1
Stephen Hugh Kinser, Lloyd Leon Burch, Cameron Craig Morris: Single sign on with proxy services. Novell Intellectual Property Holdings, Schwegman Lundberg & Woessner P A, December 4, 2012: US08327426 (9 worldwide citation)

Techniques for proxing services with a single sign on are provided. A principal authenticates to a first identity service. The first identity service is in a trusted relationship with a second identity service. An authentication request is sent to the second identity service and the request includes ...


2
Robert Drew Major, Stephen R Carter, Hilarie Orman: Method and mechanism for vending digital content. Novell Intellectual Property Holdings, Schwegman Lundberg & Woessner P A, March 27, 2012: US08145570 (5 worldwide citation)

An Internet Box Office (IBO) system and technique vends digital content via a computer network, such as the Internet. The IBO system comprises a viewing system that cooperates with a Digital Rights Management system and various deployment enhancements within the Internet to provide an infrastructure ...


3
Scott A Isaacson: Light-weight multi-user browser. Novell Intellectual Property Holdings, Marger Johnson & McCollom PC, March 18, 2014: US08676973 (4 worldwide citation)

A multi-user web browser is stored on a computer. The multi-user web browser permits more than one user to create and use a browser user account without requiring different users to log into different operating system user accounts. Instead, a browser user can log into the multi-user browser by prov ...


4
Sebastien Pouliot: System and method for tracking software changes. Novell Intellectual Property Holdings, Pillsbury Winthrop Shaw Pittman, June 11, 2013: US08464207 (3 worldwide citation)

A system and method may be used to track software changes by analyzing intermediate language level representations of the software. For example, software changes may be tracked by analyzing object-oriented program code that includes one or more non-native binary executables based on an intermediate ...


5
Delos C Jensen, Stephen R Carter: Construction, manipulation, and comparison of a multi-dimensional semantic space. Novell Intellectual Property Holdings, Marger Johnson & McCollom PC, March 6, 2012: US08131741 (1 worldwide citation)

A directed set can be used to establish contexts for linguistic concepts: for example, to aid in answering a question, to refine a query, or even to determine what questions can be answered given certain knowledge. A directed set includes a plurality of elements and chains relating the concepts. One ...


6
Tammy Anita Green, Jim Alan Nicolet, Haripriya Srinivasaraghavan: Techniques for securing content in an untrusted environment. Novell Intellectual Property Holdings, Schwegman Lundberg & Woessner P A, May 20, 2014: US08731201 (1 worldwide citation)

Techniques for securing content in an untrusted environment are provided. Content is encrypted and stored with a content delivery service in an encrypted format. Encrypted versions of a content encryption/decryption key and a first key are also housed and distributed by the content delivery service. ...


7
Randall Brett Funk, Joseph Hyrum Astin: System and method for creating platform-specific self-extracting client packages using a production server. Novell Intellectual Property Holdings, Marger Johnson & McCollom PC, December 11, 2012: US08332841 (1 worldwide citation)

System and method for creating platform-specific self-extracting client packages using a production server are described. In one embodiment, the method comprises compiling a source file on a first build server comprising a first computing platform to produce a first executable seed file for the firs ...


8
Duane Buss, Andrew Hodgkinson, Tom Doman: System and method for virtual information cards. Novell Intellectual Property Holdings, Marger Johnson & McCollom PC, October 15, 2013: US08561172

A client includes a card selector, and receives a security policy from a relying party. If the client does not have an information card that can satisfy the security policy, the client can define a virtual information card, either from the security policy or by augmenting an existing information car ...


9
Dipto Chakravarty, Usman Choudhary, John Paul Gassner, Frank Anthony Pellegrino, William Matthew Weiner, Yuriy Fuksenko, Robert Price: Event source management using a metadata-driven framework. NOVELL INTELLECTUAL PROPERTY HOLDINGS, Pillsbury Winthrop Shaw Pittman, June 2, 2015: US09047145

The system and method described herein relates to managing multiple network device connections, collecting event source data from one or more network devices with one or more collectors, filtering the event source data, continuously monitoring the network device connections, controlling raw data col ...


10
W Scott Kiester, Cameron Mashayekhi, Karl E Ford: Provisioning users to multiple agencies. Novell Intellectual Property Holdings, King & Schickli PLLC, February 14, 2012: US08117650

Apparatus and methods are described for providing employee cards to employees, such as PIV cards to federal employees, including provisioning the employees to a more than one agency (and more than one card) without requiring multiple instances of enrolling and adjudicating the employee. Representati ...