1
Stephen R Carter: Method and apparatus for collaborative document control. Novell, Computer Law, July 28, 1998: US05787175 (339 worldwide citation)

A method and apparatus are disclosed for controlling collaborative access to a work group document by the users of a computer system. A combination of public-key cryptographic methods, symmetric cryptographic methods, and message digest generation methods are used. The document has a data portion an ...


2
Stephen R Carter, Donald H LaVange Jr, Delos C Jensen: Network license authentication. Novell, Dinsmore & Shohl, April 17, 2001: US06219652 (207 worldwide citation)

A method and system for license authentication over a network. An on-line vendor receives a digital certificate that includes a public key associated with a consumer, and a digital signature of the consumer. A license packet is generated that includes a unique serial number. A record that includes t ...


3
Stephen R Carter, Robert Drew Major: Methods and systems for managing network traffic. Novell, Schwegman Lundberg & Woessner P A, March 16, 2010: US07680897 (178 worldwide citation)

Methods and systems for network traffic management are provided. A content distribution network application manages data in a cache. A network rate shaper application controls and manages requests for access to an external network connection. The content distribution network application determines p ...


4
Stephen R Carter: Distributed dynamic security capabilities. Novell, Computer Law, September 12, 2000: US06119230 (177 worldwide citation)

Methods and systems are provided for managing security credentials in a distributed computer system. Multiple security contexts may be defined for a given principal in the system without requiring the use of multiple accounts. A secure package is provided to allow the principal to roam. Methods are ...


5
Delos C Jensen, Stephen R Carter: Method and mechanism for superpositioning state vectors in a semantic abstract. Novell, Marger Johnson & McCollom P C, June 17, 2008: US07389225 (112 worldwide citation)

State vectors representing the semantic content of a document are created. The state vectors are superpositioned to construct a single vector representing a semantic abstract for the document. The single vector can be normalized. Once constructed, the single vector semantic abstract can be compared ...


6
Scott Isaacson, Stephen R Carter: System and method of semantic correlation of rich content. Novell, Marger Johnson & McCollom PC, March 2, 2010: US07672952 (89 worldwide citation)

Content of interest to a user is identified. A first semantic abstract is generated for the content of interest using a state vector representation of the content of interest. The first semantic abstract is compared to a second semantic abstract representing another prospective content. If the first ...


7
Joseph Andrew Mellmer, Russell T Young, Arn D Perkins, John M Robertson, Jeffrey Neil Sabin, Michael C McDonald, Douglas Phillips, Robert Michael Sheridan, Nadeem Ahmad Nazeer, DeeAnne Barker Higley, Stephen R Carter, Douglas G Earl, Kelly E Sonderegger, Daniel T Ferguson, Farrell Lynn Brough: Managing digital identity information. Novell, King & Schickli PLLC, March 16, 2010: US07680819 (83 worldwide citation)

A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and gr ...


8
Stephen R Carter, Carlos A Nevarez: Deputization in a distributed computing system. Novell, Dinsmore & Shohl, May 25, 2004: US06742114 (76 worldwide citation)

Methods, signals, devices, and systems are provided for delegating rights in a distributed computer system from a principal to one or more deputies. The deputies have identities separate from the principal. This allows the deputies to persist after the principal logs off the system, and permits depu ...


9
Stephen R Carter, Carlos A Nevarez: Deputization in a distributed computing system. Novell, Dinsmore & Shohl, July 29, 2003: US06601171 (76 worldwide citation)

Methods, signals, devices, and systems are provided for delegating rights in a distributed computer system from a principal to one or more deputies. The deputies have identities separate from the principal. This allows the deputies to persist after the principal logs off the system, and permits depu ...


10
David Nephi Johnson, Dustin Lance Nielson, Jerry E Griffis Jr, David Kent Beus, Nathan Blaine Jensen, William Street, Paul Erik Sherman, Michael William Cook, Stephen R Carter: Credential mapping. Novell, Schwegman Lundberg & Woessner P A, June 8, 2010: US07735122 (75 worldwide citation)

Methods, systems, and data structures map credentials. A master credential is established for a user or an application. The master credential is mapped to one or more service credentials associated with one or more services. When a request for a service is received from a requestor, the request is a ...