Patents by Inventor James G. Sermersheim

James G. Sermersheim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8468576
    Abstract: A selector daemon can run in the background of a computer. Applications that are capable of processing information cards directly, without requiring the use of a card selector, can request the selector daemon to list information cards that satisfy security policy. Upon receiving such a request, selector daemon can determine the information cards available on the computer that satisfy the security policy, and can identify these information cards to the requesting application. The applications can then use the identified information cards in any manner desired, without having to use a card selector: for example, by requesting a security token based on one of the information cards directly from an identity provider.
    Type: Grant
    Filed: October 1, 2008
    Date of Patent: June 18, 2013
    Assignee: Apple Inc.
    Inventors: Thomas E. Doman, Duane F. Buss, Daniel S. Sanders, Andrew A. Hodgkinson, James G. Sermersheim, James M. Norman
  • Patent number: 8370913
    Abstract: A user defines an audit policy. The audit policy identifies one or more triggers that, when related information is included in a security token, trigger the performance of the audit. The audit can include notifying the user in some manner that the trigger occurred. The audit can require in-line confirmation of the audit, so that the security token is not transmitted until the user confirms the audit.
    Type: Grant
    Filed: August 22, 2007
    Date of Patent: February 5, 2013
    Assignee: Apple Inc.
    Inventors: Andrew A. Hodgkinson, Duane F. Buss, Thomas E. Doman, Patrick R. Felsted, James G. Sermersheim
  • Patent number: 8364600
    Abstract: A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
    Type: Grant
    Filed: February 28, 2011
    Date of Patent: January 29, 2013
    Assignee: Apple Inc.
    Inventors: Patrick R. Felsted, Thomas E. Doman, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson, Dale R. Olds
  • Publication number: 20130024908
    Abstract: A selector daemon can run in the background of a computer. Applications that are capable of processing information cards directly, without requiring the use of a card selector, can request the selector daemon to list information cards that satisfy security policy. Upon receiving such a request, selector daemon can determine the information cards available on the computer that satisfy the security policy, and can identify these information cards to the requesting application. The applications can then use the identified information cards in any manner desired, without having to use a card selector: for example, by requesting a security token based on one of the information cards directly from an identity provider.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 24, 2013
    Applicant: APPLE INC.
    Inventors: Thomas E. Doman, Duane F. Buss, Daniel S. Sanders, Andrew A. Hodgkinson, James G. Sermersheim, James M. Norman
  • Publication number: 20130014207
    Abstract: A user defines an audit policy. The audit policy identifies one or more triggers that, when related information is included in a security token, trigger the performance of the audit. The audit can include notifying the user in some manner that the trigger occurred. The audit can require in-line confirmation of the audit, so that the security token is not transmitted until the user confirms the audit.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Applicant: APPLE INC.
    Inventors: Andrew A. Hodgkinson, Duane F. Buss, Thomas E. Doman, Patrick R. Felsted, James G. Sermersheim
  • Patent number: 8073783
    Abstract: A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
    Type: Grant
    Filed: August 22, 2007
    Date of Patent: December 6, 2011
    Inventors: Patrick R. Felsted, Thomas E. Doman, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson, Dale R. Olds
  • Patent number: 8074257
    Abstract: When a user connects a pluggable card store to a machine, the machine plugs a pluggable card provider into a card provider registry. The pluggable card store can be an object portable to the user, or can be a remote store available via some connection, such as an FTP connection. The user can then use the information cards stored on the pluggable card store in a transaction.
    Type: Grant
    Filed: August 22, 2007
    Date of Patent: December 6, 2011
    Inventors: Patrick R. Felsted, Andrew A. Hodgkinson, Daniel S. Sanders, James G. Sermersheim, James Mark Norman
  • Publication number: 20110153499
    Abstract: A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
    Type: Application
    Filed: February 28, 2011
    Publication date: June 23, 2011
    Applicant: NOVELL, INC.
    Inventors: Patrick R. Felsted, Thomas E. Doman, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson, Dale R. Olds
  • Publication number: 20090272797
    Abstract: A system and method for dynamic rendering of information cards is provided. A card selector uses policies and rendering content to modify the presentation of information cards in the card selector. The policies and rendering content can be obtained from identity providers and relying parties. The rendering content can be obtained each time the card selector is invoked, just prior to rendering the information cards, or at other times specified in the policy. The rendering content can be displayed in a display area of the information card or in a content canvas outside the display area of the information card.
    Type: Application
    Filed: April 30, 2008
    Publication date: November 5, 2009
    Applicant: NOVELL, INC. A DELAWARE CORPORATION
    Inventors: Thomas E. Doman, Duane F. Buss, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson
  • Publication number: 20090228885
    Abstract: A system and method for managing information cards using workflows is provided. A workflow manager in a card selector allows the user to initiate cardflows in the card selector. The workflow manager is extensible and programmable so that additional user-defined or industry-defined cardflows can be added to the workflow manager.
    Type: Application
    Filed: March 7, 2008
    Publication date: September 10, 2009
    Applicant: NOVELL, INC.
    Inventors: Duane F. Buss, Thomas E. Doman, Andrew A. Hodgkinson, Daniel S. Sanders, James G. Sermersheim
  • Publication number: 20090205035
    Abstract: A computer system accesses metadata about an information card. The metadata can be stored locally or remotely (for example, at an identity provider). A metadata engine can be used to generate data to be provided to the user from the metadata: this data can take any desired form, such as an advertisement, a state of the user's account, or a policy update, among other possibilities.
    Type: Application
    Filed: February 12, 2008
    Publication date: August 13, 2009
    Applicant: NOVELL, INC.
    Inventors: James G. Sermersheim, Duane F. Buss, Thomas E. Doman, Andrew A. Hodgkinson, Dale R. Olds, Daniel S. Sanders
  • Publication number: 20090204542
    Abstract: A computer system accesses reputation information about a relying party. The reputation information can be stored locally or remotely (for example, at an identity provider or reputation service). A reputation information engine can be used to provide the reputation information to the user. The user can then use the reputation information in performing a transaction with the relying party.
    Type: Application
    Filed: March 4, 2008
    Publication date: August 13, 2009
    Applicant: NOVELL, INC.
    Inventors: Thomas E. Doman, Daniel S. Sanders, Duane F. Buss, Andrew A. Hodgkinson, James G. Sermersheim
  • Publication number: 20090204622
    Abstract: A user desires to select information about himself. The system uses policies applicable to the display of the user's information and metadata about the user and the information to determine modified presentations of the user's information. The modified information can include visual and non-visual cues (such as aural, olfactory, or tactile). The system then displays the modified information, presenting the user with the visual and non-visual cues about the information.
    Type: Application
    Filed: February 11, 2008
    Publication date: August 13, 2009
    Applicant: NOVELL, INC.
    Inventors: Daniel S. Sanders, Duane F. Buss, Thomas E. Doman, Andrew A. Hodgkinson, James G. Sermersheim, John M. Calcote
  • Publication number: 20090077655
    Abstract: A user engages in a transaction with a relying party through a computer system. The relying party requests identity information from the user using HTML extensions. The computer system includes a web browser having browser extensions. The HTML extensions cause the web browser to call a card selector invoker. The card selector invoker invokes a card selector to provide a security token. The card selector invoker extracts identity information from the security token and provides the identity information to the web browser. The computer system then returns the identity information to the relying party.
    Type: Application
    Filed: January 24, 2008
    Publication date: March 19, 2009
    Applicant: NOVELL, INC.
    Inventors: James G. SERMERSHEIM, Duane F. BUSS, Andrew A. HODGKINSON, Daniel S. SANDERS
  • Publication number: 20080229398
    Abstract: When a user connects a pluggable card store to a machine, the machine plugs a pluggable card provider into a card provider registry. The pluggable card store can be an object portable to the user, or can be a remote store available via some connection, such as an FTP connection. The user can then use the information cards stored on the pluggable card store in a transaction.
    Type: Application
    Filed: August 22, 2007
    Publication date: September 18, 2008
    Applicant: NOVELL, INC.
    Inventors: Patrick R. Felsted, Andrew A. Hodgkinson, Daniel S. Sanders, James G. Sermersheim, James M. Norman
  • Publication number: 20080229410
    Abstract: A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
    Type: Application
    Filed: August 22, 2007
    Publication date: September 18, 2008
    Applicant: NOVELL, INC.
    Inventors: Patrick R. Felsted, Thomas E. Doman, James G. Sermersheim, Daniel S. Sanders, Andrew A. Hodgkinson, Dale R. Olds
  • Publication number: 20080229384
    Abstract: A user defines an audit policy. The audit policy identifies one or more triggers that, when related information is included in a security token, trigger the performance of the audit. The audit can include notifying the user in some manner that the trigger occurred. The audit can require in-line confirmation of the audit, so that the security token is not transmitted until the user confirms the audit.
    Type: Application
    Filed: August 22, 2007
    Publication date: September 18, 2008
    Applicant: NOVELL, INC.
    Inventors: Andrew A. Hodgkinson, Duane F. Buss, Thomas E. Doman, Patrick R. Felsted, James G. Sermersheim