Patents by Inventor Craig Morris

Craig Morris has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130318359
    Abstract: A method for anonymous authentication by an electronic device is described. The method includes obtaining biometric data. The method also includes generating a token. The method also includes blinding the token to produce a blinded token. The method also includes sending the blinded token and biometric information based on the biometric data to a verifier. The method also includes receiving a signature of the blinded token from the verifier if corresponding biometric information is not stored by the verifier.
    Type: Application
    Filed: May 21, 2013
    Publication date: November 28, 2013
    Applicant: Partnet, Inc.
    Inventors: Cameron Craig Morris, Douglas M. Erickson
  • Patent number: 8490198
    Abstract: Techniques for the local personalization of content are presented. A content personalization service is dynamically pushed from a server environment to a client processing environment associated with a principal on demand. The content personalization service interjects itself between content that the principal attempts to view and access within the client processing environment and modifies and personalizes that content on behalf of the principal before the principal can view or access the content.
    Type: Grant
    Filed: May 18, 2007
    Date of Patent: July 16, 2013
    Assignee: Apple Inc.
    Inventors: Cameron Craig Morris, Lloyd Leon Burch
  • Patent number: 8468359
    Abstract: Techniques for creating and using credentials for blinded intended audiences are provided. A principal desires access to a target service. An identity associated with the target service is hidden from an identity service via a random identifier. The identity service supplies an assertion with credentials and the random identifier. The principal sends the assertion and an access message, which also includes the random identifier to the target service. The target service compares the identifier included with the message to the identifier in the assertion and when a match occurs access is permitted to the target service, assuming other credentials associated with the assertion are satisfied as well.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: June 18, 2013
    Assignee: Novell, Inc.
    Inventors: Cameron Craig Morris, Lloyd Leon Burch, Tammy Anita Green
  • Patent number: 8412931
    Abstract: Techniques for credential strength analysis via failed intruder access attempts are presented. Intruders attempting to access a secure network with failed credentials are monitored. The failed credentials are retained and evaluated in view of previously recorded failed credentials. Credential policy is updated in response to the evaluation and intruder trends and sophistication levels are also predicted in response to the evaluation.
    Type: Grant
    Filed: December 27, 2007
    Date of Patent: April 2, 2013
    Assignee: Apple Inc.
    Inventors: Srinivas Vedula, Cameron Craig Morris
  • Publication number: 20130016337
    Abstract: A method of identifying the presence of heroin in an impure heroin composition which contains heroin and at least one fluorescent contaminant which interferes with a Raman signal from the heroin. The method may include contacting the mixture with a solvent such as an alcohol, then contacting the resulting alcohol composition with a SERS surface. The surface may then be exposed to laser light from a hand-held Raman spectrometer to detect a Raman signal from the heroin. An apparatus for performing the method is also provided.
    Type: Application
    Filed: June 21, 2012
    Publication date: January 17, 2013
    Applicant: Thermo Scientific Portable Analytical Instruments Inc.
    Inventors: Craig Morris GARDNER, Michael Derek HARGREAVES, Peidong WANG, Yu SHEN
  • Patent number: 8332918
    Abstract: Techniques real-time adaptive password policies are presented. Patterns for passwords are regularly analyzed along with other factors associated with the patterns to dynamically determine password strength values. The strength values can change over time based on usage statistics. When a strength value falls below an acceptable threshold, passwords associated with that particular pattern can be downgraded or rejected in real-time and existing policy can be adapted to reflect the undesirability of that pattern.
    Type: Grant
    Filed: December 6, 2007
    Date of Patent: December 11, 2012
    Assignee: Novell, Inc.
    Inventors: Srinivas Vedula, Cameron Craig Morris, Larry Hal Henderson
  • Patent number: 8327426
    Abstract: Techniques for proxing services with a single sign on are provided. A principal authenticates to a first identity service. The first identity service is in a trusted relationship with a second identity service. An authentication request is sent to the second identity service and the request includes an authentication response supplied by the first identity service in response to successful authentication of the principal to the first identity service. In response to the authentication request and the accompanying response, the principal is authenticated for access to the second identity service. Furthermore, targeted services accessible to the second identity service are proxied from and to the principal during interactions between the principal and an external service of that principal.
    Type: Grant
    Filed: June 1, 2006
    Date of Patent: December 4, 2012
    Assignee: Novell Intellectual Property Holdings, Inc.
    Inventors: Stephen Hugh Kinser, Lloyd Leon Burch, Cameron Craig Morris
  • Patent number: 8301789
    Abstract: Techniques for port hopping are presented. A sender and a receiver engage in a communication session with one another and dynamically switch ports during that communication session. A decision to switch ports is based on a data length or packet count of a given transaction occurring during the communication session. The data length and packet count randomly and dynamically change during the communication session and varies from one transaction to another transaction. Any particular port to switch to during the communication session is also randomly and dynamically generated and varies from one transaction to another transaction.
    Type: Grant
    Filed: June 18, 2007
    Date of Patent: October 30, 2012
    Assignee: EMC Corporation
    Inventors: Cameron Craig Morris, Lloyd Leon Burch, David Thomas Robinson
  • Patent number: 8286000
    Abstract: Techniques for dynamic generation and management of password dictionaries are presented. Passwords are parsed for recognizable terms. The terms are housed in dictionaries or databases. Statistics associated with the terms are maintained and managed. The statistics are used to provide strength values to the passwords and determine when passwords are acceptable and unacceptable.
    Type: Grant
    Filed: December 7, 2007
    Date of Patent: October 9, 2012
    Assignee: Novell, Inc.
    Inventors: Srinivas Vedula, Cameron Craig Morris
  • Patent number: 8131758
    Abstract: Techniques for recognizing multiple patterns within a string of characters are presented. A dictionary is hierarchically organized, such that leaf nodes within the dictionary represents words defined in the dictionary. A string of characters are received. Each character within the string is traversed by attempting to match it with a character defined in the dictionary. As long as a match continues with the dictionary the characters within the string are traversed. Once a longest possible match to a word within the dictionary is found, the next character following the last matched character for the string is processed.
    Type: Grant
    Filed: December 26, 2007
    Date of Patent: March 6, 2012
    Assignee: Novell, Inc.
    Inventors: Cameron Craig Morris, Lloyd Leon Burch, Srinivas Vedula
  • Publication number: 20120042355
    Abstract: Techniques for representing extensible markup language (XML) in an executable format are presented. An XML document is parsed into its components and content. The components and content are packaged as an executable. Some portions of the executable include authentication logic or policy logic that is subsequently enforced when the executable is processed. The executable is subsequently distributed to recipient machines. The machines process the executable and produce memory loaded versions of the components and content representing the XML document on the machines. The memory loaded versions of the components and content include conditionally added authentication logic of policy logic.
    Type: Application
    Filed: October 21, 2011
    Publication date: February 16, 2012
    Inventors: Cameron Craig Morris, Herrick Gordon Muhlestein, Lloyd Leon Burch
  • Patent number: 8069476
    Abstract: Techniques for validating identities are provided. A sign-on request is authenticated for a given principal. Attributes associated with that principal are acquired from an identity service and compared against local maintained attributes for that principal. If the identity-service acquired attributes match the local attributes, then the principal is validated for access. During principal access, selective events drive updates to the identity-service acquired attributes, and the comparison with the local attributes is performed again to determine whether the validated principal is to be invalidated or is to remain validated.
    Type: Grant
    Filed: June 1, 2006
    Date of Patent: November 29, 2011
    Assignee: Novell, Inc.
    Inventors: Stephen Hugh Kinser, Lloyd Leon Burch, Cameron Craig Morris
  • Patent number: 8069408
    Abstract: Techniques for representing extensible markup language (XML) in an executable format are presented. An XML document is parsed into its components and content. The components and content are packaged as an executable. Some portions of the executable include authentication logic or policy logic that is subsequently enforced when the executable is processed. The executable is subsequently distributed to recipient machines. The machines process the executable and produce memory loaded versions of the components and content representing the XML document on the machines. The memory loaded versions of the components and content include conditionally added authentication logic or policy logic.
    Type: Grant
    Filed: November 16, 2006
    Date of Patent: November 29, 2011
    Assignee: Novell, Inc.
    Inventors: Cameron Craig Morris, Herrick Gordon Muhlestein, Lloyd Leon Burch
  • Patent number: 7935376
    Abstract: This invention relates to a storage stable buoyant waxy grain wherein the waxy grain is waxy triticale and waxy wheat. The starch in the waxy grain is gelatinized throughout and the cooked waxy grains of this invention can be stored for prolonged times in air tight or conventional cereal containers having a liner without acquiring rancid odors or tastes even in the absence of preservatives that inhibit the development of rancidity. Preferably, the waxy wholegrain is a waxy wheat having a protein content of no more than 14% by dry weight. The processes for preparing the waxy wholegrain food products of this invention are also described.
    Type: Grant
    Filed: February 17, 2006
    Date of Patent: May 3, 2011
    Assignees: Kellogg Company, The United States of America as represented by the Secretary of Agriculture
    Inventors: Lori Ann Wilson, John William Colyn, Grace Lai, Craig Morris
  • Patent number: 7845003
    Abstract: Techniques for variable security access information are presented. The complexity levels associated with access secrets drive the assigned access rights to target resources. A single target resource may have varying sets of access rights, where each set is associated with a particular complexity level for a given access secret. A requesting principal can custom establish the principal's desired access secret complexity level for a target resource; this in turn drives the set of access rights for the target resource, which the principal may use when accessing the target resource.
    Type: Grant
    Filed: October 31, 2006
    Date of Patent: November 30, 2010
    Assignee: Novell, Inc.
    Inventors: Cameron Craig Morris, Lloyd Leon Burch, Stephen R. Carter
  • Patent number: 7822974
    Abstract: Techniques for establishing implicit trust of authorship certification are provided. A message's domain is validated in response to a valid domain certificate. A message's author is validated in response to an author identification, which is acquired from the message and which is supplied to a domain service of the author. The domain service is implicitly trusted based on the domain being validated via the domain certificate. The domain service uses the author's identification to traverse to a specific location within the domain that houses an author certificate for the author. The author certificate is compared against a message certificate that accompanies the message in order to establish trust with the author and the author's message.
    Type: Grant
    Filed: May 15, 2006
    Date of Patent: October 26, 2010
    Assignee: Novell, Inc.
    Inventors: Stephen Hugh Kinser, Lloyd Leon Burch, Cameron Craig Morris
  • Patent number: 7574479
    Abstract: Techniques for attesting to content received from an author (sender) are provided. A sender's content is represented by a message digest. The message digest is signed by an identity service. The signed message digest represents an attestation as to the authenticity of the content from the sender. The sender transmits the signed message digest and content in a message to a recipient. The recipient verifies the signature and message digest to authenticate the content from the sender.
    Type: Grant
    Filed: January 24, 2006
    Date of Patent: August 11, 2009
    Assignee: Novell, Inc.
    Inventors: Cameron Craig Morris, Lloyd Leon Burch, Stephen R. Carter, Stephen Hugh Kinser
  • Publication number: 20090171953
    Abstract: Techniques for recognizing multiple patterns within a string of characters are presented. A dictionary is hierarchically organized, such that leaf nodes within the dictionary represents words defined in the dictionary. A string of characters are received. Each character within the string is traversed by attempting to match it with a character defined in the dictionary. As long as a match continues with the dictionary the characters within the string are traversed. Once a longest possible match to a word within the dictionary is found, the next character following the last matched character for the string is processed.
    Type: Application
    Filed: December 26, 2007
    Publication date: July 2, 2009
    Inventors: Cameron Craig Morris, Lloyd Leon Burch, Srinivas Vedula
  • Publication number: 20090172788
    Abstract: Techniques for credential strength analysis via failed intruder access attempts are presented. Intruders attempting to access a secure network with failed credentials are monitored. The failed credentials are retained and evaluated in view of previously recorded failed credentials. Credential policy is updated in response to the evaluation and intruder trends and sophistication levels are also predicted in response to the evaluation.
    Type: Application
    Filed: December 27, 2007
    Publication date: July 2, 2009
    Inventors: Srinivas Vedula, Cameron Craig Morris
  • Publication number: 20090150677
    Abstract: Techniques real-time adaptive password policies are presented. Patterns for passwords are regularly analyzed along with other factors associated with the patterns to dynamically determine password strength values. The strength values can change over time based on usage statistics. When a strength value falls below an acceptable threshold, passwords associated with that particular pattern can be downgraded or rejected in real-time and existing policy can be adapted to reflect the undesirability of that pattern.
    Type: Application
    Filed: December 6, 2007
    Publication date: June 11, 2009
    Inventors: Srinivas Vedula, Cameron Craig Morris, Larry Hal Henderson