1
Patrick Charles Mancuso, Scott Howard Prager: Centralized mapping of security credentials for database access operations. International Business Machines Corporation, Brown Raysman Millstein Felder & Steiner, August 23, 2005: US06934706 (94 worldwide citation)

An enterprise data integration product which facilitates access to one or more external or remote databases so as to provide integration from a central application. The product enables a user to pre-populate a credential database which stores the user's security credentials for each of the remote da ...


2
Scott Howard Prager: Method and system for providing access to computer resources that utilize distinct protocols for receiving security information and providing access based on received security information. International Business Machines Corporation, Brown Raysman Millstein Felder & Steiner, August 29, 2006: US07100207 (22 worldwide citation)

A method for providing a user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information. A request is received from the user identifying one ...


3
Scott Howard Prager: Data transformer system for accessing database information. International Business Machines Corporation, Hunton & Williams, December 14, 1999: US06003025 (3 worldwide citation)

A database accessing system wherein a data transformer is provided to make it possible to access data between one or more different databases storing and retrieving information in a predetermined and heterogeneous format. The system has one or more data providers for accessing information stored in ...


4
Scott Howard Prager: Method and system for providing access to computer resources that utilize distinct protocols for receiving security information and providing access based on received security information. International Business Machines Corporation, Ostrow Kaufman & Frankl, November 9, 2010: US07832015

A method for providing a user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information. A request is received from the user identifying one ...


5
Scott Howard Prager: Method and system for providing access to computer resources that utilize distinct protocols for receiving security information and providing access based on received security information. Brown Raysman Millstein Felder & Steiner, August 3, 2006: US20060174131-A1

A method for providing a user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information. A request is received from the user identifying one ...