Patents by Inventor Andrew A. Hodgkinson

Andrew A. Hodgkinson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8875997
    Abstract: A computer implemented method may include identifying a base information card stored on a client, determining whether an overlay information card is to be applied to the identified base information card, and selecting the overlay information card. The method may also include generating a final information card by applying the selected overlay information card to the identified base information card.
    Type: Grant
    Filed: November 30, 2011
    Date of Patent: November 4, 2014
    Assignee: Novell, Inc.
    Inventors: Andrew A. Hodgkinson, James M. Norman
  • Patent number: 8632003
    Abstract: A computer-implemented method can include selecting an information card from a group of identified information cards, selecting a persona from a group of identified personae that are associated with the selected information card, and generating a Request for Security Token (RST) based on the selected information card and the selected persona.
    Type: Grant
    Filed: January 27, 2009
    Date of Patent: January 21, 2014
    Assignee: Novell, Inc.
    Inventors: James Sermersheim, Andrew A. Hodgkinson, Daniel S. Sanders, Thomas E. Doman, Duane F. Buss
  • Patent number: 8479254
    Abstract: The user can associate metadata with information cards. The metadata can include, among other possibilities, string names, icons, user policies, containers, and hierarchies. The metadata is stored by the computer system. The metadata can then be used to filter the set of information cards that can satisfy a security policy from a relying party.
    Type: Grant
    Filed: August 22, 2007
    Date of Patent: July 2, 2013
    Assignee: Apple Inc.
    Inventors: Duane F. Buss, Patrick R. Felsted, Andrew A. Hodgkinson, Daniel S. Sanders
  • Patent number: 8468576
    Abstract: A selector daemon can run in the background of a computer. Applications that are capable of processing information cards directly, without requiring the use of a card selector, can request the selector daemon to list information cards that satisfy security policy. Upon receiving such a request, selector daemon can determine the information cards available on the computer that satisfy the security policy, and can identify these information cards to the requesting application. The applications can then use the identified information cards in any manner desired, without having to use a card selector: for example, by requesting a security token based on one of the information cards directly from an identity provider.
    Type: Grant
    Filed: October 1, 2008
    Date of Patent: June 18, 2013
    Assignee: Apple Inc.
    Inventors: Thomas E. Doman, Duane F. Buss, Daniel S. Sanders, Andrew A. Hodgkinson, James G. Sermersheim, James M. Norman
  • Patent number: 8370913
    Abstract: A user defines an audit policy. The audit policy identifies one or more triggers that, when related information is included in a security token, trigger the performance of the audit. The audit can include notifying the user in some manner that the trigger occurred. The audit can require in-line confirmation of the audit, so that the security token is not transmitted until the user confirms the audit.
    Type: Grant
    Filed: August 22, 2007
    Date of Patent: February 5, 2013
    Assignee: Apple Inc.
    Inventors: Andrew A. Hodgkinson, Duane F. Buss, Thomas E. Doman, Patrick R. Felsted, James G. Sermersheim
  • Patent number: 8364600
    Abstract: A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
    Type: Grant
    Filed: February 28, 2011
    Date of Patent: January 29, 2013
    Assignee: Apple Inc.
    Inventors: Patrick R. Felsted, Thomas E. Doman, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson, Dale R. Olds
  • Publication number: 20130024908
    Abstract: A selector daemon can run in the background of a computer. Applications that are capable of processing information cards directly, without requiring the use of a card selector, can request the selector daemon to list information cards that satisfy security policy. Upon receiving such a request, selector daemon can determine the information cards available on the computer that satisfy the security policy, and can identify these information cards to the requesting application. The applications can then use the identified information cards in any manner desired, without having to use a card selector: for example, by requesting a security token based on one of the information cards directly from an identity provider.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 24, 2013
    Applicant: APPLE INC.
    Inventors: Thomas E. Doman, Duane F. Buss, Daniel S. Sanders, Andrew A. Hodgkinson, James G. Sermersheim, James M. Norman
  • Publication number: 20130014207
    Abstract: A user defines an audit policy. The audit policy identifies one or more triggers that, when related information is included in a security token, trigger the performance of the audit. The audit can include notifying the user in some manner that the trigger occurred. The audit can require in-line confirmation of the audit, so that the security token is not transmitted until the user confirms the audit.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Applicant: APPLE INC.
    Inventors: Andrew A. Hodgkinson, Duane F. Buss, Thomas E. Doman, Patrick R. Felsted, James G. Sermersheim
  • Publication number: 20130014245
    Abstract: An accessor function interfaces among a client, a relying party, and an identity provider. The identity provider can “manage” personal (i.e., self-asserted) information cards on behalf of a user, making the personal information cards available on clients on which the personal information cards are not installed. The client can be an untrusted client, vulnerable to attacks such as key logging, screen capture, and memory interrogation. The accessor function can also asked as a proxy for the relying party in terms of invoking and using the information cards system, for use with legacy relying parties.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Applicant: APPLE INC.
    Inventors: Lloyd Leon Burch, Daniel S. Sanders, Andrew A. Hodgkinson, Stephen R. Carter
  • Publication number: 20120159605
    Abstract: An accessor function interfaces among a client, a relying party, and an identity provider. The identity provider can “manage” personal (i.e., self-asserted) information cards on behalf of a user, making the personal information cards available on clients on which the personal information cards are not installed. The client can be an untrusted client, vulnerable to attacks such as key logging, screen capture, and memory interrogation. The accessor function can also asked as a proxy for the relying party in terms of invoking and using the information cards system, for use with legacy relying parties.
    Type: Application
    Filed: February 29, 2012
    Publication date: June 21, 2012
    Inventors: Lloyd Leon Burch, Daniel S. Sanders, Andrew A. Hodgkinson, Stephen R. Carter
  • Patent number: 8151324
    Abstract: An accessor function interfaces among a client, a relying party, and an identity provider. The identity provider can “manage” personal (i.e., self-asserted) information cards on behalf of a user, making the personal information cards available on clients on which the personal information cards are not installed. The client can be an untrusted client, vulnerable to attacks such as key logging, screen capture, and memory interrogation. The accessor function can also asked as a proxy for the relying party in terms of invoking and using the information cards system, for use with legacy relying parties.
    Type: Grant
    Filed: April 29, 2008
    Date of Patent: April 3, 2012
    Inventors: Lloyd Leon Burch, Daniel S. Sanders, Andrew A. Hodgkinson, Stephen R. Carter
  • Publication number: 20120074221
    Abstract: A computer implemented method may include identifying a base information card stored on a client, determining whether an overlay information card is to be applied to the identified base information card, and selecting the overlay information card. The method may also include generating a final information card by applying the selected overlay information card to the identified base information card.
    Type: Application
    Filed: November 30, 2011
    Publication date: March 29, 2012
    Applicant: NOVELL, INC.
    Inventors: Andrew A. Hodgkinson, James M. Norman
  • Patent number: 8083135
    Abstract: An information card overlay system can include a base card having multiple claims, an overlay card storing an overlay claim, and an overlay module that can be used to apply the overlay card to the base card. A computer-implemented method can include selecting a base card having multiple claims, selecting an overlay card storing an overlay claim, and applying the overlay card to the base card.
    Type: Grant
    Filed: January 12, 2009
    Date of Patent: December 27, 2011
    Assignee: Novell, Inc.
    Inventors: Andrew A. Hodgkinson, James M. Norman
  • Patent number: 8074257
    Abstract: When a user connects a pluggable card store to a machine, the machine plugs a pluggable card provider into a card provider registry. The pluggable card store can be an object portable to the user, or can be a remote store available via some connection, such as an FTP connection. The user can then use the information cards stored on the pluggable card store in a transaction.
    Type: Grant
    Filed: August 22, 2007
    Date of Patent: December 6, 2011
    Inventors: Patrick R. Felsted, Andrew A. Hodgkinson, Daniel S. Sanders, James G. Sermersheim, James Mark Norman
  • Patent number: 8073783
    Abstract: A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
    Type: Grant
    Filed: August 22, 2007
    Date of Patent: December 6, 2011
    Inventors: Patrick R. Felsted, Thomas E. Doman, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson, Dale R. Olds
  • Publication number: 20110153499
    Abstract: A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
    Type: Application
    Filed: February 28, 2011
    Publication date: June 23, 2011
    Applicant: NOVELL, INC.
    Inventors: Patrick R. Felsted, Thomas E. Doman, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson, Dale R. Olds
  • Publication number: 20100251353
    Abstract: A system can include an authorization token provided by a user, the authorization token specifying user identification information to be made accessible by an information card host to a relying party, an information card stored at the information card host, and an identity token generated or requested by the information card host in response to a request for identity token from the relying party.
    Type: Application
    Filed: March 25, 2009
    Publication date: September 30, 2010
    Applicant: NOVELL, INC.
    Inventor: Andrew A. Hodgkinson
  • Publication number: 20100187302
    Abstract: A computer-implemented method can include selecting an information card from a group of identified information cards, selecting a persona from a group of identified personae that are associated with the selected information card, and generating a Request for Security Token (RST) based on the selected information card and the selected persona.
    Type: Application
    Filed: January 27, 2009
    Publication date: July 29, 2010
    Applicant: Novell, Inc.
    Inventors: James Sermersheim, Andrew A. Hodgkinson, Daniel S. Sanders, Thomas E. Doman, Duane F. Buss
  • Publication number: 20100176194
    Abstract: An information card overlay system can include a base card having multiple claims, an overlay card storing an overlay claim, and an overlay module that can be used to apply the overlay card to the base card. A computer-implemented method can include selecting a base card having multiple claims, selecting an overlay card storing an overlay claim, and applying the overlay card to the base card.
    Type: Application
    Filed: January 12, 2009
    Publication date: July 15, 2010
    Applicant: Novell, Inc.
    Inventors: Andrew A. Hodgkinson, James M. Norman
  • Publication number: 20100095372
    Abstract: An apparatus can include a secret mapping module running on a machine and configured to create a mapping that maps a secret to a claim stored in an information card, a receiver running on the machine and configured to receive a request for the secret from a remote application, a mapping query module running on the machine and configured to perform a search for the mapping, a credential provider application running on the machine and configured to retrieve the secret based at least in part on the claim, and a transmitter configured to transmit the secret to the remote application.
    Type: Application
    Filed: October 9, 2008
    Publication date: April 15, 2010
    Applicant: NOVELL, INC.
    Inventors: Andrew A. Hodgkinson, James M. Norman, Daniel S. Sanders