William M. Shapiro - Palo Alto CA, US Joseph D. Steele - Danville CA, US
Assignee:
Adobe Systems Incorporated - San Jose CA
International Classification:
G06F 17/00 G06F 3/00
US Classification:
726 1, 715700, 715741
Abstract:
Methods and apparatus, including computer systems and program products, that relate to a security policy user interface. The methods feature a machine-implemented method that includes presenting labels of multiple security policies, receiving input specifying a selected security policy, and securing a first document according to the selected security policy. In that method, each security policy specifies criteria that governs use of an electronic document and has an associated security mechanism. Moreover, security mechanisms of a number of the multiple security policies distinctly enforce security of a document, and presenting labels of multiple security policies includes presenting at least two labels of two respective security policies such that a detailed description of a respective, associated security mechanism is left out. The security policies can be declarative security policies. At least one of the labels can include an abstract of a corresponding security mechanism.
Converting Transport Level Transactional Security Into A Persistent Document Signature
Sunil C. Agrawal - Milpitas CA, US Jagriti Uppal - Santa Clara CA, US Joseph Steele - Danville CA, US
Assignee:
Adobe Systems Incorporated - San Jose CA
International Classification:
H04L 9/32
US Classification:
713176
Abstract:
Briefly, in accordance with one or more embodiments, a transport level transactional security may be converted into a persistent document signature. In one embodiment, a digital signature of an electronic mail message may be saved in a file attached to the electronic mail message. The file with the added digital signature may be saved, transmitted, received, and/or otherwise utilized independent of the original electronic mail message. A receiving node may verify the identity of an originating node based at least in part on the digital signature contained in the file. In alternative embodiment, the signature for the file may be generated at least in part on a message to be transmitted according to a secure transmission and/or file download protocol from a server to a client.
System And Method For Trusted Embedded User Interface For Authentication
James D. Pravetz - Sunnyvale CA, US Joseph D. Steele - Danville CA, US Sunil Agrawal - Milpitas CA, US
Assignee:
Adobe Systems Incorporated - San Jose CA
International Classification:
H04L 29/06
US Classification:
726 5, 715749
Abstract:
A security component may be associated with a network-enabled application. The security component may initiate the display of an embedded region of a window drawn according to display information received from a relying party. The security component may define at least a portion of the appearance of the embedded region; the relying party may not define this portion. The embedded region may include customization information configured by a user, and “Card” information received from an assertion provider, indicating how to authenticate user credentials in order to gain access to relying party restricted content. The security component may request authentication of user credentials from the assertion provider, which may be trusted by the relying party. The security component may receive an assertion token from the assertion provider indicating the credentials are authentic. The security component may forward the assertion token to the relying party to gain access to the restricted content.
Secure Portable Store For Security Skins And Authentication Information
James D. Pravetz - Sunnyvale CA, US Joseph D. Steele - Danville CA, US Sunil Agrawal - Milpitas CA, US
Assignee:
Adobe Systems Incorporated - San Jose CA
International Classification:
H04L 29/06
US Classification:
726 5, 726 4, 715749
Abstract:
A security component may be associated with a network-enabled application. The security component may access a secure store, which may include customization information, which may include one or more graphical user interface customizations defined by a user, and one or more instances of card information. The card information may specify how to authenticate a user's credentials to access a relying party (e. g. , web site). The security component may initiate the display of an embedded region of a window drawn by the network-enabled application. At least a part of the appearance of the embedded region of the window may be defined according to the customization information and not by the relying party. The embedded region may provide a user interface for determining user authentication credentials. The customization information and the one or more instances of card information may not be accessible to the relying party.
Relying Party Specifiable Format For Assertion Provider Token
James D. Pravetz - Sunnyvale CA, US Joseph D. Steele - Danville CA, US Sunil Agrawal - Milpitas CA, US
Assignee:
Adobe Systems Incorporated - San Jose CA
International Classification:
G06F 21/00 H04L 29/06 H04L 21/00 G06F 15/16
US Classification:
713185, 713155, 713182, 709206, 709229, 726 9
Abstract:
A security component may be associated with a network-enabled application. The network-enabled application may request access to restricted content from a relying party (e. g. , web site). The security component associated with the network-enabled application may receive authentication policy information from the relying party and send a user's authentication credentials to an assertion provider to authenticate the credentials. The relying party may trust the assertion provider to authenticate user credentials. Upon successful authentication, the assertion provider may return an assertion token to the security component and the security component may sign the assertion token as specified in the authentication policy information. Subsequently, the security token may forward the signed assertion token to the relying party and the relying party may grant access to the restricted content.
Marc T. Kaufman - Woodside CA, US Genevieve Laroche - San Jose CA, US Roberto Perelman - Sunnyvale CA, US Joseph D. Steele - Danville CA, US
International Classification:
G06F 21/62
US Classification:
713165
Abstract:
A system, for secure form delivery, may include a detector to detect a request to submit an electronic form that includes associated application data; an encryption module to respond to the request to submit the electronic form by automatically accessing an encryption key, determining destination information, and encrypting the associated application data, utilizing the encryption key; and a submit module to submit the electronic form to a destination, utilizing the destination information.
Drm Protected Video Streaming On Game Console With Secret-Less Application
- San Jose CA, US Sheng Wei - San Jose CA, US Joseph Donovan Steele - Danville CA, US
Assignee:
Adobe Systems Incorporated - San Jose CA
International Classification:
H04L 29/06 H04L 29/08
Abstract:
Techniques are disclosed for secure playback of protected multimedia content on a game console using a secret-less application. An SSO model can be used for client authentication at a key server, which eliminates the need of storing or using any secret information in the client application. Further, an encrypted content key generated by a content packager using a public key can be deployed in the key URI of a playlist file, which is sent to the key server. The key server can be configured to decrypt the content key using a corresponding private key. Further, the content key and unencrypted samples are protected in the game console client application from debugging and replay attacks by using additional security checks at both the client and key server. By storing secret information remotely from the game console and using the SSO model, DRM policies can be enforced on an untrusted client application.
Drm Protected Video Streaming On Game Console With Secret-Less Application
- San Jose CA, US Sheng Wei - San Jose CA, US Joseph Donovan Steele - Danville CA, US
Assignee:
Adobe Systems Incorporated - San Jose CA
International Classification:
G06F 21/10 G06F 21/62 H04L 29/06
Abstract:
Techniques are disclosed for secure playback of protected multimedia content on a game console using a secret-less application. An SSO model can be used for client authentication at a key server, which eliminates the need of storing or using any secret information in the client application. Further, an encrypted content key generated by a content packager using a public key can be deployed in the key URI of a playlist file, which is sent to the key server. The key server can be configured to decrypt the content key using a corresponding private key. Further, the content key and unencrypted samples are protected in the game console client application from debugging and replay attacks by using additional security checks at both the client and key server. By storing secret information remotely from the game console and using the SSO model, DRM policies can be enforced on an untrusted client application.
Glendale Community College Peoria, AZ 2009 to 2012 ADJUNCT INSTUCTORBuckeye Union High School District Buckeye, AZ 2004 to 2012 DRAFTING and DESIGN TEACHERAjo Unified High School Ajo, AZ 2003 to 2004 INDUSTRIAL ARTS TEACHERCenter Area High School
2001 to 2002 DRAFTING and DESIGN TEACHERChambersburg Area School District Chambersburg, PA 2000 to 2001 INDUSTRIAL ARTS TEACHER
Skills:
Setting up curriculum for every level of education school and state standards, coordinate parents, students and teachers to work together to bring out the best in students
Googleplus
Joseph Steele
Lived:
El Paso, TX San Diego, CA Bremerton, WA Forth Worth, TX San Francisco, CA
About:
Why anyone would want to know about me is a complete mystery.
Bragging Rights:
Love to right and express my opinion.
Youtube
Joe Steele Spent 20 Years in Prison for a Cri...
James English, The Anything Goes Show. Ep 39. James speaks to Joe abou...
Duration:
48m 31s
Sports Untold 122 Joe Steele
Paul is joined by University of Washington football legend Joe Steele ...
Duration:
1h 17m 10s
Glasgow Ice cream wars, 'TC' Campbell & Joe S...
Glasgow Ice cream wars, The Ice Cream Wars were turf wars in the East ...
Duration:
13m 35s
Book Review: Joe Steele by Harry Turtledove
Didn't want to go a whole week without posting a video, so here is an ...
Duration:
3m 35s
The Ice Cream Wars Scenario: Campbelle and St...
TC Campbell & Joe Steele were convicted of their murders but this prog...
Duration:
41m 54s
scottish gangster documentary | featuring Wal...
scottish gangster documentary fearing Walter novel Paul ferris joe ste...