Patents by Inventor Larry Hal Henderson

Larry Hal Henderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190036915
    Abstract: A Time-based One-Time Password (TOTP) validator is interposed between a principal and a network service. The validator interacts with a mobile application (app) on the mobile device associated with the principal to dynamically supply a validator secret. The secret and, perhaps, other information are processed by the app to generate a TOTP when the principal attempts to access a protected resource of the network service. The validator independently generates the TOTP and compares the app generated TOTP, and on a successful match, a principal's access device is redirected for access to the protected resource.
    Type: Application
    Filed: August 23, 2018
    Publication date: January 31, 2019
    Inventors: Lloyd Leon Burch, Duane Fredrick Buss, Larry Hal Henderson
  • Patent number: 10084773
    Abstract: A Time-based One-Time Password (TOTP) validator is interposed between a principal and a network service. The validator interacts with a mobile application (app) on the mobile device associated with the principal to dynamically supply a validator secret. The secret and, perhaps, other information are processed by the app to generate a TOTP when the principal attempts to access a protected resource of the network service. The validator independently generates the TOTP and compares the app generated TOTP, and on a successful match, a principal's access device is redirected for access to the protected resource.
    Type: Grant
    Filed: April 26, 2016
    Date of Patent: September 25, 2018
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Duane Fredrick Buss, Larry Hal Henderson
  • Patent number: 10021144
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Grant
    Filed: June 13, 2016
    Date of Patent: July 10, 2018
    Assignee: Micro Focus Software Inc.
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R Carter
  • Publication number: 20160352779
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Application
    Filed: June 13, 2016
    Publication date: December 1, 2016
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R. Carter
  • Publication number: 20160241550
    Abstract: A Time-based One-Time Password (TOTP) validator is interposed between a principal and a network service. The validator interacts with a mobile application (app) on the mobile device associated with the principal to dynamically supply a validator secret. The secret and, perhaps, other information are processed by the app to generate a TOTP when the principal attempts to access a protected resource of the network service. The validator independently generates the TOTP and compares the app generated TOTP, and on a successful match, a principal's access device is redirected for access to the protected resource.
    Type: Application
    Filed: April 26, 2016
    Publication date: August 18, 2016
    Inventors: Lloyd Leon Burch, Duane Fredrick Buss, Larry Hal Henderson
  • Patent number: 9369494
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Grant
    Filed: August 13, 2014
    Date of Patent: June 14, 2016
    Assignee: Novell, Inc.
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R Carter
  • Patent number: 9332008
    Abstract: A Time-based One-Time Password (TOTP) validator is interposed between a principal and a network service. The validator interacts with a mobile application (app) on the mobile device associated with the principal to dynamically supply a validator secret. The secret and, perhaps, other information are processed by the app to generate a TOTP when the principal attempts to access a protected resource of the network service. The validator independently generates the TOTP and compares the app generated TOTP, and on a successful match, a principal's access device is redirected for access to the protected resource.
    Type: Grant
    Filed: March 28, 2014
    Date of Patent: May 3, 2016
    Assignee: NetIQ Corporation
    Inventors: Lloyd Leon Burch, Duane Fredrick Buss, Larry Hal Henderson
  • Publication number: 20150281222
    Abstract: A Time-based One-Time Password (TOTP) validator is interposed between a principal and a network service. The validator interacts with a mobile application (app) on the mobile device associated with the principal to dynamically supply a validator secret. The secret and, perhaps, other information are processed by the app to generate a TOTP when the principal attempts to access a protected resource of the network service. The validator independently generates the TOTP and compares the app generated TOTP, and on a successful match, a principal's access device is redirected for access to the protected resource.
    Type: Application
    Filed: March 28, 2014
    Publication date: October 1, 2015
    Applicant: Novell, Inc.
    Inventors: Lloyd Leon Burch, Duane Fredrick Buss, Larry Hal Henderson
  • Publication number: 20140351894
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Application
    Filed: August 13, 2014
    Publication date: November 27, 2014
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R. Carter
  • Patent number: 8813192
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Grant
    Filed: May 4, 2011
    Date of Patent: August 19, 2014
    Assignee: Novell, Inc.
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R Carter
  • Publication number: 20140047521
    Abstract: Techniques for credential auditing are provided. Histories for credentials are evaluated against a principal credential policy for a user and an enterprise credential policy for an enterprise as a whole. An audit trail is produced within a report for the histories. The report indicates whether compliance with the principal and enterprise credential policies occurred and if not at least one reason is provided as to why compliance was not met within the histories.
    Type: Application
    Filed: July 2, 2013
    Publication date: February 13, 2014
    Inventors: Larry Hal HENDERSON, Brett A. BERGER
  • Publication number: 20140047520
    Abstract: Techniques for credential auditing are provided. Histories for credentials are evaluated against a principal credential policy for a user and an enterprise credential policy for an enterprise as a whole. An audit trail is produced within a report for the histories. The report indicates whether compliance with the principal and enterprise credential policies occurred and if not at least one reason is provided as to why compliance was not met within the histories.
    Type: Application
    Filed: July 2, 2013
    Publication date: February 13, 2014
    Inventors: LARRY HAL HENDERSON, BRETT A. BERGER
  • Publication number: 20140047499
    Abstract: Techniques for credential auditing are provided. Histories for credentials are evaluated against a principal credential policy for a user and an enterprise credential policy for an enterprise as a whole. An audit trail is produced within a report for the histories. The report indicates whether compliance with the principal and enterprise credential policies occulted and if not at least one reason is provided as to why compliance was not met within the histories.
    Type: Application
    Filed: July 2, 2013
    Publication date: February 13, 2014
    Applicant: Oracle International Corporation
    Inventors: LARRY HAL HENDERSON, BRETT A. BERGER
  • Patent number: 8495715
    Abstract: Techniques for credential auditing are provided. Histories for credentials are evaluated against a principal credential policy for a user and an enterprise credential policy for an enterprise as a whole. An audit trail is produced within a report for the histories. The report indicates whether compliance with the principal and enterprise credential policies occurred and if not at least one reason is provided as to why compliance was not met within the histories.
    Type: Grant
    Filed: February 23, 2009
    Date of Patent: July 23, 2013
    Assignee: Oracle International Corporation
    Inventors: Larry Hal Henderson, Brett A. Berger
  • Patent number: 8332918
    Abstract: Techniques real-time adaptive password policies are presented. Patterns for passwords are regularly analyzed along with other factors associated with the patterns to dynamically determine password strength values. The strength values can change over time based on usage statistics. When a strength value falls below an acceptable threshold, passwords associated with that particular pattern can be downgraded or rejected in real-time and existing policy can be adapted to reflect the undesirability of that pattern.
    Type: Grant
    Filed: December 6, 2007
    Date of Patent: December 11, 2012
    Assignee: Novell, Inc.
    Inventors: Srinivas Vedula, Cameron Craig Morris, Larry Hal Henderson
  • Publication number: 20120284780
    Abstract: Techniques for establishing a trusted cloud service are provided. Packages are created for services that include certificates, configuration information, trust information, and images for deploying instances of the services. The packages can be used to deploy the services in trusted environments and authenticated to deploy in sub environments of un-trusted environments. The sub environments are trusted by the trusted environments. Also, clouds are prospected for purposes of identifying desirable clouds and creating the packages for deployment.
    Type: Application
    Filed: May 4, 2011
    Publication date: November 8, 2012
    Inventors: Bruce L. Bergeson, Carl Tietjen, Carolyn B. McClain, Larry Hal Henderson, Stephen R. Carter
  • Patent number: 8250633
    Abstract: In various embodiments, techniques for flexible resource authentication are provided. A principal attempts to login to a target resource using first credentials. The target resource does not recognize the first credentials and in response thereto forwards the first credentials to an identity service. The identity service authenticates the principal via the first credentials and supplies second credentials to the target resource. The target resource recognizes and authenticates the second credentials and grants access to the principal.
    Type: Grant
    Filed: October 26, 2007
    Date of Patent: August 21, 2012
    Assignee: EMC Corporation
    Inventors: Srinivas Vedula, Larry Hal Henderson, Stephen Kent Winn
  • Publication number: 20100218233
    Abstract: Techniques for credential auditing are provided. Histories for credentials are evaluated against a principal credential policy for a user and an enterprise credential policy for an enterprise as a whole. An audit trail is produced within a report for the histories. The report indicates whether compliance with the principal and enterprise credential policies occurred and if not at least one reason is provided as to why compliance was not met within the histories.
    Type: Application
    Filed: February 23, 2009
    Publication date: August 26, 2010
    Inventors: Larry Hal Henderson, Brett A. Berger
  • Patent number: 7707416
    Abstract: A computer receives a request for authentication from a client. The computer forwards the authentication request to an authentication source. Once the authentication source has validated the authentication request, the computer requests authentication and cache control information from the authentication source. The computer uses the authentication and cache control information to populate a user object stored in a container hierarchy and enable the computer to authenticate an authentication request without forwarding the authentication request to the authentication source.
    Type: Grant
    Filed: February 7, 2008
    Date of Patent: April 27, 2010
    Assignee: Novell, Inc.
    Inventors: Scott Alan Isaacson, Daniel Gene Fritch, Larry Hal Henderson, Lynn Wells Crabb, James Duane Nyland, Jr.
  • Publication number: 20090150677
    Abstract: Techniques real-time adaptive password policies are presented. Patterns for passwords are regularly analyzed along with other factors associated with the patterns to dynamically determine password strength values. The strength values can change over time based on usage statistics. When a strength value falls below an acceptable threshold, passwords associated with that particular pattern can be downgraded or rejected in real-time and existing policy can be adapted to reflect the undesirability of that pattern.
    Type: Application
    Filed: December 6, 2007
    Publication date: June 11, 2009
    Inventors: Srinivas Vedula, Cameron Craig Morris, Larry Hal Henderson