Patents by Inventor Heather Maria Hinton
Heather Maria Hinton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7827318Abstract: An Internet user transfers directly to a domain within an e-community without returning to a home domain or reauthenticating by providing to a web browser by a home domain server a home identity cookie with an extensible data area and an enrollment token; performing enrollment through an e-community for a web-browser user by redirecting the home identity cookie via the web browser to each affiliated domain in the e-community until each has been visited once; responsive to each visit to each affiliated domain, sending an affiliated domain identity cookie to the web browser including an enrollment successful indicator; accumulating received enrollment success indicators in the extensible data area of the home identity cookie; and subsequently, vouching for an identity of the user at an affiliated domain through exchange of a vouch-for request and vouch-for response between the home domain server and an affiliated domain server.Type: GrantFiled: November 20, 2008Date of Patent: November 2, 2010Assignee: International Business Machines CorporationInventors: Heather Maria Hinton, George Robert Blakley, III, Greg Clark
-
Publication number: 20100268934Abstract: A document management (DM), data leak prevention (DLP) or similar application in a data processing system is instrumented with a document protection service provider interface (SPI). The service provider interface is used to call an external function, such as an encryption utility, that is used to facilitate secure document exchange between a sending entity and a receiving entity. The encryption utility may be configured for local download to and installation in the machine on which the SPI is invoked, but a preferred approach is to use the SPI to invoke an external encryption utility as a “service.” In such case, the external encryption utility is implemented by a service provider. When the calling program invokes the SPI, preferably the user is provided with a display panel. Using that panel, the end user provides a password that is used for encryption key generation, together with an indication of the desired encryption strength. The service provider uses the password to generate the encryption key.Type: ApplicationFiled: April 20, 2009Publication date: October 21, 2010Applicant: International Business Machines CorporationInventors: Heather Maria Hinton, Ivan Matthew Milman
-
Patent number: 7797434Abstract: A system is presented for facilitating management of user attribute information at one or more attribute information providers (AIPs), which can manage the user's attribute information in accordance with user-selected or administratively-determined options, including options that are stored in attribute release policies and/or dynamically determined during a transaction. E-commerce service providers (ECSPs), such as online banks or merchants, also maintain a relationship with an AIP such that the ECSP can trust the user attribute information that is provided by the AIP on behalf of the user. The user can complete transactions that require user attribute information at any ECSP without having to have previously established a relationship with that particular ECSP. If the ECSP has a relationship with one of the user's AIPS, then the user will be able to direct the ECSP to an AIP when the ECSP needs user attribute information to complete a transaction for the user.Type: GrantFiled: December 31, 2002Date of Patent: September 14, 2010Assignee: International Business Machines CorporationInventors: George Robert Blakley, III, Heather Maria Hinton, Birgit Monika Pfitzmann
-
Publication number: 20100223490Abstract: A method, system, and computer usable program product for assessing third-party IP that may be incorporated in a software product are provided in the illustrative embodiments. An instance of the third-party's intellectual property is identified in a component of the product. The instance is classified as actionable, or not actionable. A remediation action is identified for an actionable instance. An entry is created in a remediation report, the entry including information identifying the actionable instance, the remediation action, or a combination thereof. The remediation report is published. A context of the actionable instance may be determined. Based on the context and the actionable instance, a remediation rule may be selected and executed from a set of remediation rules. The output of the remediation rule may be reported as the remediation action in the remediation report. Performing the remediation action may cause manipulation or initiation of a workflow.Type: ApplicationFiled: March 2, 2009Publication date: September 2, 2010Applicant: International Business Machines CorporationInventors: Heather Maria Hinton, Jeffrey R. Dean
-
Publication number: 20100223592Abstract: A method, system, and computer usable program product for code component level IP remediation are provided in the illustrative embodiments. An actionable instance of the third-party's intellectual property is identified in a component of the product. A component model of the product is constructed. The actionable instance of the third-party's intellectual property is associated with a component in the component model. A graphical representation of the component model is created. Information about a type of license associated with the actionable instance is added to the graphical representation of the component. The graphical representation is published. The actionable instance may be identified based on the type of the license associated with the third-party's intellectual property, a context of the inclusion, or both. A remediation action is identified for the actionable instance.Type: ApplicationFiled: March 2, 2009Publication date: September 2, 2010Applicant: International Business Machines CorporationInventors: HEATHER MARIA HINTON, Jeffrey R. Dean
-
Publication number: 20100146290Abstract: A method, system, and computer usable program product for token caching in a trust chain processing are provided in the illustrative embodiments. An information in a token associated with a first request is mapped. A determination is made whether a requester of the first request has provided a constraint in the first request, the constraint concerning the token, the constraint forming a client constraint. The client constraint is stored. The information and the mapped information is stored, forming stored information. The token is received in a second request. The stored information is reused if the client constraint allows reusing the stored information. A further determination may be made whether a target system receiving the mapped information has provided a server constraint, the second constraint concerning the mapped information, the second constraint forming a server constraint. The stored information may be reused if the server constraint allows reusing the stored information.Type: ApplicationFiled: December 4, 2008Publication date: June 10, 2010Applicant: International Business Machines CorporationInventors: David Werner Bachmann, Nicholas George Harlow, Heather Maria Hinton, Patrick Ryan Wardrop
-
Patent number: 7725562Abstract: A computer system is presented for facilitating storage and retrieval of user attribute information within a federated environment at entities that manage such information as a service. Through enrollment processes, certain domains inform online service providers of identities of attribute information providers that may be used to retrieve user attribute information for a particular user. When performing a user-specific operation with respect to a requested resource, e.g., for personalizing documents using user attribute information or for determining user access privileges for the resource, an e-commerce service provider requires user attribute information, which is retrieved from an attribute information provider that has been previously specified through an enrollment operation. The e-commerce service provider may store the identity of the user's attribute information providers in a persistent token, e.g., an HTTP cookie, that is available when the user sends a request for access to a resource.Type: GrantFiled: December 31, 2002Date of Patent: May 25, 2010Assignee: International Business Machines CorporationInventors: George Robert Blakley, III, Heather Maria Hinton, Anthony Joseph Nadalin, Birgit Monika Pfitzmann
-
Publication number: 20100100924Abstract: A method operative at a service provider enforces a digital rights management (DRM) scheme associated with a piece of content. The service provider typically is a content provider. The service provider is an entity that participates in a “federation” with one or more other entities including, for example, an identity provider, a DRM privileges provider, and a DRM policy provider. In one embodiment, the method begins upon receipt at the service provider of a single sip on (SSO) message generated by the identity provider entity that includes a reference to a set of DRM privileges associated with an end user requesting access to the piece of content. In response to receiving the message, the service provider as necessary obtains the DRM privileges and at least one applicable DRM policy. It then evaluates the DRM privileges associated with the end user against the DRM policy, and provides the end user a response.Type: ApplicationFiled: October 16, 2008Publication date: April 22, 2010Applicant: Intrnational Business Machines CorporationInventor: Heather Maria Hinton
-
Publication number: 20100100925Abstract: A method operative at an identity provider enforces a digital rights management (DRM) scheme associated with a piece of content. The identity provider is an entity that participates in a “federation” with one or more other entities including, for example, an service provider (e.g., a content provider), a DRM privileges provider, and a DRM policy provider. In one embodiment, the method begins by having the identity provider obtain and evaluate against a DRM policy a set of DRM privileges associated with the end user requesting access to the piece of content. Based on the evaluation, the identity provider generates a single sign on (SSO) message that includes a reference to the set of DRM privileges. The message is then forward to the service provider entity, which provides the end user a response.Type: ApplicationFiled: October 16, 2008Publication date: April 22, 2010Applicant: International Business Machines CorporationInventor: Heather Maria Hinton
-
Patent number: 7698375Abstract: A method and a system are presented in which federated domains interact within a federated environment. Domains within a federation can initiate federated operations for a user at other federated domains. A point-of-contact server within a domain relies upon a trust proxy within the domain to manage trust relationships between the domain and the federation. The point-of-contact server receives incoming requests directed to the domain and interfaces with a first application server and a second application server, wherein the first application server responds to requests for access to controlled resources and the second application server responds to requests for access to federated user lifecycle management functions, which are implemented using one or more pluggable modules that interface with the second application server.Type: GrantFiled: July 21, 2004Date of Patent: April 13, 2010Assignee: International Business Machines CorporationInventors: Heather Maria Hinton, Dolapo Martin Falola, Anthony Scott Moran, Patrick Ryan Wardrop
-
Publication number: 20100083347Abstract: A method, system, and computer usable program product for verifying and enforcing certificate use are provided in the illustrative embodiments. A certificate is received from a sender. The certificate is validated before communicating a message associated with the certificate to a receiver. If the certificate is invalid, a policy is selected based on a type of invalidity of the certificate. An action is taken to enforce the policy for using the certificate. The certificate may be received from the sender at a proxy. The validating may further include verifying the validity of the certificate using a certificate from a certificate database accessible to the proxy over a network. the proxy may copy a part of the certificate database to a second certificate database local to the proxy. The validating may further include verifying the validity of the certificate using a certificate revocation list accessible to the proxy over a network.Type: ApplicationFiled: October 1, 2008Publication date: April 1, 2010Applicant: International Business Machines CorporationInventor: Heather Maria Hinton
-
Publication number: 20100048204Abstract: A method, system, and computer usable program product for dynamic access to radio networks are provided in the illustrative embodiments. A new radio network having a characteristic more suitable than a corresponding characteristic of a present radio network is detected. A request for access to the new radio network is sent, the request including a token, which includes structured information about a user, a device, a home network, or a billing service. Access to the new radio network is received. Switching is performed from the present radio network to the new radio network for wireless communication. The request for access to a radio network is received such that the requester is not known to a provider of the radio network. The requester is verified using a billing service provider or a home network provider identified in a token in the request. Upon verification, access is granted to the radio network.Type: ApplicationFiled: August 22, 2008Publication date: February 25, 2010Applicant: International Business Machines CorporationInventor: Heather Maria Hinton
-
Publication number: 20100030805Abstract: A method, system, and computer usable program product for propagating information in a trust chain processing are provided in the illustrative embodiments. Upon a trust client invoking the trust chain processing, a mapped security information is received, the mapped security information being stored in a memory or a data storage associated with a data processing system. A set of security information attributes are located from the mapped security information according to a configuration. The set of security information attributes are packaged to form a packaged security information. The packaged security information is issued to a target system, the target system being distinct from the trust client that invoked the trust chain processing. The locating, the packaging, and the issuing collectively form monitoring the trust chain processing. A next component in the trust chain processing may be invoked. The invoking may occur before, after, or during the monitoring.Type: ApplicationFiled: July 30, 2008Publication date: February 4, 2010Applicant: International Business Machines CorporationInventors: Heather Maria Hinton, Sridhar R. Muppidi, David Eugene Cox
-
Patent number: 7631346Abstract: A method, system, apparatus, and computer program product are presented to support computing systems of different enterprises that interact within a federated computing environment. Federated single-sign-on operations can be initiated at the computing systems of federation partners on behalf of a user even though the user has not established a user account at a federation partner prior to the initiation of the single-sign-on operation. For example, an identity provider can initiate a single-sign-on operation at a service provider while attempting to obtain access to a controlled resource on behalf of a user. When the service provider recognizes that it does not have a linked user account for the user that allows for a single-sign-on operation with the identity provider, the service provider creates a local user account. The service provider can also pull user attributes from the identity provider as necessary to perform the user account creation operation.Type: GrantFiled: April 1, 2005Date of Patent: December 8, 2009Assignee: International Business Machines CorporationInventors: Heather Maria Hinton, Ivan Matthew Milman, Venkat Raghavan, Shane Bradley Weeden
-
Publication number: 20090259753Abstract: The invention provides federated functionality within a data processing system by means of a set of specialized runtimes, which are instances of an application for providing federation services to requesters. Each of the plurality of specialized runtimes provides requested federation services for selected ones of the requestors according to configuration data of respective federation relationships of the requestors with the identity provider. The configuration data is dynamically retrieved during initialization of the runtimes which allows the respective_runtime to be specialized for a given federation relationship. Requests are routed to the appropriate specialized runtime using the first requestor identity and the given federation relationship. The data, which describes each federation relationship between the identity provider and each of the plurality of requestors, is configured prior to initialization of the runtimes.Type: ApplicationFiled: June 9, 2009Publication date: October 15, 2009Applicant: International Business Machines CorporationInventors: Heather Maria Hinton, Anthony Scott Moran, Dolapo Martin Falola, Ivan Matthew Milman, Patrick Ryan Wardrop
-
Patent number: 7587491Abstract: A computer system is presented for facilitating user enrollment at service providers, particularly with respect to storage and retrieval of user attribute information within a federated environment at entities that manage such information as a service. One domain can inform other domains of identities of service providers that are to be associated with a user, thereby enrolling information about the user at those domains. In addition, an enrollment operation can be invoked by a first service provider through a second service provider such that the user becomes enrolled at a third service provider. During an enrollment operation, information about multiple service providers may be associated with a user, and these service providers may be prioritized. The user may be provided an opportunity to reprioritize the service providers during the enrollment operation so that the service providers are subsequently contacted or used in a particular priority order.Type: GrantFiled: December 31, 2002Date of Patent: September 8, 2009Assignee: International Business Machines CorporationInventor: Heather Maria Hinton
-
Publication number: 20090205032Abstract: The present invention provides identification and access control for an end user mobile device in a disconnected mode environment, which refers generally to the situation where, in a mobile environment, a mobile device is disconnected from or otherwise unable to connect to a wireless network. The inventive method provides the mobile device with a “long term” token, which is obtained from an identity provider coupled to the network. The token may be valid for a given time period. During that time period, the mobile device can enter a disconnected mode but still obtain a mobile device-aided function (e.g., access to a resource) by presenting for authentication the long term token. Upon a given occurrence (e.g., loss of or theft of the mobile device) the long term token is canceled to restrict unauthorized further use of the mobile device in disconnected mode.Type: ApplicationFiled: February 11, 2008Publication date: August 13, 2009Inventors: Heather Maria Hinton, Anthony Joseph Nadalin
-
Patent number: 7562382Abstract: The invention provides federated functionality within a data processing system by means of a set of specialized runtimes. Each of the plurality of specialized runtimes provides requested federation services for selected ones of the requestors according to configuration data of respective federation relationships of the requestors with the identity provider. The configuration data is dynamically retrieved during initialization of the runtimes which allows the respective runtime to be specialized for a given federation relationship. Requests are routed to the appropriate specialized runtime using the first requestor identity and the given federation relationship. The data which describes each federation relationship between the identity provider and each of the plurality of requesters is configured prior to initialization of the runtimes.Type: GrantFiled: December 16, 2004Date of Patent: July 14, 2009Assignee: International Business Machines CorporationInventors: Heather Maria Hinton, Anthony Scott Moran, Dolapo Martin Falola, Ivan Matthew Milman, Patrick Ryan Wardrop
-
Publication number: 20090125972Abstract: Federated single sign on (F-SSO) uses a token service that fulfills requests by executing a module chain comprising a set of modules. F-SSO runtime processing is enhanced by enabling a federated entity user to define a custom module to include in the chain. The custom module includes one or more name-value pairs, wherein a given name-value pair has a value that may be validated against an entity-defined rule. The rule is determined during the processing of the custom module based on one or more invocation parameters of the module chain. In a runtime operation, F-SSO begins in response to receipt of a token. In response, the processing of the module chain that includes the custom module is initiated. During processing of the custom module, an attempt is made to validate the value of a name-value pair based on the rule. If the value of the name-value pair based on the rule can be validated, processing of the module chain continues.Type: ApplicationFiled: November 14, 2007Publication date: May 14, 2009Inventors: Heather Maria Hinton, Patrick Ryan Wardrop, Parley Avery Salmon
-
Publication number: 20090100438Abstract: A web browser is provided with a logout enablement function that traps a browser or page shutdown request and prevents that request from completing until the browser (or page) has logged out from one or more current server-side application sessions. The logout enablement function ensures that server-side resources that have been invoked for a given session are released before the web browser can be shutdown. The function is implemented as native browser code, a web page applet, a Java server page, a script, a control associated with the browser, and a browser plug-in.Type: ApplicationFiled: October 16, 2007Publication date: April 16, 2009Inventors: Heather Maria Hinton, Sridhar R. Muppidi