Patents by Inventor Carolyn B. McClain

Carolyn B. McClain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10230704
    Abstract: System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external address to the internal cloud addresses of the cloud workloads. A designated one of the cloud workloads obtains one key of a first pair of cryptographic keys, the first pair of cryptographic keys for decrypting encrypted storage hosted within the cloud computing environment.
    Type: Grant
    Filed: April 10, 2017
    Date of Patent: March 12, 2019
    Assignee: Micro Focus Software Inc.
    Inventors: Stephen R Carter, Carolyn B. McClain, Jared Patrick Allen, Dale Robert Olds, Lloyd Leon Burch
  • Patent number: 10182074
    Abstract: Techniques for virtual Representational State Transfer (REST) interfaces are provided. A proxy is interposed between a client and a REST service over a network. The proxy performs independent authentication of the client and provides credentials to the client and for the client to authenticate to the REST service using a REST service authentication mechanism. The proxy inspects requests and responses and translates the requests and responses into formats expected by the client and the REST service. Moreover, the proxy enforces policy and audits the requests and responses occurring between the client and the REST service over the network.
    Type: Grant
    Filed: May 22, 2015
    Date of Patent: January 15, 2019
    Assignee: Micro Focus Software, Inc.
    Inventors: Lloyd Leon Burch, Douglas Garry Earl, Jonathan Paul Bultmeyer, Carolyn B. McClain
  • Patent number: 10171470
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: January 1, 2019
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Patent number: 10021144
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Grant
    Filed: June 13, 2016
    Date of Patent: July 10, 2018
    Assignee: Micro Focus Software Inc.
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R Carter
  • Patent number: 9864616
    Abstract: Methods and apparatus involve extending functionality of legacy services. A legacy application has functionality designed for use on an original computing device. In a modern environment, virtual machines (VMs) operate as independent guests on processors and memory by way of scheduling control from a virtualization layer (e.g., hypervisor). At least one VM is provisioned to modify standard entry points of the original legacy application for new accessing of various system functions of the hardware platform. Representative functions include network access, processors, and storage. Policy decision points variously located are further employed to ensure compliance with computing policies. Multiple platforms and computing clouds are contemplated as are VMs in support roles and dedicated software appliances. In this manner, continued use of legacy services in modern situations allows participation in more capable environments and application capabilities heretofore unimagined.
    Type: Grant
    Filed: May 20, 2014
    Date of Patent: January 9, 2018
    Assignee: Micro Focus Software Inc.
    Inventors: Kattiganehalli Y. Srinivasan, Stephen R. Carter, Carolyn B. McClain, Jonathon P. Bultmeyer
  • Publication number: 20170353464
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Application
    Filed: July 31, 2017
    Publication date: December 7, 2017
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Publication number: 20170346696
    Abstract: Techniques for cloud control and management are provided. The control, creation, and management of workloads in distributed infrastructures are coordinated via a master Configuration Management Database (CMDB). The master CMDB is also used to unify the multiple distributed infrastructures so that the workloads are rationalized. Moreover, data centers are coordinated with the distributed infrastructures so the configuration settings and policies included in the master CMDB are enforced and synchronized throughout the network.
    Type: Application
    Filed: August 14, 2017
    Publication date: November 30, 2017
    Inventors: Robert A. Wipfel, Stephen R. Carter, Carolyn B. McClain
  • Patent number: 9736026
    Abstract: Techniques for cloud control and management are provided. The control, creation, and management of workloads in distributed infrastructures are coordinated via a master Configuration Management Database (CMDB). The master CMDB is also used to unify the multiple distributed infrastructures so that the workloads are rationalized. Moreover, data centers are coordinated with the distributed infrastructures so the configuration settings and policies included in the master CMDB are enforced and synchronized throughout the network.
    Type: Grant
    Filed: January 30, 2015
    Date of Patent: August 15, 2017
    Assignee: Micro Focus Software Inc.
    Inventors: Robert A. Wipfel, Stephen R Carter, Carolyn B. McClain
  • Patent number: 9723007
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Grant
    Filed: September 28, 2015
    Date of Patent: August 1, 2017
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Publication number: 20170214669
    Abstract: System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external address to the internal cloud addresses of the cloud workloads. A designated one of the cloud workloads obtains one key of a first pair of cryptographic keys, the first pair of cryptographic keys for decrypting encrypted storage hosted within the cloud computing environment.
    Type: Application
    Filed: April 10, 2017
    Publication date: July 27, 2017
    Inventors: Stephen R Carter, Carolyn B. McClain, Jared Patrick Allen, Dale Robert Olds, Lloyd Leon Burch
  • Publication number: 20170126820
    Abstract: Metering service instances collect predefined types of metering events on the nodes in which the service instances process. Within each node, the events are statistically filtered, aggregated, and collected. The events are also passed to audit logs. At the conclusion of a metering period or upon detection of a batching event, the aggregated statistically filtered events (statistics) are forward to a collecting cluster where they are populated to a metering statistic data store.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Inventors: Carolyn B. McClain, Greg Goodwin, Carl B. Andersen, Bruce L. Bergeson
  • Patent number: 9514459
    Abstract: A forward proxy can perform identity substitutions and related services. The user provides the forward proxy with identity information, and the forward proxy presents itself to remote Internet sites on behalf of the user in the guize of the specified identity. From the remote site's point of view, the forward proxy is the machine being used by the user; the identity of the actual user machine can be hidden. Cookies are thus stored and updated at the forward proxy instead of being stored and updated at the user computer as they would be if a conventional forward proxy had been used. This helps preserve user privacy. The use of group identities, which are shared by multiple users, are also facilitated.
    Type: Grant
    Filed: March 15, 2001
    Date of Patent: December 6, 2016
    Assignee: EMC Corporation
    Inventors: Kshitij A. Doshi, Hashem Mohammad Ebrahimi, Carolyn B. McClain
  • Publication number: 20160352862
    Abstract: Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds. Policy actions are enforced when processing the messages. The policy actions can include identity-based restrictions and the policy actions are specific to the messages and/or clouds within which the messages are being processed.
    Type: Application
    Filed: August 11, 2016
    Publication date: December 1, 2016
    Inventors: Bruce L. Bergeson, Carolyn B. McClain, Stephen R. Carter, Vernon Roger Holm
  • Publication number: 20160352779
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Application
    Filed: June 13, 2016
    Publication date: December 1, 2016
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R. Carter
  • Patent number: 9473499
    Abstract: In various embodiments, techniques for federated role provisioning are provided. A federated role definition for a resource is constructed and distributed. The federated role definition includes a role hierarchy having role assignments and constraints for dynamically resolving and binding a resource to particular ones of the role assignments. A resource may have role assignments statically bound to its identity and dynamically bound to its identity. Furthermore, some role assignments may be inherited from the role hierarchy.
    Type: Grant
    Filed: April 2, 2014
    Date of Patent: October 18, 2016
    Assignee: Apple Inc.
    Inventors: Carolyn B. McClain, Bruce L. Bergeson, Vernon Roger Holm
  • Patent number: 9438692
    Abstract: Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds. Policy actions are enforced when processing the messages. The policy actions can include identity-based restrictions and the policy actions are specific to the messages and/or clouds within which the messages are being processed.
    Type: Grant
    Filed: July 31, 2014
    Date of Patent: September 6, 2016
    Assignee: Novell, Inc.
    Inventors: Bruce L. Bergeson, Carolyn B. McClain, Stephen R Carter, Vernon Roger Holm
  • Patent number: 9369494
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Grant
    Filed: August 13, 2014
    Date of Patent: June 14, 2016
    Assignee: Novell, Inc.
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R Carter
  • Publication number: 20160021113
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Application
    Filed: September 28, 2015
    Publication date: January 21, 2016
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Patent number: 9172701
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Grant
    Filed: December 27, 2012
    Date of Patent: October 27, 2015
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Publication number: 20150281286
    Abstract: Techniques for virtual Representational State Transfer (REST) interfaces are provided. A proxy is interposed between a client and a REST service over a network. The proxy performs independent authentication of the client and provides credentials to the client and for the client to authenticate to the REST service using a REST service authentication mechanism. The proxy inspects requests and responses and translates the requests and responses into formats expected by the client and the REST service. Moreover, the proxy enforces policy and audits the requests and responses occurring between the client and the REST service over the network.
    Type: Application
    Filed: May 22, 2015
    Publication date: October 1, 2015
    Inventors: Lloyd Leon Burch, Douglas Garry Earl, Jonathan Paul Bultmeyer, Carolyn B. McClain