Patents by Inventor Larry Hal Henderson

Larry Hal Henderson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8250633
    Abstract: In various embodiments, techniques for flexible resource authentication are provided. A principal attempts to login to a target resource using first credentials. The target resource does not recognize the first credentials and in response thereto forwards the first credentials to an identity service. The identity service authenticates the principal via the first credentials and supplies second credentials to the target resource. The target resource recognizes and authenticates the second credentials and grants access to the principal.
    Type: Grant
    Filed: October 26, 2007
    Date of Patent: August 21, 2012
    Assignee: EMC Corporation
    Inventors: Srinivas Vedula, Larry Hal Henderson, Stephen Kent Winn
  • Publication number: 20100218233
    Abstract: Techniques for credential auditing are provided. Histories for credentials are evaluated against a principal credential policy for a user and an enterprise credential policy for an enterprise as a whole. An audit trail is produced within a report for the histories. The report indicates whether compliance with the principal and enterprise credential policies occurred and if not at least one reason is provided as to why compliance was not met within the histories.
    Type: Application
    Filed: February 23, 2009
    Publication date: August 26, 2010
    Inventors: Larry Hal Henderson, Brett A. Berger
  • Patent number: 7707416
    Abstract: A computer receives a request for authentication from a client. The computer forwards the authentication request to an authentication source. Once the authentication source has validated the authentication request, the computer requests authentication and cache control information from the authentication source. The computer uses the authentication and cache control information to populate a user object stored in a container hierarchy and enable the computer to authenticate an authentication request without forwarding the authentication request to the authentication source.
    Type: Grant
    Filed: February 7, 2008
    Date of Patent: April 27, 2010
    Assignee: Novell, Inc.
    Inventors: Scott Alan Isaacson, Daniel Gene Fritch, Larry Hal Henderson, Lynn Wells Crabb, James Duane Nyland, Jr.
  • Publication number: 20090150677
    Abstract: Techniques real-time adaptive password policies are presented. Patterns for passwords are regularly analyzed along with other factors associated with the patterns to dynamically determine password strength values. The strength values can change over time based on usage statistics. When a strength value falls below an acceptable threshold, passwords associated with that particular pattern can be downgraded or rejected in real-time and existing policy can be adapted to reflect the undesirability of that pattern.
    Type: Application
    Filed: December 6, 2007
    Publication date: June 11, 2009
    Inventors: Srinivas Vedula, Cameron Craig Morris, Larry Hal Henderson
  • Publication number: 20090113523
    Abstract: In various embodiments, techniques for flexible resource authentication are provided. A principal attempts to login to a target resource using first credentials. The target resource does not recognize the first credentials and in response thereto forwards the first credentials to an identity service. The identity service authenticates the principal via the first credentials and supplies second credentials to the target resource. The target resource recognizes and authenticates the second credentials and grants access to the principal.
    Type: Application
    Filed: October 26, 2007
    Publication date: April 30, 2009
    Inventors: Srinivas Vedula, Larry Hal Henderson, Stephen Kent Winn
  • Patent number: 7487535
    Abstract: A computer receives an authentication request from a client. The computer creates a temporary user object and populates it with identification information from the authentication request. The computer then forwards the authentication request to an authentication source. Once the authentication source has validated the authentication request, the computer queries the authentication source for identification information, populates the temporary user object with the identification information, and makes the user object permanent.
    Type: Grant
    Filed: February 1, 2002
    Date of Patent: February 3, 2009
    Assignee: Novell, Inc.
    Inventors: Scott A. Isaacson, Daniel G. Fritch, Larry Hal Henderson, Lynn W. Crabb, James D. Nyland, Jr.
  • Publication number: 20080133914
    Abstract: A computer receives a request for authentication from a client. The computer forwards the authentication request to an authentication source. Once the authentication source has validated the authentication request, the computer requests authentication and cache control information from the authentication source. The computer uses the authentication and cache control information to populate a user object stored in a container hierarchy and enable the computer to authenticate an authentication request without forwarding the authentication request to the authentication source.
    Type: Application
    Filed: February 7, 2008
    Publication date: June 5, 2008
    Applicant: NOVELL, INC.
    Inventors: Scott Alan Isaacson, Daniel Gene Fritch, Larry Hal Henderson, Lynn Wells Crabb, James Duane Nyland