Patents Assigned to Novell, Inc.
  • Patent number: 8806566
    Abstract: Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds. Policy actions are enforced when processing the messages. The policy actions can include identity-based restrictions and the policy actions are specific to the messages and/or clouds within which the messages are being processed.
    Type: Grant
    Filed: March 18, 2010
    Date of Patent: August 12, 2014
    Assignee: Novell, Inc.
    Inventors: Bruce L. Bergeson, Carolyn B. McClain, Stephen R Carter, Vernon Roger Holm
  • Patent number: 8799640
    Abstract: Techniques for managing a secure communication session are provided. A non-browser application utilizes a browser to establish a secure communication session with a server. The session cookie set in the browser is mapped by the server to a secret token that is supplied via the browser to the non-browser application. The browser is then closed and the secure communication session between the server and the non-browser application continues unabated via the secret token.
    Type: Grant
    Filed: February 27, 2010
    Date of Patent: August 5, 2014
    Assignee: Novell, Inc.
    Inventors: Prakash Umasankar Mukkara, Lloyd Leon Burch
  • Patent number: 8799048
    Abstract: Techniques for visual integration of meeting spaces within a calendar system are presented. A meeting room can be viewed via a map and selected for scheduling a meeting. The map depicts the location of the meeting room within a facility of an enterprise. A meeting scheduler visually sees the meeting room within the map and can select the meeting room and acquire details about the meeting room.
    Type: Grant
    Filed: November 14, 2008
    Date of Patent: August 5, 2014
    Assignee: Novell, Inc.
    Inventor: Jitender Bisht
  • Patent number: 8789179
    Abstract: Cloud protection techniques are provided. A security breach is detected in a source cloud environment. An enterprise system processing in the source cloud environment is immediately locked down and is dynamically migrated to a target cloud environment. While the enterprise system is migrating, the source cloud environment creates a fake environment with fake resources within the source cloud environment to dupe an intruder having access as a result of the security breach. Metrics and logs are gathered with respect to activities of the intruder within the source cloud environment.
    Type: Grant
    Filed: October 28, 2011
    Date of Patent: July 22, 2014
    Assignee: Novell, Inc.
    Inventor: Jason Allen Sabin
  • Patent number: 8788669
    Abstract: Techniques for policy and identity-based workload provisioning are presented. Identities for requestors or workloads and identities for workloads are tied to specific policies. The specific policies are evaluated based on a stage of readiness for resources within a resource pool and based on resource identities for the resources within the resource pool. Resources are then dynamically provisioned based on the identity-based policy evaluation to handle workloads from the resource pool.
    Type: Grant
    Filed: January 3, 2011
    Date of Patent: July 22, 2014
    Assignee: Novell, Inc.
    Inventors: Gregory Matthew Haskins, David H. Bahi, Daniel Edward Westervelt, Jonathan Paul Bultmeyer, Stephen R Carter
  • Patent number: 8787391
    Abstract: Techniques for using the network as a memory device are provided. Network packets continue to circulate on a network using the network communication channel as a memory device. Nodes of the network are configured to selectively copy, use, verify, modify, create, and purge the network packets using file management semantics.
    Type: Grant
    Filed: October 22, 2009
    Date of Patent: July 22, 2014
    Assignee: Novell, Inc.
    Inventor: Stephen R Carter
  • Patent number: 8782734
    Abstract: Methods and apparatus teach defining an access policy to digital data available on one or more computing devices, including identifying one or more semantic attributes of at least one first digital data set and using the identified attributes to define policy dictating user access privileges. On receipt of a user request to access at least one second digital data set, semantic attributes are compared to the at least one first digital data set and access is allowed or not allowed based on the policy. Semantic attributes are selected from at least one of a closeness attribute, a relatedness attribute, and a semantic vector attribute. Also is taught configuring a policy enforcement agent on the one or more computing devices to undertake the comparing and to allow or not allow access. In turn, computer program products and computing systems for accomplishing the foregoing are provided.
    Type: Grant
    Filed: January 14, 2011
    Date of Patent: July 15, 2014
    Assignee: Novell, Inc.
    Inventors: Scott A. Isaacson, John Melvin Antony, Stephen R. Carter
  • Patent number: 8782765
    Abstract: Techniques for environment single sign on are provided. Multiple identifiers for devices are associated as a single environment. A principal can be authenticated via any of the devices once to access protected resources and once authenticated the principal can access the protected resources from the other devices without re-authenticating.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: July 15, 2014
    Assignee: Novell, Inc.
    Inventors: Nathaniel Kranendonk, Stephen R Carter
  • Publication number: 20140192644
    Abstract: Techniques for privileged network routing are provided. As traffic is received at a gateway of a network backbone provider environment it is interrogated for predefined criteria. If the traffic satisfies the predefined criteria, then the information is routed within the network backbone provider environment to use a set of reserved and restricted resources to provide premium service for the traffic being routed through the network backbone provider environment.
    Type: Application
    Filed: March 17, 2014
    Publication date: July 10, 2014
    Applicant: Novell, Inc.
    Inventors: Stephen R. Carter, Dipto Chakravarty
  • Publication number: 20140195292
    Abstract: Techniques for project management instantiation and configuration are provided. A master project includes policy directives that drive the dynamic instantiation and configuration of resources for a project. The resources are instantiated and configured on demand and when resources are actually requested, in response to the policy directives.
    Type: Application
    Filed: January 6, 2014
    Publication date: July 10, 2014
    Applicant: Novell, Inc.
    Inventors: Michel Shane Simpson, Volker Gunnar Scheuber-Heinz, Lee Edward Lowry, Stephen R. Carter
  • Publication number: 20140189775
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Application
    Filed: December 27, 2012
    Publication date: July 3, 2014
    Applicant: Novell, Inc.
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Patent number: 8769084
    Abstract: The system and method described herein may include a discovery engine that scans a network datacenter to inventory resources in the datacenter and populate a configuration management database with the resource inventory. One or more destination listeners created from the resource inventory may then selectively sample monitored flows in the datacenter to model interdependencies between the inventoried resources. For example, any monitored flows originating outside the datacenter or failing to correlate with the inventoried resources may be dropped, whereby the interdependencies may be modeled from a deliberately reduced sample of the monitored flows that have information relevant to modeling relationships between resources within the datacenter. Furthermore, directionalities for the monitored flows may be determined, wherein the directionalities provide further information relevant to modeling the relationships between the resources within the datacenter.
    Type: Grant
    Filed: August 25, 2010
    Date of Patent: July 1, 2014
    Assignee: Novell, Inc.
    Inventors: Kurt Andrew Westerfeld, John Ross Judson
  • Patent number: 8769529
    Abstract: Apparatus, systems, and methods may operate to monitor operations of at least one processor to define a set of executed applications executed under a first operating system over a selected time period; and to generate an image of a second operating system having sufficient resources to service a subset of the set of executed applications, the subset determined according to a usage pattern defined by at least a portion of the selected time period, the number of resources provided by the second operating system being less than or equal to the number of resources provided by the first operating system. The images may be loaded based on receipt of a menu selection. Additional apparatus, systems, and methods are disclosed.
    Type: Grant
    Filed: July 24, 2009
    Date of Patent: July 1, 2014
    Assignee: Novell, Inc.
    Inventor: Dhairesh Oza
  • Patent number: 8760683
    Abstract: Techniques for scheduling and guaranteeing print jobs are presented. Print jobs are scheduled to process on a selected printer at user-defined dates and times. A print queue for the selected printer is managed to ensure that no subsequent print job begins on the printer when that subsequent print job cannot finish before a scheduled start time of a scheduled print job that has been guaranteed the scheduled start time on the printer.
    Type: Grant
    Filed: March 30, 2009
    Date of Patent: June 24, 2014
    Assignee: Novell, Inc.
    Inventor: Ruma Chakraborty
  • Patent number: 8762584
    Abstract: The system and method described herein may activate an automatic provisioning system within customer premise equipment via a digital subscriber line, cable modem, or other residential hub or gateway interface and access a remote directory service to locate appropriate addressing and other information to initialize the customer premise equipment. The gateway interface may automatically update a configuration, heal bugs, and perform other maintenance and tasks to manage the customer premise equipment. Multiple gateway interfaces or products or services associated therewith may be configured at one premise and version control may be maintained to ensure compatibility.
    Type: Grant
    Filed: February 6, 2012
    Date of Patent: June 24, 2014
    Assignee: Novell, Inc.
    Inventors: Michael L. Buck, Richard D. Jones
  • Patent number: 8756535
    Abstract: Apparatus, systems, and methods may operate to execute a plurality of screen saver program instances to display a plurality of separately visible screen saver images using a single display device at substantially the same time. In some embodiments, some or all of the screen saver images are displayed in a plurality of non-overlapping display compartments. The images may be selectively assigned a dominant color, or color scheme. The compartments may have boundaries that can be selectively revised. Additional apparatus, systems, and methods are disclosed.
    Type: Grant
    Filed: November 17, 2008
    Date of Patent: June 17, 2014
    Assignee: Novell, Inc.
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 8756597
    Abstract: Methods and apparatus involve extending functionality of legacy services. A legacy application has functionality designed for use on an original computing device. In a modern environment, virtual machines (VMs) operate as independent guests on processors and memory by way of scheduling control from a virtualization layer (e.g., hypervisor). At least one VM is provisioned to modify standard entry points of the original legacy application for new accessing of various system functions of the hardware platform. Representative functions include network access, processors, and storage. Policy decision points variously located are further employed to ensure compliance with computing policies. Multiple platforms and computing clouds are contemplated as are VMs in support roles and dedicated software appliances. In this manner, continued use of legacy services in modern situations allows participation in more capable environments and application capabilities heretofore unimagined.
    Type: Grant
    Filed: February 5, 2010
    Date of Patent: June 17, 2014
    Assignee: Novell, Inc.
    Inventors: Kaltiganehalli Y. Srinivasan, Stephen R. Carter, Carolyn B. McClain, Jonathan P. Bultmeyer
  • Publication number: 20140164606
    Abstract: Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service.
    Type: Application
    Filed: November 11, 2013
    Publication date: June 12, 2014
    Applicant: Novell, Inc.
    Inventors: Lloyd Leon Burch, Jeremy Ray Brown, Jason Allen Sabin, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks, Michael John Jorgensen, Thomas Larry Biggs
  • Publication number: 20140164791
    Abstract: Apparatus, systems, and methods may operate to restore an operational state of an associated virtual machine (VM) using encrypted information stored in encrypted memory locations. A single hypervisor may be used to encrypt and decrypt the information. Access may be permitted to a designated number of the encrypted memory locations only to a single application executed by the associated VM subject to the hypervisor. Access may be denied to any other application executed by the associated VM, or any other VM.
    Type: Application
    Filed: January 6, 2014
    Publication date: June 12, 2014
    Applicant: Novell, Inc.
    Inventors: Pradeep Kumar Chaturvedi, Gosukonda Naga Venkata Satya Sudhakar
  • Publication number: 20140156357
    Abstract: Techniques for help desk management are provided. A user's experience with a resource is captured via a rating. The rating is recorded along with other metrics associated with a processing environment of the user and proactive action taken in response to configuration or performance problems with the user.
    Type: Application
    Filed: February 7, 2014
    Publication date: June 5, 2014
    Applicant: Novell, Inc.
    Inventors: Tammy Anita Green, Stephen R. Carter, Scott Alan Isaacson, Eric W. B. Anderson