1
David L Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William R Soley: Log-on service providing credential level change without loss of session continuity. Sun Microsystems, Zagorin O&apos Brien & Graham, August 19, 2003: US06609198 (397 worldwide citation)

A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authenti ...


2
David L Wood, Derk Norton: Access management system and method employing secure credentials. Sun Microsystems, Zagorin O&apos Brien & Graham, December 23, 2003: US06668322 (338 worldwide citation)

A security architecture has been developed in which a single sign-on is provided. Session credentials are used to maintain continuity of a persistent session across multiple accesses to one or more information resources, and in some embodiments, across credential level changes. Session credentials a ...


3
David L Wood, Thomas Pratt, Michael B Dilger, Derk Norton, Yunas Nadiadi: Security architecture with environment sensitive credential sufficiency evaluation. Sun Microsystems, Zagorin O&apos Brien & Graham L, February 10, 2004: US06691232 (264 worldwide citation)

By including environment information in a security policy, a security architecture advantageously allows temporal, locational, connection type and/or client capabilities-related information to affect the sufficiency of a given credential type (and associated authentication scheme) for access to a pa ...


4
David L Wood, Derk Norton, Paul Weschler, Chris Ferris, Yvonne Wilson: Single sign-on framework with trust-level mapping to authentication requirements. Sun Microsystems, Zagorin O Brien Graham, May 10, 2005: US06892307 (247 worldwide citation)

A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authenti ...


5
David L Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William R Soley: Log-on service providing credential level change without loss of session continuity. Sun Microsystems, Zagorin O Brien Graham, September 13, 2005: US06944761 (41 worldwide citation)

A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authenti ...


6
David L Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William R Soley: Default credential provisioning. Sun Microsystems, Zagorin O Brien Graham, October 3, 2006: US07117359 (40 worldwide citation)

A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authenti ...


7
David L Wood, Michael B Dilger, Thomas Pratt, Derk Norton, Stan D Shurygailo: Secure data broker. Sun Microsystems, Brooks Kushman P C, November 17, 2009: US07620980 (16 worldwide citation)

A secure data broker has been developed, which provides a restricted message based data exchange between a client application and a secured information resource by allowing registered or verified messages to be brokered across a security barrier. In some configurations, both requests and responses a ...


8
David L Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William R Soley: Log-on service providing credential level change without loss of session continuity. Sun Microsystems, Brooks Kushman P C, January 29, 2008: US07325128 (11 worldwide citation)

A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authenti ...


9
Derk Norton: Approach for message level encryption for service APIs. BLACKHAWK NETWORK, Wick Phillips Gould & Martin, Jerry C Harris Jr, December 27, 2016: US09531688 (1 worldwide citation)

Disclosed are requesting party and responding party computer systems which perform a message level encryption for messages sent through the computer systems. Using the message level encryption, the computer systems may prevent those with access to an unsecured zone in one or more of the computer sys ...


10
Derk Norton: Method for securing a private key. Crater Dog Technologies, Sheridan Ross PC, December 26, 2017: US09853813

Systems and methods are provided for securing a private key on a mobile device for use with public key cryptography. Specifically, a private key is reduced to two partial keys where the partial keys are stored on separate electronic devices. The partial keys combine to temporarily regenerate the pri ...