Patents by Inventor Yvonne Wilson
Yvonne Wilson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7325128Abstract: A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e.g., those based on passwords, certificates, biometric techniques, smart cards, etc.) are employed depending on the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient.Type: GrantFiled: September 19, 2006Date of Patent: January 29, 2008Assignee: Sun Microsystems, Inc.Inventors: David L. Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William R. Soley
-
Publication number: 20070101418Abstract: A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e.g., those based on passwords, certificates, biometric techniques, smart cards, etc.) are employed depending on the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient.Type: ApplicationFiled: September 19, 2006Publication date: May 3, 2007Applicant: Sun Microsystems, Inc.Inventors: David Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William Soley
-
Patent number: 7117359Abstract: A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e.g., those based on passwords, certificates, biometric techniques, smart cards, etc.) are employed depending on the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient. In addition, an entity can be allocated a new session and associated default credential if the entity's access request indicates an invalid session token or does not indicate a token.Type: GrantFiled: September 12, 2005Date of Patent: October 3, 2006Assignee: Sun Microsystems, Inc.Inventors: David L. Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William R. Soley
-
Publication number: 20060070114Abstract: A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e.g., those based on passwords, certificates, biometric techniques, smart cards, etc.) are employed depending on the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient.Type: ApplicationFiled: September 12, 2005Publication date: March 30, 2006Inventors: David Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William Soley
-
Patent number: 6944761Abstract: A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e.g., those based on passwords, certificates, biometric techniques, smart cards, etc.) are employed depending on the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient.Type: GrantFiled: August 19, 2003Date of Patent: September 13, 2005Assignee: Sun Microsystems, Inc.Inventors: David L. Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William R. Soley
-
Patent number: 6892307Abstract: A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e.g., those based on passwords, certificates, biometric techniques, smart cards, etc.) are associated with trust levels and a log-on service obtains credentials for an entity commensurate with the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient.Type: GrantFiled: August 5, 1999Date of Patent: May 10, 2005Assignee: Sun Microsystems, Inc.Inventors: David L. Wood, Derk Norton, Paul Weschler, Chris Ferris, Yvonne Wilson
-
Publication number: 20040210771Abstract: A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e.g., those based on passwords, certificates, biometric techniques, smart cards, etc.) are employed depending on the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient.Type: ApplicationFiled: August 19, 2003Publication date: October 21, 2004Applicant: Sun Microsystems, Inc.Inventors: David L. Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William R. Soley
-
Patent number: 6609198Abstract: A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e.g., those based on passwords, certificates, biometric techniques, smart cards, etc.) are employed depending on the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient. The security architecture allows upgrade of credentials for a given session. This capability is particularly advantageous in the context of a single, enterprise-wide log-on. An entity (e.g.Type: GrantFiled: August 5, 1999Date of Patent: August 19, 2003Assignee: Sun Microsystems, Inc.Inventors: David L. Wood, Paul Weschler, Derk Norton, Chris Ferris, Yvonne Wilson, William R. Soley
-
Patent number: 6338138Abstract: A network-based authentication scheme is provided that performs authentication in a centralized manner for the stand-alone computers of a particular organization. Since authentication is centralized, the individual computers do not need to store authentication information, and control over all of the computers rests in a single location, enabling the system administrator to manage access and utilization of the computers from this location. The network-based authentication scheme includes an authentication manager, remotely located with respect to a local computer, that performs authentication for the local computer. The authentication manager receives login information from the local computer, verifies this information against an authentication file, and returns indications of the services on the local computer that the user is able to utilize. The local computer receives these indications and displays icons representing the services available to that user.Type: GrantFiled: June 29, 1998Date of Patent: January 8, 2002Assignee: Sun Microsystems, Inc.Inventors: William J. Raduchel, Abhay Gupta, Yvonne Wilson