摘要:
Sending and receiving application or service data through an email transport for mobile computing devices occasionally disconnected from network connectivity. At a sending service or application, application or service data is intercepted from the application or service. The application or service data is packaged in an email message. The email message includes the application or service data within the email envelope and an identification of an application or service client to which the application or service data should be applied at a client computer system. The email message is sent through an email transport to a mobile client computer system which includes the application or service to which the application or service data should be applied. At the client the email message is intercepted. The data is extracted from the email envelope. The application or service client is identified. The data is routed to the appropriate application or service.
摘要:
Sending and receiving application or service data through an email transport for mobile computing devices occasionally disconnected from network connectivity. At a sending service or application, application or service data is intercepted from the application or service. The application or service data is packaged in an email message. The email message includes the application or service data within the email envelope and an identification of an application or service client to which the application or service data should be applied at a client computer system. The email message is sent through an email transport to a mobile client computer system which includes the application or service to which the application or service data should be applied. At the client the email message is intercepted. The data is extracted from the email envelope. The application or service client is identified. The data is routed to the appropriate application or service.
摘要:
Delivery of a message over a communications network from a sender based on a single delivery address. The single delivery address is generated as one unit for the message. The single delivery address has a collection of recipient addresses including one or more recipient addresses each identifying at least one recipient of the message. Each of the one or more recipient addresses includes a user level information and a domain level information. The generated single delivery address with the collection of recipient addresses is included in the message. A copy of the message is provided to the identified recipient(s) as a function of the domain level information of the one or more recipient addresses. The message is transmitted over the communications network to the identified recipient(s) recipient based on the collection of recipient addresses.
摘要:
Delivery of a message over a communications network from a sender based on a single delivery address. The single delivery address is generated as one unit for the message. The single delivery address has a collection of recipient addresses including one or more recipient addresses each identifying at least one recipient of the message. Each of the one or more recipient addresses includes a user level information and a domain level information. The generated single delivery address with the collection of recipient addresses is included in the message. A copy of the message is provided to the identified recipient(s) as a function of the domain level information of the one or more recipient addresses. The message is transmitted over the communications network to the identified recipient(s) recipient based on the collection of recipient addresses.
摘要:
A representational state transfer-based model for a computing environment uses models resources with links between them. Security principals are resources which can be independently authenticated. Each resource may be associated with an authorization policy that determines level of access, protocol supported. Successfully presenting security credentials at a security principal allows use of an instance of the security principal (i.e. application) as well as generation of an authentication token that can be presented across the computing environment to resources subscribing to the same authorization policy. As security principals with different security policies are authenticated, the appropriate tokens may be combined to allow broader access without undue re-authentication for resources subscribing to the same security policy. Authorization requirements (policies) may be attached to links to resources so that an application instance can dynamically discover authentication rules for that resource by inspecting the link.
摘要:
A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users and devices may be represented within the deployable computing environment. A relationship between a user and a device may specify that the device is owned by the user and that the device is authorized to perform operations within the deployable computing environment on behalf of the user. Secure authentication of devices and users for interaction within the deployable computing environment is achieved by authenticating tickets corresponding to the user, the device, and the relationship. A device identification ticket and a user identification ticket are used to authenticate the device and user for interaction within the deployable computing environment. A device claim ticket allows the device to perform delegated operations (e.g., data synchronization, peer connectivity, etc.) on behalf of the user without the user's credentials (e.g., user identification ticket).
摘要:
A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users and devices may be represented within the deployable computing environment. A relationship between a user and a device may specify that the device is owned by the user and that the device is authorized to perform operations within the deployable computing environment on behalf of the user. Secure authentication of devices and users for interaction within the deployable computing environment is achieved by authenticating tickets corresponding to the user, the device, and the relationship. A device identification ticket and a user identification ticket are used to authenticate the device and user for interaction within the deployable computing environment. A device claim ticket allows the device to perform delegated operations (e.g., data synchronization, peer connectivity, etc.) on behalf of the user without the user's credentials (e.g., user identification ticket).
摘要:
A representational state transfer-based model for a computing environment uses models resources with links between them. Security principals are resources which can be independently authenticated. Each resource may be associated with an authorization policy that determines level of access, protocol supported. Successfully presenting security credentials at a security principal allows use of an instance of the security principal (i.e. application) as well as generation of an authentication token that can be presented across the computing environment to resources subscribing to the same authorization policy. As security principals with different security policies are authenticated, the appropriate tokens may be combined to allow broader access without undue re-authentication for resources subscribing to the same security policy. Authorization requirements (policies) may be attached to links to resources so that an application instance can dynamically discover authentication rules for that resource by inspecting the link.