Patents by Inventor Colin Constable
Colin Constable has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240146533Abstract: The present disclosure involves systems, software, and computer implemented methods for enhanced login processes. A first login page of a website is received that includes a field that enables a user to enter a handle for a decentralized resource directory. A handle for the decentralized resource directory is received in the field and provided to a webserver. A second login page is received that includes a challenge code for the handle. A challenge value is generated based on the challenge code. A location in the decentralized resource directory is determined, based on the challenge value. A request is sent to a protocol server that manages the personalized resource directory to store the challenge value in the decentralized resource directory at the location as a login challenge response for logging into the website. A login result page is received that indicates a result of the webserver processing the login challenge response.Type: ApplicationFiled: June 16, 2022Publication date: May 2, 2024Inventors: Colin Constable, Kevin Nickels
-
Publication number: 20240039739Abstract: The present disclosure involves systems, software, and computer implemented methods for user-controlled access control for user information. One example method includes sending an authentication request to authenticate as a requesting entity to a first decentralized resource directory of a providing entity. An authentication challenge is received, via the connection, from the providing entity, and in response to the authentication request, to store an authentication challenge value for an authentication challenge key in a second decentralized resource directory of the requesting entity. The authentication challenge value for the authentication challenge key is stored in the second decentralized resource directory. An authentication challenge response is sent to the providing entity requesting the providing entity to verify the authentication challenge.Type: ApplicationFiled: October 12, 2023Publication date: February 1, 2024Inventors: Kevin Nickels, Colin Constable, Jagannadh Vanguri
-
Patent number: 11849053Abstract: The present disclosure involves systems, software, and computer implemented methods for user-controlled access control for user information. One example method includes sending an authentication request to authenticate as a requesting entity to a first decentralized resource directory of a providing entity. An authentication challenge is received, via the connection, from the providing entity, and in response to the authentication request, to store an authentication challenge value for an authentication challenge key in a second decentralized resource directory of the requesting entity. The authentication challenge value for the authentication challenge key is stored in the second decentralized resource directory. An authentication challenge response is sent to the providing entity requesting the providing entity to verify the authentication challenge.Type: GrantFiled: July 7, 2021Date of Patent: December 19, 2023Assignee: Atsign, Inc.Inventors: Kevin Nickels, Colin Constable, Jagannadh Vanguri
-
Publication number: 20230015819Abstract: The present disclosure involves systems, software, and computer implemented methods for user-controlled access control for user information. One example method includes sending an authentication request to authenticate as a requesting entity to a first decentralized resource directory of a providing entity. An authentication challenge is received, via the connection, from the providing entity, and in response to the authentication request, to store an authentication challenge value for an authentication challenge key in a second decentralized resource directory of the requesting entity. The authentication challenge value for the authentication challenge key is stored in the second decentralized resource directory. An authentication challenge response is sent to the providing entity requesting the providing entity to verify the authentication challenge.Type: ApplicationFiled: July 7, 2021Publication date: January 19, 2023Inventors: Kevin Nickels, Colin Constable, Jagannadh Vanguri
-
Patent number: 9391869Abstract: A system includes a storage device to store information associated with virtual nodes that correspond to network nodes. The system also includes a server to install a virtual node that corresponds to one of the network nodes, based on the information associated with the virtual node, where installing the virtual node includes creating a logical interface via which traffic is to be sent to, or received from, other virtual nodes; start the virtual node to create an operating virtual node based on a copy of an operating system that is run on the network node, where starting the virtual node causes the operational virtual node to execute the copy of the operating system; and cause the operating virtual node to communicate with a virtual network that includes the virtual nodes, where causing the operating virtual node to communicate with the virtual network enables the operating virtual node to receive or forward traffic associated with the virtual network.Type: GrantFiled: February 25, 2014Date of Patent: July 12, 2016Assignee: Juniper Networks, Inc.Inventors: Daniel Kharitonov, Colin Constable, Geoffrey Huang, Joel Obstfeld
-
Publication number: 20140177471Abstract: A system includes a storage device to store information associated with virtual nodes that correspond to network nodes. The system also includes a server to install a virtual node that corresponds to one of the network nodes, based on the information associated with the virtual node, where installing the virtual node includes creating a logical interface via which traffic is to be sent to, or received from, other virtual nodes; start the virtual node to create an operating virtual node based on a copy of an operating system that is run on the network node, where starting the virtual node causes the operational virtual node to execute the copy of the operating system; and cause the operating virtual node to communicate with a virtual network that includes the virtual nodes, where causing the operating virtual node to communicate with the virtual network enables the operating virtual node to receive or forward traffic associated with the virtual network.Type: ApplicationFiled: February 25, 2014Publication date: June 26, 2014Applicant: Juniper Networks, Inc.Inventors: Daniel KHARITONOV, Colin Constable, Geoffrey Huang, Joel Obstfeld
-
Patent number: 8671176Abstract: A system includes a storage device to store information associated with virtual nodes that correspond to network nodes. The system also includes a server to install a virtual node that corresponds to one of the network nodes, based on the information associated with the virtual node, where installing the virtual node includes creating a logical interface for sending traffic to, or receiving traffic from, other virtual nodes; start the virtual node to create an operating virtual node based on a copy of an operating system that runs on the network node, where starting the virtual node causes the operational virtual node to execute the copy of the operating system; and cause the operating virtual node to communicate with a virtual network, that includes the other virtual nodes, to allow the operating virtual node to receive or forward traffic associated with the virtual network.Type: GrantFiled: September 29, 2011Date of Patent: March 11, 2014Assignee: Juniper Networks, Inc.Inventors: Daniel Kharitonov, Colin Constable, Geoffrey Huang, Joel Obstfeld
-
Publication number: 20080189776Abstract: The dynamic access evaluation system receives a service request from a device seeking access to a network. The system receives information about the requester, the device from which the request is made and/or the location of the requester and the device. The system analyzes rule sets for the application being requested on the network to determine whether authentication is necessary. The system authenticates the requester based on a comparison of authorization information to information about the requester received in the request. The system authenticates the device by comparing device information in the request to historical device information. Furthermore, the system receives location information for the device and the requester and compares them to determine whether the locations are the same or similar. After granting access, the system continues to monitor information about the requester, device, or location and can terminate device access based on a change in the monitored information.Type: ApplicationFiled: February 1, 2008Publication date: August 7, 2008Applicant: Credit Suisse Securities (USA) LLCInventor: Colin Constable
-
Patent number: 6792519Abstract: A Virtual Disk Storage (VDS) System for providing multiple virtual data storage devices for use in a computer system which contains a central processing unit (CPU). The VDS System includes a memory system for storing information and a VDS Controller which is in communication with the memory system and the CPU. The VDS Controller partitions the memory system into multiple virtual data storage devices, and then restricts the computer system from communicating with certain of these virtual data storage devices. The VDS Controller thus selectively isolates at least one of the virtual data storage devices from communicating with the computer system, in order to prevent corruption of information stored in at least one virtual data storage device.Type: GrantFiled: November 26, 2001Date of Patent: September 14, 2004Assignee: Virtual Data Security, LLCInventors: Colin Constable, Charles Thomas Gambetta, David Nathan Kricheff
-
Publication number: 20020108023Abstract: A Virtual Disk Storage (VDS) System for providing multiple virtual data storage devices for use in a computer system which contains a central processing unit (CPU). The VDS System includes a memory system for storing information and a VDS Controller which is in communication with the memory system and the CPU. The VDS Controller partitions the memory system into multiple virtual data storage devices, and then restricts the computer system from communicating with certain of these virtual data storage devices. The VDS Controller thus selectively isolates at least one of the virtual data storage devices from communicating with the computer system, in order to prevent corruption of information stored in at least one virtual data storage device.Type: ApplicationFiled: November 26, 2001Publication date: August 8, 2002Applicant: VIRTUAL DATA SECURITY, LLC.Inventors: Colin Constable, Charles Thomas Gambetta, David Nathan Kricheff
-
Publication number: 20020095557Abstract: A Virtual Disk Storage (VDS) System for providing multiple virtual data storage devices for use in a computer system which contains a central processing unit (CPU). The VDS System includes a memory system for storing information and a VDS Controller which is in communication with the memory system and the CPU. The VDS Controller partitions the memory system into multiple virtual data storage devices, and then restricts the computer system from communicating with certain of these virtual data storage devices. The VDS Controller thus selectively isolates at least one of the virtual data storage devices from communicating with the computer system, in order to prevent corruption of information stored in at least one virtual data storage device.Type: ApplicationFiled: December 3, 2001Publication date: July 18, 2002Inventors: Colin Constable, Charles Thomas Gambetta, David Nathan Kricheff
-
Patent number: 6324627Abstract: A Virtual Disk Storage (VDS) System for providing multiple virtual data storage devices for use in a computer system which contains a central processing unit (CPU). The VDS System includes a memory system for storing information and a VDS Controller which is in communication with the memory system and the CPU. The VDS Controller partitions the memory system into multiple virtual data storage devices, and then restricts the computer system from communicating with certain of these virtual data storage devices. The VDS Controller thus selectively isolates at least one of the virtual data storage devices from communicating with the computer system, in order to prevent corruption of information stored in at least one virtual data storage device.Type: GrantFiled: June 2, 1999Date of Patent: November 27, 2001Assignee: Virtual Data Security, LLCInventors: David Nathan Kricheff, Colin Constable, Charles Thomas Gambetta