Patent classifications
H04L41/0293
Stacking of tentant-aware services
Methods and systems are used for using services in stacked services. As an example, a first service instance of a first service bound to a first application is instantiated. A second service instance of a second service is instantiated from within a first service broker. The second service instance is bound to the first service to be used indirectly in a context of the first application. A subaccount of the first application is provided to the second service as a first consumer. A third service instance of a third service is instantiated from within a second service broker. The third service instance is bound to the second service to be used indirectly in a context of the first application. The first application uses the second service indirectly through the first service. The subaccount of the first application is provided to the third service as the first consumer.
INTEGRATED ANALYSIS AND RECLAMATION OF REMOTE SERVICE RESOURCES
One or more databases contain data defining: a common authentication configuration for a plurality of remote services, and individual authentication configurations for each of the remote services, where a particular remote service of the remote services is associated with a particular individual authentication configuration. One or more server devices are configured to: (i) access, by way of the common authentication configuration and the particular individual authentication configuration, a master userid of the particular remote service; (ii) receive, from the particular remote service, a list of userids that are registered to the managed network and configured to use the particular remote service; (iii) receive, from the particular remote service, access data representing use of the particular remote service by the userids; (iv) determine, from the access data, most-recent access times of the userids; and (v) store, in the one or more databases, representations of the most-recent access times.
STACKING OF TENTANT-AWARE SERVICES
Methods and systems are used for using services in stacked services. As an example, a first service instance of a first service bound to a first application is instantiated. A second service instance of a second service is instantiated from within a first service broker. The second service instance is bound to the first service to be used indirectly in a context of the first application. A subaccount of the first application is provided to the second service as a first consumer. A third service instance of a third service is instantiated from within a second service broker. The third service instance is bound to the second service to be used indirectly in a context of the first application. The first application uses the second service indirectly through the first service. The subaccount of the first application is provided to the third service as the first consumer.
WEBSERVER INTERFACE FOR DEPLOYMENT MANAGEMENT TOOL
A computer-implemented method includes submitting a description of devices to a webserver and receiving an identifier for the devices from the webserver. Information related to an application to be deployed is submitted to the webserver and an identifier for the application is received from the webserver. A request is submitted to the webserver to deploy the application to the devices, where the request includes the identifier for the devices and the identifier for the application. The request to deploy the application is independent of which deployment management tool is used to deploy the application to the devices.
DECOUPLING PLATFORM AS A SERVICE PROVIDERS USING A SERVICE MANAGEMENT PLATFORM
A registration interface is provided to service providers for registering services with a service management platform. The service management platform is configured to provide access to services from multiple service providers to application developers using a same application developer interface. A registration request is received for a service from a service provider. The service is registered to make the service available to application developers. A provision request for the service is received from an application developer. The provision request is forwarded to a broker associated with the service provider. A provision response is received from the broker. The provision response indicates a status of provisioning an instance of the service at the service provider. A create-binding request for binding information for the service is received from the application developer. Binding information is provided to the application developer, in response to the create-binding request.
Decoupling platform as a service providers using a service management platform
A registration interface is provided to service providers for registering services with a service management platform. The service management platform is configured to provide access to services from multiple service providers to application developers using a same application developer interface. A registration request is received for a service from a service provider. The service is registered to make the service available to application developers. A provision request for the service is received from an application developer. The provision request is forwarded to a broker associated with the service provider. A provision response is received from the broker. The provision response indicates a status of provisioning an instance of the service at the service provider. A create-binding request for binding information for the service is received from the application developer. Binding information is provided to the application developer, in response to the create-binding request.
Money transfer by use of a payment proxy
In some examples, a payment system generates, for a first user, a proxy identifier having a syntax including a symbol and a string of one or more characters that are concatenated such that the symbol appears immediately before the string. The proxy identifier is associated with a financial account of the first user. The payment system receives an indication of an intent to transfer funds from a second user to the first user. The indication includes the proxy identifier in lieu of financial account information of the first user, and to identify the financial account of the first user for receiving the funds. Based at least on identifying the proxy identifier, the payment system accesses the financial account information of the first user and initiates the transfer of funds from the financial account of the second user to the financial account of the first user.
Method and system for enhancing the security of a transaction
This invention concerns a method and system for improving the security of transaction in an emulated Integrated Circuit. Methods and devices for pre-generating session keys for securing transactions are provided. The generated session key is obfuscated with a preventing data for unauthorized use and/or access of the session cryptographic and encrypted. This encrypted obfuscated key is provisioned from a remote computer to the communication device. The mobile application is configured to decrypt and de-obfuscate the received encrypted obfuscated session cryptographic key, during a transaction. The method may also include generating, by the communication device, a transaction cryptogram using the decrypted and de-obfuscated session cryptographic key, and sending by the communication device to the remote system the transaction cryptogram to conduct the transaction. The transaction can be authorized based on at least whether the decrypted and de-obfuscated session cryptographic key is the expected one. With the invention, the session cryptographic key is keep unveiled from the moment they are provisioned to until the very last moment when the session cryptographic key is used to compute the cryptogram.
METHOD AND SYSTEM FOR A UNIFORM RESOURCE IDENTIFIER (URI) BROKER
A system provides the ability for developers to create and embed a URI in HTML, a document, or an application to invoke another application or functionality according to a URI scheme name. The invoked application does not natively react to URI selections. Rather, a URI Broker can redirect the URI selection to the desired application and conduct any pre-processing to allow the URI to invoke any application, even those that do not include URI capability.
Method for managing access to a set of resources delivered via an electronic device
The present invention concerns the field of the management of access to resources by an electronic device, in particular in the case where this device is controlled by firmware stored in a rewritable non-volatile memory. The invention aims to solve the aforementioned problems by the use of a reverse proxy module on the device that enables locating some of the resources of the management interface on a remote server. Access to these resources causes a redirection of the request to the remote server, the response from which is then transmitted to the local client by the device as if it came directly from the device.