Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

114results about How to "Retain control" patented technology

Authentication and authorization methods for cloud computing security

An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.
Owner:IBM CORP

Authentication and authorization methods for cloud computing security platform

An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.
Owner:IBM CORP

Technique for centrally tracking transactions in an electronic billing system

A method is provided for centrally tracking transactions in an electronic billing system. The system includes multiple different billing entities, multiple different financial institute entities and multiple different user entities. Each of the multiple different billing entities is associated with a respective portion of the multiple different user entities and each of the multiple different financial institute entities is associated with a respective portion of the multiple different user entities. A message is received from any of the multiple different financial institute entities indicating a request from any of the multiple different user entities associated with the applicable financial institute entity to view billing information. The receipt of the request to view the billing information is logged in a database as first event information. A message indicative of the billing information of at least one of the multiple different billing entities associated with the applicable user entity which is available for viewing is transmitted to the applicable user entity. A message indicating a request from the applicable user entity to view the available billing information of that billing entity is received from any of the at least one of the billing entities. The receipt of the message indicating the applicable user entity request to view the billing information of the applicable billing entity is logged in the database as a second event information.
Owner:ORG WORLD INTPROP

Presentation and payment of bills over a wide area communications network

A bill is presented and payment of the presented bill is requested over a communications network having a first network site associated with a bill payment entity, a second network site, which is different than the first network site, associated with a user, and a third network site, which is different than the first and the second network sites, associated with a bill presentment entity, which is different than the bill payment entity. A first signal, representing a request of the user for billing information, is transmitted from the second network site to the first network site. Responsive to the transmitted first signal, a second signal representing a bill availability identifier for a bill of a biller for the user, is transmitted from the first network site to the second network site. The bill availability identifier represented by the transmitted second signal is displayed and a first user input representing a selection of the displayed bill availability identifier is received, at the second network site. A third signal, representing a request of the user for the identified bill, is transmitted from the second network site to a third network site responsive to the first user input. Responsive to the transmitted third signal, a fourth signal representing the requested bill and an associated pay bill indicator, is transmitted from the third network site to the second network site. The bill and associated pay bill indicator represented by the transmitted fourth signal are displayed and a second user input representing a selection of the displayed pay bill indicator is received at the second network site. Responsive to the second user input, a fifth signal representing a request of the user that the bill payment entity pay the displayed bill on behalf of the user, is transmitted from the second network site to the first network site.
Owner:CHECKFREE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products