Patents by Inventor Craig V. McMurtry
Craig V. McMurtry has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10104069Abstract: Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource.Type: GrantFiled: October 31, 2017Date of Patent: October 16, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Craig V. McMurtry, Alexander T. Weinert, Vadim Meleshuk, Mark E. Gabarra
-
Publication number: 20180069848Abstract: Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource.Type: ApplicationFiled: October 31, 2017Publication date: March 8, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Craig V. McMurtry, Alexander T. Weinert, Vadim Meleshuk, Mark E. Gabarra
-
Patent number: 9832185Abstract: Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource.Type: GrantFiled: January 23, 2017Date of Patent: November 28, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Craig V. McMurtry, Alexander T. Weinert, Vadim Meleshuk, Mark E. Gabarra
-
Publication number: 20170134368Abstract: Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource.Type: ApplicationFiled: January 23, 2017Publication date: May 11, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Craig V. McMurtry, Alexander T. Weinert, Vadim Meleshuk, Mark E. Gabarra
-
Patent number: 9590994Abstract: Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource.Type: GrantFiled: November 9, 2015Date of Patent: March 7, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Craig V. McMurtry, Alexander T. Weinert, Vadim Meleshuk, Mark E. Gabarra
-
Publication number: 20160191528Abstract: Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource.Type: ApplicationFiled: November 9, 2015Publication date: June 30, 2016Inventors: Craig V. McMurtry, Alexander T. Weinert, Vadim Meleshuk, Mark E. Gabarra
-
Patent number: 9213951Abstract: Identification of the root cause of a change in the system, as well as any side-effects (“ancillary changes”) caused by the change via an object attribute. A change resulting from a request in a system, whether originating from a user, service, or workflow, has an associated request object that captures the details of the change. An ancillary change resulting from the prior change is correlated to the prior change through a parent attribute on the request object that identifies the prior change as the immediate parent. Thus, all downstream ancillary changes resulting from a request can be correlated back to the root request (change) via the parent attributes of the ancillary changes.Type: GrantFiled: November 5, 2009Date of Patent: December 15, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Nima Ganjeh, Craig V. McMurtry
-
Patent number: 9183366Abstract: Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource.Type: GrantFiled: January 27, 2014Date of Patent: November 10, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Craig V. McMurtry, Alexander T. Weinert, Vadim Meleshuk, Mark E. Gabarra
-
Publication number: 20140143546Abstract: Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource.Type: ApplicationFiled: January 27, 2014Publication date: May 22, 2014Applicant: MICROSOFT CORPORATIONInventors: Craig V. McMurtry, Alexander T. Weinert, Vadim Meleshuk, Mark E. Gabarra
-
Patent number: 8656472Abstract: Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource.Type: GrantFiled: February 1, 2008Date of Patent: February 18, 2014Assignee: Microsoft CorporationInventors: Craig V. McMurtry, Alexander T. Weinert, Vadim Meleshuk, Mark E. Gabarra
-
Patent number: 8336021Abstract: The present invention extends to methods, systems, and computer program products for managing set membership. A set definition is translated into one or more membership conditions. Each membership condition includes statements about the attributes of a resource that are to be true if the resource is to be included in the set. For any given resource request, resources touched by the request are compared to membership conditions applicable to the touched resources. Thus, embodiments of the invention minimize the work that is done to determine which sets a resource may or may not belong to whenever a resource is modified. Accordingly, based on available resources, embodiments of the invention can scale to accommodate larger numbers of sets and larger numbers of potential members of sets.Type: GrantFiled: December 15, 2008Date of Patent: December 18, 2012Assignee: Microsoft CorporationInventors: Craig V. McMurtry, Nima Ganjeh, Vadim Meleshuk, Stephen J. Pek
-
Patent number: 7979896Abstract: A web service includes a protected resource. A requester requests access to the protected resource by sending a request to the web service. The web service prevents access to the web service until the request has been authorized by an authorizer. After the request has been authorized by the authorizer, the web service allows the requester to access the protected resource.Type: GrantFiled: February 1, 2008Date of Patent: July 12, 2011Assignee: Microsoft CorporationInventors: Craig V. McMurtry, Alexander T. Weinert, Vadim Meleshuk, Mark E. Gabarra
-
Publication number: 20110107351Abstract: Identification of the root cause of a change in the system, as well as any side-effects (“ancillary changes”) caused by the change via an object attribute. A change resulting from a request in a system, whether originating from a user, service, or workflow, has an associated request object that captures the details of the change. An ancillary change resulting from the prior change is correlated to the prior change through a parent attribute on the request object that identifies the prior change as the immediate parent. Thus, all downstream ancillary changes resulting from a request can be correlated back to the root request (change) via the parent attributes of the ancillary changes.Type: ApplicationFiled: November 5, 2009Publication date: May 5, 2011Applicant: Microsoft CorporationInventors: Nima Ganjeh, Craig V. McMurtry
-
Publication number: 20100153932Abstract: The present invention extends to methods, systems, and computer program products for managing set membership. A set definition is translated into one or more membership conditions. Each membership condition includes statements about the attributes of a resource that are to be true if the resource is to be included in the set. For any given resource request, resources touched by the request are compared to membership conditions applicable to the touched resources. Thus, embodiments of the invention minimize the work that is done to determine which sets a resource may or may not belong to whenever a resource is modified. Accordingly, based on available resources, embodiments of the invention can scale to accommodate larger numbers of sets and larger numbers of potential members of sets.Type: ApplicationFiled: December 15, 2008Publication date: June 17, 2010Applicant: Microsoft CorporationInventors: Craig V. McMurtry, Nima Ganjeh, Vadim Meleshuk, Stephen J. Pek
-
Publication number: 20090307172Abstract: Disclosed herein is a system and method for enforcement of management policies by automatically trigging action-based processes that are mapped to the management policies. This may occur when: a new management policy is created; a final set of a management policy is modified; a new workflow is added to the management policy; and the membership filter or explicit membership of a set referenced by the management policy's final set is modified.Type: ApplicationFiled: September 26, 2008Publication date: December 10, 2009Applicant: Microsoft CorporationInventors: Craig V. McMurtry, Jack Kabat, Nima Ganjeh
-
Publication number: 20090119500Abstract: The embodiments described herein generally relate to a method and system of injecting automated repeatable processes, or workflows, into software configuration management sequences. The benefits of such a system include the ability to delegate configurability change abilities to an IT administrator while still maintaining efficiency and management control over such changes. A request made by a system administrator to process configuration data may be subject to multiple phases of processing, such as, authentication, authorization, and action. A declarative mapping associates workflows, or meaningful repeatable processes, with the configuration process request criteria and processing phase. The mapping may be created by, or at the direction of, management through the application of the processing concept in API or UI. Upon a triggering event, e.g.Type: ApplicationFiled: November 2, 2007Publication date: May 7, 2009Applicant: Microsoft CorporationInventors: Dan Roth, Asaf Kashi, Alexander T. Weinert, Craig V. McMurtry
-
Publication number: 20090007157Abstract: Described are embodiments directed to use of workflows for developing management agents that connect operations of a data source to a procedural API of an application. The management agents include a workflow that corresponds to an operation of a data source. The workflow includes a number of activities that make calls to the procedural API in order to perform the operation of the data source with respect to an object of the application. The use of workflows makes the development of management agents easier and more efficient.Type: ApplicationFiled: June 28, 2007Publication date: January 1, 2009Applicant: Microsoft CorporationInventors: Robert D. Ward, Alexander T. Weinert, Craig V. McMurtry
-
Publication number: 20080263638Abstract: A web service includes a protected resource. A requester requests access to the protected resource by sending a request to the web service. The web service prevents access to the web service until the request has been authorized by an authorizer. After the request has been authorized by the authorizer, the web service allows the requester to access the protected resource.Type: ApplicationFiled: February 1, 2008Publication date: October 23, 2008Applicant: MICROSOFT CORPORATIONInventors: Craig V. McMurtry, Alexander T. Weinert, Vadim Meleshuk, Mark E. Gabarra
-
Publication number: 20080263652Abstract: Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource.Type: ApplicationFiled: February 1, 2008Publication date: October 23, 2008Applicant: MICROSOFT CORPORATIONInventors: Craig V. McMurtry, Alexander T. Weinert, Vadim Meleshuk, Mark E. Gabarra