1
Michele C Lee: Delivering output XML with dynamically selectable processing. Oblix, Vierra Magen Marcus Harmon & DeNiro, November 9, 2004: US06816871 (154 worldwide citation)

In response to a user request, an Identity System generates an Output XML containing raw identity information organized in accordance with a set of XML templates. The Identity System dynamically determines the desired response type and prepares the response from the Output XML. One response type is ...


2
Michael J Shandony: Request based caching of data store data. Oblix, Vierra Magen Marcus Harmon & DeNiro, January 6, 2004: US06675261 (152 worldwide citation)

A request, such as those embedded in URLs and XML documents, is assigned to a thread of execution in a server that is in communication with a data store. The thread of execution includes a thread local storage with a pointer to a cache object. The cache object maintains copies of data store entries ...


3
Kumar Vora, Rajesh Raman, Prakash Ramamurthy, Praveen R Swadi, Michael J Shandony, Vrinda S Joshi, Shahram Moatazedi, Adam C Stone: Method and apparatus for implementing a corporate directory and service center. Oblix, Vierra Magen Marcus Harmon & DeNiro, March 25, 2003: US06539379 (134 worldwide citation)

A method and apparatus for implementing a corporate directory and service center is described. The method includes and the apparatus performs querying for common characteristics, displaying information in a varied manner of displays and switching between the manners of displaying, maintaining data i ...


4
Michele C Lee: Preparing output XML based on selected programs and XML templates. Oblix, Vierra Magen Marcus Harmon & DeNiro, August 24, 2004: US06782379 (114 worldwide citation)

An Identity System delivers customized request responses that integrate the results of multiple programs. The Identity System receives and translates a user request. The Identity Systems employs a program service to identify all the programs required to complete the request. The Identity System uses ...


5
Crosbie Tanya M Mastin, Knouse Charles W, Crosbie Tanya M Mastin: Query string processing. Oblix, June 4, 2003: EP1316041-A1 (9 worldwide citation)

A system is disclosed that is used to provide access management for resources on a network. The system makes use of query data from a URL (or another identification or request) to identify the appropriate access rule. Examples of an access rule include an authentication rule, an authorization rule, ...


6
Srinivasagopalan Ramamurthy, Joan C Teng: Localized access. Oblix, June 4, 2003: EP1316016-A2 (8 worldwide citation)

An identity management system manages identity profiles that store information about various entities. A localized access feature for an identity management system allows for a set of identity profiles to be grouped together in order to define a locale. Users outside the locale can be restricted fro ...


7
Knouse Charles W, Lakshmi Velandai Thiyagarajan: Post data processing. Oblix, June 4, 2003: EP1316028-A1 (8 worldwide citation)

The present invention matches sets of authentification, authorization, and auditing rules to resources in an Access System based on the contents of POST data received in HTTP POST requests. The system of the present invention receives a POST request and matches a set of rules to a resource using POS ...


8
Argawal Sachin, Lee Michele C: Automatic configuration of attribute sets. Oblix, MAGEN Burt, January 22, 2004: WO/2004/008307 (1 worldwide citation)

Technology is disclosed for automaticall configuring attribute sets, such as object classes and classes of database tables. A system employing an object class, such as an Identity (40) or Access (34) System, configures (306) the object class for use by the system. One version of the system employs a ...


9
Lee Michele C, Ahmed Sajeed: Securely persisting network resource identifiers. Oblix, MAGEN Burt, January 22, 2004: WO/2004/008333 (1 worldwide citation)

Technology is disclosed for securely persisting a network resource identifier, such as a URL, that addresses a network resource (24), such as a portal. The network resource identifier is persisted from one network resource to another. A system accessed through the portal receives requests for access ...


10
Lee Chi Cheng, Tsang Andy M, Remahl Thomas B: Support for multiple data stores. Oblix, November 5, 2003: EP1358572-A1

Technology is disclosed for supporting multiple data stores (36a, 36b, 36c, 36d). The set of data stores can be of a uniform type, or the various data stores (36a, 36b, 36c, 36d) can be different types (e.g. LDAP, SQL, etc.). One implementation of the disclosed technology is with an Identity System. ...