Abstract:
PROBLEM TO BE SOLVED: To realize loose security within a network while retaining strong security against external access to a local network. SOLUTION: A user has access trusted nodes in a secured group within an unmanaged network, without being required to choose, enter and remember a login password. To establish such a secure blank password or one-click logon account for the user on a computer, a strong random password is generated and stored, and the account is designated as a blank password account. If the device is part of a secured network group, the strong random password is replicated to the other trusted nodes. When a user with a blank password account wishes to log in to a computer, the stored strong random password is retrieved and the user is authenticated. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To allow a user to log on to coexistent authentication infrastructures different from each other. SOLUTION: A credential is translated with one of different credential provider modules each translating a corresponding different type of credential into a common protocol. The translated credential is communicated through an API to a logon UI module to an OS of a local machine. An OS logon module is called by the logon UI module to authenticate the translated credential against a credential database. A user identified by the translated credential is logged on to access the local machine when the authentication is successful. The API establishes a network session with an access service specified by the selected PLAP module when the credential is authenticated with the credential database. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a data synchronization service in a peer-to-peer computing system environment. SOLUTION: In this method for synchronizing data shared between peer-to-peer computing devices is provided with following steps: a step 1 in which a selected data object is copied to a selected computing device; a step 2 in which a service on each device monitors the data object with respect to a change; a step 3 in which the service transmits a change notification to the other device so that the device can update a copy of the data object itself when the change is detected; a step 4 in which a user can access the data object from an optional device while knowing the acquisition of the latest version of the data object; step 5 in which the user turns files on some devices into ghost files instead of owing a cost for storing a large file on the all devices and stores not whole of the file but metadata alone; and a step 6 in which the user accesses the file via a ghost. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
A method of authenticating a user is disclosed. Multiple sets of credential information for multiple credentials and from multiple credential providers are received. Each set of credential information to enable tailoring of a portion of a graphical user interface to present one of the multiple credentials and to specify an acceptable credential type for the one of the multiple credentials. A request to authenticate the user is received. The multiple credentials are presented on the graphical user interface. The graphical user interface includes a corresponding portion for each of the multiple credentials that is tailored based on its set of credential information. An authenticator for one of the multiple credentials that is of the acceptable credential type is received. The authenticator is capable of authenticating the user. Alternatively a method of authenticating a user comprises gathering sets of information associated with two or more credentials. Each of the credentials capable of authenticating users and the sets of information are associated with the each of the credentials including instructions for submitting an authenticator for the each of the credentials to an authenticating entity. A graphical user interface to display the sets of information associated with the two or more credentials is tailored and the graphical user interface is presented. The graphical user interface enables selection of at least one of the two credentials.
Abstract:
Systems and/or methods are described that enable a credential interface. These systems and/or methods may build a credential user interface enabling a user to choose between multiple credentials and submit an authenticator for a chosen credential. These systems and/or methods may also gather information about arbitrary credentials and build a user interface for submission of authenticators for these arbitrary credentials.
Abstract:
Systems and/or methods are described that enable a credential interface. These systems and/or methods may build a credential user interface enabling a user to choose between multiple credentials and submit an authenticator for a chosen credential. These systems and/or methods may also gather information about arbitrary credentials and build a user interface for submission of authenticators for these arbitrary credentials.
Abstract:
Systems and/or methods are described that enable a credential interface. These systems and/or methods may build a credential user interface enabling a user to choose between multiple credentials and submit an authenticator for a chosen credential. These systems and/or methods may also gather information about arbitrary credentials and build a user interface for submission of authenticators for these arbitrary credentials.
Abstract:
A credential is translated with one of different credential provider modules each translating a corresponding different type of credential into a common protocol. The translated credential is communicated through an API to a logon UI module to an operating system (OS) of a local machine. An OS logon module is called by the logon UI module to authenticate the translated credential against a credential database. A user identified by the translated credential is logged on to access the local machine when the authentication is successful. The credential can also be used with a selection received from t he logon UI module via a corresponding one of different pre-log access provider (PLAP) modules that each communicate with the API. The API establishes a network session with an access service specified by the selected PLAP module when the credential is authenticated with the credential database.
Abstract:
Systems and/or methods are described that enable a credential interface. These systems and/or methods may build a credential user interface enabling a user to choose between multiple credentials and submit an authenticator for a chosen credential. These systems and/or methods may also gather information about arbitrary credentials and build a user interface for submission of authenticators for these arbitrary credentials.
Abstract:
A credential is translated with one of different credential provider modules each translating a corresponding different type of credential into a common protocol. The translated credential is communicated through an API to a logon UI module to an operating system (OS) of a local machine. An OS logon module is called by the logon UI module to authenticate the translated credential against a credential database. A user identified by the translated credential is logged on to access the local machine when the authentication is successful. The credential can also be used with a selection received from the logon UI module via a corresponding one of different pre-log access provider (PLAP) modules that each communicate with the API. The API establishes a network session with an access service specified by the selected PLAP module when the credential is authenticated with the credential database.