Proxy server-based network site account management
    35.
    发明授权
    Proxy server-based network site account management 有权
    基于代理服务器的网站帐户管理

    公开(公告)号:US09282098B1

    公开(公告)日:2016-03-08

    申请号:US13792678

    申请日:2013-03-11

    Abstract: Disclosed are various embodiments for network site account management using a proxy server. A first request for a secured resource on a network site is received from a client. It is determined whether stored account information is available for the secured resource. A second request for the secured resource is generated based at least in part on the stored account information in response to determining that the stored account information is available for the secured resource. The second request is sent to a server corresponding to the network site. The secured resource is received from the server, and the secured resource is sent to the client.

    Abstract translation: 公开了使用代理服务器进行网站帐户管理的各种实施例。 从客户端接收到网站上的安全资源的第一个请求。 确定存储的帐户信息是否可用于安全资源。 响应于确定存储的帐户信息对于安全资源可用,至少部分地基于所存储的帐户信息来生成对安全资源的第二请求。 第二个请求被发送到对应于该网站的服务器。 从服务器接收安全资源,并将安全资源发送给客户端。

    SYNCHRONIZING AUTHENTICATION SESSIONS BETWEEN APPLICATIONS
    36.
    发明申请
    SYNCHRONIZING AUTHENTICATION SESSIONS BETWEEN APPLICATIONS 有权
    同步应用之间的认证会议

    公开(公告)号:US20150341334A1

    公开(公告)日:2015-11-26

    申请号:US14817846

    申请日:2015-08-04

    Abstract: Disclosed are various embodiments for synchronizing authentication sessions between applications. In one embodiment, a first authentication token is received from a first application in response to determining that the first application is authenticated with a service provider. A second authentication token is requested from a token exchange service associated with the service provider. The second authentication token is requested using the first authentication token. The second application is configured to use the second authentication token in order to access a resource of the service provider.

    Abstract translation: 公开了用于在应用之间同步认证会话的各种实施例。 在一个实施例中,响应于确定第一应用被服务提供商认证,从第一应用接收第一认证令牌。 从与服务提供商相关联的令牌交换服务请求第二认证令牌。 使用第一认证令牌请求第二认证令牌。 第二应用被配置为使用第二认证令牌来访问服务提供商的资源。

    Passwordless strong authentication using trusted devices
    37.
    发明授权
    Passwordless strong authentication using trusted devices 有权
    使用可信设备进行无密码强认证

    公开(公告)号:US09178890B1

    公开(公告)日:2015-11-03

    申请号:US14101697

    申请日:2013-12-10

    Abstract: A code for accessing a resource having a customer account associated therewith is presented via a secondary device, and authentication data indicative of the code that was presented is received from a primary device. The primary device is identified as a trusted device associated with the customer account responsive to receiving the authentication data therefrom, and the secondary device is authenticated for access to the resource responsive to identification of the primary device as the trusted device associated with the customer account.

    Abstract translation: 通过辅助设备呈现用于访问具有与其相关联的客户帐户的资源的代码,并且从主设备接收到表示所呈现的代码的认证数据。 响应于从其接收到认证数据,主设备被识别为与客户帐户相关联的可信设备,并且辅助设备被认证用于响应于主设备的标识作为与该客户帐户相关联的信任设备的标识。

    Trustworthy indication of software integrity

    公开(公告)号:US10354075B1

    公开(公告)日:2019-07-16

    申请号:US15638867

    申请日:2017-06-30

    Abstract: Computing devices are disclosed that include functionality for providing a trustworthy indication of software integrity. The computing devices include a hardware trust evaluation device capable of determining the trustworthiness of computer programs executing on the devices. At least one trust indicator is also connected to the hardware trust evaluation device for providing an external indication of the trustworthiness of a computer program. Additional security information regarding the trustworthiness of the computer program may be displayed on the primary display device of the computing device. The display of the security information is triggered by a user of the computing device submitting a request through a secure mechanism, where the request is unobservable and inaccessible to programs executing on the computing device. Additional secure mechanisms, such as a unique user interface for displaying the security information, can be utilized to ensure the authenticity of the displayed security information.

Patent Agency Ranking