Patents by Inventor Carolyn B. McClain

Carolyn B. McClain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160021113
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Application
    Filed: September 28, 2015
    Publication date: January 21, 2016
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Patent number: 9172701
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Grant
    Filed: December 27, 2012
    Date of Patent: October 27, 2015
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Publication number: 20150281286
    Abstract: Techniques for virtual Representational State Transfer (REST) interfaces are provided. A proxy is interposed between a client and a REST service over a network. The proxy performs independent authentication of the client and provides credentials to the client and for the client to authenticate to the REST service using a REST service authentication mechanism. The proxy inspects requests and responses and translates the requests and responses into formats expected by the client and the REST service. Moreover, the proxy enforces policy and audits the requests and responses occurring between the client and the REST service over the network.
    Type: Application
    Filed: May 22, 2015
    Publication date: October 1, 2015
    Inventors: Lloyd Leon Burch, Douglas Garry Earl, Jonathan Paul Bultmeyer, Carolyn B. McClain
  • Publication number: 20150207684
    Abstract: Techniques for cloud control and management are provided. The control, creation, and management of workloads in distributed infrastructures are coordinated via a master Configuration Management Database (CMDB). The master CMDB is also used to unify the multiple distributed infrastructures so that the workloads are rationalized. Moreover, data centers are coordinated with the distributed infrastructures so the configuration settings and policies included in the master CMDB are enforced and synchronized throughout the network.
    Type: Application
    Filed: January 30, 2015
    Publication date: July 23, 2015
    Inventors: Robert A. Wipfel, Stephen R. Carter, Carolyn B. McClain
  • Patent number: 9071443
    Abstract: Techniques for automated service platform prospecting are provided. A prospector process is sent out in advance to scout for potential network sites that provide computing infrastructure and computing services (platforms) to self-contained computing environments. The prospector process validates the potential network sites for use and gathers site characteristics that are used to configure the self-contained computing environments when they are to be installed and executed on those network sites.
    Type: Grant
    Filed: August 25, 2008
    Date of Patent: June 30, 2015
    Assignee: Novell, Inc.
    Inventors: Stephen R Carter, Carolyn B. McClain
  • Patent number: 9049182
    Abstract: Techniques for virtual Representational State Transfer (REST) interfaces are provided. A proxy is interposed between a client and a REST service over a network. The proxy performs independent authentication of the client and provides credentials to the client and for the client to authenticate to the REST service using a REST service authentication mechanism. The proxy inspects requests and responses and translates the requests and responses into formats expected by the client and the REST service. Moreover, the proxy enforces policy and audits the requests and responses occurring between the client and the REST service over the network.
    Type: Grant
    Filed: October 29, 2009
    Date of Patent: June 2, 2015
    Assignee: Novell, Inc.
    Inventors: Lloyd Leon Burch, Douglas Garry Earl, Jonathan Paul Bultmeyer, Carolyn B. McClain
  • Patent number: 8966017
    Abstract: Techniques for cloud control and management are provided. The control, creation, and management of workloads in distributed infrastructures are coordinated via a master Configuration Management Database (CMDB). The master CMDB is also used to unify the multiple distributed infrastructures so that the workloads are rationalized. Moreover, data centers are coordinated with the distributed infrastructures so the configuration settings and policies included in the master CMDB are enforced and synchronized throughout the network.
    Type: Grant
    Filed: October 29, 2009
    Date of Patent: February 24, 2015
    Assignee: Novell, Inc.
    Inventors: Robert A. Wipfel, Stephen R Carter, Carolyn B. McClain
  • Publication number: 20140365656
    Abstract: Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds. Policy actions are enforced when processing the messages. The policy actions can include identity-based restrictions and the policy actions are specific to the messages and/or clouds within which the messages are being processed.
    Type: Application
    Filed: July 31, 2014
    Publication date: December 11, 2014
    Inventors: Bruce L. Bergeson, Carolyn B. McClain, Stephen R. Carter, Vernon Roger Holm
  • Publication number: 20140351894
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Application
    Filed: August 13, 2014
    Publication date: November 27, 2014
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R. Carter
  • Publication number: 20140298407
    Abstract: In various embodiments, techniques for federated role provisioning are provided. A federated role definition for a resource is constructed and distributed. The federated role definition includes a role hierarchy having role assignments and constraints for dynamically resolving and binding a resource to particular ones of the role assignments. A resource may have role assignments statically bound to its identity and dynamically bound to its identity. Furthermore, some role assignments may be inherited from the role hierarchy.
    Type: Application
    Filed: April 2, 2014
    Publication date: October 2, 2014
    Applicant: Apple Inc.
    Inventors: Carolyn B. McClain, Bruce L. Bergeson, Vernon Roger Holm
  • Publication number: 20140282547
    Abstract: Methods and apparatus involve extending functionality of legacy services. A legacy application has functionality designed for use on an original computing device. In a modern environment, virtual machines (VMs) operate as independent guests on processors and memory by way of scheduling control from a virtualization layer (e.g., hypervisor). At least one VM is provisioned to modify standard entry points of the original legacy application for new accessing of various system functions of the hardware platform. Representative functions include network access, processors, and storage. Policy decision points variously located are further employed to ensure compliance with computing policies. Multiple platforms and computing clouds are contemplated as are VMs in support roles and dedicated software appliances. In this manner, continued use of legacy services in modern situations allows participation in more capable environments and application capabilities heretofore unimagined.
    Type: Application
    Filed: May 20, 2014
    Publication date: September 18, 2014
    Applicant: Novell, Inc.
    Inventors: Kattiganehalli Y. Srinivasan, Stephen R. Carter, Carolyn B. McClain, Jonathon P. Bultmeyer
  • Patent number: 8813192
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Grant
    Filed: May 4, 2011
    Date of Patent: August 19, 2014
    Assignee: Novell, Inc.
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R Carter
  • Patent number: 8806566
    Abstract: Techniques for identity and policy enforced cloud communications are presented. Cloud channel managers monitor messages occurring within a cloud or between independent clouds. Policy actions are enforced when processing the messages. The policy actions can include identity-based restrictions and the policy actions are specific to the messages and/or clouds within which the messages are being processed.
    Type: Grant
    Filed: March 18, 2010
    Date of Patent: August 12, 2014
    Assignee: Novell, Inc.
    Inventors: Bruce L. Bergeson, Carolyn B. McClain, Stephen R Carter, Vernon Roger Holm
  • Publication number: 20140189775
    Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
    Type: Application
    Filed: December 27, 2012
    Publication date: July 3, 2014
    Applicant: Novell, Inc.
    Inventors: Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
  • Patent number: 8756597
    Abstract: Methods and apparatus involve extending functionality of legacy services. A legacy application has functionality designed for use on an original computing device. In a modern environment, virtual machines (VMs) operate as independent guests on processors and memory by way of scheduling control from a virtualization layer (e.g., hypervisor). At least one VM is provisioned to modify standard entry points of the original legacy application for new accessing of various system functions of the hardware platform. Representative functions include network access, processors, and storage. Policy decision points variously located are further employed to ensure compliance with computing policies. Multiple platforms and computing clouds are contemplated as are VMs in support roles and dedicated software appliances. In this manner, continued use of legacy services in modern situations allows participation in more capable environments and application capabilities heretofore unimagined.
    Type: Grant
    Filed: February 5, 2010
    Date of Patent: June 17, 2014
    Assignee: Novell, Inc.
    Inventors: Kaltiganehalli Y. Srinivasan, Stephen R. Carter, Carolyn B. McClain, Jonathan P. Bultmeyer
  • Patent number: 8731200
    Abstract: Methods and systems are provided for trusted key distribution. A key distribution or an identity service acts as an intermediary between participants to a secure network. The service provisions and manages the distribution of keys. The keys are used for encrypting communications occurring within the secure network.
    Type: Grant
    Filed: April 30, 2010
    Date of Patent: May 20, 2014
    Assignee: Novell, Inc.
    Inventors: Stephen R. Carter, Carolyn B. McClain
  • Patent number: 8719894
    Abstract: In various embodiments, techniques for federated role provisioning are provided. A federated role definition for a resource is constructed and distributed. The federated role definition includes a role hierarchy having role assignments and constraints for dynamically resolving and binding a resource to particular ones of the role assignments. A resource may have role assignments statically bound to its identity and dynamically bound to its identity. Furthermore, some role assignments may be inherited from the role hierarchy.
    Type: Grant
    Filed: March 29, 2007
    Date of Patent: May 6, 2014
    Assignee: Apple Inc.
    Inventors: Carolyn B. McClain, Bruce L. Bergeson, Vernon Roger Holm
  • Patent number: 8688856
    Abstract: Techniques for distributing content over a network via keys are provided. A key is associated with a particular destination or with a particular piece of content. A path management service derives and selectively communicates portions of a network path for moving the content to a destination on the basis of a value for a key. Any intermediate processing resource receives a next location within the path for forwarding the content from the path management service in response to presenting the key.
    Type: Grant
    Filed: January 24, 2006
    Date of Patent: April 1, 2014
    Assignee: Novell, Inc.
    Inventors: Carolyn B. McClain, Stephen R. Carter
  • Patent number: 8538026
    Abstract: Methods and systems are provided for trusted key distribution. A key distribution or an identity service acts as an intermediary between participants to a secure network. The service provisions and manages the distribution of keys. The keys are used for encrypting communications occurring within the secure network.
    Type: Grant
    Filed: April 30, 2010
    Date of Patent: September 17, 2013
    Assignee: Novell, Inc.
    Inventors: Stephen R. Carter, Carolyn B. McClain
  • Publication number: 20120284780
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Application
    Filed: May 4, 2011
    Publication date: November 8, 2012
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R. Carter