Patents by Inventor Andrew A. Hodgkinson
Andrew A. Hodgkinson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130014207Abstract: A user defines an audit policy. The audit policy identifies one or more triggers that, when related information is included in a security token, trigger the performance of the audit. The audit can include notifying the user in some manner that the trigger occurred. The audit can require in-line confirmation of the audit, so that the security token is not transmitted until the user confirms the audit.Type: ApplicationFiled: September 14, 2012Publication date: January 10, 2013Applicant: APPLE INC.Inventors: Andrew A. Hodgkinson, Duane F. Buss, Thomas E. Doman, Patrick R. Felsted, James G. Sermersheim
-
Publication number: 20120159605Abstract: An accessor function interfaces among a client, a relying party, and an identity provider. The identity provider can “manage” personal (i.e., self-asserted) information cards on behalf of a user, making the personal information cards available on clients on which the personal information cards are not installed. The client can be an untrusted client, vulnerable to attacks such as key logging, screen capture, and memory interrogation. The accessor function can also asked as a proxy for the relying party in terms of invoking and using the information cards system, for use with legacy relying parties.Type: ApplicationFiled: February 29, 2012Publication date: June 21, 2012Inventors: Lloyd Leon Burch, Daniel S. Sanders, Andrew A. Hodgkinson, Stephen R. Carter
-
Publication number: 20120130983Abstract: A string matching system is described herein that provides for very fast and efficient pattern matching against large sets of certain types of pattern strings. If a set of pattern strings is comprised of strings that can be logically divided into segments, these pattern strings can be stored efficiently in a tree-like data structure, segment by segment, storing pattern-match syntax segments separately from literal string segments. After segmentation, individual match candidate strings are compared, segment by segment, against elements in the tree. The system uses a data structure that is conceptually a combination of a tree and a hash table. Using a hash table to implement the branching elements at each level in the tree contributes to quick matching speed at each level. By consistently separating strings into segments, the system can also share storage locations for like elements in the data structure.Type: ApplicationFiled: November 24, 2010Publication date: May 24, 2012Applicant: MICROSOFT CORPORATIONInventors: Matthew V. Ryan, Andrew Hodgkinson, Russell Young
-
Publication number: 20120085701Abstract: A process for treating a water stream containing dissolved organic carbon and dissolved salts comprises subjecting the water stream to reverse osmosis after a pre-treatment step to reduce the amount of dissolved organic carbon directed in water to the reverse osmosis treatment step. The preferred pre-treatment step is a membrane treatment step such as nanofiltration. The process enables treatment of complex effluents including mixtures of domestic and industrial effluents. Treated water may be recycled and a treatment plant (100) employing the process forms another aspect of the invention.Type: ApplicationFiled: December 22, 2008Publication date: April 12, 2012Inventors: David Evans, Andrew Hodgkinson
-
Patent number: 8151324Abstract: An accessor function interfaces among a client, a relying party, and an identity provider. The identity provider can “manage” personal (i.e., self-asserted) information cards on behalf of a user, making the personal information cards available on clients on which the personal information cards are not installed. The client can be an untrusted client, vulnerable to attacks such as key logging, screen capture, and memory interrogation. The accessor function can also asked as a proxy for the relying party in terms of invoking and using the information cards system, for use with legacy relying parties.Type: GrantFiled: April 29, 2008Date of Patent: April 3, 2012Inventors: Lloyd Leon Burch, Daniel S. Sanders, Andrew A. Hodgkinson, Stephen R. Carter
-
Publication number: 20120074221Abstract: A computer implemented method may include identifying a base information card stored on a client, determining whether an overlay information card is to be applied to the identified base information card, and selecting the overlay information card. The method may also include generating a final information card by applying the selected overlay information card to the identified base information card.Type: ApplicationFiled: November 30, 2011Publication date: March 29, 2012Applicant: NOVELL, INC.Inventors: Andrew A. Hodgkinson, James M. Norman
-
Patent number: 8083135Abstract: An information card overlay system can include a base card having multiple claims, an overlay card storing an overlay claim, and an overlay module that can be used to apply the overlay card to the base card. A computer-implemented method can include selecting a base card having multiple claims, selecting an overlay card storing an overlay claim, and applying the overlay card to the base card.Type: GrantFiled: January 12, 2009Date of Patent: December 27, 2011Assignee: Novell, Inc.Inventors: Andrew A. Hodgkinson, James M. Norman
-
Patent number: 8073783Abstract: A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.Type: GrantFiled: August 22, 2007Date of Patent: December 6, 2011Inventors: Patrick R. Felsted, Thomas E. Doman, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson, Dale R. Olds
-
Patent number: 8074257Abstract: When a user connects a pluggable card store to a machine, the machine plugs a pluggable card provider into a card provider registry. The pluggable card store can be an object portable to the user, or can be a remote store available via some connection, such as an FTP connection. The user can then use the information cards stored on the pluggable card store in a transaction.Type: GrantFiled: August 22, 2007Date of Patent: December 6, 2011Inventors: Patrick R. Felsted, Andrew A. Hodgkinson, Daniel S. Sanders, James G. Sermersheim, James Mark Norman
-
Publication number: 20110153499Abstract: A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.Type: ApplicationFiled: February 28, 2011Publication date: June 23, 2011Applicant: NOVELL, INC.Inventors: Patrick R. Felsted, Thomas E. Doman, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson, Dale R. Olds
-
Patent number: 7823059Abstract: The invention relates to the generation of user selected pages from an internet site and the delay in the reformatting of the same following a user selection of a new data event i.e. the selection of a new page which is to be displayed. In accordance with the invention, upon a user selection, reformatting of the page is delayed either for a predesignated time interval from the previous page reformatting or until all or a predefined amount of the data for the new page has been received. This allows the processor to be controlled hence preventing delays and/or errors in navigational functions and also can reduce the generation of “flicker” on the on-screen display.Type: GrantFiled: August 1, 2001Date of Patent: October 26, 2010Assignee: Pace PLC.Inventor: Andrew Hodgkinson
-
Publication number: 20100251353Abstract: A system can include an authorization token provided by a user, the authorization token specifying user identification information to be made accessible by an information card host to a relying party, an information card stored at the information card host, and an identity token generated or requested by the information card host in response to a request for identity token from the relying party.Type: ApplicationFiled: March 25, 2009Publication date: September 30, 2010Applicant: NOVELL, INC.Inventor: Andrew A. Hodgkinson
-
Publication number: 20100187302Abstract: A computer-implemented method can include selecting an information card from a group of identified information cards, selecting a persona from a group of identified personae that are associated with the selected information card, and generating a Request for Security Token (RST) based on the selected information card and the selected persona.Type: ApplicationFiled: January 27, 2009Publication date: July 29, 2010Applicant: Novell, Inc.Inventors: James Sermersheim, Andrew A. Hodgkinson, Daniel S. Sanders, Thomas E. Doman, Duane F. Buss
-
Publication number: 20100176194Abstract: An information card overlay system can include a base card having multiple claims, an overlay card storing an overlay claim, and an overlay module that can be used to apply the overlay card to the base card. A computer-implemented method can include selecting a base card having multiple claims, selecting an overlay card storing an overlay claim, and applying the overlay card to the base card.Type: ApplicationFiled: January 12, 2009Publication date: July 15, 2010Applicant: Novell, Inc.Inventors: Andrew A. Hodgkinson, James M. Norman
-
Patent number: 7725428Abstract: A system and method is presented for database restoration in a distributed data system. The distributed data system has a first database on a first server which needs restoration. The first database is first restored with a predetermined full backup file, the full backup file being made at a first predetermined time. The first database is then restored with one or more incremental backup files, the incremental backup files being made since the first predetermined time and having the most recent backup file made at a second predetermined time. A transaction log documenting data transactions since the second predetermined time is then examined. One or more transactions listed in the transaction log after the second predetermined time are then executed since they are not included in the incremental backup files.Type: GrantFiled: July 17, 2002Date of Patent: May 25, 2010Assignee: Novell, Inc.Inventors: Brian Hawkins, Andrew Hodgkinson, Daniel Sanders, Steven S. McLain
-
Publication number: 20100095372Abstract: An apparatus can include a secret mapping module running on a machine and configured to create a mapping that maps a secret to a claim stored in an information card, a receiver running on the machine and configured to receive a request for the secret from a remote application, a mapping query module running on the machine and configured to perform a search for the mapping, a credential provider application running on the machine and configured to retrieve the secret based at least in part on the claim, and a transmitter configured to transmit the secret to the remote application.Type: ApplicationFiled: October 9, 2008Publication date: April 15, 2010Applicant: NOVELL, INC.Inventors: Andrew A. Hodgkinson, James M. Norman, Daniel S. Sanders
-
Publication number: 20100058435Abstract: A client includes a card selector, and receives a security policy from a relying party. If the client does not have an information card that can satisfy the security policy, the client can define a virtual information card, either from the security policy or by augmenting an existing information card. The client can also use a local security policy that controls how and when a virtual information card is defined. The virtual information card can then be used to generate a security token to satisfy the security policy.Type: ApplicationFiled: August 29, 2008Publication date: March 4, 2010Applicant: NOVELL, INC.Inventors: Duane Buss, Andrew Hodgkinson, Tom Doman
-
Publication number: 20100031328Abstract: Systems and methods for generation of site-specific credentials using information cards are provided. An apparatus can include a machine, a browser on the machine configured to receive a request from a relying party site for a credential from a user, a receiver to receive one or more inputs, a site-specific credential generator to generate the credential based on the inputs, and a transmitter configured to transmit the generated credential to the relying party site.Type: ApplicationFiled: July 31, 2008Publication date: February 4, 2010Applicant: NOVELL, INC.Inventor: Andrew A. Hodgkinson
-
Publication number: 20100011409Abstract: Systems and methods for automatic, non-interactive generation of information card tokens are provided. An apparatus can include a receiver, a transmitter, and an information card token generator, wherein the information card token generator is operable to generate an information card token in response to an information card token request received from a relying party site, the information card security token being based at least in part on a user-defined policy.Type: ApplicationFiled: July 9, 2008Publication date: January 14, 2010Applicant: NOVELL, INC.Inventors: Andrew A. Hodgkinson, Dale Olds
-
Publication number: 20090328166Abstract: An accessor function interfaces among a client, a relying party, and an identity provider. The identity provider can “manage” personal (i.e., self-asserted) information cards on behalf of a user, making the personal information cards available on clients on which the personal information cards are not installed. The client can be an untrusted client, vulnerable to attacks such as key logging, screen capture, and memory interrogation. The accessor function can also asked as a proxy for the relying party in terms of invoking and using the information cards system, for use with legacy relying parties.Type: ApplicationFiled: April 29, 2008Publication date: December 31, 2009Applicant: NOVELL, INC.Inventors: Lloyd Leon Burch, Daniel S. Sanders, Andrew A. Hodgkinson, Stephen R. Carter