Patents by Inventor John Jules Alexander Boyer
John Jules Alexander Boyer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10178078Abstract: A secure and transparent digital credential sharing arrangement which utilizes one or more cryptographic levels of indirection to obfuscate a sharing entity's credentials from those entities authorized to share the credentials. A security policy table is provided which allows the sharing entity to selectively authorize or revoke digital credential sharing among a plurality of entities. Various embodiments of the invention provide for secure storage and retrieval of digital credentials from security tokens such as smart cards. The secure sharing arrangement may be implemented in hierarchical or non-hierarchical embodiments as desired.Type: GrantFiled: December 27, 2016Date of Patent: January 8, 2019Assignee: Assa Abloy ABInventors: John Jules Alexander Boyer, Eric F. Le Saint
-
Patent number: 9722972Abstract: A method of establishing a secure communications path between a first local server on a local network and a device on a wide area network comprising: establishing a first secure communications connection between a second local server on the local network and the device; establishing a second secure communications connection between the second local server and the first local server, wherein the second local server impersonates the device for at least a portion of the connection request; and proxying data between the local server and the device.Type: GrantFiled: February 26, 2012Date of Patent: August 1, 2017Assignee: Oracle International CorporationInventors: Ali K. Ahmed, John Jules Alexander Boyer, Kenneth Montagna, Timothy Michael Shephard
-
Publication number: 20170195368Abstract: A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.Type: ApplicationFiled: January 10, 2017Publication date: July 6, 2017Inventors: Eric F. Le Saint, John Jules Alexander Boyer
-
Patent number: 9602549Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: GrantFiled: December 15, 2015Date of Patent: March 21, 2017Assignee: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
-
Patent number: 9576111Abstract: A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.Type: GrantFiled: April 9, 2014Date of Patent: February 21, 2017Assignee: Assa Abloy ABInventors: Eric F. Le Saint, John Jules Alexander Boyer
-
Patent number: 9563757Abstract: A secure and transparent digital credential sharing arrangement which utilizes one or more cryptographic levels of indirection to obfuscate a sharing entity's credentials from those entities authorized to share the credentials. A security policy table is provided which allows the sharing entity to selectively authorize or revoke digital credential sharing among a plurality of entities. Various embodiments of the invention provide for secure storage and retrieval of digital credentials from security tokens such as smart cards. The secure sharing arrangement may be implemented in hierarchical or non-hierarchical embodiments as desired.Type: GrantFiled: June 5, 2013Date of Patent: February 7, 2017Assignee: Assa Abloy ABInventors: John Jules Alexander Boyer, Eric F. Le Saint
-
Patent number: 9563772Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: GrantFiled: September 1, 2015Date of Patent: February 7, 2017Assignee: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
-
Publication number: 20160112458Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: ApplicationFiled: December 15, 2015Publication date: April 21, 2016Applicant: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
-
Patent number: 9246893Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: GrantFiled: March 14, 2014Date of Patent: January 26, 2016Assignee: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
-
Publication number: 20150371045Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: ApplicationFiled: September 1, 2015Publication date: December 24, 2015Applicant: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Timothy Michael Shephard, Vinay Prabhu, Ruchir Tewari
-
Patent number: 9129112Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: GrantFiled: March 15, 2013Date of Patent: September 8, 2015Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Tim Shephard, Vinay Prabhu, Ruchir Tewari
-
Publication number: 20140359301Abstract: A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.Type: ApplicationFiled: April 9, 2014Publication date: December 4, 2014Applicant: ASSA ABLOY ABInventors: Eric F. Le Saint, John Jules Alexander Boyer
-
Publication number: 20140281548Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: ApplicationFiled: March 14, 2014Publication date: September 18, 2014Applicant: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Tim Shephard, Vinay Prabhu, Ruchir Tewari
-
Publication number: 20140282833Abstract: Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: Oracle International CorporationInventors: John Jules Alexander Boyer, Ali Kamran Ahmed, Tim Shephard, Vinay Prabhu, Ruchir Tewari
-
Publication number: 20130227291Abstract: A method of establishing a secure communications path between a first local server on a local network and a device on a wide area network comprising: establishing a first secure communications connection between a second local server on the local network and the device; establishing a second secure communications connection between the second local server and the first local server, wherein the second local server impersonates the device for at least a portion of the connection request; and proxying data between the local server and the deviceType: ApplicationFiled: February 26, 2012Publication date: August 29, 2013Inventors: Ali K. Ahmed, John Jules Alexander Boyer, Kenneth Montagna, Timothy Michael Shephard
-
Publication number: 20110078776Abstract: A secure and transparent digital credential sharing arrangement which utilizes one or more cryptographic levels of indirection to obfuscate a sharing entity's credentials from those entities authorized to share the credentials. A security policy table is provided which allows the sharing entity to selectively authorize or revoke digital credential sharing among a plurality of entities. Various embodiments of the invention provide for secure storage and retrieval of digital credentials from security tokens such as smart cards. The secure sharing arrangement may be implemented in hierarchical or non-hierarchical embodiments as desired.Type: ApplicationFiled: August 12, 2010Publication date: March 31, 2011Inventors: John Jules Alexander Boyer, Eric Fernand Le Saint
-
Patent number: 7802293Abstract: A secure and transparent digital credential sharing arrangement which utilizes one or more cryptographic levels of indirection to obfuscate a sharing entity's credentials from those entities authorized to share the credentials. A security policy table is provided which allows the sharing entity to selectively authorize or revoke digital credential sharing among a plurality of entities. Various embodiments of the invention provide for secure storage and retrieval of digital credentials from security tokens such as smart cards. The secure sharing arrangement may be implemented in hierarchical or non-hierarchical embodiments as desired.Type: GrantFiled: April 5, 2006Date of Patent: September 21, 2010Assignee: ActivIdentity, Inc.Inventors: John Jules Alexander Boyer, Eric Fernand Le Saint
-
Patent number: 7787661Abstract: A system is used for authorizing access to a Personal Security Device. This system comprises a Personal Security Device 75 and another device 105 which is in functional communication with said Personal Security Device. Said Personal Security Device comprises identification information retrieval data and a biometric authentication application 200 which transfers said identification information retrieval data to said other device 105 in response to an identified match between biometric data sent by said other device and a predetermined biometric reference. Said other device 105 comprises a security executive application 230 for retrieving an Identification Information with at least said identification information retrieval data, thus generating a retrieved Identification Information, and transferring said retrieved Identification Information to said Personal Security Device 75.Type: GrantFiled: March 29, 2006Date of Patent: August 31, 2010Assignee: ActivIdentity, Inc.Inventors: Eric Fernand Le Saint, Dominique Louis Fedronic, John Jules Alexander Boyer, Hong Liu