1
Kelly E Sonderegger, Kevin L Hopton, Matthew G Brooks, Andy Lawrence, Damon Janis, Lori K Dayton, Thomas B Oldroyd: Managing application programs in a computer network by using a database of application objects. Novell, Computer Law, January 12, 1999: US05859978 (89 worldwide citation)

A method and apparatus for management of application programs in a computer network are disclosed. A modified hierarchical database which includes application objects that represent applications and their execution environments is utilized. Administrator tools support the creation, deletion, and mod ...


2
Joseph Andrew Mellmer, Russell T Young, Arn D Perkins, John M Robertson, Jeffrey Neil Sabin, Michael C McDonald, Douglas Phillips, Robert Michael Sheridan, Nadeem Ahmad Nazeer, DeeAnne Barker Higley, Stephen R Carter, Douglas G Earl, Kelly E Sonderegger, Daniel T Ferguson, Farrell Lynn Brough: Managing digital identity information. Novell, King & Schickli PLLC, March 16, 2010: US07680819 (83 worldwide citation)

A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and gr ...


3
Kelly E Sonderegger: Method for managing globally distributed software components. Novell, Computer Law, April 6, 1999: US05893118 (80 worldwide citation)

Methods and systems are provided which make security, licensing, and browsing capabilities of directory services available for use with the Java language and environment, and thus provide an alternative to security restrictions imposed on Java applets. A Java component type is created in a directory ...


4
Nicholas Huston Franklin, Bill Guy Bodine, Randall R Cook, Calvin R Gaisford, Matthew G Brooks, Carla M Heesch, Kelly E Sonderegger: Licensing controller using network directory services. Novell, Madson & Metcalf, August 15, 2000: US06105069 (75 worldwide citation)

A directory services system includes a resource object, such as an application object for accessing a resource associated with the resource object. Attributes of the resource object contain licensing control information. The licensing attributes may be used by executables to control access by a user ...


5
Kelly E Sonderegger, Matthew G Brooks, Calvin Gaisford, Damon Janis: Apparatus and method for performing actions on object-oriented software objects in a directory services system. Novell, Wolf Greenfield & Sacks P C, January 9, 2001: US06173289 (72 worldwide citation)

A system and method of providing associations between resources and actions in a network includes the steps of providing, in a database schema an action object class defining the structure and attributes of actions available in the network. During operation, action objects are created and stored in ...


6
Kelly E Sonderegger, Kevin L Hopton, Matthew G Brooks, Andy Lawrence, Damon Janis, Lori K Dayton, Thomas B Oldroyd: Managing application programs in a computer network by using a database of application objects. Novell, Computer LawPlusPlus, November 25, 1997: US05692129 (68 worldwide citation)

A method and apparatus for management of application programs in a computer network are disclosed. A modified hierarchical database which includes application objects that represent applications and their execution environments is utilized. Administrator tools support the creation, deletion, and mod ...


7
Joseph Andrew Mellmer, Russell T Young, Arn D Perkins, John M Robertson, Jeffrey Neil Sabin, Michael C McDonald, Douglas Phillips, Robert Michael Sheridan, Nadeem Ahmad Nazeer, DeeAnne Barker Higley, Stephen R Carter, Douglas G Earl, Kelly E Sonderegger, Daniel T Ferguson, Farrell Lynn Brough: Managing digital identity information. EMC Corporation, Barry N Young, January 14, 2014: US08631038 (7 worldwide citation)

A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and gr ...


8
Joseph Andrew Mellmer, Russell T Young, Arn D Perkins, John M Robertson, Jeffrey Neil Sabin, Michael C McDonald, Douglas Phillips, Robert Michael Sheridan, Nadeem Ahmad Nazeer, DeeAnne Barker Higley, Stephen R Carter, Douglas G Earl, Kelly E Sonderegger, Daniel T Ferguson, Farrell Lynn Brough: Managing access to digital identity information. EMC Corporation, Barry N Young, March 5, 2013: US08392420 (4 worldwide citation)

A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and gr ...


9
Joseph Andrew Mellmer, Russell T Young, Arn D Perkins, John M Robertson, Jeffrey Neil Sabin, Michael C McDonald, Douglas Phillips, Robert Michael Sheridan, Nadeem Ahmad Nazeer, DeeAnne Barker Higley, Stephen R Carter, Douglas G Earl, Kelly E Sonderegger, Daniel T Ferguson, Farrell Lynn Brough: Managing digital identity information. King & Schickli Pllc, February 24, 2005: US20050044423-A1

A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and gr ...


10
Joseph Andrew Mellmer, Russell T Young, Arn D Perkins, John M Robertson, Jeffrey Neil Sabin, Michael C McDonald, Douglas Phillips, Robert Michael Sheridan, Nadeem Ahmad Nazeer, DeeAnne Barker Higley, Stephen R Carter, Douglas G Earl, Kelly E Sonderegger, Daniel T Ferguson, Farrell Lynn Brough: Managing digital identity information. Novell, August 25, 2011: US20110208778-A1

A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and gr ...