1
Ranjan Prasad, Layne C Izatt, Dale R Olds: System and method for synchronizing database information. Novell, Dinsmore & Shohl, March 25, 2003: US06539381 (224 worldwide citation)

A system and method for synchronizing database information over a communications network distributed among a plurality of servers. The system allows each server to track the state of a replica on each of the servers, and changes to the servers are communicated between the servers along with their st ...


2
Kevin Kingdon, Randal Earl Childers, DeeAnne Higley, Dale R Olds: Method and apparatus to secure digital directory object changes. Novell, Dinsmore & Shohl, October 14, 1997: US05677851 (200 worldwide citation)

A method of providing authoritative access control to computer networks that employs a distributed network directory using a static means of resolving object attributes is disclosed. The method employs the existing directories and an authentication procedure for each server. A first object that is u ...


3
Dale R Olds: Controlling access to objects in a hierarchical database. Novell, Computer Law, March 2, 1999: US05878415 (182 worldwide citation)

Methods and systems are provided for controlling access to objects in a hierarchical database. The database may include a directory services repository, and/or synchronized partitions. An access constraint propagator reads an access control property of an ancestor of a target object. The access cont ...


4
Ranjan Prasad, Dale R Olds: Method and apparatus for moving subtrees in a distributed network directory. Novell, Dinsmore & Shohl, March 4, 1997: US05608903 (95 worldwide citation)

A method of moving leaf objects and subtrees in computer networks that employ a distributed network directory is disclosed. The method employs the existing directories and an authentication procedure for each server. A first object that is under the physical control of the administrator of one parti ...


5
Dale R Olds, Layne Izatt, Ranjan Prasad: Replicated object identification in a partitioned hierarchy. Novell, Computer Law, November 3, 1998: US05832487 (83 worldwide citation)

Methods and systems for managing replicated objects in a partitioned hierarchical database are disclosed. One method combines partition-wide object identifiers in order according to ancestry to form a database-wide object identifier that identifies a target object relative to all other objects in th ...


6
Ranjan Prasad, Dale R Olds: Method and apparatus for moving subtrees in a distributed network directory. Novell, Dinsmore & Shohl, May 26, 1998: US05758344 (60 worldwide citation)

A method of moving leaf objects and subtrees in computer networks that employ a distributed network directory is disclosed. The method employs the existing directories and an authentication procedure for each server. A first object that is under the physical control of the administrator of one parti ...


7
Kevin Kingdon, Randal Earl Childers, DeeAnne Higley, Dale R Olds: Method and apparatus to secure distributed digital directory object changes. Novell, Dinsmore & Shohl, July 21, 1998: US05784560 (50 worldwide citation)

A method and apparatus for providing access control to objects in a distributed network directory employing static resolution to resolve object attributes. A first object has a Security Equals attribute and a second object has an Equivalent To Me attribute. Upon receiving a request for the first obj ...


8
Dale R Olds: System for dynamically replacing operating software which provides distributed directory service after verifying that versions of new software and the operating software are compatible. Novell, Dinsmore & Shohl, November 3, 1998: US05832275 (45 worldwide citation)

The present invention provides a method and apparatus for dynamically updating computer programs that are providing X.500 directory services without interruption of service. Upon receiving a call to update a computer program providing directory services, a process or thread is executed that authenti ...


9
Patrick R Felsted, Thomas E Doman, James G Sermersheim, Daniel S Sanders, Andrew A Hodgkinson, Dale R Olds: Performing a business transaction without disclosing sensitive identity information to a relying party. Marger Johnson & McCollom PC, December 6, 2011: US08073783 (8 worldwide citation)

A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the secu ...


10
Patrick R Felsted, Thomas E Doman, James G Sermersheim, Daniel S Sanders, Andrew A Hodgkinson, Dale R Olds: Performing a business transaction without disclosing sensitive identity information to a relying party. Apple, Blakely Sokoloff Taylor & Zafman, January 29, 2013: US08364600

A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the secu ...