1
Joseph Andrew Mellmer, Russell T Young, Arn D Perkins, John M Robertson, Jeffrey Neil Sabin, Michael C McDonald, Douglas Phillips, Robert Michael Sheridan, Nadeem Ahmad Nazeer, DeeAnne Barker Higley, Stephen R Carter, Douglas G Earl, Kelly E Sonderegger, Daniel T Ferguson, Farrell Lynn Brough: Managing digital identity information. Novell, King & Schickli PLLC, March 16, 2010: US07680819 (83 worldwide citation)

A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and gr ...


2
Douglas G Earl, Cory R Newey: Client inherited functionally derived from a proxy topology where each proxy is independently configured. Novell, August 29, 2000: US06112228 (77 worldwide citation)

A system and method efficiently provides services offered by proxy servers to client computers coupled to a network. The system comprises a proxy server interface configured to expose the services within a web brower executing on a client computer. The services available to the client are dependent ...


3
Lloyd Leon Burch, Douglas G Earl, Stephen R Carter, Robert Mark Ward: Techniques for dynamically establishing and managing authentication and trust relationships. Novell, Schwegman Lundberg & Woessner P A, November 20, 2007: US07299493 (38 worldwide citation)

Techniques are provided for dynamically establishing and managing authentication and trust relationships. An identity service acquires and evaluates contracts associated with relationships between principals. The contracts permit the identity service to assemble authentication information, aggregate ...


4
Lloyd Leon Burch, Douglas G Earl, Stephen R Carter: Techniques for dynamically establishing and managing trust relationships. Novell, Schwegman Lundberg & Woessner P A, January 1, 2008: US07316027 (27 worldwide citation)

Techniques are provided for dynamically establishing and managing trust relationships. A first principal initially requests a community list. The community list includes identities of one or more second principals with which the first principal can establish trusted relationships with. The community ...


5
Lloyd Leon Burch, Douglas G Earl, Stephen R Carter, Robert Mark Ward: Techniques for dynamically establishing and managing authentication and trust relationships. Novell, Schwegman Lundberg & Woessner P A, June 23, 2009: US07552468 (21 worldwide citation)

Techniques are provided for dynamically establishing and managing authentication and trust relationships. An identity service acquires and evaluates contracts associated with relationships between principals. The contracts permit the identity service to assemble authentication information, aggregate ...


6
Joseph Andrew Mellmer, Russell T Young, Arn D Perkins, John M Robertson, Jeffrey Neil Sabin, Michael C McDonald, Douglas Phillips, Robert Michael Sheridan, Nadeem Ahmad Nazeer, DeeAnne Barker Higley, Stephen R Carter, Douglas G Earl, Kelly E Sonderegger, Daniel T Ferguson, Farrell Lynn Brough: Managing digital identity information. EMC Corporation, Barry N Young, January 14, 2014: US08631038 (7 worldwide citation)

A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and gr ...


7
Lloyd Leon Burch, Douglas G Earl, Stephen R Carter: Techniques for establishing and managing a distributed credential store. Novell, Schwegman Lundberg & Woessner P A, January 12, 2010: US07647256 (7 worldwide citation)

Techniques are provided for establishing and managing a distributed credential store. An identity service aggregates identity information from one or more identity stores and maintains the information as a remote credential store. Initially, the remote credential store, or portions thereof, is trans ...


8
Tammy Anita Green, Lloyd Leon Burch, Stephen R Carter, Douglas G Earl: Allocation of network resources. Novell, Schwegman Lundberg & Woessner P A, March 16, 2010: US07681242 (5 worldwide citation)

Techniques are provided for allocating resources over a network. A resource consumer requests access to a resource over a network. As part of that request, the resource consumer acquires information that permits it to securely communicate with a resource provider. The resource provider controls the ...


9
Joseph Andrew Mellmer, Russell T Young, Arn D Perkins, John M Robertson, Jeffrey Neil Sabin, Michael C McDonald, Douglas Phillips, Robert Michael Sheridan, Nadeem Ahmad Nazeer, DeeAnne Barker Higley, Stephen R Carter, Douglas G Earl, Kelly E Sonderegger, Daniel T Ferguson, Farrell Lynn Brough: Managing access to digital identity information. EMC Corporation, Barry N Young, March 5, 2013: US08392420 (4 worldwide citation)

A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and gr ...


10
Lloyd Leon Burch, Stephen R Carter, Douglas G Earl: Techniques for preserving and managing identities in an audit log. Novell, Schwegman Lundberg & Woessner P A, January 12, 2010: US07647624 (1 worldwide citation)

Techniques are provided for preserving and managing identities within an audit log. Initial entries into a log do not include an explicit and direct reference to an agent that performs a transaction; rather, the agent acquires a temporary transaction identity for the transaction and an indirect refe ...