Patents by Inventor Charles W. Knouse

Charles W. Knouse has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8935418
    Abstract: An access system provides identity management and/or access management services for a network. An application program interface for the access system enables an application without a web agent front end to read and use contents of an existing encrypted cookie to bypass authentication and proceed to authorization. A web agent is a component (usually software, but can be hardware or a combination of hardware and software) that plugs into (or otherwise integrates with) a web server (or equivalent) in order to participate in providing access services.
    Type: Grant
    Filed: October 22, 2008
    Date of Patent: January 13, 2015
    Assignee: Oracle International Corporation
    Inventors: Charles W. Knouse, Minoo Gupta
  • Patent number: 8204999
    Abstract: A system is disclosed that is used to provide access management for resources on a network. The system makes use of query data from a URL (or another identification or request) to identify the appropriate access rule. Examples of an access rule include an authentication rule, an authorization rule, or an audit rule. The system can be configured to require the query data to match order dependent variables or order independent variables. In one option, the system can include two levels of rules and the query data can be used to identify first level rules, second level rules or both.
    Type: Grant
    Filed: February 26, 2001
    Date of Patent: June 19, 2012
    Assignee: Oracle International Corporation
    Inventors: Tanya M. Mastin Crosbie, Charles W. Knouse
  • Publication number: 20090106433
    Abstract: An access system provides identity management and/or access management services for a network. An application program interface for the access system enables an application without a web agent front end to read and use contents of an existing encrypted cookie to bypass authentication and proceed to authorization. A web agent is a component (usually software, but can be hardware or a combination of hardware and software) that plugs into (or otherwise integrates with) a web server (or equivalent) in order to participate in providing access services.
    Type: Application
    Filed: October 22, 2008
    Publication date: April 23, 2009
    Applicant: Oracle International Corporation
    Inventors: Charles W. Knouse, Minoo Gupta
  • Patent number: 7458096
    Abstract: An access system provides identity management and/or access management services for a network. An application program interface for the access system enables an application without a web agent front end to read and use contents of an existing encrypted cookie to bypass authentication and proceed to authorization. A web agent is a component (usually software, but can be hardware or a combination of hardware and software) that plugs into (or otherwise integrates with) a web server (or equivalent) in order to participate in providing access services.
    Type: Grant
    Filed: October 27, 2006
    Date of Patent: November 25, 2008
    Assignee: Oracle International Corpration
    Inventors: Charles W. Knouse, Minoo Gupta
  • Patent number: 7249369
    Abstract: The present invention matches sets of authentication, authorization, and auditing rules to resources in an Access System based on the contents of POST data received in HTTP POST requests. The system of the present invention receives a POST request and matches a set of rules to a resource using POST data referenced by the HTTP request. In one embodiment, the matching is performed by accessing required matching data. A portion of the POST data is selected and compared with the required data. If all of the required data is matched to the POST data, then the resource is successfully matched. The present invention further authorizes a user to access resources in an Access System based on the contents of POST data. An authorization rule is retrieved and authorization is performed using the POST data. If the authorization is successful, the system grants the user access to the resource.
    Type: Grant
    Filed: February 26, 2001
    Date of Patent: July 24, 2007
    Assignee: Oracle International Corporation
    Inventors: Charles W. Knouse, Lakshmi Velandai Thiyagarajan
  • Patent number: 7231661
    Abstract: An Access System can provide identity management and/or access management services. Examples of access management services include authentication and authorization services. In some implementations, users of an Access System want to use the authorization services of the Access System but do not want to use the authentication services of the Access System. The present invention allows some or all of the resources protected by the Access System to use the authentication services of the Access System and some or all of the resources protected by the Access System to use external authentication services.
    Type: Grant
    Filed: June 21, 2001
    Date of Patent: June 12, 2007
    Assignee: Oracle International Corporation
    Inventors: Francisco J. Villavicencio, Charles W. Knouse
  • Patent number: 7185364
    Abstract: An access system provides identity management and/or access management services for a network. An application program interface for the access system enables an application without a web agent front end to read and use contents of an existing encrypted cookie to bypass authentication and proceed to authorization. A web agent is a component (usually software, but can be hardware or a combination of hardware and software) that plugs into (or otherwise integrates with) a web server (or equivalent) in order to participate in providing access services.
    Type: Grant
    Filed: March 21, 2001
    Date of Patent: February 27, 2007
    Assignee: Oracle International Corporation
    Inventors: Charles W. Knouse, Minoo Gupta
  • Publication number: 20030074580
    Abstract: An access system provides identity management and/or access management services for a network An application program interface for the access system enables an application without a web agent front end to read and use contents of an existing encrypted cookie to bypass authentication and proceed to authorization. A web agent is a component (usually software, but can be hardware or a combination of hardware and software) that plugs into (or otherwise integrates with) a web server (or equivalent) in order to participate in providing access services.
    Type: Application
    Filed: March 21, 2001
    Publication date: April 17, 2003
    Inventors: Charles W. Knouse, Minoo Gupta
  • Publication number: 20020120599
    Abstract: The present invention matches sets of authentication, authorization, and auditing rules to resources in an Access System based on the contents of POST data received in HTTP POST requests. The system of the present invention receives a POST request and matches a set of rules to a resource using POST data referenced by the HTTP request. In one embodiment, the matching is performed by accessing required matching data. A portion of the POST data is selected and compared with the required data. If all of the required data is matched to the POST data, then the resource is successfully matched. The present invention further authorizes a user to access resources in an Access System based on the contents of POST data. An authorization rule is retrieved and authorization is performed using the POST data. If the authorization is successful, the system grants the user access to the resource.
    Type: Application
    Filed: February 26, 2001
    Publication date: August 29, 2002
    Inventors: Charles W. Knouse, Lakshmi Velandai Thiyagarajan
  • Publication number: 20020099671
    Abstract: A system is disclosed that is used to provide access management for resources on a network. The system makes use of query data from a URL (or another identification or request) to identify the appropriate access rule. Examples of an access rule include an authentication rule, an authorization rule, or an audit rule. The system can be configured to require the query data to match order dependent variables or order independent variables. In one option, the system can include two levels of rules and the query data can be used to identify first level rules, second level rules or both.
    Type: Application
    Filed: February 26, 2001
    Publication date: July 25, 2002
    Inventors: Tanya M. Mastin Crosbie, Charles W. Knouse