Patents by Inventor Leon A. Burch

Leon A. Burch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9917835
    Abstract: Techniques for secure message offloading are presented. An intermediary is transparently situated between a user's local messaging client and an external and remote messaging client. The user authenticates to the local client for access and the intermediary authenticates the user for access to the remote client using different credentials unknown to the user. Messages sent from the local client are transparently encrypted by the intermediary before being passed to the remote client and messages received from the remote client are transparently decrypted before being delivered to the local client.
    Type: Grant
    Filed: December 9, 2016
    Date of Patent: March 13, 2018
    Assignee: Micro Focus Software Inc.
    Inventors: Lloyd Leon Burch, Volker Gunnar Scheuber-Heinz, Jon Hardman
  • Publication number: 20180041510
    Abstract: An authenticated session with a remote system is established and identified through an authentication token for the session. During that session, a resource is accessed requiring additional authentication beyond what the authentication token was originally authorized for. Out-of-band processing from the existing session performs the additional authentication and permission from the authentication token are upgraded to include permissions for accessing the resource during the session. The resource is accessed during the session with the authentication token having the upgraded permissions.
    Type: Application
    Filed: August 2, 2016
    Publication date: February 8, 2018
    Inventors: Lloyd Leon Burch, Gulshan Govind Vaswani, Sureshkumar Thangavel, Rik Peters
  • Publication number: 20170374096
    Abstract: Systems and methods are described that support information security and sub-system operational conformance with protocols. In some embodiments, agent access to resources can be controlled via generation of credentials and/or tokens and/or conditioned external authentication. In some embodiments, workflows used to assess protocol conformance can be conditionally triggered at sub-systems.
    Type: Application
    Filed: August 21, 2017
    Publication date: December 28, 2017
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: Stephen R. Carter, Lee Edward Lowry, Paul Alexandre Turner, Robert Mark Ward, Lloyd Leon Burch, Dale Robert Olds, Duane Fredrick Buss
  • Patent number: 9848017
    Abstract: Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies.
    Type: Grant
    Filed: January 30, 2015
    Date of Patent: December 19, 2017
    Assignee: Micro Focus Software Inc.
    Inventors: Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Stephen R Carter
  • Patent number: 9843490
    Abstract: Techniques for inserting analytic logic into network requests are presented. In an embodiment, instructions are dynamically inserted into web pages as the pages are requested. The instructions enable analytics to be captured and/or tracked when the web pages are processed. In another embodiment, web requests are intercepted and processed to include analytic instructions.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: December 12, 2017
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Duane Fredrick Buss
  • Publication number: 20170353464
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Application
    Filed: July 31, 2017
    Publication date: December 7, 2017
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Publication number: 20170353442
    Abstract: A first device requests a protected resource (managed by a second device). A first authentication is performed by the second device upon receipt of the request. The second device provides an audio message back to the first device, which plays the audio message over a speaker. A third device captures the audio message as audio and uses the audio message to request a second authentication from the second device. The second device provides an authenticated session handle back to the first device for accessing the protected resource when both the first and second authentications are successful.
    Type: Application
    Filed: July 31, 2017
    Publication date: December 7, 2017
    Inventors: Lloyd Leon Burch, Michael F. Angelo, Baha Masoud
  • Patent number: 9787659
    Abstract: Techniques for secure access management to virtual environments are provided. A user authenticates to a portal for purposes of establishing a virtual machine (VM). The portal interacts with a cloud server and an identity server to authenticate the user, to acquire an Internet Protocol (IP) address and port number for the VM, and to obtain a secure token. The user then interacts with a secure socket layer virtual private network (SSL VPN) server to establish a SSL VPN session with the VM. The SSL VPN server also authenticates the token through the identity server and acquires dynamic policies to enforce during the SSL VPN session between the user and the VM (the VM managed by the cloud server).
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: October 10, 2017
    Assignee: Micro Focus Software Inc.
    Inventors: Lloyd Leon Burch, Prakash Umasankar Mukkara, Douglas Garry Earl
  • Patent number: 9781154
    Abstract: Systems and methods are described that support information security and sub-system operational conformance with protocols. In some embodiments, agent access to resources can be controlled via generation of credentials and/or tokens and/or conditioned external authentication. In some embodiments, workflows used to assess protocol conformance can be conditionally triggered at sub-systems.
    Type: Grant
    Filed: September 26, 2016
    Date of Patent: October 3, 2017
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Stephen R. Carter, Lee Edward Lowry, Paul Alexandre Turner, Robert Mark Ward, Lloyd Leon Burch, Dale Robert Olds, Duane Fredrick Buss
  • Publication number: 20170264634
    Abstract: Systems and methods are described that support information security and sub-system operational conformance with protocols. In some embodiments, agent access to resources can be controlled via generation of credentials and/or tokens and/or conditioned external authentication. In some embodiments, workflows used to assess protocol conformance can be conditionally triggered at sub-systems.
    Type: Application
    Filed: September 26, 2016
    Publication date: September 14, 2017
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: Stephen R. Carter, Lee Edward Lowry, Paul Alexandre Turner, Robert Mark Ward, Lloyd Leon Burch, Dale Robert Olds, Duane Fredrick Buss
  • Patent number: 9742864
    Abstract: System and method for implementing cloud mitigation and operations controllers are described. One embodiment is a system for controlling operation of a cloud computing environment, wherein the system comprises a repository for storing data regarding characteristics of the cloud computing environment, wherein the stored data includes policy notations designating compliance or noncompliance of the data with policy; an analyst module for analyzing the stored data in combination with external report information regarding the cloud computing environment and for providing results of the analysis; and a controller for evaluating the analysis results and issuing instructions for controlling operation of the cloud computing environment based on the evaluating.
    Type: Grant
    Filed: November 5, 2009
    Date of Patent: August 22, 2017
    Assignee: Novell, Inc.
    Inventors: Stephen R. Carter, Lloyd Leon Burch, Carolyn Bennion McClain, Dale Robert Olds
  • Publication number: 20170223009
    Abstract: A late-binding token (LBT) is securely generated and provided to a device application. When the LBT is presented and validated, a resource associated with the presentation is bound to the LBT and authenticated for access to a service and provided valid credentials for accessing that service.
    Type: Application
    Filed: April 13, 2017
    Publication date: August 3, 2017
    Inventors: Lloyd Leon Burch, Atul Mahajan, Stuart Jensen, Baha Masoud
  • Publication number: 20170223002
    Abstract: Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a website displaying an embedded code as an image alongside a normal login process for that website. The image is identified by the mobile device, encrypted and signed by the mobile device and sent to a proxy. The proxy authenticates the code and associates it with the website. Credentials for the user are provided to the website to automatically authenticate the user for access to the website bypassing the normal login process associated with the website.
    Type: Application
    Filed: April 12, 2017
    Publication date: August 3, 2017
    Inventors: Jason Allen Sabin, Jeremy Ray Brown, Lloyd Leon Burch
  • Patent number: 9723007
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Grant
    Filed: September 28, 2015
    Date of Patent: August 1, 2017
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Patent number: 9722984
    Abstract: A first device requests a protected resource (managed by a second device). A first authentication is performed by the second device upon receipt of the request. The second device provides an audio message back to the first device, which plays the audio message over a speaker. A third device captures the audio message as audio and uses the audio message to request a second authentication from the second device. The second device provides an authenticated session handle back to the first device for accessing the protected resource when both the first and second authentications are successful.
    Type: Grant
    Filed: January 30, 2014
    Date of Patent: August 1, 2017
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Michael F. Angelo, Baha Masoud
  • Publication number: 20170214669
    Abstract: System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external address to the internal cloud addresses of the cloud workloads. A designated one of the cloud workloads obtains one key of a first pair of cryptographic keys, the first pair of cryptographic keys for decrypting encrypted storage hosted within the cloud computing environment.
    Type: Application
    Filed: April 10, 2017
    Publication date: July 27, 2017
    Inventors: Stephen R Carter, Carolyn B. McClain, Jared Patrick Allen, Dale Robert Olds, Lloyd Leon Burch
  • Publication number: 20170193237
    Abstract: Techniques for security auditing of cloud resources are provided. A virtual machine (VM) is captured and isolated when a session indicates that a session with the VM has terminated. Security checks are executed against the VM in the isolated environment. Results from the security checks are then reported.
    Type: Application
    Filed: March 15, 2017
    Publication date: July 6, 2017
    Inventors: Jason Allen Sabin, Michael John Jorgensen, Lloyd Leon Burch, Jeremy Ray Brown, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Matthew Holt
  • Publication number: 20170180331
    Abstract: Techniques for secure data extraction in a virtual or cloud environment are presented. Desired data from a Virtual Machine (VM) or an entire VM is extracted and encrypted with a key. This key is sealed to a machine or a group of machines. The encrypted data is then migrated and successfully used on startup for instances of the VM by having the ability to access the sealed key (and unsealing it) to decrypt the encrypted data.
    Type: Application
    Filed: December 5, 2016
    Publication date: June 22, 2017
    Inventors: Michael F. Angelo, Lloyd Leon Burch
  • Patent number: 9674188
    Abstract: Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a website displaying an embedded code as an image alongside a normal login process for that website. The image is identified by the mobile device, encrypted and signed by the mobile device and sent to a proxy. The proxy authenticates the code and associates it with the website. Credentials for the user are provided to the website to automatically authenticate the user for access to the website bypassing the normal login process associated with the website.
    Type: Grant
    Filed: December 18, 2014
    Date of Patent: June 6, 2017
    Assignee: Micro Focus Software Inc.
    Inventors: Jason Allen Sabin, Jeremy Ray Brown, Lloyd Leon Burch
  • Patent number: 9658891
    Abstract: System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external address to the internal cloud addresses of the cloud workloads. A designated one of the cloud workloads obtains one key of a first pair of cryptographic keys, the first pair of cryptographic keys for decrypting encrypted storage hosted within the cloud computing environment.
    Type: Grant
    Filed: November 5, 2009
    Date of Patent: May 23, 2017
    Assignee: Micro Focus Software Inc.
    Inventors: Stephen R. Carter, Carolyn Bennion McClain, Jared Patrick Allen, Dale Robert Olds, Lloyd Leon Burch