1
David L Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William R Soley: Log-on service providing credential level change without loss of session continuity. Sun Microsystems, Zagorin O&apos Brien & Graham, August 19, 2003: US06609198 (397 worldwide citation)

A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authenti ...


2
David L Wood, Derk Norton: Access management system and method employing secure credentials. Sun Microsystems, Zagorin O&apos Brien & Graham, December 23, 2003: US06668322 (338 worldwide citation)

A security architecture has been developed in which a single sign-on is provided. Session credentials are used to maintain continuity of a persistent session across multiple accesses to one or more information resources, and in some embodiments, across credential level changes. Session credentials a ...


3
David L Wood, Thomas Pratt, Michael B Dilger, Derk Norton, Yunas Nadiadi: Security architecture with environment sensitive credential sufficiency evaluation. Sun Microsystems, Zagorin O&apos Brien & Graham L, February 10, 2004: US06691232 (264 worldwide citation)

By including environment information in a security policy, a security architecture advantageously allows temporal, locational, connection type and/or client capabilities-related information to affect the sufficiency of a given credential type (and associated authentication scheme) for access to a pa ...


4
David L Wood, Derk Norton, Paul Weschler, Chris Ferris, Yvonne Wilson: Single sign-on framework with trust-level mapping to authentication requirements. Sun Microsystems, Zagorin O Brien Graham, May 10, 2005: US06892307 (247 worldwide citation)

A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authenti ...


5
David L Wood III, Stephen A Grot, Gerald Fly: Composite gas distribution structure for fuel cell. General Motors Corporation, A Luke Simon, Kalr F Barr Jr, Linda M Deschere, February 26, 2002: US06350539 (48 worldwide citation)

There is provided a multilayer gas distribution structure for use with a membrane electrode assembly of a PEM fuel cell. The layers of the multilayer diffusion structure have selected chemical and physical properties. Together, the layers facilitate transport of reactant gas to the electrode while i ...


6
David L Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William R Soley: Log-on service providing credential level change without loss of session continuity. Sun Microsystems, Zagorin O Brien Graham, September 13, 2005: US06944761 (41 worldwide citation)

A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authenti ...


7
David L Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William R Soley: Default credential provisioning. Sun Microsystems, Zagorin O Brien Graham, October 3, 2006: US07117359 (40 worldwide citation)

A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authenti ...


8
David L Wood, Michael B Dilger, Thomas Pratt, Derk Norton, Stan D Shurygailo: Secure data broker. Sun Microsystems, Brooks Kushman P C, November 17, 2009: US07620980 (16 worldwide citation)

A secure data broker has been developed, which provides a restricted message based data exchange between a client application and a secured information resource by allowing registered or verified messages to be brokered across a security barrier. In some configurations, both requests and responses a ...


9
Paul E Bergeron, David L Wood: Multi-message sign. 3 Message Display, Townsend and Townsend, August 10, 1993: US05233772 (11 worldwide citation)

A sign providing for the serial display of three discreet messages is disclosed. The disclosed sign has an array of discrete vertical three sided sign elements provided with an improved sign element mounts and bearings, improved detachable face plates for the display of the three sign messages, and ...


10
David L Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William R Soley: Log-on service providing credential level change without loss of session continuity. Sun Microsystems, Brooks Kushman P C, January 29, 2008: US07325128 (11 worldwide citation)

A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authenti ...