Patents by Inventor Carolyn B. McClain
Carolyn B. McClain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10708387Abstract: Metering service instances collect predefined types of metering events on the nodes in which the service instances process. Within each node, the events are statistically filtered, aggregated, and collected. The events are also passed to audit logs. At the conclusion of a metering period or upon detection of a batching event, the aggregated statistically filtered events (statistics) are forward to a collecting cluster where they are populated to a metering statistic data store.Type: GrantFiled: October 30, 2015Date of Patent: July 7, 2020Assignee: Novell, Inc.Inventors: Carolyn B. McClain, Greg Goodwin, Carl B. Andersen, Bruce L. Bergeson
-
Patent number: 10560330Abstract: Techniques for cloud control and management are provided. The control, creation, and management of workloads in distributed infrastructures are coordinated via a master Configuration Management Database (CMDB). The master CMDB is also used to unify the multiple distributed infrastructures so that the workloads are rationalized. Moreover, data centers are coordinated with the distributed infrastructures so the configuration settings and policies included in the master CMDB are enforced and synchronized throughout the network.Type: GrantFiled: August 14, 2017Date of Patent: February 11, 2020Assignee: Micro Focus Software Inc.Inventors: Robert A. Wipfel, Stephen R Carter, Carolyn B. McClain
-
Patent number: 10375201Abstract: Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds. Policy actions are enforced when processing the messages. The policy actions can include identity-based restrictions and the policy actions are specific to the messages and/or clouds within which the messages are being processed.Type: GrantFiled: August 11, 2016Date of Patent: August 6, 2019Assignee: Micro Focus Software Inc.Inventors: Bruce L. Bergeson, Carolyn B. McClain, Stephen R Carter, Vernon Roger Holm
-
Patent number: 10230704Abstract: System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external address to the internal cloud addresses of the cloud workloads. A designated one of the cloud workloads obtains one key of a first pair of cryptographic keys, the first pair of cryptographic keys for decrypting encrypted storage hosted within the cloud computing environment.Type: GrantFiled: April 10, 2017Date of Patent: March 12, 2019Assignee: Micro Focus Software Inc.Inventors: Stephen R Carter, Carolyn B. McClain, Jared Patrick Allen, Dale Robert Olds, Lloyd Leon Burch
-
Patent number: 10182074Abstract: Techniques for virtual Representational State Transfer (REST) interfaces are provided. A proxy is interposed between a client and a REST service over a network. The proxy performs independent authentication of the client and provides credentials to the client and for the client to authenticate to the REST service using a REST service authentication mechanism. The proxy inspects requests and responses and translates the requests and responses into formats expected by the client and the REST service. Moreover, the proxy enforces policy and audits the requests and responses occurring between the client and the REST service over the network.Type: GrantFiled: May 22, 2015Date of Patent: January 15, 2019Assignee: Micro Focus Software, Inc.Inventors: Lloyd Leon Burch, Douglas Garry Earl, Jonathan Paul Bultmeyer, Carolyn B. McClain
-
Patent number: 10171470Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: GrantFiled: July 31, 2017Date of Patent: January 1, 2019Assignee: NetIQ CorporationInventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Patent number: 10021144Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.Type: GrantFiled: June 13, 2016Date of Patent: July 10, 2018Assignee: Micro Focus Software Inc.Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R Carter
-
Patent number: 9864616Abstract: Methods and apparatus involve extending functionality of legacy services. A legacy application has functionality designed for use on an original computing device. In a modern environment, virtual machines (VMs) operate as independent guests on processors and memory by way of scheduling control from a virtualization layer (e.g., hypervisor). At least one VM is provisioned to modify standard entry points of the original legacy application for new accessing of various system functions of the hardware platform. Representative functions include network access, processors, and storage. Policy decision points variously located are further employed to ensure compliance with computing policies. Multiple platforms and computing clouds are contemplated as are VMs in support roles and dedicated software appliances. In this manner, continued use of legacy services in modern situations allows participation in more capable environments and application capabilities heretofore unimagined.Type: GrantFiled: May 20, 2014Date of Patent: January 9, 2018Assignee: Micro Focus Software Inc.Inventors: Kattiganehalli Y. Srinivasan, Stephen R. Carter, Carolyn B. McClain, Jonathon P. Bultmeyer
-
Publication number: 20170353464Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: ApplicationFiled: July 31, 2017Publication date: December 7, 2017Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Publication number: 20170346696Abstract: Techniques for cloud control and management are provided. The control, creation, and management of workloads in distributed infrastructures are coordinated via a master Configuration Management Database (CMDB). The master CMDB is also used to unify the multiple distributed infrastructures so that the workloads are rationalized. Moreover, data centers are coordinated with the distributed infrastructures so the configuration settings and policies included in the master CMDB are enforced and synchronized throughout the network.Type: ApplicationFiled: August 14, 2017Publication date: November 30, 2017Inventors: Robert A. Wipfel, Stephen R. Carter, Carolyn B. McClain
-
Patent number: 9736026Abstract: Techniques for cloud control and management are provided. The control, creation, and management of workloads in distributed infrastructures are coordinated via a master Configuration Management Database (CMDB). The master CMDB is also used to unify the multiple distributed infrastructures so that the workloads are rationalized. Moreover, data centers are coordinated with the distributed infrastructures so the configuration settings and policies included in the master CMDB are enforced and synchronized throughout the network.Type: GrantFiled: January 30, 2015Date of Patent: August 15, 2017Assignee: Micro Focus Software Inc.Inventors: Robert A. Wipfel, Stephen R Carter, Carolyn B. McClain
-
Patent number: 9723007Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.Type: GrantFiled: September 28, 2015Date of Patent: August 1, 2017Assignee: NetIQ CorporationInventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
-
Publication number: 20170214669Abstract: System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external address to the internal cloud addresses of the cloud workloads. A designated one of the cloud workloads obtains one key of a first pair of cryptographic keys, the first pair of cryptographic keys for decrypting encrypted storage hosted within the cloud computing environment.Type: ApplicationFiled: April 10, 2017Publication date: July 27, 2017Inventors: Stephen R Carter, Carolyn B. McClain, Jared Patrick Allen, Dale Robert Olds, Lloyd Leon Burch
-
Publication number: 20170126820Abstract: Metering service instances collect predefined types of metering events on the nodes in which the service instances process. Within each node, the events are statistically filtered, aggregated, and collected. The events are also passed to audit logs. At the conclusion of a metering period or upon detection of a batching event, the aggregated statistically filtered events (statistics) are forward to a collecting cluster where they are populated to a metering statistic data store.Type: ApplicationFiled: October 30, 2015Publication date: May 4, 2017Inventors: Carolyn B. McClain, Greg Goodwin, Carl B. Andersen, Bruce L. Bergeson
-
Patent number: 9514459Abstract: A forward proxy can perform identity substitutions and related services. The user provides the forward proxy with identity information, and the forward proxy presents itself to remote Internet sites on behalf of the user in the guize of the specified identity. From the remote site's point of view, the forward proxy is the machine being used by the user; the identity of the actual user machine can be hidden. Cookies are thus stored and updated at the forward proxy instead of being stored and updated at the user computer as they would be if a conventional forward proxy had been used. This helps preserve user privacy. The use of group identities, which are shared by multiple users, are also facilitated.Type: GrantFiled: March 15, 2001Date of Patent: December 6, 2016Assignee: EMC CorporationInventors: Kshitij A. Doshi, Hashem Mohammad Ebrahimi, Carolyn B. McClain
-
Publication number: 20160352862Abstract: Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds. Policy actions are enforced when processing the messages. The policy actions can include identity-based restrictions and the policy actions are specific to the messages and/or clouds within which the messages are being processed.Type: ApplicationFiled: August 11, 2016Publication date: December 1, 2016Inventors: Bruce L. Bergeson, Carolyn B. McClain, Stephen R. Carter, Vernon Roger Holm
-
Publication number: 20160352779Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.Type: ApplicationFiled: June 13, 2016Publication date: December 1, 2016Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R. Carter
-
Patent number: 9473499Abstract: In various embodiments, techniques for federated role provisioning are provided. A federated role definition for a resource is constructed and distributed. The federated role definition includes a role hierarchy having role assignments and constraints for dynamically resolving and binding a resource to particular ones of the role assignments. A resource may have role assignments statically bound to its identity and dynamically bound to its identity. Furthermore, some role assignments may be inherited from the role hierarchy.Type: GrantFiled: April 2, 2014Date of Patent: October 18, 2016Assignee: Apple Inc.Inventors: Carolyn B. McClain, Bruce L. Bergeson, Vernon Roger Holm
-
Patent number: 9438692Abstract: Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds. Policy actions are enforced when processing the messages. The policy actions can include identity-based restrictions and the policy actions are specific to the messages and/or clouds within which the messages are being processed.Type: GrantFiled: July 31, 2014Date of Patent: September 6, 2016Assignee: Novell, Inc.Inventors: Bruce L. Bergeson, Carolyn B. McClain, Stephen R Carter, Vernon Roger Holm
-
Patent number: 9369494Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.Type: GrantFiled: August 13, 2014Date of Patent: June 14, 2016Assignee: Novell, Inc.Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R Carter