Patents by Inventor Kyle Stapley Young
Kyle Stapley Young has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10382434Abstract: To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service relay. The user obtains a first security token by providing the user's credentials. A second token is obtained from a trust broker that validates the first token. Both tokens are then sent with a service request to a service relay. The service relay validates the second token and then passes the first token and the service request to a connector service. The connector service validates the first token and passes the service request to a target back end service. The connector service acts as the user when communicating with the back end service. Service responses are routed back to the user through the connector service and the service relay.Type: GrantFiled: October 5, 2017Date of Patent: August 13, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Kyle Stapley Young, Robert Aron Drollinger, Robert O'Brien, David J. Runde, Jagruti Dushyant Pandya, Georges El Khoury
-
Publication number: 20180219862Abstract: To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service relay. The user obtains a first security token by providing the user's credentials. A second token is obtained from a trust broker that validates the first token. Both tokens are then sent with a service request to a service relay. The service relay validates the second token and then passes the first token and the service request to a connector service. The connector service validates the first token and passes the service request to a target back end service. The connector service acts as the user when communicating with the back end service. Service responses are routed back to the user through the connector service and the service relay.Type: ApplicationFiled: October 5, 2017Publication date: August 2, 2018Inventors: Kyle Stapley Young, Robert Aron Drollinger, Robert O'Brien, David J. Runde, Jagruti Dushyant Pandya, Georges El Khoury
-
Patent number: 9825948Abstract: To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service relay. The user obtains a first security token by providing the user's credentials. A second token is obtained from a trust broker that validates the first token. Both tokens are then sent with a service request to a service relay. The service relay validates the second token and then passes the first token and the service request to a connector service. The connector service validates the first token and passes the service request to a target back end service. The connector service acts as the user when communicating with the back end service. Service responses are routed back to the user through the connector service and the service relay.Type: GrantFiled: February 18, 2016Date of Patent: November 21, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Kyle Stapley Young, Robert Aron Drollinger, Robert O'Brien, David J. Runde, Jagruti Dushyant Pandya, Georges El Khoury
-
Patent number: 9544147Abstract: Authentication is widely used to protect consumer data and computing services, such as email, document storage, and online banking. Current authentication models, such as those employed by online identity providers, may have limited options and configurations for authentication schemes. Accordingly, as provided herein, a model based authentication scheme may be configured based upon a policy and/or an authentication mechanism list. The policy may define the target resource, a user, a group the user belongs to, devices used to connect to the target resource, a service owning the target resource, etc. The authentication mechanism list may comprise predefined authentication mechanisms and/or user plug-in authentication mechanisms (e.g., user created authentication mechanism). Once the authentication scheme is configured, it may be enforced upon authentication requests from a user. Feedback may be provided to the user based upon patterns of usage of the target resource.Type: GrantFiled: May 22, 2009Date of Patent: January 10, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Yordan I. Rouskov, Wei-Qiang Michael Guo, Orville Charles McDonald, Ramu Movva, Kyle Stapley Young, Kok Wai Chan
-
Publication number: 20160164869Abstract: To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service relay. The user obtains a first security token by providing the user's credentials. A second token is obtained from a trust broker that validates the first token. Both tokens are then sent with a service request to a service relay. The service relay validates the second token and then passes the first token and the service request to a connector service. The connector service validates the first token and passes the service request to a target back end service. The connector service acts as the user when communicating with the back end service. Service responses are routed back to the user through the connector service and the service relay.Type: ApplicationFiled: February 18, 2016Publication date: June 9, 2016Applicant: Microsoft Technology Licensing, LLC.Inventors: Kyle Stapley Young, Robert Aron Drollinger, Robert O'Brien, David J. Runde, Jagruti Dushyant Pandya, Georges El Khoury
-
Patent number: 9294454Abstract: To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service relay. The user obtains a first security token by providing the user's credentials. A second token is obtained from a trust broker that validates the first token. Both tokens are then sent with a service request to a service relay. The service relay validates the second token and then passes the first token and the service request to a connector service. The connector service validates the first token and passes the service request to a target back end service. The connector service acts as the user when communicating with the back end service. Service responses are routed back to the user through the connector service and the service relay.Type: GrantFiled: May 13, 2013Date of Patent: March 22, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Kyle Stapley Young, Robert Aron Drollinger, Robert O'Brien, David J. Runde, Jagruti Dushyant Pandya, Georges El Khoury
-
Publication number: 20140282989Abstract: To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service relay. The user obtains a first security token by providing the user's credentials. A second token is obtained from a trust broker that validates the first token. Both tokens are then sent with a service request to a service relay. The service relay validates the second token and then passes the first token and the service request to a connector service. The connector service validates the first token and passes the service request to a target back end service. The connector service acts as the user when communicating with the back end service. Service responses are routed back to the user through the connector service and the service relay.Type: ApplicationFiled: May 13, 2013Publication date: September 18, 2014Applicant: Microsoft CorporationInventors: Kyle Stapley Young, Robert Aron Drollinger, Robert O'Brien, David J. Runde, Jagruti Dushyant Pandya, Georges El Khoury
-
Publication number: 20140280494Abstract: A relay component for a back office service creates an externally exposed REST service endpoint in front of the back office service. Instead of calling the back office service directly, REST service clients make REST service calls to the relay component using the HTTP protocol. The relay component coverts the data to XML format and sends it in a SOAP call to the back office service. The relay component receives the response from the back office service as a SOAP response that is converted to a REST message to be sent to the REST client.Type: ApplicationFiled: April 29, 2013Publication date: September 18, 2014Applicant: Microsoft CorporationInventors: Alexander Nikolayevich Samoylenko, Carlos Omar Ortiz Rodriguez, Robert Aron Drollinger, Sandeep Kuruvilla Lukose, Chandramouli Venkatesh, Kyle Stapley Young, Syed Mohammad Ali
-
Publication number: 20100299716Abstract: Authentication is widely used to protect consumer data and computing services, such as email, document storage, and online banking. Current authentication models, such as those employed by online identity providers, may have limited options and configurations for authentication schemes. Accordingly, as provided herein, a model based authentication scheme may be configured based upon a policy and/or an authentication mechanism list. The policy may define the target resource, a user, a group the user belongs to, devices used to connect to the target resource, a service owning the target resource, etc. The authentication mechanism list may comprise predefined authentication mechanisms and/or user plug-in authentication mechanisms (e.g., user created authentication mechanism). Once the authentication scheme is configured, it may be enforced upon authentication requests from a user. Feedback may be provided to the user based upon patterns of usage of the target resource.Type: ApplicationFiled: May 22, 2009Publication date: November 25, 2010Applicant: Microsoft CorporationInventors: Yordan I. Rouskov, Wei-Qiang Michael Guo, Orville Charles McDonald, Ramu Movva, Kyle Stapley Young, Kok Wai Chau