Abstract:
Systems and methods authenticate with application extensions. An application extension requests a token from a local application. The local application generates a token and either inserts the token into a protected storage accessible only by the application extension being run by the current user or returns the token back to the application extension after being confirmed by the legitimate user. The application extension uses the token to authenticate itself with the local application.
Abstract:
Web page items and other requests can be automatically categorized. An interaction with a web page item can be categorized based on previous categorizations of other web page items in which the same or similar data has been entered into a web page. A classification database containing categories of classified web page items is maintained. An interaction database containing interaction records of a user is maintained. The interaction records include a value corresponding to the user and a web page item. A web page item on a web page visited by a user and that is a user-fillable field that has been previously categorized in the classification database may be automatically populated with a value stored in an interaction database and that corresponds to the user and the user-fillable field.
Abstract:
Systems and methods authenticate with application extensions. An application extension requests a token from a local application. The local application generates a token and either inserts the token into a protected storage accessible only by the application extension being run by the current user or returns the token back to the application extension after being confirmed by the legitimate user. The application extension uses the token to authenticate itself with the local application.
Abstract:
A data set shared by multiple nodes is encrypted. The data set can be split into independent records. The records can be encrypted and shared independently, without the need to modify and transmit the full data set. Although the records are encrypted with their own encryption key, they are all accessible by a single authentication method.
Abstract:
A data set shared by multiple nodes is encrypted. The data set can be split into independent records. The records can be encrypted and shared independently, without the need to modify and transmit the full data set. Although the records are encrypted with their own encryption key, they are all accessible by a single authentication method.
Abstract:
A trust relationship can be established between two or more identities without the need of a certificate authority. Trust relationships between identities can be maintained in a distributed ring of trust between two or more identities. The distributed ring of trust can be on a signed identity list. A node desiring to add an identity to the ring of trust sends a request to a member of the ring of trust. The receiving member can determine whether or not to approve the request. In some aspects, approval can be based on a previously shared key or a two-party verification. Upon approval, the requested identity is added to a trusted identity list indicating identities associated with current members of the ring of trust. The updated trusted identity list can then be distributed to the members of the ring of trust.