Patents by Inventor Lloyd Burch

Lloyd Burch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10992706
    Abstract: Response to incorrect passwords being entered for usernames in attempts to access a computing system, each incorrect password is one-way hashed. The hashed incorrect passwords are stored within a database. High-frequency hashed incorrect passwords are determined from the stored hashed incorrect passwords. Each high-frequency hashed incorrect password corresponds to an incorrect password that was entered more than a threshold number of the attempts, regardless of the username for which the incorrect password was entered in any attempt. That the computing system is being subjected to a cyber attack is detected based on the determined high-frequency hashed incorrect passwords.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: April 27, 2021
    Assignee: NETIQ CORPORATION
    Inventors: Lloyd Burch, Michael F. Angelo, Baha Masoud
  • Publication number: 20200351299
    Abstract: Response to incorrect passwords being entered for usernames in attempts to access a computing system, each incorrect password is one-way hashed. The hashed incorrect passwords are stored within a database. High-frequency hashed incorrect passwords are determined from the stored hashed incorrect passwords. Each high-frequency hashed incorrect password corresponds to an incorrect password that was entered more than a threshold number of the attempts, regardless of the username for which the incorrect password was entered in any attempt. That the computing system is being subjected to a cyber attack is detected based on the determined high-frequency hashed incorrect passwords.
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Lloyd Burch, Michael F. Angelo, Baha Masoud
  • Publication number: 20070294750
    Abstract: Techniques are provided for dynamically establishing and managing authentication and trust relationships. An identity service acquires and evaluates contracts associated with relationships between principals. The contracts permit the identity service to assemble authentication information, aggregated attributes, and aggregated policies which will drive and define the various relationships. That assembled information is consumed by the principals during interactions with one another and constrains those interactions. In some embodiments, the constraints are dynamically modified during on-going interactions between the principals.
    Type: Application
    Filed: August 24, 2007
    Publication date: December 20, 2007
    Inventors: Lloyd Burch, Douglas Earl, Stephen Carter, Robert Ward
  • Publication number: 20070266249
    Abstract: Techniques for establishing implicit trust of authorship certification are provided. A message's domain is validated in response to a valid domain certificate. A message's author is validated in response to an author identification, which is acquired from the message and which is supplied to a domain service of the author. The domain service is implicitly trusted based on the domain being validated via the domain certificate. The domain service uses the author's identification to traverse to a specific location within the domain that houses an author certificate for the author. The author certificate is compared against a message certificate that accompanies the message in order to establish trust with the author and the author's message.
    Type: Application
    Filed: May 15, 2006
    Publication date: November 15, 2007
    Inventors: Stephen Kinser, Lloyd Burch, Cameron Morris
  • Publication number: 20070234408
    Abstract: In various embodiments of the invention, techniques are presented for providing multifactor authentication. A first set of credentials are received, which are associated with a first principal, and at least one identifier also associated with the first principal is obtained from a second principal. Next, the first principal's knowledge of the at least one identifier is verified and an authentication credential is generated for the first principal. The authentication credential permits the first principal to access the second principal.
    Type: Application
    Filed: March 31, 2006
    Publication date: October 4, 2007
    Inventors: Lloyd Burch, Stephen Carter
  • Publication number: 20070234406
    Abstract: Techniques for the remote authorization of secure operations are provided. A secure security system restricts access to a secure operation via an access key. An authorization acquisition service obtains the access key on request from the secure security system when an attempt is made to initiate the secure operation. The authorization acquisition service gains access the access key from a secure store via a secret. That is, the secret store is accessible via the secret. The secret is obtained directly or indirectly from a remote authorization principal over a network.
    Type: Application
    Filed: March 29, 2006
    Publication date: October 4, 2007
    Inventors: Stephen Carter, Lloyd Burch
  • Publication number: 20070226338
    Abstract: Techniques for registration of peer-to-peer (P2P) services are provided. A first principal registers a P2P service with a network service provider. The first principal supplies a criterion for granting access to the P2P service. The network service provider distributes an access token to a second principal if the criterion is met. The second principal connects to the P2P service of the first principal via a P2P connection if the second principal successfully acquires the access token from the network service provider.
    Type: Application
    Filed: March 23, 2006
    Publication date: September 27, 2007
    Inventors: Lloyd Burch, Cameron Morris, Stephen Kinser
  • Publication number: 20070179834
    Abstract: Techniques for federating and for attesting to online reputations are provided. A variety of reputation sources supply portions of reputation information about a principal. The portions are aggregated and optionally weighted to form a summary of reputation information. The summary is then represented as an attestation and optionally signed by the service providing the attestation.
    Type: Application
    Filed: February 1, 2006
    Publication date: August 2, 2007
    Inventors: Stephen Carter, Lloyd Burch
  • Publication number: 20070174406
    Abstract: Techniques for attesting to content received from an author (sender) are provided. A sender's content is represented by a message digest. The message digest is signed by an identity service. The signed message digest represents an attestation as to the authenticity of the content from the sender. The sender transmits the signed message digest and content in a message to a recipient. The recipient verifies the signature and message digest to authenticate the content from the sender.
    Type: Application
    Filed: January 24, 2006
    Publication date: July 26, 2007
    Inventors: Cameron Morris, Lloyd Burch, Stephen Carter, Stephen Kinser
  • Publication number: 20070124820
    Abstract: Techniques are provided for preserving and managing identities within an audit log. Initial entries into a log do not include an explicit and direct reference to an agent that performs a transaction; rather, the agent acquires a temporary transaction identity for the transaction and an indirect reference to the transaction identity is written to the log while the transaction is pending. Once the transaction completes a direct reference to the transaction identity is written to the log, the identity of agent remains transparent until the identity of the agent expires, if at all.
    Type: Application
    Filed: November 30, 2005
    Publication date: May 31, 2007
    Inventors: Lloyd Burch, Stephen Carter, Douglas Earl
  • Publication number: 20070061263
    Abstract: Crafted identities are provided. A statement is provided to the principal for using a crafted identity. The statement includes an identifier that provides access to a resource when presented by the principal to the resource. The statement also includes one or more roles and permissions for the crafted identity when accessing the resource.
    Type: Application
    Filed: September 14, 2005
    Publication date: March 15, 2007
    Inventors: Stephen Carter, Lloyd Burch, Dale Olds
  • Publication number: 20060277595
    Abstract: Techniques for providing role-based security with instance-level granularity are provided. A security service detects a request made by a principal for access to a resource. Access to the resource is conditioned on a status of a role. The role is associated with the request, the principal, and the resource. The security service evaluates a constraint associated with the role to determine the status. The status is subsequently consumed to determine whether access to the resource for the purposes of satisfying the request is permissible.
    Type: Application
    Filed: June 6, 2005
    Publication date: December 7, 2006
    Inventors: Stephen Kinser, Lloyd Burch, Stephen Carter
  • Publication number: 20060059565
    Abstract: Techniques are provided for allocating resources over a network. A resource consumer requests access to a resource over a network. As part of that request, the resource consumer acquires information that permits it to securely communicate with a resource provider. The resource provider controls the resource and once satisfied with the security of a request from a resource consumer allocates the resource for access by the resource consumer.
    Type: Application
    Filed: August 26, 2004
    Publication date: March 16, 2006
    Inventors: Tammy Green, Lloyd Burch, Stephen Carter, Douglas Earl
  • Publication number: 20060034179
    Abstract: Techniques are provided for establishing privileged paths for data packets over a network. A data packet is received with a header; the header includes a route selector. The route selector assists in resolving a privileged path for the data packet. The data packet is injected into the network over the resolved privileged path.
    Type: Application
    Filed: August 2, 2004
    Publication date: February 16, 2006
    Inventors: Stephen Carter, Lloyd Burch, Hashem Ebrahimi, Carolyn McClain
  • Publication number: 20050259776
    Abstract: Techniques are provided for serializing events of a data stream. Meta information defines information unit separators and context for events within the data stream. The data stream is parsed according to the instructions of the meta information and event data associated with the events of the data stream are retained. The event data is packaged into selective groupings of event data and transmitted to one or more services in data formats used by the services. The services perform one or more actions based on the received selective groupings of event data.
    Type: Application
    Filed: May 18, 2004
    Publication date: November 24, 2005
    Inventors: Stephen Kinser, Lloyd Burch, Stephen Carter
  • Publication number: 20050172116
    Abstract: Techniques are provided for dynamically establishing and managing trust relationships. A first principal initially requests a community list. The community list includes identities of one or more second principals with which the first principal can establish trusted relationships with. The community list is associated with a trust specification. The trust specification defines the policies and access rights associated with interactions between the first principal and the second principals during any active trusted relationships. The first principal can dynamically subdivide, manage, and modify entries of the community list and the trust specification, assuming any such modifications are permissible according to global contracts and policies associated with the first principal.
    Type: Application
    Filed: February 3, 2004
    Publication date: August 4, 2005
    Inventors: Lloyd Burch, Douglas Earl, Stephen Carter
  • Publication number: 20050068983
    Abstract: Techniques are provided for controlling access to a resource based on access policies and attributes. A principal issues a request to a service for purposes of accessing a resource. The principal is authenticated and a service contract for the principal, the service, and the resource is generated. The service contract defines resource access policies and attributes which can be permissibly performed by the service on behalf of the principal during a session. Moreover, the session between the service and the resource is controlled by the service contract.
    Type: Application
    Filed: September 30, 2003
    Publication date: March 31, 2005
    Inventors: Stephen Carter, Lloyd Burch
  • Publication number: 20030174841
    Abstract: Methods, systems, and data structures are provided for secure data content presentation. A client makes a request to access data content on a remote server. A key is associated with the data content. Moreover, the key and the data content are delivered to the client. In one embodiment, a proxy server generates the key and provides the data content along with the key to the client. The client validates the key prior to presenting the data content.
    Type: Application
    Filed: March 15, 2002
    Publication date: September 18, 2003
    Applicant: Novell Inc.
    Inventors: Gabe Nault, Lloyd Burch