Daniel S. Sanders - Orem UT Scott W. Pathakis - Sandy UT
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 1730
US Classification:
707 2, 707 3, 707100, 707103 R
Abstract:
A correlation operator provides a way for the results of sub-queries to be correlated. The correlation operator has an implied existential quantifier property (i. e. , a âfor someâ property) and is satisfied if any record matches its sub-query. If no record is found that matches the correlation operator s sub-query, then the correlation operator query fails. The implicit existential quantifier property of the correlation operator can be converted into a universal quantifier property (i. e. , a âfor allâ property) by transformation of the query. The correlation operator uses an algebra to resolve into flags attached to appropriate operators in the sub-query. After the correlation operator is eliminated from the query, the query can be performed. The operator flags perform the correlation as part of the sub-query. The correlation operator can be inserted explicitly by the user if she knows what data she desires to be correlated.
Performing A Business Transaction Without Disclosing Sensitive Identity Information To A Relying Party
Patrick R. Felsted - Cedar Hills UT, US Thomas E. Doman - Pleasant Grove UT, US James G. Sermersheim - Woodland Hills UT, US Daniel S. Sanders - Orem UT, US Andrew A. Hodgkinson - Pleasant Grove UT, US Dale R. Olds - Draper UT, US
A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
Framework And Technology To Enable The Portability Of Information Cards
Patrick R. Felsted - Cedar Hills UT, US Andrew A. Hodgkinson - Pleasant Grove UT, US Daniel S. Sanders - Orem UT, US James G. Sermersheim - Woodland Hills UT, US James Mark Norman - Pleasant Grove UT, US
International Classification:
G06F 21/00 H04L 29/06
US Classification:
726 1, 726 9, 726 20, 705 65
Abstract:
When a user connects a pluggable card store to a machine, the machine plugs a pluggable card provider into a card provider registry. The pluggable card store can be an object portable to the user, or can be a remote store available via some connection, such as an FTP connection. The user can then use the information cards stored on the pluggable card store in a transaction.
James Mark Norman - Pleasant Grove UT, US Daniel S. Sanders - Orem UT, US
International Classification:
G06F 21/00 H04L 29/06
US Classification:
726 1, 726 9, 726 20, 705 65
Abstract:
A machine includes card stores to store information cards. For each card store, one or more card selectors can be provided. When performing a transaction involving information cards, a generic card selector, using a selector policy engine, can identify a card selector to use for the transaction. The identified card selector can be used to identify an information card in a card store to use in performing the transaction, which can be used to provide a security token to the relying party.
James Mark Norman - Pleasant Grove UT, US Daniel S. Sanders - Orem UT, US
Assignee:
Apple Inc. - Cupertino CA
International Classification:
G06F 21/00 H04L 29/06
US Classification:
726 1, 726 9, 726 20, 705 65
Abstract:
A machine includes card stores to store information cards. For each card store, one or more card selectors can be provided. When performing a transaction involving information cards, a generic card selector, using a selector policy engine, can identify a card selector to use for the transaction. The identified card selector can be used to identify an information card in a card store to use in performing the transaction, which can be used to provide a security token to the relying party.
Performing A Business Transaction Without Disclosing Sensitive Identity Information To A Relying Party
Patrick R. Felsted - Cedar Hills UT, US Thomas E. Doman - Pleasant Grove UT, US James G. Sermersheim - Woodland Hills UT, US Daniel S. Sanders - Orem UT, US Andrew A. Hodgkinson - Pleasant Grove UT, US Dale R. Olds - Draper UT, US
Assignee:
Apple Inc. - Cupertino CA
International Classification:
G06F 21/00
US Classification:
705 64, 705 51, 705 59, 705 65, 705 79
Abstract:
A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
Daniel Spaugh Sanders - Orem UT, US John Paul Gassner - Alexandria VA, US David Gordon Corlette - Washington DC, US
Assignee:
EMC Corporation - Hopkinton MA
International Classification:
G06N 5/02 G06F 15/173
US Classification:
706 48
Abstract:
A syslog message routing system can include multiple syslog sources, a syslog message routing module, and multiple syslog parsers. The syslog message routing module can receive a syslog message from one of the syslog sources, identify a particular syslog parser to handle the syslog message, and send the syslog message to the selected syslog parser. The syslog message routing module can identify the syslog parser by applying at least one of an application ID-based policy, a unique pattern matching rule policy, and a universal syslog parser policy.
System And Method For Application-Integrated Information Card Selection
Thomas E. Doman - Pleasant Grove UT, US Duane F. Buss - West Mountain UT, US Daniel S. Sanders - Orem UT, US Andrew A. Hodgkinson - Pleasant Grove UT, US James G. Sermersheim - Woodland Hills UT, US James M. Norman - Pleasant Grove UT, US
A selector daemon can run in the background of a computer. Applications that are capable of processing information cards directly, without requiring the use of a card selector, can request the selector daemon to list information cards that satisfy security policy. Upon receiving such a request, selector daemon can determine the information cards available on the computer that satisfy the security policy, and can identify these information cards to the requesting application. The applications can then use the identified information cards in any manner desired, without having to use a card selector: for example, by requesting a security token based on one of the information cards directly from an identity provider.
Isbn (Books And Publications)
Deutscher Sprachschatz: Geordnet Nach Begriffen Zur Leichten Auffindung Und Auswahl Des Passenden Ausdrucks Ein Stilistisches Hulfsbuch Fur Jeden Deutsch Schreibenden
Deutscher Sprachschatz: Geordnet Nach Begriffen Zur Leichten Auffindung Und Auswahl Des Passenden Ausdrucks Ein Stilistisches Hulfsbuch Fur Jeden Deutsch Schreibenden
Administrative Law Appellate Practice Business Law Construction Law Dispute Resolution Local Government Practice Litigation - General Civil Practice Judges & Courts Real Estate Law Taxation - Corp. & Business Tort & Personal Injury Ethics Ethics
Aurora Charter Oak Hospital - Psychotherapist (2006) Los Angeles Unified Schools - Teacher (1987-2008)
Education:
Azusa Pacific University - Clinical Psychology, California State University, Los Angeles - Teaching credential, Ohio State University - Microbiology, Citrus College - Wrenching on Cars
Daniel Sanders
Work:
Lumen Christi Parish - Pastor
Education:
Pontifical Gregorian University - Biblical Theology, University of Wisconsin-Milwaukee - Latin American Studies
Daniel Sanders
Work:
Guinness World Records
Education:
University of Paris VII: Denis Diderot
Daniel Sanders
Work:
Cozean Memorial Chapel - General Manager
Relationship:
Married
Daniel Sanders
Work:
TBWA\
Daniel Sanders
Education:
Harrison
Daniel Sanders
Education:
Delaware College of Art and Design - Graphic Design