Patents by Inventor Conor Cahill

Conor Cahill has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110075643
    Abstract: Embodiments of systems and methods for Universal System Interface networking are generally described herein. Other embodiments may be described and claimed.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 31, 2011
    Inventors: Eetay Natan, Conor Cahill
  • Publication number: 20100064355
    Abstract: A system and method for determining in a global network the user network authentication status as the user goes from site to site within the network is provided. Additionally, the system and method provides for transparent or implicit multi-site logon functionality, including automatic introduction from one site to the other using a baseline authentication agency (102). The system and method provides an architecture for a core global network (100) (referred to herein as NET) that incorporates some or all of the following features and components: a set of baseline authentication agencies responsible for the core global network (NET) services, such as login and user-selected service-provider lookup; a shared NET domain and associated DNS records (106) used for cookie (110) sharing, login routing, and the like; and a collection of partner sites (108) accessible via the NET.
    Type: Application
    Filed: August 28, 2009
    Publication date: March 11, 2010
    Inventors: Christopher Newell Toomey, Conor Cahill
  • Patent number: 7596804
    Abstract: A system and method for determining in a global network the user network authentication status as the user goes from site to site within the network is provided. Additionally, the system and method provides for transparent or implicit multi-site logon functionality, including automatic introduction from one site to the other using a baseline authentication agency (102). The system and method provides an architecture for a core global network (100) (referred to herein as NET) that incorporates some or all of the following features and components: a set of baseline authentication agencies responsible for the core global network (NET) services, such as login and user-selected service-provider lookup; a shared NET domain and associated DNS records (106) used for cookie (110) sharing, login routing, and the like; and a collection of partner sites (108) accessible via the NET.
    Type: Grant
    Filed: July 2, 2003
    Date of Patent: September 29, 2009
    Assignee: AOL LLC
    Inventors: Christopher Newell Toomey, Conor Cahill
  • Publication number: 20070033148
    Abstract: Invoking a computer implemented service includes receiving a request from a first user to access a service associated with a second user. The request is associated with a security token for the first user and an identity token for the second user. The acceptability of the security token is determined to authenticate the first user, and the acceptability of the identity token is determined to securely identify the second user. The first user is able to access the service associated with the second user conditioned on the security token being determined to be acceptable and the identity token being determined to be acceptable.
    Type: Application
    Filed: February 6, 2006
    Publication date: February 8, 2007
    Inventor: Conor Cahill
  • Publication number: 20060229936
    Abstract: A method and apparatus for rewarding a customer referral by recognizing a referring customer, noting a purchase of a product, receiving a referral directive from the referring customer, determining a refer-to customer and dispatching a referral to the determined refer-to customer.
    Type: Application
    Filed: April 6, 2005
    Publication date: October 12, 2006
    Inventor: Conor Cahill
  • Publication number: 20060080730
    Abstract: The invention provides an affiliation within a single sign-on system, which affiliation comprises a group of service providers that have chosen to act as a single entity on a network from the point of view of authentication, federation, and authorization. This type of entity is used to implement functionality within a portal site, such as the Yahoo (see http://www.yahoo.com) portal with a Travelocity (see http://www.travelocity.com/) travel section that acts as part of Yahoo and not as part of Travelocity. In the preferred embodiment, there is an owner of the affiliation that is responsible for maintaining a list that shows which service providers are members of the affiliation, as well as any control structure or meta-data associated with the affiliation. Each affiliation must have an identifier that is unique within the single sign-on system in which the affiliation is defined. User actions associated with the affiliation apply to all entities within the affiliation.
    Type: Application
    Filed: October 12, 2004
    Publication date: April 13, 2006
    Inventors: Conor Cahill, Christopher Toomey, Andrew Feng
  • Publication number: 20050226152
    Abstract: Content is distributed from a source to a sink only if the sink is within a predetermined geographic locality. In one embodiment, a signature request is sent to the sink. The sink obtains an actual signature compares it to the requested signature, and if the requested signature and the actual signature resemble each other sufficiently closely, then the content is sent to the sink The signature is compiled from parameters obtained from appropriate parameter detectors. The parameter detectors generate, detect and monitor various signals required for determining the locality of the sink.
    Type: Application
    Filed: March 30, 2005
    Publication date: October 13, 2005
    Inventors: Spencer Stephens, Kenneth Long, Craig Cuttner, Conor Cahill
  • Publication number: 20050216582
    Abstract: A system and method for determining in a global network the user network authentication status as the user goes from site to site within the network is provided. Additionally, the system and method provides for transparent or implicit multi-site logon functionality, including automatic introduction from one site to the other using a baseline authentication agency (102). The system and method provides an architecture for a core global network (100) (referred to herein as NET) that incorporates some or all of the following features and components: a set of baseline authentication agencies responsible for the core global network (NET) services, such as login and user-selected service-provider lookup; a shared NET domain and associated DNS records (106) used for cookie (110) sharing, login routing, and the like; and a collection of partner sites (108) accessible via the NET.
    Type: Application
    Filed: July 2, 2003
    Publication date: September 29, 2005
    Inventors: Christopher Toomey, Conor Cahill
  • Publication number: 20050190915
    Abstract: An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e.g., using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
    Type: Application
    Filed: December 22, 2004
    Publication date: September 1, 2005
    Inventors: David Pare, David Biderman, Stephen Loomis, Scott Brown, Michael Wise, David Wexelblat, Conor Cahill, David Bill
  • Publication number: 20050190911
    Abstract: An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e.g., using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream.
    Type: Application
    Filed: December 22, 2004
    Publication date: September 1, 2005
    Inventors: David Pare, David Biderman, Stephen Loomis, Scott Brown, Michael Wise, David Wexelblat, Conor Cahill, David Bill
  • Publication number: 20050076248
    Abstract: An identity based service system is provided, in which an identity is created and managed for a user or principal, such that at least a portion of the identity is available to use between one or more system entities. A discovery service enables a system entity to discover a service descriptor, given a service name and a name identifier of the user, whereby system entities can find and invoke the user's other personal web services. The discovery service preferably provides a translation between a plurality of namespaces, to prevent linkable identity information over time between system entities.
    Type: Application
    Filed: October 2, 2003
    Publication date: April 7, 2005
    Inventors: Conor Cahill, David Wexelblat, Norihiro Aoki, Steven Carriere, James Roskind, Christopher Toomey
  • Publication number: 20040260949
    Abstract: A method and apparatus is provided for invoking authenticated transactions on behalf of a user when the user is not present. For example, the invention allows a subscription to take actions that would otherwise require authentication. A method and apparatus is provided that gives apparent authority to a service that allows the service to get services from other services without revisiting the client. Thus, the architecture enables a Web Services Provider to assume the role of a Web Services Client and invoke other services required to perform its service. As each Web Services Provider calls another Web Services Provider, the Discovery Service adds the Web Services Provider's footprint to the Service Assertions it passes on such that a trail of Web Services Providers is imprinted into the Service Assertion and is visible to the Discovery Service. Each Web Services Provider in the chain can also add permission requests.
    Type: Application
    Filed: March 15, 2004
    Publication date: December 23, 2004
    Inventors: Norihiro Edwin Aoki, Conor Cahill