Patents by Inventor Glenn Durfee

Glenn Durfee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070266410
    Abstract: A method of accessing a data resource identifies, by a personal domain controller, the data resource accessible by a first device and determines if there is a pause point for the data resource stored in the personal domain controller.
    Type: Application
    Filed: May 12, 2006
    Publication date: November 15, 2007
    Applicant: PALO ALTO RESEARCH CENTER INCORPORATED
    Inventors: DIRK BALFANZ, DIANA SMETTERS, GLENN DURFEE, TREVOR SMITH
  • Publication number: 20070266164
    Abstract: A method of accessing a data resource identifies the data resource, the data resource accessible through a first device and associated with a resource locator, the first device configured to provide access to the data resource responsive to possession of a whitelisted credential. The method includes receiving a second-device credential from a second device by a personal domain controller, the personal domain controller and the first device within a first trusted relationship and provides, by the personal domain controller, the second-device credential to the first device for whitelisting subject to the first trusted relationship. The method uses, by the second device, the second-device credential to access the data resource responsive to the resource locator.
    Type: Application
    Filed: May 12, 2006
    Publication date: November 15, 2007
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Dirk Balfanz, Diana Smetters, Glenn Durfee, Trevor Smith
  • Publication number: 20070130617
    Abstract: One embodiment of the present invention provides a system for establishing temporary and permanent credentials for secure remote data access. The system includes a temporary smart card configured to provide a temporary credential for a first device, thereby providing the first device with temporary secure access to a remote data source when the temporary smart card is used with the first device. Additionally, the system includes an enrollment smart card configured to provide a permanent credential for a second device, thereby providing the second device with permanent secure access to the remote data source without presence of the enrollment smart card or the temporary smart card.
    Type: Application
    Filed: December 2, 2005
    Publication date: June 7, 2007
    Inventors: Glenn Durfee, Dirk Balfanz, Diana Smetters
  • Publication number: 20070019806
    Abstract: A method for establishing a secondary communication channel between at least two computing devices over a network medium through use of a primary channel connects a first computing device with a first telephonic unit and a second computing device with a second telephonic unit. If the two telephonic units are in communication with each other over a primary channel, and communication channels are established between the computing devices and their respective telephonic units, then the first computing device transmits its location information to the second computing device over the primary channel. A connection is then established between the second computing device and the first computing device over a secondary communication channel.
    Type: Application
    Filed: September 28, 2006
    Publication date: January 25, 2007
    Inventors: Kenneth Conley, Dirk Balfanz, Bryan Pendleton, Diana Smetters, Glenn Durfee
  • Publication number: 20060129797
    Abstract: Systems and methods for establishing an authenticated and encrypted network connection in a boot protocol, and specifying the boot image to be loaded by a client, are disclosed. A hardware token or other portable medium, such as a USB drive or device, CD, mini-CD, or floppy diskette, is used to store authentication and/or identification information for a server. A client uses the information on the token to authenticate the network server upon initial connection to the network and request a boot image. Furthermore, the client and server may use the authentication information from the token to establish secure communications and mutually authenticate each other.
    Type: Application
    Filed: December 15, 2004
    Publication date: June 15, 2006
    Inventors: Glenn Durfee, Dirk Balfanz, Diana Kathryn Smetters, Paul Joseph Stewart
  • Publication number: 20060085633
    Abstract: One embodiment of the present invention provides a system that uses a portable security token (PST) to facilitate cross-certification between a first certification authority (CA) and a second CA, wherein the first CA and associated subscriber devices constitute a first public-key infrastructure (PKI) domain, and wherein the second CA and associated subscriber devices constitute a second PKI domain. During operation, the system uses the PST to transfer certification information between the first CA and the second CA, wherein the PST communicates with the first CA and the second CA through a location-limited communication channel. Next, the system uses the certification information to issue a cross-certificate to the first CA. Note that the cross-certificate is signed by the second CA.
    Type: Application
    Filed: October 14, 2004
    Publication date: April 20, 2006
    Inventors: Dirk Balfanz, Glenn Durfee, Diana Smetters
  • Publication number: 20050287985
    Abstract: One embodiment of the present invention provides a system that uses a portable security token to facilitate public key certification for a target device in a network. During system operation, the portable security token is located in close physical proximity to the target device to allow the portable security token to communicate with the target device through a location-limited communication channel. During this communication, the portable security token receives an authenticator for the target device, and forms a ticket by digitally signing the authenticator with a key previously agreed upon by the portable security token and a certification authority (CA). Next, the portable security token sends the ticket to the target device, whereby the target device can subsequently present the ticket to the CA to prove that the target device is authorized to receive a credential from the CA.
    Type: Application
    Filed: June 24, 2004
    Publication date: December 29, 2005
    Inventors: Dirk Balfanz, Glenn Durfee, Diana Smetters
  • Publication number: 20050129240
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used to quickly establish a secure credential infrastructure that can be used to secure ad-hoc and/or dynamic command and control operations such are needed for Incident Command Systems or other emergency response systems that require simplicity and rapid deployment among disparate responder teams.
    Type: Application
    Filed: December 15, 2003
    Publication date: June 16, 2005
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Dirk Balfanz, Diana Smetters, Glenn Durfee, Rebecca Grinter, Paul Stewart
  • Publication number: 20050125669
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including enabling secure communications to components of a vehicle, and enabling secure communications between the vehicle and associated infrastructure.
    Type: Application
    Filed: April 30, 2004
    Publication date: June 9, 2005
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Paul Stewart, Diana Smetters, Rebecca Grinter, Dirk Balfanz, Glenn Durfee, Hao-Chi Wong
  • Patent number: 6898579
    Abstract: A system, method and article of manufacture are provided for certifying contracts utilizing a network. Initially, a first and second contract is received utilizing a network. Each contract includes a plurality of terms. It is then certified that the terms of the second contract are consistent with the terms of the first contract.
    Type: Grant
    Filed: April 6, 2000
    Date of Patent: May 24, 2005
    Assignee: Xerox Corporation
    Inventors: Glenn Durfee, Matthew K. Franklin
  • Publication number: 20050100166
    Abstract: A location-limited channel is implemented using physical exchanges of physical tokens. The physical tokens are implemented using writeable or re-writeable storage media. Location-limited channels, when used to implement pre-authentication protocols, provide demonstrative identification and authenticity. A group originator loads pre-authentication information and a network location from a communication device onto the location-limited physical token channel. The location-limited physical token channel is passed to another participant, who copies the originator's pre-authentication information and location onto that participant's communication device. That participant then adds that participant's own pre-authentication information and network location onto the location-limited physical token channel. This is repeated until the last participant passes the location-limited physical token channel back to the group originator.
    Type: Application
    Filed: November 10, 2003
    Publication date: May 12, 2005
    Applicant: PARC INC.
    Inventors: Diana Smetters, Kenneth Conley, Bryan Pendleton, Glenn Durfee, Steve Cousins, Dirk Balfanz, Hadar Shemtov