1
Brent Ray Christensen, Howard Rollin Davis, Adam Lee Harral: Proxy cache cluster. Volera, Cesari and McKenna, December 11, 2001: US06330605 (151 worldwide citation)

A proxy cache cluster (PCC) couples to a service provider of a communications network to increase the availability of services offered by the provider to clients connected to the network. The clients access the services by issuing requests to network addresses associated with these services. The PCC ...


2
Hilarie Orman, Howard Rollin Davis, Jamshid Mahdavi: System and method for transparent takeover of TCP connections between servers. Novell, Schwegman Lundberg Woessner & Kluth P A, July 11, 2006: US07076555 (144 worldwide citation)

A system and a method for transparent takeover (or failover) of a remote client TCP connection from a first server in a cluster of interconnected servers to a second server provides the storing of shared state information relative to the connection on each involved server and using of the shared sta ...


3
Robert Drew Major, Stephen R Carter, Howard Rollin Davis, Brent Ray Christensen: System and method for partitioning address space in a proxy cache server cluster. Novell, Schwegman Lundberg Woessner & Kluth P A, March 1, 2005: US06862606 (68 worldwide citation)

A proxy partition cache (PPC) architecture and a technique for address-partitioning a proxy cache consisting of a grouping of discrete, cooperating caches (servers) is provided. Client requests for objects (files) of a given size are redirected or reassigned to a single cache in the grouping, notwit ...


4
Scott William Pathakis, David Kent Beus, Stephen R Carter, Michael William Cook, Howard Rollin Davis, Dustin Lance Nielson, David Nephi Johnson, Jerry E Griffis: Techniques for securing electronic identities. Novell, Schwegman Lundberg & Woessner P A, August 3, 2010: US07770204 (9 worldwide citation)

Methods, systems, and data stores generate and manage temporarily assigned identities. A requestor issues a request for a service. The request includes an identity used for authenticating the requestor. The identity is used for generating an identity configuration and for generating a temporarily as ...


5
Stephen R Carter, Howard Rollin Davis: Transparent network connection takeover. Novell, Schwegman Lundberg & Woessner P A, August 9, 2011: US07996517 (3 worldwide citation)

Techniques for the transparent takeover of network connections are presented. A first server is engaged in a connection with a client. The transactions of the connection and the traffic are monitored by a traffic cache manager. The first server records sequence numbers for the transactions with a sy ...


6
Scott William Pathakis, David Kent Beus, Stephen R Carter, Michael William Cook, Howard Rollin Davis, Dustin Lance Nielson, David Nephi Johnson, Jerry E Griffis: Techniques for securing electronic identities. Novell, Schwegman Lundberg Woessner & Kluth Pa, March 31, 2005: US20050071687-A1

Methods, systems, and data stores generate and manage temporarily assigned identities. A requestor issues a request for a service. The request includes an identity used for authenticating the requestor. The identity is used for generating an identity configuration and for generating a temporarily as ...


7
Robert Drew Major, Stephen R Carter, Howard Rollin Davis, Brent Ray Christensen: System and method for partitioning address space in a proxy cache server cluster. Cesari And Mckenna, December 5, 2002: US20020184327-A1

A proxy partition cache (PPC) architecture and a technique for address-partitioning a proxy cache consisting of a grouping of discrete, cooperating caches (servers) is provided. Client requests for objects (files) of a given size are redirected or reassigned to a single cache in the grouping, notwit ...


8
Stephen R Carter, Howard Rollin Davis: Transparent network connection takeover. Novell, Schwegman Lundberg Woessner & Kluth Pa, November 9, 2006: US20060253575-A1

Techniques for the transparent takeover of network connections are presented. A first server is engaged in a connection with a client. The transactions of the connection and the traffic are monitored by a traffic cache manager. The first server records sequence numbers for the transactions with a sy ...