaa) | Digital identification system |
US9569626B1 (en) * | 2015-04-10 | 2017-02-14 | Dell Software Inc. | Systems and methods of reporting content-exposure events |
US20160315910A1 (en) * | 2015-04-27 | 2016-10-27 | Microsoft Technology Licensing, Llc | Persistent Uniform Resource Locators (URLs) for Client Applications acting as Web Services |
US9756020B2 (en) * | 2015-04-27 | 2017-09-05 | Microsoft Technology Licensing, Llc | Persistent uniform resource locators (URLs) for client applications acting as web services |
US9959398B1 (en) * | 2015-04-30 | 2018-05-01 | Ims Health Incorporated | Dynamic user authentication and authorization |
US20160344561A1 (en) * | 2015-05-22 | 2016-11-24 | Garret Grajek | Securing multimedia content via certificate-issuing cloud service |
US11503031B1 (en) * | 2015-05-29 | 2022-11-15 | Pure Storage, Inc. | Storage array access control from cloud-based user authorization and authentication |
US20200402049A1 (en) * | 2015-06-11 | 2020-12-24 | APPI Technologia S/A (D.B.A. MUXI) | Antifraud Resilient Transaction Identifier Datastructure Apparatuses, Methods and Systems |
US10237280B2 (en) * | 2015-06-25 | 2019-03-19 | Websafety, Inc. | Management and control of mobile computing device using local and remote software agents |
US20170149795A1 (en) * | 2015-06-25 | 2017-05-25 | Websafety, Inc. | Management and control of mobile computing device using local and remote software agents |
US10757104B1 (en) * | 2015-06-29 | 2020-08-25 | Veritas Technologies Llc | System and method for authentication in a computing system |
US20170006020A1 (en) * | 2015-07-02 | 2017-01-05 | Adobe Systems Incorporated | Authentication context transfer for accessing computing resources via single sign-on with single use access tokens |
US20170048235A1 (en) * | 2015-07-14 | 2017-02-16 | Fmr Llc | Crypto Captcha and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems |
US20170048209A1 (en) * | 2015-07-14 | 2017-02-16 | Fmr Llc | Crypto Key Recovery and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems |
US20170048234A1 (en) * | 2015-07-14 | 2017-02-16 | Fmr Llc | Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems |
US20170085545A1 (en) * | 2015-07-14 | 2017-03-23 | Fmr Llc | Smart Rules and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems |
US20170085555A1 (en) * | 2015-07-14 | 2017-03-23 | Fmr Llc | Point-to-Point Transaction Guidance Apparatuses, Methods and Systems |
US20170024679A1 (en) * | 2015-07-20 | 2017-01-26 | Bank Of America Corporation | Personalized user selection of remote video assistants based on remote video call history |
US20170024781A1 (en) * | 2015-07-20 | 2017-01-26 | Bank Of America Corporation | Providing remote video assistant-specific availability details for previously contacted remote video assistants |
US20170026613A1 (en) * | 2015-07-20 | 2017-01-26 | Bank Of America Corporation | Personalized presentation of performance ratings of remote video assistant during remote video assistant selection |
US20170026322A1 (en) * | 2015-07-20 | 2017-01-26 | Bank Of America Corporation | Asynchronous event-driven messaging framework for a remote video assistance system |
US10148786B1 (en) * | 2015-07-26 | 2018-12-04 | RedCritter Corp. | Method of generating a unified user profile |
US20170041304A1 (en) * | 2015-08-05 | 2017-02-09 | Facebook, Inc. | Managing a Device Cloud |
US20170041296A1 (en) * | 2015-08-05 | 2017-02-09 | Intralinks, Inc. | Systems and methods of secure data exchange |
US10425392B2 (en) * | 2015-08-05 | 2019-09-24 | Facebook, Inc. | Managing a device cloud |
US10033702B2 (en) * | 2015-08-05 | 2018-07-24 | Intralinks, Inc. | Systems and methods of secure data exchange |
US20170048174A1 (en) * | 2015-08-10 | 2017-02-16 | Facebook, Inc. | Dynamic Communication Participant Identification |
US10439970B2 (en) * | 2015-08-10 | 2019-10-08 | Facebook, Inc. | Dynamic communication participant identification |
US20170048319A1 (en) * | 2015-08-11 | 2017-02-16 | Oracle International Corporation | Asynchronous pre-caching of synchronously loaded resources |
US10582001B2 (en) * | 2015-08-11 | 2020-03-03 | Oracle International Corporation | Asynchronous pre-caching of synchronously loaded resources |
US20170048215A1 (en) * | 2015-08-14 | 2017-02-16 | Oracle International Corporation | Secure storage of enterprise certificates for cloud services |
US10013668B2 (en) * | 2015-08-14 | 2018-07-03 | Oracle International Corporation | Secure storage of enterprise certificates for cloud services |
US20170054717A1 (en) * | 2015-08-20 | 2017-02-23 | Fujitsu Limited | Communication method, communication terminal apparatus, and communication network system |
US11329980B2 (en) * | 2015-08-21 | 2022-05-10 | Veridium Ip Limited | System and method for biometric protocol standards |
US20200036707A1 (en) * | 2015-08-21 | 2020-01-30 | Veridium Ip Limited | System and method for biometric protocol standards |
US20170063842A1 (en) * | 2015-08-24 | 2017-03-02 | Hyundai Motor Company | Method for controlling vehicle security access based on certificate |
US11310281B2 (en) * | 2015-08-27 | 2022-04-19 | Mastercard International Incorporated | Systems and methods for monitoring computer authentication procedures |
US11503010B2 (en) * | 2015-09-08 | 2022-11-15 | Plaid Inc. | Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts |
US10728239B2 (en) * | 2015-09-15 | 2020-07-28 | Mimecast Services Ltd. | Mediated access to resources |
US20200137110A1 (en) * | 2015-09-15 | 2020-04-30 | Mimecast Services Ltd. | Systems and methods for threat detection and warning |
US20170180378A1 (en) * | 2015-09-15 | 2017-06-22 | Mimecast North America, Inc. | Mediated access to resources |
US20180293371A1 (en) * | 2015-09-30 | 2018-10-11 | Friedrich Kisters | Method and device for authenticating an object or a person using a security element with a modular structure |
US20180337975A1 (en) * | 2015-09-30 | 2018-11-22 | Surfdash | System and method for providing a secure network |
US9847994B1 (en) * | 2015-09-30 | 2017-12-19 | Surfdash | System and method for providing a secure network |
US20170099280A1 (en) * | 2015-10-02 | 2017-04-06 | Veritas Technologies Llc | Single Sign-On Method for Appliance Secure Shell |
US9923888B2 (en) * | 2015-10-02 | 2018-03-20 | Veritas Technologies Llc | Single sign-on method for appliance secure shell |
US20170141921A1 (en) * | 2015-11-12 | 2017-05-18 | International Business Machines Corporation | Location control of cloud data stores |
US20170147809A1 (en) * | 2015-11-23 | 2017-05-25 | International Business Machines Corporation | Enhancing security of a mobile device using pre-authentication sequences |
US9767309B1 (en) * | 2015-11-23 | 2017-09-19 | Experian Information Solutions, Inc. | Access control system for implementing access restrictions of regulated database records while identifying and providing indicators of regulated database records matching validation criteria |
US20180359234A1 (en) * | 2015-12-18 | 2018-12-13 | Nippon Telegraph And Telephone Corporation | Authentication control system, server apparatus, client apparatus, authentication control method, authentication method, and program |
US10156842B2 (en) * | 2015-12-31 | 2018-12-18 | General Electric Company | Device enrollment in a cloud service using an authenticated application |
US20170195332A1 (en) * | 2015-12-31 | 2017-07-06 | General Electric Company | Device enrollment in a cloud service using an authenticated application |
US20170223026A1 (en) * | 2016-02-01 | 2017-08-03 | General Electric Company | System and method for zone access control |
US20170223057A1 (en) * | 2016-02-01 | 2017-08-03 | General Electric Company | System and method for access control services |
US9923905B2 (en) * | 2016-02-01 | 2018-03-20 | General Electric Company | System and method for zone access control |
US10356112B2 (en) * | 2016-03-10 | 2019-07-16 | Huawei Technologies Co., Ltd. | Method of mitigating cookie-injection and cookie-replaying attacks |
US10129228B1 (en) * | 2016-03-30 | 2018-11-13 | Amazon Technologies, Inc. | Authenticated communication between devices |
US20170289168A1 (en) * | 2016-03-31 | 2017-10-05 | Microsoft Technology Licensing, Llc | Personalized Inferred Authentication For Virtual Assistance |
US10187394B2 (en) * | 2016-03-31 | 2019-01-22 | Microsoft Technology Licensing, Llc | Personalized inferred authentication for virtual assistance |
US9503452B1 (en) * | 2016-04-07 | 2016-11-22 | Automiti Llc | System and method for identity recognition and affiliation of a user in a service transaction |
US20170300910A1 (en) * | 2016-04-13 | 2017-10-19 | American Express Travel Related Services Company, Inc. | Presenting a personalized value added offer during an advanced verification process |
US10893034B2 (en) * | 2016-04-13 | 2021-01-12 | American Express Travel Related Services Company, Inc. | Presenting a personalized value added offer during an advanced verification process |
US20170310686A1 (en) * | 2016-04-22 | 2017-10-26 | Sophos Limited | Labeling network flows according to source applications |
US11277416B2 (en) * | 2016-04-22 | 2022-03-15 | Sophos Limited | Labeling network flows according to source applications |
US20170317997A1 (en) * | 2016-04-30 | 2017-11-02 | Civic Technologies, Inc. | Methods and systems of providing verification of the identity of a digital entity using a centralized or distributed ledger |
US10333706B2 (en) * | 2016-04-30 | 2019-06-25 | Civic Technologies, Inc. | Methods and systems of providing verification of information using a centralized or distributed ledger |
US9996679B2 (en) * | 2016-05-03 | 2018-06-12 | Pegasus Media Security, Llc | Methods and apparatus for device authentication and secure data exchange between a server application and a device |
US20170323087A1 (en) * | 2016-05-03 | 2017-11-09 | Pegasus Media Security, Llc | Methods and apparatus for device authentication and secure data exchange between a server application and a device |
US10581820B2 (en) * | 2016-05-11 | 2020-03-03 | Oracle International Corporation | Key generation and rollover |
US9781122B1 (en) * | 2016-05-11 | 2017-10-03 | Oracle International Corporation | Multi-tenant identity and data security management cloud service |
US20170331802A1 (en) * | 2016-05-11 | 2017-11-16 | Oracle International Corporation | Key Generation and Rollover |
US10425386B2 (en) * | 2016-05-11 | 2019-09-24 | Oracle International Corporation | Policy enforcement point for a multi-tenant identity and data security management cloud service |
US20170331829A1 (en) * | 2016-05-11 | 2017-11-16 | Oracle International Corporation | Security tokens for a multi-tenant identity and data security management cloud service |
US20170331812A1 (en) * | 2016-05-11 | 2017-11-16 | Oracle International Corporation | Microservices based multi-tenant identity and data security management cloud service |
US20170331813A1 (en) * | 2016-05-11 | 2017-11-16 | Oracle International Corporation | Task segregation in a multi-tenant identity and data security management cloud service |
US20170331791A1 (en) * | 2016-05-11 | 2017-11-16 | Oracle International Corporation | Policy enforcement point for a multi-tenant identity and data security management cloud service |
US20170331832A1 (en) * | 2016-05-11 | 2017-11-16 | Oracle International Corporation | Identity cloud service authorization model |
US10574692B2 (en) * | 2016-05-30 | 2020-02-25 | Christopher Nathan Tyrwhitt Drake | Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements |
US20170346851A1 (en) * | 2016-05-30 | 2017-11-30 | Christopher Nathan Tyrwhitt Drake | Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements. |
US10440053B2 (en) * | 2016-05-31 | 2019-10-08 | Lookout, Inc. | Methods and systems for detecting and preventing network connection compromise |
US20170359370A1 (en) * | 2016-06-10 | 2017-12-14 | Sophos Limited | Key throttling to mitigate unauthorized file access |
US10798133B2 (en) * | 2016-06-10 | 2020-10-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10873606B2 (en) * | 2016-06-10 | 2020-12-22 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10681078B2 (en) * | 2016-06-10 | 2020-06-09 | Sophos Limited | Key throttling to mitigate unauthorized file access |
US10438017B2 (en) * | 2016-06-10 | 2019-10-08 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US10282559B2 (en) * | 2016-06-10 | 2019-05-07 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US20170359306A1 (en) * | 2016-06-10 | 2017-12-14 | Sophos Limited | Network security |
US10565161B2 (en) * | 2016-06-10 | 2020-02-18 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US10708305B2 (en) * | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Automated data processing systems and methods for automatically processing requests for privacy-related information |
US11228620B2 (en) * | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US20200065519A1 (en) * | 2016-06-10 | 2020-02-27 | OneTrust, LLC | Data processing systems for use in automatically generating, populating, and submitting data subject access requests |
US10454973B2 (en) * | 2016-06-10 | 2019-10-22 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10509920B2 (en) * | 2016-06-10 | 2019-12-17 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US10848523B2 (en) * | 2016-06-10 | 2020-11-24 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11038925B2 (en) * | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10467432B2 (en) * | 2016-06-10 | 2019-11-05 | OneTrust, LLC | Data processing systems for use in automatically generating, populating, and submitting data subject access requests |
US20170372046A1 (en) * | 2016-06-23 | 2017-12-28 | Yahoo! Inc. | Computerized system and method for modifying a media file by automatically applying security features to select portions of media file content |
US10284543B2 (en) * | 2016-06-24 | 2019-05-07 | AO Kaspersky Lab | System and method for secure online authentication |
US20190124112A1 (en) * | 2016-06-30 | 2019-04-25 | Sophos Limited | Baiting endpoints for improved detection of authentication attacks |
US10986124B2 (en) * | 2016-06-30 | 2021-04-20 | Sophos Limited | Baiting endpoints for improved detection of authentication attacks |
US10027657B1 (en) * | 2016-07-06 | 2018-07-17 | Wells Fargo Bank, N.A. | Authentication/authorization without a password |
US20190280876A1 (en) * | 2016-07-18 | 2019-09-12 | bitagentur GmbH & Co. KG | Token-based authentication with signed message |
US20180308566A1 (en) * | 2016-08-02 | 2018-10-25 | Invaryant, Inc. | System and method for predictive and preventative treatment guidance for secure storage electronic medical records |
US20180039737A1 (en) * | 2016-08-02 | 2018-02-08 | Umbra Health Corporation | Patient directed data synchronization of electronic health records using a patient controlled health record |
US10950330B2 (en) * | 2016-08-02 | 2021-03-16 | Invaryant Health Llc | System and method for predictive and preventative treatment guidance for secure storage electronic medical records |
US20180039501A1 (en) * | 2016-08-05 | 2018-02-08 | Oracle International Corporation | Tenant self-service troubleshooting for a multi-tenant identity and data security management cloud service |
US20180041598A1 (en) * | 2016-08-05 | 2018-02-08 | Oracle International Corporation | Hierarchical Processing for a Virtual Directory System for LDAP to SCIM Proxy Service |
US20180039494A1 (en) * | 2016-08-05 | 2018-02-08 | Oracle International Corporation | Zero down time upgrade for a multi-tenant identity and data security management cloud service |
US10585682B2 (en) * | 2016-08-05 | 2020-03-10 | Oracle International Corporation | Tenant self-service troubleshooting for a multi-tenant identity and data security management cloud service |
US20180041491A1 (en) * | 2016-08-05 | 2018-02-08 | Oracle International Corporation | Caching framework for a multi-tenant identity and data security management cloud service |
US10255061B2 (en) * | 2016-08-05 | 2019-04-09 | Oracle International Corporation | Zero down time upgrade for a multi-tenant identity and data security management cloud service |
US20180041515A1 (en) * | 2016-08-05 | 2018-02-08 | Oracle International Corporation | Service discovery for a multi-tenant identity and data security management cloud service |
US20180069702A1 (en) * | 2016-08-22 | 2018-03-08 | Akamai Technologies, Inc. | Providing Single Sign-On (SSO) in disjoint networks with non-overlapping authentication protocols |
US10931452B2 (en) * | 2016-08-22 | 2021-02-23 | Akamai Technologies, Inc. | Providing single sign-on (SSO) in disjoint networks with non-overlapping authentication protocols |
US20180109549A1 (en) * | 2016-08-30 | 2018-04-19 | International Business Machines Corporation | Securing services in a networked computing environment |
US20180063143A1 (en) * | 2016-08-31 | 2018-03-01 | Oracle International Corporation | Data management for a multi-tenant identity cloud service |
US10484382B2 (en) * | 2016-08-31 | 2019-11-19 | Oracle International Corporation | Data management for a multi-tenant identity cloud service |
US10511589B2 (en) * | 2016-09-14 | 2019-12-17 | Oracle International Corporation | Single logout functionality for a multi-tenant identity and data security management cloud service |
US20180077144A1 (en) * | 2016-09-14 | 2018-03-15 | Oracle International Corporation | Single logout functionality for a multi-tenant identity and data security management cloud service |
US20180075231A1 (en) * | 2016-09-14 | 2018-03-15 | Oracle International Corporation | Single sign-on functionality for a multi-tenant identity and data security management cloud service |
US10846390B2 (en) * | 2016-09-14 | 2020-11-24 | Oracle International Corporation | Single sign-on functionality for a multi-tenant identity and data security management cloud service |
US20180077138A1 (en) * | 2016-09-14 | 2018-03-15 | Oracle International Corporation | Generating derived credentials for a multi-tenant identity cloud service |
US10445395B2 (en) * | 2016-09-16 | 2019-10-15 | Oracle International Corporation | Cookie based state propagation for a multi-tenant identity cloud service |
US20180083915A1 (en) * | 2016-09-16 | 2018-03-22 | Oracle International Corporation | SCIM to LDAP Mapping Using Subtype Attributes |
US20180081983A1 (en) * | 2016-09-16 | 2018-03-22 | Oracle International Corporation | Cookie based state propagation for a multi-tenant identity cloud service |
US20180083967A1 (en) * | 2016-09-16 | 2018-03-22 | Oracle International Corporation | Tenant and Service Management For A Multi-Tenant Identity and Data Security Management Cloud Service |
US10341354B2 (en) * | 2016-09-16 | 2019-07-02 | Oracle International Corporation | Distributed high availability agent architecture |
US20180083977A1 (en) * | 2016-09-16 | 2018-03-22 | Oracle International Corporation | Distributed High Availability Agent Architecture |
US20180083944A1 (en) * | 2016-09-16 | 2018-03-22 | Oracle International Corporation | Preserving LDAP Hierarchy in a SCIM Directory Using Special Marker Groups |
US10616224B2 (en) * | 2016-09-16 | 2020-04-07 | Oracle International Corporation | Tenant and service management for a multi-tenant identity and data security management cloud service |
US20180083826A1 (en) * | 2016-09-17 | 2018-03-22 | Oracle International Corporation | Composite event handler for a multi-tenant identity cloud service |
US20180096552A1 (en) * | 2016-09-26 | 2018-04-05 | PollMole Corporation | Cloud-based connectivity tool and method |
US20180091974A1 (en) * | 2016-09-28 | 2018-03-29 | Hospitality Core Services, LLC | Network Operations Center With User Authorization Interface |
US20180091930A1 (en) * | 2016-09-29 | 2018-03-29 | Mobilogix, Inc. | Systems and methods for vehicle access and management |
US20180097829A1 (en) * | 2016-09-30 | 2018-04-05 | Mcafee, Inc | Safe sharing of sensitive data |
US10476900B2 (en) * | 2016-09-30 | 2019-11-12 | McAFEE, LLC. | Safe sharing of sensitive data |
US10360402B2 (en) * | 2016-11-15 | 2019-07-23 | International Business Machines Corporation | Intercepting sensitive data using hashed candidates |
US20180137303A1 (en) * | 2016-11-15 | 2018-05-17 | International Business Machines Corporation | Intercepting sensitive data using hashed candidates |
US20180167378A1 (en) * | 2016-11-23 | 2018-06-14 | Ingram Micro, Inc. | System and Method for Multi-Tenant SSO With Dynamic Attribute Retrieval |
US20180198878A1 (en) * | 2017-01-09 | 2018-07-12 | Hewlett Packard Enterprise Development Lp | Shared sessions through reverse proxy |
US10715510B2 (en) * | 2017-01-16 | 2020-07-14 | Citrix Systems, Inc. | Secure device notifications from remote applications |
US20180205715A1 (en) * | 2017-01-16 | 2018-07-19 | Citrix Systems, Inc. | Secure Device Notifications From Remote Applications |
US10356088B1 (en) * | 2017-01-25 | 2019-07-16 | Salesforce.Com, Inc. | User authentication based on multiple asymmetric cryptography key pairs |
US20180233236A1 (en) * | 2017-02-15 | 2018-08-16 | Stephen A. Dawkins | Occupational telemedicine |
US11210670B2 (en) * | 2017-02-28 | 2021-12-28 | Early Warning Services, Llc | Authentication and security for mobile-device transactions |
US20180247312A1 (en) * | 2017-02-28 | 2018-08-30 | Early Warning Services, Llc | Authentication and security for mobile-device transactions |
US10015167B1 (en) * | 2017-03-17 | 2018-07-03 | Accenture Global Solutions Limited | Extensible key management system for application program interfaces |
US20180278612A1 (en) * | 2017-03-22 | 2018-09-27 | Oracle International Corporation | Techniques for implementing a data storage device as a security device for managing access to resources |
US20180278419A1 (en) * | 2017-03-22 | 2018-09-27 | Extrahop Networks, Inc. | Managing session secrets for continuous packet capture systems |
US10331471B1 (en) * | 2017-03-29 | 2019-06-25 | Parallels International Gmbh | Browser credential management for virtual execution environments |
US20180285466A1 (en) * | 2017-04-04 | 2018-10-04 | Yandex Europe Ag | Method of and server for classifying a web resource |
US10599497B2 (en) * | 2017-04-26 | 2020-03-24 | International Business Machines Corporation | Invoking enhanced plug-ins and creating workflows having a series of enhanced plug-ins |
US20180316777A1 (en) * | 2017-04-26 | 2018-11-01 | International Business Machines Corporation | Invoking enhanced plug-ins and creating workflows having a series of enhanced plug-ins |
US11316829B2 (en) * | 2017-05-05 | 2022-04-26 | Royal Bank Of Canada | Distributed memory data repository based defense system |
US20180337907A1 (en) * | 2017-05-16 | 2018-11-22 | Softex Incorporated | Integrated cybersecurity system and method for providing restricted client access to a website |
US20180337914A1 (en) * | 2017-05-18 | 2018-11-22 | Oracle International Corporation | User authentication using kerberos with identity cloud service |
US10454915B2 (en) * | 2017-05-18 | 2019-10-22 | Oracle International Corporation | User authentication using kerberos with identity cloud service |
US20200007615A1 (en) * | 2017-06-05 | 2020-01-02 | Umajin Inc. | Server kit configured to execute custom workflows and methods therefor |
US20200007556A1 (en) * | 2017-06-05 | 2020-01-02 | Umajin Inc. | Server kit configured to marshal resource calls and methods therefor |
US20200285464A1 (en) * | 2017-06-05 | 2020-09-10 | Umajin Inc. | Location tracking system and methods |
US20180359244A1 (en) * | 2017-06-09 | 2018-12-13 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
US10218697B2 (en) * | 2017-06-09 | 2019-02-26 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
US20180359233A1 (en) * | 2017-06-13 | 2018-12-13 | Salesforce.Com, Inc. | Conversational Authentication |
US10659446B2 (en) * | 2017-06-13 | 2020-05-19 | Salesforce.Com, Inc. | Conversational authentication |
US20190014468A1 (en) * | 2017-07-06 | 2019-01-10 | Bank Of America Corporation | Frictionless hardening of digital consent |
US20190028517A1 (en) * | 2017-07-21 | 2019-01-24 | Freefly881 Communications Inc. | Network voice communication method and system implemented based on web communication plug-in |
US20190028468A1 (en) * | 2017-07-24 | 2019-01-24 | Bernard GARCIA | Biometric cloud authentication gateway database system and method of use |
US11438330B2 (en) * | 2017-07-24 | 2022-09-06 | Bernard GARCIA | Biometric cloud authentication gateway database system and method of use |
US20190036906A1 (en) * | 2017-07-28 | 2019-01-31 | SmartAxiom, Inc. | System and method for iot security |
US10924466B2 (en) * | 2017-07-28 | 2021-02-16 | SmartAxiom, Inc. | System and method for IOT security |
US20190044942A1 (en) * | 2017-08-01 | 2019-02-07 | Twosense, Inc. | Deep Learning for Behavior-Based, Invisible Multi-Factor Authentication |
US11681568B1 (en) * | 2017-08-02 | 2023-06-20 | Styra, Inc. | Method and apparatus to reduce the window for policy violations with minimal consistency assumptions |
US10462171B2 (en) * | 2017-08-08 | 2019-10-29 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US20190052659A1 (en) * | 2017-08-08 | 2019-02-14 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US11303633B1 (en) * | 2017-08-09 | 2022-04-12 | Sailpoint Technologies, Inc. | Identity security gateway agent |
US20190087902A1 (en) * | 2017-08-18 | 2019-03-21 | Stephen A. Dawkins | Occupational telemedicine |
US20190068382A1 (en) * | 2017-08-30 | 2019-02-28 | Raytheon Company | Self-organizing mobile peer-to-peer mesh network authentication |
US20190089809A1 (en) * | 2017-09-15 | 2019-03-21 | Oracle International Corporation | Dynamic message queues for a microservice based cloud service |
US10348858B2 (en) * | 2017-09-15 | 2019-07-09 | Oracle International Corporation | Dynamic message queues for a microservice based cloud service |
US20190089757A1 (en) * | 2017-09-18 | 2019-03-21 | Inclusive Technology Solutions, LLC | Secure, multi-lingual, flexible access system and method |
US11354443B2 (en) * | 2017-09-26 | 2022-06-07 | Neighborhood Connections Llc | System and method for providing customizable property management services enabling increased transparency and communication |
US20190096013A1 (en) * | 2017-09-26 | 2019-03-28 | Joseph Balzamo, JR. | System and method for providing customizable property management services enabling increased transparency and communication |
US9948612B1 (en) * | 2017-09-27 | 2018-04-17 | Citrix Systems, Inc. | Secure single sign on and conditional access for client applications |
US20190149514A1 (en) * | 2017-09-27 | 2019-05-16 | Citrix Systems, Inc. | Secure Single Sign On And Conditional Access For Client Applications |
US10831789B2 (en) * | 2017-09-27 | 2020-11-10 | Oracle International Corporation | Reference attribute query processing for a multi-tenant cloud service |
US20190095516A1 (en) * | 2017-09-27 | 2019-03-28 | Oracle International Corporation | Reference attributes for related stored objects in a multi-tenant cloud service |
US20190098055A1 (en) * | 2017-09-28 | 2019-03-28 | Oracle International Corporation | Rest-based declarative policy management |
US20190098056A1 (en) * | 2017-09-28 | 2019-03-28 | Oracle International Corporation | Rest-based declarative policy management |
US10528551B2 (en) * | 2017-09-29 | 2020-01-07 | Oracle International Corporation | System and method for providing a representational state transfer proxy service for a blockchain cloud service |
US20190102162A1 (en) * | 2017-09-29 | 2019-04-04 | Oracle International Corporation | Application Templates and Upgrade Framework for a Multi-Tenant Identity Cloud Service |
US20190104196A1 (en) * | 2017-09-29 | 2019-04-04 | Oracle International Corporation | System and method for providing a representational state transfer proxy service for a blockchain cloud service |
US10867209B2 (en) * | 2017-10-09 | 2020-12-15 | Box, Inc. | Combining outputs of data processing services in a cloud-based collaboration platform |
US20190108419A1 (en) * | 2017-10-09 | 2019-04-11 | Box, Inc. | Combining outputs of data processing services in a cloud-based collaboration platform |
US11170116B2 (en) * | 2017-10-19 | 2021-11-09 | 3D Bridge Solutions Inc. | Systems, devices and methods for protecting and exchanging electronic computer files |
US20190121989A1 (en) * | 2017-10-19 | 2019-04-25 | 3D Bridge Solutions Inc. | Systems, devices and methods for protecting and exchanging electronic computer files |
US20190147515A1 (en) * | 2017-11-10 | 2019-05-16 | Facebook, Inc. | Facilitating transactions using transaction tokens |
US10911491B2 (en) * | 2017-11-20 | 2021-02-02 | International Business Machines Corporation | Encryption with sealed keys |
US11240275B1 (en) * | 2017-12-28 | 2022-02-01 | Fireeye Security Holdings Us Llc | Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture |
US11106515B1 (en) * | 2017-12-28 | 2021-08-31 | Wells Fargo Bank, N.A. | Systems and methods for multi-platform product integration |
US20190207912A1 (en) * | 2018-01-03 | 2019-07-04 | Syccure Inc. | Distributed authentication between network nodes |
US20190222424A1 (en) * | 2018-01-12 | 2019-07-18 | Nok Nok Labs, Inc. | System and method for binding verifiable claims |
US20190230090A1 (en) * | 2018-01-22 | 2019-07-25 | Salesforce.Com, Inc. | Technologies for integrating and sandboxing web resources |
US10693883B2 (en) * | 2018-01-22 | 2020-06-23 | Salesforce.Com, Inc. | Technologies for integrating and sandboxing web resources |
US20190238598A1 (en) * | 2018-01-29 | 2019-08-01 | Oracle International Corporation | Dynamic client registration for an identity cloud service |
US10938792B2 (en) * | 2018-01-31 | 2021-03-02 | Dell Products L.P. | Layered encryption for end to end communication |
US20190238519A1 (en) * | 2018-01-31 | 2019-08-01 | Dell Products L. P. | Layered encryption for end to end communication |
US20190246160A1 (en) * | 2018-02-06 | 2019-08-08 | Akamai Technologies, Inc. | Securing an overlay network against attack |
US20190245848A1 (en) * | 2018-02-08 | 2019-08-08 | Citrix Systems, Inc. | Fast Smart Card Login |
US10958640B2 (en) * | 2018-02-08 | 2021-03-23 | Citrix Systems, Inc. | Fast smart card login |
US20190266576A1 (en) * | 2018-02-27 | 2019-08-29 | Anchor Labs, Inc. | Digital Asset Custodial System |
US20190268165A1 (en) * | 2018-02-27 | 2019-08-29 | Anchor Labs, Inc. | Cryptoasset custodial system with different rules governing access to logically separated cryptoassets |
US20190332754A1 (en) * | 2018-03-05 | 2019-10-31 | The Boogie Badge, Inc. | Digital identity authentication and verification system, method, and device |
US11005839B1 (en) * | 2018-03-11 | 2021-05-11 | Acceptto Corporation | System and method to identify abnormalities to continuously measure transaction risk |
US11455641B1 (en) * | 2018-03-11 | 2022-09-27 | Secureauth Corporation | System and method to identify user and device behavior abnormalities to continuously measure transaction risk |
US20190289007A1 (en) * | 2018-03-14 | 2019-09-19 | Bank Of America Corporation | Preventing Unauthorized Access to Secure Information Systems Using Advanced Pre-Authentication Techniques |
US20190286812A1 (en) * | 2018-03-14 | 2019-09-19 | Microsoft Technology Licensing, Llc | Autonomous secrets renewal and distribution |
US11171950B1 (en) * | 2018-03-21 | 2021-11-09 | Pure Storage, Inc. | Secure cloud-based storage system management |
US20190306138A1 (en) * | 2018-03-27 | 2019-10-03 | Oracle International Corporation | Cross-Region Trust for a Multi-Tenant Identity Cloud Service |
US10931656B2 (en) * | 2018-03-27 | 2021-02-23 | Oracle International Corporation | Cross-region trust for a multi-tenant identity cloud service |
US10796016B2 (en) * | 2018-03-28 | 2020-10-06 | Visa International Service Association | Untethered resource distribution and management |
US20190306010A1 (en) * | 2018-04-02 | 2019-10-03 | Oracle International Corporation | Data Replication Conflict Detection and Resolution for a Multi-Tenant Identity Cloud Service |
US11258775B2 (en) * | 2018-04-04 | 2022-02-22 | Oracle International Corporation | Local write for a multi-tenant identity cloud service |
US20190312857A1 (en) * | 2018-04-04 | 2019-10-10 | Oracle International Corporation | Local Write for a Multi-Tenant Identity Cloud Service |
US20190312882A1 (en) * | 2018-04-05 | 2019-10-10 | The Toronto-Dominion Bank | Real-time authorization of initiated data exchanges based on dynamically generated tokenized data |
US20190312883A1 (en) * | 2018-04-05 | 2019-10-10 | The Toronto-Dominion Bank | Dynamic authorization of pre-staged data exchanges based on contextual data |
US11120158B2 (en) * | 2018-04-13 | 2021-09-14 | Plaid Inc. | Secure permissioning of access to user accounts, including secure distribution of aggregated user account data |
US20190318122A1 (en) * | 2018-04-13 | 2019-10-17 | Plaid Inc. | Secure permissioning of access to user accounts, including secure distribution of aggregated user account data |
US20210119785A1 (en) * | 2018-04-18 | 2021-04-22 | 2Key New Economics Ltd. | Decentralized protocol for maintaining cryptographically proven multi-step referral networks |
US20210243027A1 (en) * | 2018-04-20 | 2021-08-05 | Vishal Gupta | Decentralized document and entity verification engine |
US20210232306A1 (en) * | 2018-04-24 | 2021-07-29 | Handheld Community Ltd | A swipe to connect system for providing targeted content to a device |
US11328077B2 (en) * | 2018-05-04 | 2022-05-10 | Citrix Systems, Inc. | Systems and methods for providing data loss prevention via an embedded browser |
US20190340376A1 (en) * | 2018-05-04 | 2019-11-07 | Citrix Systems, Inc. | Systems and methods for providing data loss prevention via an embedded browser |
US20190384632A1 (en) * | 2018-05-08 | 2019-12-19 | Thomson Reuters Global Resources Unlimited Company | Systems and method for automating security workflows in a distributed system |
US20210081536A1 (en) * | 2018-05-11 | 2021-03-18 | Lattice Semiconductor Corporation | Secure boot systems and methods for programmable logic devices |
US20190394204A1 (en) * | 2018-06-25 | 2019-12-26 | Oracle International Corporation | Declarative Third Party Identity Provider Integration for a Multi-Tenant Identity Cloud Service |
US11012444B2 (en) * | 2018-06-25 | 2021-05-18 | Oracle International Corporation | Declarative third party identity provider integration for a multi-tenant identity cloud service |
US20200007530A1 (en) * | 2018-06-28 | 2020-01-02 | Oracle International Corporation | Session Synchronization Across Multiple Devices in an Identity Cloud Service |
US20210279734A1 (en) * | 2018-07-06 | 2021-09-09 | Visa International Service Association | Real time interaction processing system and method |
US20200012511A1 (en) * | 2018-07-09 | 2020-01-09 | Samsung Electronics Co., Ltd. | System and method for guest operating system using containers |
US11429712B2 (en) * | 2018-07-24 | 2022-08-30 | Royal Bank Of Canada | Systems and methods for dynamic passphrases |
US20200036528A1 (en) * | 2018-07-24 | 2020-01-30 | Royal Bank Of Canada | Systems and methods for secure tokenized credentials |
US20210173916A1 (en) * | 2018-07-24 | 2021-06-10 | Royal Bank Of Canada | Systems and methods for dynamic passphrases |
US10917389B2 (en) * | 2018-07-31 | 2021-02-09 | Splunk Inc. | Trusted tunnel bridge |
US20200045016A1 (en) * | 2018-07-31 | 2020-02-06 | Splunk Inc. | Trusted tunnel bridge |
US20200042971A1 (en) * | 2018-07-31 | 2020-02-06 | American Express Travel Related Services Co., Inc. | System and method for transaction account based micro-payments |
US10939295B1 (en) * | 2018-08-21 | 2021-03-02 | HYPR Corp. | Secure mobile initiated authentications to web-services |
US20210044976A1 (en) * | 2018-08-21 | 2021-02-11 | HYPR Corp. | Secure mobile initiated authentications to web-services |
US20200280855A1 (en) * | 2018-08-21 | 2020-09-03 | HYPR Corp. | Secure mobile initiated authentication |
US10764752B1 (en) * | 2018-08-21 | 2020-09-01 | HYPR Corp. | Secure mobile initiated authentication |
US11182379B2 (en) * | 2018-08-24 | 2021-11-23 | Oracle International Corporation | DAG based methods and systems of transaction processing in a distributed ledger |
US20200065300A1 (en) * | 2018-08-24 | 2020-02-27 | Oracle International Corporation | Dag based methods and systems of transaction processing in a distributed ledger |
US20200067903A1 (en) * | 2018-08-24 | 2020-02-27 | International Business Machines Corporation | Integration of Publish-Subscribe Messaging with Authentication Tokens |
US10846432B2 (en) * | 2018-09-11 | 2020-11-24 | OneLogin, Inc. | Secure data leak detection |
US20200084132A1 (en) * | 2018-09-11 | 2020-03-12 | Citrix Systems, Inc. | Systems and methods for application scripts for cross-domain applications |
US10924377B2 (en) * | 2018-09-11 | 2021-02-16 | Citrix Systems, Inc. | Systems and methods for application scripts for cross-domain applications |
US10623508B2 (en) * | 2018-09-12 | 2020-04-14 | Citrix Systems, Inc. | Systems and methods for integrated service discovery for network applications |
US20200084284A1 (en) * | 2018-09-12 | 2020-03-12 | Citrix Systems, Inc. | Systems and methods for integrated service discovery for network applications |
US20200092382A1 (en) * | 2018-09-19 | 2020-03-19 | Citrix Systems, Inc. | Systems and methods for maintaining and transferring saas session state |
US20200089898A1 (en) * | 2018-09-19 | 2020-03-19 | Citrix Systems, Inc. | Systems and methods for integrating html based application with embedded browser |
US10862978B2 (en) * | 2018-09-19 | 2020-12-08 | Citrix Systems, Inc. | Systems and methods for maintaining and transferring SaaS session state |
US11087008B2 (en) * | 2018-09-19 | 2021-08-10 | Citrix Systems, Inc. | Systems and methods for integrating HTML based application with embedded browser |
US10599486B1 (en) * | 2018-09-21 | 2020-03-24 | Citrix Systems, Inc. | Systems and methods for intercepting and enhancing SaaS application calls via embedded browser |
US20200097337A1 (en) * | 2018-09-21 | 2020-03-26 | Citrix Systems, Inc. | Systems and methods for intercepting and enhancing saas application calls via embedded browser |
US20200099738A1 (en) * | 2018-09-24 | 2020-03-26 | Citrix Systems, Inc. | Systems and methods for bridge protocol between diverse applications |
US20200106760A1 (en) * | 2018-10-01 | 2020-04-02 | Citrix Systems, Inc. | Systems and methods for slogan based sharing of living saas objects |
US11228583B2 (en) * | 2018-10-01 | 2022-01-18 | Citrix Systems, Inc. | Systems and methods for slogan based sharing of living SaaS objects |
US11785119B2 (en) * | 2018-10-02 | 2023-10-10 | Google Llc | Cloud-based microservices system |
US20200112589A1 (en) * | 2018-10-05 | 2020-04-09 | Citrix Systems, Inc. | Systems and methods for responsible intermediation of privacy policies |
US11095688B2 (en) * | 2018-10-05 | 2021-08-17 | Citrix Systems, Inc. | Systems and methods for responsible intermediation of privacy policies |
US20200112436A1 (en) * | 2018-10-09 | 2020-04-09 | Ca, Inc. | Token exchange with client generated token |
US20200120088A1 (en) * | 2018-10-10 | 2020-04-16 | Microsoft Technology Licensing, Llc | Progressive access to data and device functionality |
US20200117489A1 (en) * | 2018-10-11 | 2020-04-16 | Citrix Systems, Inc. | Systems and methods for traffic optimization via system on chip of intermediary device |
US11314532B2 (en) * | 2018-10-11 | 2022-04-26 | Citrix Systems, Inc. | Systems and methods for traffic optimization via system on chip of intermediary device |
US10977354B1 (en) * | 2018-10-25 | 2021-04-13 | Massachusetts Mutual Life Insurance Company | Authentication device for virtual assistant systems |
US11607615B2 (en) * | 2018-11-02 | 2023-03-21 | Google Llc | Systems and methods for providing multi-part persistent content |
US20210069596A1 (en) * | 2018-11-02 | 2021-03-11 | Google Llc | Systems and methods for providing multi-part persistent content |
US10862998B2 (en) * | 2018-11-06 | 2020-12-08 | Citrtix Systems, Inc. | Systems and methods for managing downloads from an embedded browser |
US20200145515A1 (en) * | 2018-11-06 | 2020-05-07 | Citrix Systems, Inc. | Systems and methods for managing downloads from an embedded browser |
US20210398124A1 (en) * | 2018-11-06 | 2021-12-23 | Visa International Service Association | Systems and methods for managing a transaction state object |
US11063953B2 (en) * | 2018-11-07 | 2021-07-13 | Citrix Systems, Inc. | Systems and methods for continuous authentication |
US11153285B2 (en) * | 2018-11-07 | 2021-10-19 | Citrix Systems, Inc. | Systems and methods for application pre-launch |
US20200145425A1 (en) * | 2018-11-07 | 2020-05-07 | Citrix Systems, Inc. | Systems and methods for continuous authentication |
US20200145385A1 (en) * | 2018-11-07 | 2020-05-07 | Citrix Systems, Inc. | Systems and methods for application pre-launch |
US20200153931A1 (en) * | 2018-11-08 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for latency masking via prefix caching |
US11153306B2 (en) * | 2018-11-08 | 2021-10-19 | Citrix Systems, Inc. | Systems and methods for secure SaaS redirection from native applications |
US20200151348A1 (en) * | 2018-11-08 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for a privacy screen for secure saas applications |
US20200153818A1 (en) * | 2018-11-08 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for secure saas redirection from native applications |
US10708382B2 (en) * | 2018-11-08 | 2020-07-07 | Citrix Systems, Inc. | Systems and methods for latency masking via prefix caching |
US11475146B2 (en) * | 2018-11-08 | 2022-10-18 | Citrix Systems, Inc. | Systems and methods for a privacy screen for secure SaaS applications |
US20200151707A1 (en) * | 2018-11-08 | 2020-05-14 | Paypal, Inc. | Card storage handler for tracking of card data storage across service provider platforms |
US20200150980A1 (en) * | 2018-11-09 | 2020-05-14 | Citrix Systems, Inc. | Rendering content of service providers via web page having dynamically-loaded plugins |
US20200153911A1 (en) * | 2018-11-09 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for sharing saas content across workspace |
US11172029B2 (en) * | 2018-11-09 | 2021-11-09 | Citrix Systems, Inc. | Systems and methods for sharing SaaS content across workspace |
US11005891B2 (en) * | 2018-11-12 | 2021-05-11 | Citrix Systems, Inc. | Systems and methods for live SaaS objects |
US20200153862A1 (en) * | 2018-11-12 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for live saas objects |
US20200150838A1 (en) * | 2018-11-12 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for live tiles for saas |
US11226727B2 (en) * | 2018-11-12 | 2022-01-18 | Citrix Systems, Inc. | Systems and methods for live tiles for SaaS |
US10439825B1 (en) * | 2018-11-13 | 2019-10-08 | INTEGRITY Security Services, Inc. | Providing quality of service for certificate management systems |
US20200153821A1 (en) * | 2018-11-13 | 2020-05-14 | Mastercard International Incorporated | Systems and methods for facilitating network voice authentication |
US20200153920A1 (en) * | 2018-11-14 | 2020-05-14 | Citrix Systems, Inc. | Systems and methods for push notification service for saas applications |
US11064039B2 (en) * | 2018-11-14 | 2021-07-13 | Citrix Systems, Inc. | Systems and methods for push notification service for SaaS applications |
US11019066B2 (en) * | 2018-11-16 | 2021-05-25 | Citrix Systems, Inc. | Systems and methods for securely managing browser plugins via embedded browser |
US20200162471A1 (en) * | 2018-11-16 | 2020-05-21 | Citrix Systems, Inc. | Systems and methods for securely managing browser plugins via embedded browser |
US20200162359A1 (en) * | 2018-11-16 | 2020-05-21 | Citrix Systems, Inc. | Systems and methods for checking compatibility of saas apps for different browsers |
US20200160458A1 (en) * | 2018-11-21 | 2020-05-21 | Kony Inc. | System and method for generating actionable intelligence based on platform and community originated data |
US11003421B2 (en) * | 2018-11-21 | 2021-05-11 | Kony, Inc. | Event processing system and method |
US20200162454A1 (en) * | 2018-11-21 | 2020-05-21 | Citrix Systems, Inc. | Self-federation in authentication systems |
US20200167341A1 (en) * | 2018-11-26 | 2020-05-28 | Akamai Technologies, Inc. | High performance distributed system of record with hosted origin services |
US11356440B2 (en) * | 2018-11-30 | 2022-06-07 | International Business Machines Corporation | Automated IoT device registration |
US20200177589A1 (en) * | 2018-11-30 | 2020-06-04 | International Business Machines Corporation | Automated iot device registration |
US20200184558A1 (en) * | 2018-12-05 | 2020-06-11 | Abaxx Technologies Inc. | System and computer method for trading a commodity with carry costs |
US20200183761A1 (en) * | 2018-12-10 | 2020-06-11 | Mcafee, Llc | Portable hosted content |
US10838780B2 (en) * | 2018-12-10 | 2020-11-17 | Mcafee, Llc | Portable hosted content |
US20200193426A1 (en) * | 2018-12-18 | 2020-06-18 | Secude Ag | Method and system for creating and updating an authentic log file for a computer system and transactions |
US20220086132A1 (en) * | 2018-12-18 | 2022-03-17 | Thales Dis France Sa | Method to monitor sensitive web embedded code authenticity |
US20200213336A1 (en) * | 2018-12-26 | 2020-07-02 | International Business Machines Corporation | Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence |
US11303659B2 (en) * | 2018-12-26 | 2022-04-12 | International Business Machines Corporation | Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence |
US20220067138A1 (en) * | 2018-12-31 | 2022-03-03 | Thales Dis France Sa | Method and system for managing access to a service |
US11887112B2 (en) * | 2019-01-03 | 2024-01-30 | American Express Travel Related Services Company, Inc | Hybrid identity as a service for decentralized browser based wallets |
US20200219094A1 (en) * | 2019-01-03 | 2020-07-09 | American Express Travel Related Services Co., Inc. | Hybrid identity as a service for decentralized browser based wallets |
US20200228345A1 (en) * | 2019-01-15 | 2020-07-16 | Dell Products L.P. | Self-governed secure attestation policy for server data privacy logs |
US20220101326A1 (en) * | 2019-01-18 | 2022-03-31 | Uppsala Pte. Ltd. | Apparatus and method for cybersecurity |
US20200236152A1 (en) * | 2019-01-22 | 2020-07-23 | Apple Inc. | Network system for content playback on multiple devices |
US11102259B2 (en) * | 2019-01-22 | 2021-08-24 | Apple Inc. | Network system for content playback on multiple devices |
US11330096B2 (en) * | 2019-01-30 | 2022-05-10 | Rapidsos, Inc. | Emergency data statistics aggregation with data privacy protection |
US20200242600A1 (en) * | 2019-01-30 | 2020-07-30 | Bank Of America Corporation | System for leveraged collaborative pre-verification and authentication for secure real-time resource distribution |
US20200244797A1 (en) * | 2019-01-30 | 2020-07-30 | Rapidsos, Inc. | Emergency Data Statistics Aggregation with Data Privacy Protection |
US20200250664A1 (en) * | 2019-02-01 | 2020-08-06 | Oracle International Corporation | Multifactor Authentication Without a User Footprint |
US20200257700A1 (en) * | 2019-02-08 | 2020-08-13 | Oracle International Corporation | Replication of Resource Type and Schema Metadata for a Multi-Tenant Identity Cloud Service |
US20200265062A1 (en) * | 2019-02-19 | 2020-08-20 | Oracle International Corporation | Tenant Replication Bootstrap for a Multi-Tenant Identity Cloud Service |
US20200274717A1 (en) * | 2019-02-24 | 2020-08-27 | Ondefend Holdings, Llc | System And Apparatus For Providing Authenticable Electronic Communication |
US20200274900A1 (en) * | 2019-02-25 | 2020-08-27 | Oracle International Corporation | Automatic API Document Generation From SCIM Metadata |
US11792226B2 (en) * | 2019-02-25 | 2023-10-17 | Oracle International Corporation | Automatic api document generation from scim metadata |
US20200280550A1 (en) * | 2019-02-28 | 2020-09-03 | Nok Nok Labs, Inc. | System and method for endorsing a new authenticator |
US20200287894A1 (en) * | 2019-03-05 | 2020-09-10 | Citrix Systems, Inc. | Pre-authorization for service-to-service requests |
US11082229B2 (en) * | 2019-03-18 | 2021-08-03 | Capital One Services, Llc | System and method for pre-authentication of customer support calls |
US20220180461A1 (en) * | 2019-03-28 | 2022-06-09 | Orange | Method for negotiating a contract between two parties in a telecommunications network and devices implementing said method |
US10911926B2 (en) * | 2019-03-29 | 2021-02-02 | Rapidsos, Inc. | Systems and methods for emergency data integration |
US20200314623A1 (en) * | 2019-03-29 | 2020-10-01 | Rapidsos, Inc. | Systems and methods for emergency data integration |
US11115419B2 (en) * | 2019-04-06 | 2021-09-07 | International Business Machines Corporation | Identity attribute confidence scoring while certifying authorization claims |
US20200322342A1 (en) * | 2019-04-06 | 2020-10-08 | International Business Machines Corporation | Identity attribute confidence scoring while certifying authorization claims |
US20210367784A1 (en) * | 2019-04-16 | 2021-11-25 | Google Llc | Self-authenticating domain specific browser identifiers |
US20220131845A1 (en) * | 2019-04-30 | 2022-04-28 | Visa International Service Association | Decentralized Processing Of Interactions On Delivery |
US20200374324A1 (en) * | 2019-05-20 | 2020-11-26 | Citrix Systems, Inc. | Systems and methods for establishing a channel between multiple devices |
US11381610B2 (en) * | 2019-05-20 | 2022-07-05 | Citrix Systems, Inc. | Systems and methods for establishing a channel between multiple devices |
US20200389552A1 (en) * | 2019-06-06 | 2020-12-10 | International Business Machines Corporation | Multi-factor authentication of caller identification (id) identifiers |
US20200402052A1 (en) * | 2019-06-20 | 2020-12-24 | Bank Of America Corporation | Edge-node touchless authentication architecture |
US20210014266A1 (en) * | 2019-07-09 | 2021-01-14 | Nice Ltd. | System and method for generating and implementing a real-time multi-factor authentication policy across multiple channels |
US20210012334A1 (en) * | 2019-07-12 | 2021-01-14 | Aurus | Payment authentication system for electronic commerce transactions |
US20210021642A1 (en) * | 2019-07-16 | 2021-01-21 | International Business Machines Corporation | Multi-domain blockchain network with data flow control |
US20210019436A1 (en) * | 2019-07-18 | 2021-01-21 | Medox Exchange, Inc. | Communicating content over a communications network |
US20210036850A1 (en) * | 2019-07-31 | 2021-02-04 | EMC IP Holding Company LLC | Access controls for question delegation environments |
US11096059B1 (en) * | 2019-08-04 | 2021-08-17 | Acceptto Corporation | System and method for secure touchless authentication of user paired device, behavior and identity |
US20210056547A1 (en) * | 2019-08-19 | 2021-02-25 | Anchor Labs, Inc. | Cryptoasset custodial system with proof-of-stake blockchain support |
US10824702B1 (en) * | 2019-09-09 | 2020-11-03 | Acceptto Corporation | System and method for continuous passwordless authentication across trusted devices |
US20210081252A1 (en) * | 2019-09-13 | 2021-03-18 | Oracle International Corporation | Multi-Tenant Identity Cloud Service with On-Premise Authentication Integration and Bridge High Availability |
US11687378B2 (en) * | 2019-09-13 | 2023-06-27 | Oracle International Corporation | Multi-tenant identity cloud service with on-premise authentication integration and bridge high availability |
US20210084031A1 (en) * | 2019-09-13 | 2021-03-18 | Oracle International Corporation | Multi-Tenant Identity Cloud Service with On-Premise Authentication Integration |
US11870770B2 (en) * | 2019-09-13 | 2024-01-09 | Oracle International Corporation | Multi-tenant identity cloud service with on-premise authentication integration |
US20210081947A1 (en) * | 2019-09-17 | 2021-03-18 | Plaid Inc. | System and method linking to accounts using credential-less authentication |
US11869005B2 (en) * | 2019-09-17 | 2024-01-09 | Plaid Inc. | System and method linking to accounts using credential-less authentication |
US20210090183A1 (en) * | 2019-09-23 | 2021-03-25 | Arthur Ray Kerr | System and method for customizable link between two entities |
US11062403B2 (en) * | 2019-09-23 | 2021-07-13 | Arthur Ray Kerr | System and method for customizable link between two entities |
US20210091951A1 (en) * | 2019-09-25 | 2021-03-25 | Valimail Inc. | Centralized session key issuance and rotation |
US20210110392A1 (en) * | 2019-10-11 | 2021-04-15 | Mastercard International Incorporated | Systems and methods for use in facilitating network messaging |
US11757891B1 (en) * | 2019-10-29 | 2023-09-12 | Meta Platforms, Inc. | Using a host application to authorize a user of a client device to perform an action within a guest application |
US20210141913A1 (en) * | 2019-11-12 | 2021-05-13 | Accenture Global Solutions Limited | System and Method for Management of Policies and User Data during Application Access Sessions |
US20210149855A1 (en) * | 2019-11-15 | 2021-05-20 | Bank Of America Corporation | Conversion mechanism for complex cohabitation databases |
US11611548B2 (en) * | 2019-11-22 | 2023-03-21 | Oracle International Corporation | Bulk multifactor authentication enrollment |
US20210160231A1 (en) * | 2019-11-22 | 2021-05-27 | Oracle International Corporation | Bulk Multifactor Authentication Enrollment |
US20210166573A1 (en) * | 2019-12-01 | 2021-06-03 | Salesforce.Com, Inc. | Systems and methods for validating localized assessments in an external system |
US11120702B2 (en) * | 2019-12-01 | 2021-09-14 | Salesforce.Com, Inc. | Systems and methods for validating localized assessments in an external system |
US10951606B1 (en) * | 2019-12-04 | 2021-03-16 | Acceptto Corporation | Continuous authentication through orchestration and risk calculation post-authorization system and method |
US11444935B2 (en) * | 2019-12-11 | 2022-09-13 | Arris Enterprises Llc | Certificate-based client authentication and authorization for automated interface |
US20210194704A1 (en) * | 2019-12-11 | 2021-06-24 | Arris Enterprises Llc | Certificate-based client authentication and authorization for automated interface |
US20210182895A1 (en) * | 2019-12-17 | 2021-06-17 | Akamai Technologies, Inc. | High performance distributed system of record with extended transaction processing capability |
US11657389B2 (en) * | 2019-12-27 | 2023-05-23 | Paypal, Inc. | Data input using multi-factor authentication |
US20210203648A1 (en) * | 2019-12-27 | 2021-07-01 | Paypal, Inc. | Data input using multi-factor authentication |
US11570203B2 (en) * | 2019-12-31 | 2023-01-31 | Akamai Technologies, Inc. | Edge network-based account protection service |
US20210226987A1 (en) * | 2019-12-31 | 2021-07-22 | Akamai Technologies, Inc. | Edge network-based account protection service |
US20230035278A1 (en) * | 2020-01-07 | 2023-02-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Method to access or manage an operator's voicemail system from a digital assist or smart device |
US20210216668A1 (en) * | 2020-01-10 | 2021-07-15 | International Business Machines Corporation | Automated web session timeout enforcement |
US20210226933A1 (en) * | 2020-01-16 | 2021-07-22 | 360 It, Uab | Sharing encrypted items with participants verification |
US11550879B2 (en) * | 2020-01-19 | 2023-01-10 | Cloudinary Ltd. | System, device, and method of providing authenticity and rights verification mechanism for media content and for its derived versions |
US20210224357A1 (en) * | 2020-01-19 | 2021-07-22 | Cloudinary Ltd. | System, Device, and Method of Providing Authenticity and Rights Verification Mechanism for Media Content and for its Derived Versions |
US11743257B2 (en) * | 2020-01-22 | 2023-08-29 | Valimail Inc. | Automated authentication and authorization in a communication system |
US20210226951A1 (en) * | 2020-01-22 | 2021-07-22 | Valimail Inc. | Automated authentication and authorization in a communication system |
US20210234868A1 (en) * | 2020-01-23 | 2021-07-29 | Bank Of America Corporation | Sleeper keys |
US11089107B1 (en) * | 2020-01-31 | 2021-08-10 | Splunk Inc. | Management of connected sensor devices |
US20210243038A1 (en) * | 2020-02-04 | 2021-08-05 | Valimail Inc. | Spatial broadcasting device authentication |
US20230052150A1 (en) * | 2020-02-06 | 2023-02-16 | Hyundai Motor Company | Bootstrap method of electric vehicle charging station |
US11055119B1 (en) * | 2020-02-26 | 2021-07-06 | International Business Machines Corporation | Feedback responsive interface |
US20210273961A1 (en) * | 2020-02-28 | 2021-09-02 | Darktrace Limited | Apparatus and method for a cyber-threat defense system |
US20210281573A1 (en) * | 2020-03-06 | 2021-09-09 | Proxy, Inc | Authorized off-line access methods and apparatus |
US11588801B1 (en) * | 2020-03-12 | 2023-02-21 | Amazon Technologies, Inc. | Application-centric validation for electronic resources |
US20210306344A1 (en) * | 2020-03-31 | 2021-09-30 | Lendingclub Corporation | Dynamically-tiered authentication |
US20210306334A1 (en) * | 2020-03-31 | 2021-09-30 | Lendingclub Corporation | Conditionally-deferred authentication steps for tiered authentication |
US11470090B2 (en) * | 2020-03-31 | 2022-10-11 | LendingClub Bank, National Association | Dynamically-tiered authentication |
US20210306346A1 (en) * | 2020-03-31 | 2021-09-30 | Lendingclub Corporation | Secure content management through authentication |
US11483312B2 (en) * | 2020-03-31 | 2022-10-25 | LendingClub Bank, National Association | Conditionally-deferred authentication steps for tiered authentication |
US11522867B2 (en) * | 2020-03-31 | 2022-12-06 | LendingClub Bank, National Association | Secure content management through authentication |
US11537701B2 (en) * | 2020-04-01 | 2022-12-27 | Toyota Motor North America, Inc. | Transport related n-factor authentication |
US20210318894A1 (en) * | 2020-04-10 | 2021-10-14 | Citrix Systems, Inc. | Remoting user credential information to a remote browser |
US11093944B1 (en) * | 2020-04-30 | 2021-08-17 | Capital One Services, Llc | Systems and methods for peer-to-peer identity verification |
US20210390551A1 (en) * | 2020-06-15 | 2021-12-16 | Capital One Services, Llc | Intelligent transaction pre-authorization using a browser extension |
US20220006774A1 (en) * | 2020-07-02 | 2022-01-06 | Afilias Limited | System and method for publishing dns records of a domain including either signed or unsigned records |
US20220012795A1 (en) * | 2020-07-10 | 2022-01-13 | Paypal, Inc. | Migration of electronic shopping carts between devices |
US20220021639A1 (en) * | 2020-07-16 | 2022-01-20 | Afilias Limited | System and method for generating concurrently live and test versions of dns data |
US11095506B1 (en) * | 2020-07-22 | 2021-08-17 | Servicenow, Inc. | Discovery of resources associated with cloud operating system |
US20220043902A1 (en) * | 2020-08-04 | 2022-02-10 | International Business Machines Corporation | Verifiable labels for mandatory access control |
US11252149B1 (en) * | 2020-09-30 | 2022-02-15 | Amazon Technologies, Inc. | Resource management techniques for dialog-driven applications |
US20220116345A1 (en) * | 2020-10-13 | 2022-04-14 | Citrix Systems, Inc. | State-sharing plug-in citrix workspace environment |
US11451500B2 (en) * | 2020-10-13 | 2022-09-20 | Citrix Systems, Inc. | State-sharing plug-in citrix workspace environment |
US20230013371A1 (en) * | 2020-10-29 | 2023-01-19 | Tencent Technology (Shenzhen) Company Limited | Data communication method, apparatus, and device, storage medium, and computer program product |
US20220172251A1 (en) * | 2020-12-01 | 2022-06-02 | Welect GmbH | System for on-demand advertising |
US11171939B1 (en) * | 2020-12-01 | 2021-11-09 | Valimail Inc. | Automated device discovery and workflow enrichment |
US11558373B2 (en) * | 2020-12-01 | 2023-01-17 | Oracle International Corporation | Gradual password rollover |
US20220174061A1 (en) * | 2020-12-01 | 2022-06-02 | Oracle International Corporation | Gradual password rollover |
US11550796B2 (en) * | 2020-12-04 | 2023-01-10 | International Business Machines Corporation | Coexistence mediator for facilitating blockchain transactions |
US20220191199A1 (en) * | 2020-12-10 | 2022-06-16 | Cisco Technology, Inc. | Cloud delivered access |
US20220191186A1 (en) * | 2020-12-10 | 2022-06-16 | Okta, Inc. | Access to federated identities on a shared kiosk computing device |
US20220198394A1 (en) * | 2020-12-23 | 2022-06-23 | Capital One Services, Llc | Secured data workflow integration and methods thereof |
US20220239639A1 (en) * | 2021-01-22 | 2022-07-28 | Dell Products L.P. | Multi-Factor Authentication Methods And Related Systems |
US11165789B1 (en) * | 2021-01-28 | 2021-11-02 | Zoom Video Communications, Inc. | Application interaction movement between clients |
US20220260989A1 (en) * | 2021-02-15 | 2022-08-18 | Argo AI, LLC | System and Method for A Modular and Continually Learning Remote Guidance System for Autonomous Vehicles |
US20220272084A1 (en) * | 2021-02-19 | 2022-08-25 | Lenworth Alexander Hyatt | 5G-WiFi inside secure iris biometrics' login |
US20230367833A1 (en) * | 2021-07-26 | 2023-11-16 | Bright Data Ltd. | Emulating Web Browser in a Dedicated Intermediary Box |
US11537502B1 (en) * | 2021-11-19 | 2022-12-27 | Bank Of America Corporation | Dynamic system for active detection and mitigation of anomalies in program code construction interfaces |
US20230199032A1 (en) * | 2021-12-22 | 2023-06-22 | Avaya Management L.P. | Endpoint control over a text channel of a real-time communication session |
US11734032B1 (en) * | 2022-03-31 | 2023-08-22 | Microsoft Technology Licensing, Llc | Virtual desktop switching and communications |
US11829335B1 (en) * | 2022-06-15 | 2023-11-28 | VJ Solutions LLC | Using machine learning to provide a single user interface for streamlines deployment and management of multiple types of databases |
Non-Patent Citations (10)
Title |
---|
Almorsy et al "Collaboration-Based Cloud Computing Security Management Framework," IEEE Computer Society, Pages 364-371 (Year: 2011) * |
Amigopod "Access Code Logins: Unified Visitor Management," Revision 1.0, Pages 1-17 (Year: 2010) * |
Bako et al "Linearly Ordered Plugins through Self-Organization," IEEE, Pages 1-7 (Year: 2006) * |
Ghaffari et al "Security Considerations and Requirements for Cloud Computing," IEEE, Pages 105-110 (Year: 2016) * |
Hamilton et al "Database Multi-Factor Authentication via Pluggable Authentication Modules," The 12th International Conference for Internet Technology and Secured Transactions (ICITST-2017), IEEE, Pages 367-368 (Year: 2017) * |
Hamilton et al "Database Multi-Factor Authentication via Pluggable Authentication Modules," The 12th International Conference for Internet Technology and Secured Transactions (ICITST-2017), Pages 367-368 (Year: 2017) * |
Kaur et al "Cloud Computing Security Issues and its Solution: A Review," IEEE, Pages 1198-1200 (Year: 2015) * |
Revar et al "Securing User Authentication using Single Sign-On in Cloud Computing," Institute of Technology, NIRMA University, Ahmedabad, IEEE, Pages 1-4 (Year: 2011) * |
Shaikh et al "Security Threats in Cloud Computing," IEEE, Pages 214-219 (Year: 2011) * |
Zhao et al "Constructing Authentication Web in Cloud Computing," 2013 International Conference on Cloud and Service Computing, IEEE Computer Society, Pages 106-111 (Year: 2013) * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12238101B2 (en) * | 2021-03-09 | 2025-02-25 | Oracle International Corporation | Customizing authentication and handling pre and post authentication in identity cloud service |
US11620363B1 (en) | 2021-03-15 | 2023-04-04 | SHAYRE, Inc. | Systems and methods for authentication and authorization for software license management |
US12013920B2 (en) | 2021-03-15 | 2024-06-18 | SHAYRE, Inc. | Systems and methods for authentication and authorization for software license management |
US11632362B1 (en) * | 2021-04-14 | 2023-04-18 | SHAYRE, Inc. | Systems and methods for using JWTs for information security |
US11811746B2 (en) | 2021-04-14 | 2023-11-07 | SHAYRE, Inc. | Systems and methods for using JWTs for information security |
US11621830B1 (en) | 2021-06-28 | 2023-04-04 | SHAYRE, Inc. | Systems and methods for facilitating asynchronous secured point-to-point communications |
US12155752B2 (en) | 2021-06-28 | 2024-11-26 | SHAYRE, Inc. | Systems and methods for facilitating asynchronous secured point-to-point communications |
US20230103087A1 (en) * | 2021-09-24 | 2023-03-30 | Sap Se | Cloud plugin for legacy on-premise application |
US11841731B2 (en) * | 2021-09-24 | 2023-12-12 | Sap Se | Cloud plugin for legacy on-premise application |
US11922163B2 (en) | 2021-09-24 | 2024-03-05 | Sap Se | Cloud version management for legacy on-premise application |
US12026496B2 (en) | 2021-09-24 | 2024-07-02 | Sap Se | Cloud upgrade for legacy on-premise application |
US12254020B2 (en) | 2021-09-24 | 2025-03-18 | Sap Se | Container plugin for legacy on-premise application |
Also Published As
Publication number | Publication date |
---|---|
US12238101B2 (en) | 2025-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12238101B2 (en) | Customizing authentication and handling pre and post authentication in identity cloud service | |
US11316689B2 (en) | Trusted token relay infrastructure | |
US11245682B2 (en) | Adaptive authorization using access token | |
US10643149B2 (en) | Whitelist construction | |
US12058264B2 (en) | Techniques for using signed nonces to secure cloud shells | |
JP2018533141A (en) | Access server authenticity check initiated by end user | |
US12095755B1 (en) | Techniques for simultaneously accessing multiple isolated systems while maintaining security boundaries | |
US12069166B2 (en) | Quorum-based authorization | |
US12261834B2 (en) | Automatic sign-in upon account signup | |
WO2023055734A1 (en) | Applications as resource principals or service principals | |
US12273343B2 (en) | Techniques for dynamically assigning client credentials to an application | |
US20230100200A1 (en) | Token exchange between bearer and pop tokens | |
US20250023952A1 (en) | Client cookie management system | |
US12229297B2 (en) | Techniques for backwards compatibility in an identity management cloud service | |
US12316762B2 (en) | Applications as resource principals or service principals | |
US20230098641A1 (en) | Single logout | |
US20230103886A1 (en) | Single sign-on between 2 independent states | |
US20250030549A1 (en) | Workload Identity Resource Principle | |
US20240386124A1 (en) | Sovereign data center incoming data management | |
US20230097515A1 (en) | Combined authorization for entities within a domain | |
US20240340272A1 (en) | Secure instance metadata as cryptographic identity | |
WO2025024094A1 (en) | Workload identity resource principle |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: ORACLE INTERNATIONAL CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PATTAR, NAGARAJ;KANDASAMY, PARTHIPAN;SUBBAIYAN, ASHOK KUMAR;SIGNING DATES FROM 20210304 TO 20210305;REEL/FRAME:055579/0188 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |