1
Carolyn B McClain, Jim E Thatcher: System and method for filtering of web-based content stored on a proxy cache server. Novell, Schwegman Lundberg Woessner & Kluth P A, August 3, 2004: US06772214 (189 worldwide citation)

A system and method for filtering of web-based content in a proxy cache server environment provides a local network having a client, a directory server and a proxy cache server that caches predetermined Internet-derived web content within the network. When content is requested, it is vended to the c ...


2
Carolyn B McClain, Jim E Thatcher: System and method for filtering of web-based content stored on a proxy cache server. Novell, Schwegman Lundberg & Woessner P A, March 17, 2009: US07506055 (65 worldwide citation)

A system and method for filtering of web-based content in a proxy cache server environment provides a local network having a client, a directory server and a proxy cache server that caches predetermined Internet-derived web content within the network. When content is requested, it is vended to the c ...


3
Carolyn B McClain, Stephen R Carter, Kevin Rhodes, Mark D Ackerman, Carl B Andersen, Vernon Roger Holm, Stuart Jensen: Techniques for content filtering. Novell, Schwegman Lundberg Woessner & Kluth P A, May 9, 2006: US07043555 (39 worldwide citation)

Techniques are provided for content filtering. Logic expressions are evaluated to filter content in response to content ratings. The logic expressions include operators that are overloaded and associated with content operators for specific content providers or specific rating systems. By evaluating ...


4
Stephen R Carter, Lloyd Leon Burch, Hashem Mohammad Ebrahimi, Carolyn B McClain: Privileged network routing. Novell, Schwegman Lundberg & Woessner P A, May 20, 2008: US07376134 (16 worldwide citation)

Techniques are provided for establishing privileged paths for data packets over a network. A data packet is received with a header; the header includes a route selector. The route selector assists in resolving a privileged path for the data packet. The data packet is injected into the network over t ...


5
Hashem Mohammad Ebrahimi, Mark D Ackerman, Carolyn B McClain: Proxy authentication. Novell, Schwegman Lundberg & Woessner P A, March 16, 2010: US07681229 (13 worldwide citation)

Techniques are provided for proxy authentication. A proxy includes a first port, a second port, and a secure port; each port processing a different service. Requests received on the first and second ports which require authentication are redirected to the secure port. The secure port processes an au ...


6
Stephen R Carter, Carolyn B McClain: Key distribution. Novell, Schwegman Lundberg & Woessner P A, June 8, 2010: US07734051 (4 worldwide citation)

Methods and systems are provided for trusted key distribution. A key distribution or an identity service acts as an intermediary between participants to a secure network. The service provisions and manages the distribution of keys. The keys are used for encrypting communications occurring within the ...


7
Carolyn B McClain, Stephen R Carter: Virtualized federated role provisioning. EMC Corporation, Barry N Young, April 10, 2012: US08156516 (3 worldwide citation)

In various embodiments, techniques for virtualized federated role provisioning are provided. An entire policy and role provisioning environment is packaged in a first environment and sent to a second environment. The second environment authenticates and initiates the policy and role provisioning env ...


8
Stephen R Carter, Carolyn B McClain: Key distribution. Novell, Schwegman Lundberg & Woessner P A, January 17, 2012: US08098828 (3 worldwide citation)

Methods and systems are provided for trusted key distribution. A key distribution or an identity service acts as an intermediary between participants to a secure network. The service provisions and manages the distribution of keys. The keys are used for encrypting communications occurring within the ...


9
Lloyd Leon Burch, Douglas Garry Earl, Jonathan Paul Bultmeyer, Carolyn B McClain: Techniques for virtual representational state transfer (REST) interfaces. Novell, Schwegman Lundberg & Woessner P A, June 2, 2015: US09049182 (3 worldwide citation)

Techniques for virtual Representational State Transfer (REST) interfaces are provided. A proxy is interposed between a client and a REST service over a network. The proxy performs independent authentication of the client and provides credentials to the client and for the client to authenticate to th ...


10
Robert A Wipfel, Stephen R Carter, Carolyn B McClain: Techniques for cloud control and management. Novell, Schwegman Lundberg & Woessner P A, February 24, 2015: US08966017 (2 worldwide citation)

Techniques for cloud control and management are provided. The control, creation, and management of workloads in distributed infrastructures are coordinated via a master Configuration Management Database (CMDB). The master CMDB is also used to unify the multiple distributed infrastructures so that th ...