1
Clifford P Van Dyke, Peter T Brundrett, Michael M Swift, Praerit Garg, Richard B Ward: Extensible security system and method for controlling access to objects in a computing environment. Microsoft Corporation, Lee & Hayes PLLC, June 25, 2002: US06412070 (238 worldwide citation)

A method and computing system for extending access control of system objects in a computing environment beyond traditional rights such as read, write, create and delete. According to the invention, a system administrator or user application is able to create control rights that are unique to the typ ...


2
Michael M Swift, Clifford P Van Dyke, Pradyumna Kumar Misra: Method for changing passwords on a remote computer. Microsoft Corporation, Leydig Voit & Mayer, February 17, 1998: US05719941 (169 worldwide citation)

A method for changing an account password stored at a physically remote location is provided. After initiating a password change sequence, a user submits both an old and a new password to its client machine. Thereafter, the client computes two message values to be transmitted to the server. The firs ...


3
Keith W Logan, Pradyumna K Misra, Paul J Leach, Clifford P Van Dyke, Dave D Straube, Arnold S Miller: Method and apparatus for representing and applying network topological data. Microsoft Corporation, Leydig Voit & Mayer, October 19, 1999: US05968121 (132 worldwide citation)

A network directory and naming service include fields for identifying instances of network resources and other objects by both logical and topological grouping. This combination of information facilitates automated efficient decision making with regard to replication of resources and updating the re ...


4
Clifford P Van Dyke, Michael M Swift, Keith W Logan, Pradyumna K Misra: Method and apparatus for Migrating from a source domain network controller to a target domain network controller. Microsoft Corporation, Leydig Voit & Mayer, January 13, 1998: US05708812 (130 worldwide citation)

A method and apparatus are described for facilitating the migration of accounts from a source domain to a target domain in a computer network without affecting the capability of users and services associated with the source domain to access source domain resources after the users' and services' acco ...


5
Praerit Garg, Michael M Swift, Clifford P Van Dyke, Richard B Ward, Peter T Brundrett: Per property access control mechanism. Microsoft Corporation, Lee & Hayes PLLC, September 11, 2001: US06289458 (67 worldwide citation)

Providing access control to individual properties of an object is described. In one embodiment, a computer system comprises an operating system operative to control applications and services running on the system. The service maintains a service object having at least one property. Also included in ...


6
Donald E Schmidt, Clifford P Van Dyke, Paul J Leach, Praerit Garg, Murli D Satagopan: Authentication and authorization across autonomous network systems. Microsoft Corporation, Merchant & Gould PC, February 27, 2007: US07185359 (66 worldwide citation)

An enterprise network architecture has a trust link established between two autonomous network systems that enables transitive resource access between network domains of the two network systems. The trust link is defined by data structures maintained by each of the respective network systems. The fi ...


7
Praerit Garg, Michael M Swift, Clifford P Van Dyke, Richard B Ward, Peter T Brundrett: Object type specific access control. Microsoft Corporation, Lee & Hayes PLLC, September 23, 2003: US06625603 (58 worldwide citation)

Providing object type specific access control to an object is described. In one embodiment, a computer system comprises an operating system operative to control an application and a service running on a computer. The service maintains a service object having a link to an access control entry. The ac ...


8
Murli D Satagopan, Clifford P Van Dyke: Method and system for replication in a hybrid network. Microsoft Corporation, Leydig Voit & Mayer, June 15, 2004: US06751674 (33 worldwide citation)

Method and system for networking multiple-master servers, including multiple-master servers, with single-master servers are described. A checkpoint-flag is used to identify a state when the same changes are present in the change-log of a first multiple-master server, which is emulating a primary ser ...


9
Chao Chia Liu, Michael J Hillberg, William P Morel, James W Kelly, Clifford P Van Dyke: Method and system for maintaining the integrity of links in a computer network. Microsoft Corporation, Leydig Voit & Mayer, September 10, 2002: US06449615 (30 worldwide citation)

A method and system for maintaining the integrity of links in a computer network. The method and system is realized in a link tracking service including a local link tracking service, preferably running on all of the computers within the network, and a centralized link tracking server, preferably ru ...


10
John E Brezak, Clifford P Van Dyke, John M Hawkins, Klaus U Schutz: Credential management. Microsoft Corporation, Lee & Hayes PLLC, April 24, 2007: US07210167 (25 worldwide citation)

Described herein is an implementation of a technology for managing credentials. With an implementation, a credential manager is domain-authentication aware and concurrent authentications with multiple independent networks (e.g., domains) may be established and maintained. Moreover, a credential mana ...